Add office photos
Premium Employer

NTT Data Information Processing Services

4.0
based on 6.5k Reviews
Filter interviews by

100+ Acurus Solutions Interview Questions and Answers

Updated 16 Dec 2024
Popular Designations

Q1. On an average, how many invoices can you process in a day?

Ans.

I can process around 50-60 invoices per day depending on the complexity.

  • The number of invoices processed can vary based on the complexity of the invoices.

  • I have experience in using various invoice processing software which helps in increasing the efficiency.

  • I prioritize the invoices based on their due dates and ensure timely processing.

View 9 more answers

Q2. What is ost and pst in Outlook, what is distribution list and mailbox, how to create new data file in Outlook, how to fix bsod issue in windows OS, what is bios and key to enter in bios, what is office 365, dif...

read more
Ans.

Questions related to Outlook, Windows OS, and Office 365.

  • OST and PST are file formats used by Outlook to store data.

  • Distribution list is a group of email addresses used for sending emails to multiple recipients.

  • Mailbox is a storage location for emails and other data in Outlook.

  • To create a new data file in Outlook, go to File > New > Outlook Data File.

  • BSOD issue in Windows OS can be fixed by updating drivers or running system diagnostics.

  • BIOS is a firmware that initializes har...read more

View 2 more answers

Q3. What is the KPI in your organisation?

Ans.

The KPI in our organization is customer satisfaction.

  • Customer satisfaction is measured through surveys and feedback.

  • We track the percentage of satisfied customers on a monthly basis.

  • We also monitor the number of customer complaints and aim to reduce them.

  • Improving customer satisfaction is a key focus for our team.

View 3 more answers

Q4. What is the difference between SLA and TAT?

Ans.

SLA stands for Service Level Agreement, while TAT stands for Turnaround Time.

  • SLA is a contractual agreement between a service provider and a customer, defining the level of service expected.

  • TAT refers to the time taken to complete a specific task or process.

  • SLA focuses on the quality and availability of services, while TAT focuses on the speed of completing tasks.

  • SLA is usually measured in terms of percentage uptime or response time, while TAT is measured in hours, minutes, o...read more

View 3 more answers
Discover Acurus Solutions interview dos and don'ts from real experiences

Q5. What is the TAT for processing an invoice?

Ans.

The TAT for processing an invoice varies depending on the complexity of the invoice and the company's internal processes.

  • The TAT can range from a few days to several weeks.

  • Factors that can affect the TAT include the accuracy of the invoice, the approval process, and the payment terms.

  • Automating the invoice processing system can help reduce the TAT and improve efficiency.

  • Regularly reviewing and optimizing the invoice processing system can also help reduce the TAT.

  • It is importa...read more

View 5 more answers

Q6. Explain me Raid? how many raid are there? which raid is best to use?

Ans.

RAID stands for Redundant Array of Independent Disks. It is a data storage technology that combines multiple physical disks into a single logical unit.

  • There are several types of RAID, including RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, and more.

  • RAID 0 offers no redundancy but provides improved performance by striping data across multiple disks.

  • RAID 1 provides mirroring of data across two disks, offering redundancy but no performance improvement.

  • RAID 5 uses striping with parity...read more

View 3 more answers
Are these interview questions helpful?

Q7. How to raise the ticket , which type of ticket portal you are using

Add your answer

Q8. How to identify the cost of ospf ? What are the bgp attributes? How stp works

Ans.

Identifying OSPF cost, BGP attributes, and STP working

  • OSPF cost is calculated based on the bandwidth of the link

  • BGP attributes include AS path, next hop, local preference, etc.

  • STP works by selecting a root bridge and blocking redundant paths

  • OSPF cost can be manually configured using the 'ip ospf cost' command

  • BGP attributes are used to determine the best path for routing

  • STP uses BPDU messages to exchange information and build a loop-free topology

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Performance of virtual machine ( from VC, ESXtop), critical issue faced, Dvswitch/standard switch difference, Network security/teaming policy, full scenario for PSC, Virtual center upgrade and what ever you men...

read more
Ans.

The question covers various aspects of virtual machine performance, network security, and upgrades.

  • Virtual machine performance can be monitored using tools like VC and ESXtop.

  • Critical issues faced can include resource contention, network congestion, and storage latency.

  • Dvswitch and standard switch have differences in terms of features and capabilities.

  • Network security can be ensured through policies like teaming and VLANs.

  • PSC and Virtual Center upgrades require careful planni...read more

Add your answer

Q10. A scrum master in Agile is equivalent to which position in water fall?

Ans.

Scrum Master in Agile is equivalent to Project Manager in Waterfall.

  • Scrum Master is responsible for facilitating the Agile process and ensuring the team follows it.

  • Project Manager is responsible for managing the project from start to finish in Waterfall.

  • Both roles involve managing the team and ensuring the project is completed on time and within budget.

  • However, the approach and methodology used are different in Agile and Waterfall.

Add your answer

Q11. Select columnname as 1 from employee table,Output if employee table contain 100 record?

Ans.

The question is asking to select a column named 'columnname' as '1' from the employee table and provide the output if the table contains 100 records.

  • The column 'columnname' does not exist in the employee table, so the query will result in an error.

  • The value '1' will be selected for each record in the employee table, resulting in 100 rows with the value '1'.

  • The output will be a single column with 100 rows, all containing the value '1'.

View 1 answer

Q12. What is jvm,jdk,jre Finall, finally, finalize key words String, string builder, string buffer, Code output Difference between hash map,hast set Advantages of array list and linked list And program Oops concepts...

read more
Ans.

Java Developer interview questions covering JVM, keywords, data structures, OOPs concepts, and Java features.

  • JVM is Java Virtual Machine that executes Java bytecode

  • JDK is Java Development Kit that includes JRE and development tools

  • JRE is Java Runtime Environment that provides runtime environment for Java programs

  • finally block is used to execute code after try-catch block

  • finalize method is called by garbage collector before object is destroyed

  • String is immutable, StringBuilder...read more

Add your answer

Q13. What is service management? How do you handle escalations and difficult customers? What is a Service Level Agreement (SLA), and what are the different types of SLAs? Current job responsibilities and deliverable...

read more
Ans.

Service management involves handling customer escalations, ensuring SLAs are met, and delivering high-quality service.

  • Service management involves overseeing the delivery of services to customers, ensuring their needs are met and issues are resolved efficiently.

  • Handling escalations involves addressing customer complaints or issues that have not been resolved through regular channels, and finding solutions to satisfy the customer.

  • Dealing with difficult customers requires patien...read more

Add your answer

Q14. Which type of email client is using in your company

Add your answer

Q15. What if product owner adds a user story in the middle of the sprint ?

Ans.

It is not recommended to add user stories in the middle of the sprint.

  • Product owner should be advised to wait until the next sprint planning meeting to add the user story.

  • If the user story is critical, the team should discuss and decide if it can be accommodated within the current sprint.

  • Adding user stories in the middle of the sprint can disrupt the team's focus and impact the sprint goal.

  • The Scrum Master should facilitate a discussion with the team and product owner to dete...read more

Add your answer

Q16. if disk is full what will u do?

Ans.

Free up disk space by identifying and removing unnecessary files.

  • Identify large files and delete them

  • Remove old log files

  • Clear cache and temporary files

  • Compress large files

  • Move files to another disk or server

Add your answer

Q17. what version of redhat have you worked on?

Ans.

I have worked on Red Hat Enterprise Linux versions 6, 7, and 8.

  • I have experience with installation, configuration, and maintenance of Red Hat Enterprise Linux servers.

  • I have worked with Red Hat Enterprise Linux 6, 7, and 8 in both physical and virtual environments.

  • I have experience with package management, user management, and security hardening on Red Hat Enterprise Linux.

  • I have also worked with Red Hat Satellite for patch management and automation.

  • Examples of projects I hav...read more

Add your answer

Q18. what is the difference between zombie and orphan?

Ans.

Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.

  • Zombie process is waiting for its parent to read its exit status

  • Orphan process is adopted by init process (PID 1)

  • Zombie process can be removed by killing its parent process

  • Orphan process can continue running even after its parent has terminated

Add your answer

Q19. How to installing the application in your client system

Add your answer

Q20. What is Wcag 2.2 ? What more new guidelines it has

Ans.

WCAG 2.2 is the latest version of Web Content Accessibility Guidelines with new guidelines for making web content more accessible.

  • WCAG 2.2 includes 9 new success criteria and updates to existing ones

  • New success criteria include requirements for mobile accessibility, contrast, and language clarity

  • WCAG 2.2 also emphasizes the need for accessibility in emerging technologies like virtual and augmented reality

  • WCAG 2.2 is not yet an official standard, but is in draft form for publi...read more

Add your answer

Q21. How do you implement custom middleware in .net core?

Ans.

Custom middleware in .NET Core can be implemented by creating a class that implements the IMiddleware interface and adding it to the application pipeline.

  • Create a class that implements the IMiddleware interface

  • Implement the InvokeAsync method in the middleware class to handle the request processing logic

  • Add the custom middleware to the application pipeline in the Configure method of the Startup class

Add your answer

Q22. What is Test Prioritization and How we apply to our Test Case?

Ans.

Test prioritization is the process of determining the order in which tests should be executed based on their importance and risk.

  • Tests are prioritized based on their impact on the system and the likelihood of failure.

  • Prioritization helps to ensure that critical defects are identified and fixed early in the testing process.

  • Factors such as business requirements, user expectations, and regulatory compliance are considered when prioritizing tests.

  • Test cases with high priority are...read more

Add your answer

Q23. What is Networking how dns cluster works in Linux?

Ans.

Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.

  • Networking involves connecting devices to share resources such as files, printers, and internet access.

  • DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.

  • DNS cluster can be configured using tools like BIND and PowerDNS.

  • DNS cluster can improve the performance and rel...read more

Add your answer

Q24. What is the difference between Citrix and VPN?

Ans.

Citrix is a software platform used for virtualization and remote access, while VPN is a secure network connection that allows users to access a private network remotely.

  • Citrix is a software platform that provides virtualization and remote access solutions.

  • VPN (Virtual Private Network) is a secure network connection that allows users to access a private network remotely.

  • Citrix is often used for accessing applications and desktops remotely, while VPN is used for securely connec...read more

View 1 answer

Q25. Explain me what is network bonding?

Ans.

Network bonding is the process of combining multiple network interfaces into a single logical interface.

  • Network bonding provides redundancy and increased bandwidth.

  • There are different bonding modes such as active-backup, balance-rr, and LACP.

  • Bonding can be configured using the ifenslave utility or through network configuration files.

  • Examples of network interfaces that can be bonded include Ethernet, Wi-Fi, and InfiniBand.

  • Bonding can be used in high availability setups or for ...read more

Add your answer

Q26. Draft email to the customer for delay in Service Delivery

Ans.

Draft email to customer for delay in service delivery

  • Apologize for the delay and explain the reason

  • Provide a new estimated delivery date

  • Offer compensation or discount for the inconvenience caused

  • Assure the customer that steps are being taken to avoid such delays in future

  • End the email with a positive note and thank the customer for their patience

Add your answer

Q27. How you deploying the window patch

Add your answer

Q28. How to get the 5th top position data in Sql?

Ans.

Use the OFFSET and FETCH clauses in SQL to get the 5th top position data.

  • Use the ORDER BY clause to sort the data in descending order.

  • Use the OFFSET clause to skip the first 4 rows.

  • Use the FETCH clause to retrieve only the next row after skipping the first 4 rows.

Add your answer

Q29. What is your current CTC and expected CTC?

Ans.

My current CTC is $50,000 and I am expecting a 10% increase in my next role.

  • Current CTC: $50,000

  • Expected CTC: 10% increase

  • Open to negotiation based on job responsibilities and benefits

Add your answer

Q30. Can we perform DML operation on UDF function?

Ans.

No, DML operations cannot be performed on UDF functions.

  • UDF functions are read-only and cannot modify the data in the database.

  • DML operations can only be performed on tables or views.

  • UDF functions can be used in SELECT statements to retrieve data.

  • Examples of UDF functions include string manipulation, date calculations, and mathematical operations.

Add your answer

Q31. Select a.*,b.* From employee a,Employee2 b? Output please...

Ans.

SQL query to select all columns from two tables.

  • Use SELECT statement to select columns from tables.

  • Use aliases to differentiate columns from different tables.

  • Separate table names with comma in FROM clause.

Add your answer

Q32. How will you perform accessibility testing

Ans.

I will perform accessibility testing by using both manual and automated testing methods.

  • Conduct manual testing to evaluate accessibility features such as keyboard navigation, color contrast, and screen reader compatibility

  • Use automated testing tools like Axe, Wave, and Lighthouse to identify accessibility issues

  • Collaborate with developers and designers to ensure accessibility is integrated throughout the development process

  • Refer to accessibility guidelines such as WCAG 2.1 to...read more

Add your answer

Q33. what are the key configuration steps involved to create Automatic payment program

Ans.

Key configuration steps for creating Automatic payment program in SAP Fico

  • Define payment methods in transaction code FBZP

  • Set up house banks in transaction code FI12

  • Configure payment methods per company code in transaction code FBZP

  • Define payment methods per country in transaction code OBVC4

  • Assign payment methods to vendors in transaction code XK02

Add your answer

Q34. what is sticky bit and sgid?

Ans.

Sticky bit and SGID are special permissions in Linux file system.

  • Sticky bit is denoted by 't' in file permission and restricts deletion of files in a directory by non-owners.

  • SGID is denoted by 's' in file permission and sets the group ID of newly created files to the group of the parent directory.

  • SGID can also be used on executable files to allow users to run them with the permissions of the group that owns the file.

  • SGID can be set on directories to ensure that newly created ...read more

Add your answer

Q35. Explain Authentication & Authorization in asp.net core?

Ans.

Authentication verifies the identity of a user, while authorization determines what resources a user can access.

  • Authentication confirms the identity of a user through credentials like username and password.

  • Authorization determines the permissions and access levels of a user based on their authenticated identity.

  • In ASP.NET Core, authentication is handled through middleware like Identity, OAuth, or JWT tokens.

  • Authorization in ASP.NET Core is managed through policies and roles d...read more

Add your answer

Q36. Which type is VPN using your client

Add your answer

Q37. Design a react app to fetch and display data from an api.

Ans.

Design a React app to fetch and display data from an API.

  • Create a React component to fetch data from the API using fetch or axios

  • Use state to store the fetched data and update the component's UI

  • Render the data in the component's JSX to display it on the screen

Add your answer

Q38. Describe OOP's concepts Difference between throw and throws compile time and runtime polymorphism static methods Exception Handling Program to find occurrences of characters in a string

Ans.

OOP's concepts include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Inheritance: Allowing a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q39. Where are Logic App logs stored?

Ans.

Logic App logs are stored in Azure Monitor Logs (formerly known as Log Analytics).

  • Logic App logs are stored in Azure Monitor Logs, which is a centralized log storage and analytics service in Azure.

  • Logs can be viewed and analyzed using Azure Monitor Logs queries.

  • Logs can also be integrated with other Azure services for monitoring and alerting purposes.

Add your answer

Q40. Return type of patial view and render partial view?

Ans.

Partial view returns HTML string while render partial view writes directly to response stream.

  • Partial view returns HTML string that can be used in the main view

  • Render partial view writes directly to response stream

  • Partial view can be used to render reusable components

  • Render partial view can be used to render a partial view without a layout

Add your answer

Q41. What do you know about NTT Data?

Ans.

NTT Data is a global IT services company providing consulting, application services, and infrastructure services.

  • NTT Data is a subsidiary of Nippon Telegraph and Telephone Corporation, a Japanese telecommunications company.

  • It offers a wide range of services including consulting, application development, and infrastructure management.

  • NTT Data has a presence in over 50 countries and serves clients in various industries such as healthcare, finance, and manufacturing.

  • The company ...read more

Add your answer

Q42. What is bdc and how many type

Ans.

BDC stands for Batch Data Communication. It is a method used in SAP ABAP to transfer data from external systems to SAP.

  • BDC is used to automate the process of data entry in SAP.

  • There are two types of BDC: Classic BDC and Call Transaction Method.

  • Classic BDC involves creating a batch input session and processing it using transaction codes.

  • Call Transaction Method uses the CALL TRANSACTION statement to directly process data without creating a session.

  • BDC is commonly used for tasks...read more

Add your answer

Q43. TCD is based on what criteria?

Ans.

TCD is based on the criteria of time, cost, and deliverables.

  • TCD stands for Time, Cost, and Deliverables.

  • It is a project management approach that focuses on these three criteria.

  • The goal is to complete the project within the given time and budget while delivering the desired results.

  • For example, if a software development project is using TCD, the team will prioritize tasks based on their impact on time, cost, and deliverables.

  • This approach helps to ensure that the project sta...read more

Add your answer

Q44. Explain booting process?

Ans.

Booting process is the sequence of events that occur when a computer system is turned on.

  • BIOS/UEFI firmware initializes hardware components

  • Bootloader loads the kernel into memory

  • Kernel initializes system processes and drivers

  • Init system starts user space processes and services

  • Graphical user interface (GUI) is loaded for user interaction

View 1 answer

Q45. how do you review your code before sharing with Peer Review.

Ans.

I review my code by conducting thorough testing, following coding standards, and using code analysis tools.

  • Conduct thorough testing to identify and fix any bugs or issues.

  • Follow coding standards to ensure consistency and readability.

  • Use code analysis tools to check for potential errors or inefficiencies.

  • Seek feedback from colleagues or mentors for additional insights.

Add your answer

Q46. Explain session management in asp.net core?

Ans.

Session management in ASP.NET Core involves storing and retrieving user-specific data during a user's visit to a website.

  • Session data is stored on the server side by default in ASP.NET Core

  • Session data can be accessed and manipulated using the HttpContext.Session property

  • Session data can be configured to use different storage providers such as in-memory, distributed cache, or SQL Server

  • Session data is typically used to store user-specific information like user ID, shopping ca...read more

Add your answer

Q47. Explain how you plan the Test Cycle Schedule?

Ans.

Test cycle schedule is planned by considering project timelines, test objectives, resources, and risks.

  • Identify project timelines and milestones

  • Define test objectives and scope

  • Allocate resources and identify dependencies

  • Identify and prioritize risks

  • Create a detailed test plan and schedule

  • Review and adjust the schedule as needed

Add your answer

Q48. What is EiGRP variance, route inflence EIGRP, Route Reflector

Ans.

EIGRP variance is used to load balance traffic across unequal cost paths. Route influence EIGRP is used to manipulate the metric of a route. Route Reflector is used in BGP to reduce the number of iBGP peerings.

  • EIGRP variance is used to balance traffic across multiple paths with different costs

  • Route influence EIGRP is used to manipulate the metric of a route to influence the path selection

  • Route Reflector is used in BGP to reduce the number of iBGP peerings by reflecting routes...read more

Add your answer

Q49. What are pointers in java language?

Ans.

Pointers in Java are variables that store memory addresses of other variables or objects.

  • Pointers in Java are not directly supported like in languages such as C or C++.

  • Instead, Java uses references to objects, which act like pointers but with restrictions.

  • Example: String str = new String("Hello"); // str is a reference to the String object

Add your answer

Q50. difference between systemd and services?

Ans.

systemd is a system and service manager while services are individual programs that run in the background.

  • systemd is responsible for managing the system's startup and shutdown processes

  • services are individual programs that run in the background and can be managed by systemd

  • systemd can start, stop, restart, enable, and disable services

  • services can be configured to start automatically at boot time using systemd

  • systemd provides better logging and error reporting for services com...read more

Add your answer

Q51. How to troubleshoot outlook issues?

Ans.

To troubleshoot Outlook issues, check for connectivity, repair the application, and recreate the profile.

  • Check internet connectivity and server status

  • Repair the Outlook application using the built-in repair tool

  • Recreate the Outlook profile

  • Disable add-ins and antivirus software temporarily

  • Check for any recent updates or changes made to the system

  • Clear the Outlook cache

  • Check for any conflicting software or applications

  • Contact IT support if issue persists

View 1 answer

Q52. How do you estimate user stories

Ans.

User story estimation is done using relative sizing and team consensus.

  • Use story points to estimate complexity and effort

  • Relative sizing is used to compare user stories

  • Team consensus is important for accurate estimation

  • Estimation should be done by the entire team, including developers and stakeholders

Add your answer

Q53. What does backlog mean?

Ans.

Backlog is a list of tasks or requirements that need to be completed in a project.

  • Backlog is a prioritized list of work items

  • It includes user stories, bugs, and technical tasks

  • It is constantly updated throughout the project

  • It helps the team to plan and track progress

  • Examples: JIRA, Trello, Asana

Add your answer

Q54. Network call flows and interfaces in 2G,3G4G and IMS

Ans.

Understanding network call flows and interfaces is crucial for testing 2G, 3G, 4G, and IMS technologies.

  • 2G call flow involves circuit-switched technology and uses GSM architecture

  • 3G call flow involves packet-switched technology and uses UMTS architecture

  • 4G call flow involves all-IP technology and uses LTE architecture

  • IMS call flow involves VoIP technology and uses SIP protocol

  • Interfaces include RAN, Core Network, and IMS

  • Testing involves verifying call setup, handovers, and da...read more

Add your answer

Q55. Sorting program without using any in built functions

Ans.

Implement a sorting program without using any built-in functions

  • Iterate through the array and compare each element with the rest to sort

  • Use a sorting algorithm like bubble sort, selection sort, or insertion sort

  • Implement the sorting logic using loops and conditional statements

Add your answer

Q56. What is Active Directory Federation Service

Ans.

Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.

  • AD FS allows users to access multiple applications with a single set of credentials

  • It enables secure sharing of identity information between trusted partners

  • AD FS uses claims-based authentication to verify user identity

  • It supports integration with cloud-based services like Office 365

Add your answer

Q57. Project management life cycle What is admin account in AD What is OU

Ans.

Admin account in AD is a privileged account with full control over Active Directory. OU stands for Organizational Unit, a container object in AD.

  • Admin account has full control over AD objects and can perform any action on them

  • OU is a container object used to organize and manage AD objects

  • OU can be used to delegate administrative control over specific objects to non-administrative users

  • Example: Sales OU can contain all user accounts and resources related to the sales departmen...read more

Add your answer

Q58. How to debug smartform

Ans.

To debug a smartform, use transaction SMARTFORMS and set breakpoints in the code.

  • Open transaction SMARTFORMS

  • Select the smartform to be debugged

  • Click on the 'Debugging' button

  • Set breakpoints in the code

  • Execute the smartform and the debugger will stop at the breakpoints

Add your answer

Q59. What is the North Bridge ans South Bridge

Ans.

The North Bridge and South Bridge are components of a computer's motherboard responsible for connecting the CPU, RAM, and other high-speed components.

  • North Bridge connects the CPU, RAM, and high-speed components directly

  • South Bridge connects the slower peripheral devices like USB, SATA, and audio controllers

  • North Bridge and South Bridge work together to facilitate communication between the CPU and other components

  • Example: In older computers, the North Bridge and South Bridge ...read more

Add your answer

Q60. How do we use Conditional Access in Azure

Ans.

Conditional Access in Azure is used to control access to resources based on specific conditions.

  • Conditional Access policies can be set up to require multi-factor authentication for certain users or devices

  • It can restrict access based on location, device compliance, or other factors

  • Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data

Add your answer

Q61. Diff b/w Virtual and new keyword?

Ans.

Virtual keyword is used for method overriding while new keyword is used for hiding base class member.

  • Virtual keyword is used to allow a derived class to override a method in the base class.

  • New keyword is used to hide a base class member in the derived class.

  • Virtual keyword is used with the base class method while new keyword is used with the derived class method.

  • Virtual keyword is used for runtime polymorphism while new keyword is used for compile-time polymorphism.

Add your answer

Q62. What are backups? what are ports?

Ans.

Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.

  • Backups are essential for data recovery in case of disasters or system failures

  • Ports are identified by numbers and are used to establish connections between devices

  • Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.

Add your answer

Q63. Do you know excel microsoft

Ans.

Yes, I know Excel Microsoft.

  • I am proficient in using Excel for data analysis and reporting.

  • I have experience in creating pivot tables, charts, and graphs.

  • I am familiar with advanced functions such as VLOOKUP, IF, and SUMIF.

  • I have used Excel for budgeting, forecasting, and project management.

  • I am comfortable working with large datasets and can manipulate data using filters and sorting.

View 1 answer

Q64. What are the structure of O365 and it’s function

Ans.

O365 is a cloud-based subscription service that provides access to various Microsoft applications and services.

  • O365 includes applications such as Outlook, Word, Excel, PowerPoint, and OneNote.

  • It also includes cloud services such as OneDrive, SharePoint, Teams, and Yammer.

  • The structure of O365 is based on a subscription model, where users pay a monthly or yearly fee to access the applications and services.

  • O365 allows for collaboration and communication among users, with featur...read more

Add your answer

Q65. roles and responsibilities ,how to reslove the laptop issues

Add your answer

Q66. What is method hiding?

Ans.

Method hiding is a technique in object-oriented programming where a subclass provides a method with the same name as a method in its superclass.

  • Method hiding is also known as static polymorphism or compile-time polymorphism.

  • It allows a subclass to provide its own implementation of a method without affecting the superclass's implementation.

  • The method in the subclass must have the same name and signature as the method in the superclass.

  • Method hiding is achieved by using the 'ne...read more

Add your answer

Q67. What is test NG annotation, Can you define priority 0

Ans.

TestNG annotation is used in TestNG framework to provide additional information about test methods or classes.

  • TestNG annotations are used to control the execution flow of test methods.

  • They can be used to set the priority of test methods, define dependencies, configure test groups, etc.

  • Examples of TestNG annotations include @Test, @BeforeMethod, @AfterMethod, @DataProvider, etc.

Add your answer

Q68. Advantages of Agile Methodology

Ans.

Agile methodology allows for flexibility, collaboration, and faster delivery of high-quality software.

  • Encourages customer involvement and feedback throughout the development process

  • Allows for changes and adjustments to be made quickly and efficiently

  • Promotes teamwork and communication among team members

  • Delivers working software in shorter timeframes

  • Reduces the risk of project failure

  • Increases customer satisfaction

  • Examples: Scrum, Kanban, Extreme Programming (XP)

Add your answer

Q69. Explain the Defect Life Cycle and its Categories?

Ans.

Defect Life Cycle is a process followed by testers to identify, report, and resolve defects in software.

  • Defect is identified and reported by tester

  • Defect is reviewed by development team

  • Defect is assigned to a developer for fixing

  • Defect is fixed by developer

  • Defect is retested by tester

  • Defect is closed if it passes retest, else reopened

  • Categories include New, Open, In Progress, Fixed, Reopened, Closed

Add your answer

Q70. What is the complex integration you did?

Ans.

I led a complex integration project between two large financial institutions to streamline their data sharing processes.

  • Designed a custom API to facilitate real-time data exchange between the systems

  • Implemented data mapping and transformation logic to ensure compatibility between the different data formats

  • Worked closely with both technical teams to troubleshoot and resolve integration issues

  • Developed a comprehensive testing plan to validate the integration and ensure data acc...read more

Add your answer

Q71. What actions I have used fromDWPC

Ans.

I have used actions from DWPC to integrate systems and streamline processes.

  • Implemented data mapping and transformation using DWPC

  • Automated data transfer between different systems

  • Configured workflows to trigger actions based on specific events

  • Monitored system integrations for errors and performance issues

Add your answer

Q72. What is User Acceptance Testing?

Ans.

User Acceptance Testing (UAT) is the final phase of testing where end-users test the software to ensure it meets their requirements.

  • UAT is performed by end-users or business representatives

  • It is done in a real-world environment

  • The focus is on validating the software's functionality and usability

  • UAT is conducted after all other testing phases are completed

  • Defects found during UAT are reported and fixed before the software is released

Add your answer

Q73. Tell about the process

Ans.

The process involves planning, executing, and evaluating tasks to achieve a specific goal.

  • Identify the goal or objective of the process

  • Plan the steps needed to achieve the goal

  • Execute the planned steps

  • Evaluate the outcome to determine success or areas for improvement

View 2 more answers

Q74. Define one body system like urinary, digestive

Ans.

The respiratory system is responsible for breathing and gas exchange.

  • Includes organs such as the lungs, trachea, and bronchi

  • Works to bring oxygen into the body and remove carbon dioxide

  • Can be affected by diseases such as asthma and pneumonia

Add your answer

Q75. Validation of data between source and target

Ans.

Validation of data between source and target is a crucial step in ETL process.

  • Compare the data types and formats of source and target data

  • Check for missing or extra data in target

  • Verify data transformation rules are applied correctly

  • Perform data profiling to identify anomalies

  • Use checksums or hash values to ensure data integrity

Add your answer

Q76. What are screen Reader modes

Ans.

Screen Reader modes are different ways in which a screen reader can read and interpret content on a webpage.

  • Screen Reader modes can include reading the entire page, reading only headings or links, or reading specific sections of the page.

  • Screen Reader modes can also include different levels of verbosity, such as reading only the most important information or providing detailed descriptions of all content.

  • Examples of screen reader modes include NVDA's browse mode, JAWS' virtua...read more

Add your answer

Q77. How will you Schedule Jobs using TWS in Mainframe

Ans.

Scheduling jobs using TWS in Mainframe involves creating job definitions, specifying dependencies, setting up schedules, and monitoring job execution.

  • Create job definitions with specific parameters and requirements

  • Specify job dependencies to ensure proper sequencing

  • Set up schedules for job execution based on time, frequency, or event triggers

  • Monitor job execution and troubleshoot any issues that arise

Add your answer

Q78. Why bgp used, state, LP and weight, med

Ans.

BGP is used for routing between autonomous systems. LP and weight are used for path selection. MED is used for path advertisement.

  • BGP is used for inter-domain routing between autonomous systems.

  • LP (Local Preference) is used to select the preferred path among multiple paths within the same AS.

  • Weight is a Cisco proprietary parameter used to select the preferred path among multiple paths within the same AS.

  • MED (Multi-Exit Discriminator) is used to influence the path selection in...read more

Add your answer

Q79. Difference between Problem and Incident

Ans.

Problem is the underlying cause of one or more incidents, while an incident is an event that disrupts normal service operation.

  • A problem is a root cause of one or more incidents, while an incident is a disruption of normal service operation.

  • Problems are identified through multiple incidents, while incidents are reported as soon as they occur.

  • Problems require investigation and resolution, while incidents require immediate action to restore service.

  • Examples of problems include ...read more

Add your answer

Q80. Complexity of the algorithm

Ans.

Complexity of an algorithm refers to the amount of resources required to execute it.

  • Complexity can be measured in terms of time and space complexity.

  • Time complexity refers to the number of operations required to execute the algorithm.

  • Space complexity refers to the amount of memory required to execute the algorithm.

  • Common time complexities include O(1), O(log n), O(n), O(n log n), O(n^2), O(2^n), O(n!).

  • Optimizing algorithms for lower complexity can improve performance and scal...read more

Add your answer

Q81. Networking and difference between UDP AND TCP

Ans.

UDP and TCP are protocols used in networking. UDP is faster but less reliable, while TCP is slower but more reliable.

  • UDP stands for User Datagram Protocol and is connectionless

  • TCP stands for Transmission Control Protocol and is connection-oriented

  • UDP is faster because it doesn't establish a connection before sending data

  • TCP is more reliable because it ensures all data is received and in the correct order

  • UDP is used for applications where speed is more important than reliabili...read more

Add your answer

Q82. Spark internal working and optimization techniques

Ans.

Spark internal working and optimization techniques

  • Spark uses Directed Acyclic Graph (DAG) for optimizing workflows

  • Lazy evaluation helps in optimizing transformations by combining them into a single stage

  • Caching and persistence of intermediate results can improve performance

  • Partitioning data can help in parallel processing and reducing shuffle operations

Add your answer

Q83. Quick troubleshooting for admins like SCCM, AD and Azure

Ans.

Quick troubleshooting tips for SCCM, AD, and Azure

  • Check event logs for errors or warnings

  • Verify network connectivity

  • Restart services related to the issue

  • Check permissions and group memberships

  • Review SCCM logs for client issues

  • Use Azure Resource Health for Azure service status

  • Check AD replication status

Add your answer

Q84. Explain about VLAN and how it works?

Ans.

VLAN is a virtual LAN that separates network traffic based on logical grouping, improving network security and performance.

  • VLANs divide a physical network into multiple logical networks, allowing for better traffic management.

  • Devices within the same VLAN can communicate directly with each other, while devices in different VLANs require a router to communicate.

  • VLANs can be configured based on port, MAC address, or protocol.

  • Example: VLAN 10 for finance department, VLAN 20 for m...read more

Add your answer

Q85. Explain about Table B components in MDM scoresheet?

Add your answer

Q86. What is CUCM, CUC, Regarding Networking.

Ans.

CUCM and CUC are networking technologies used for communication and collaboration.

  • CUCM stands for Cisco Unified Communications Manager and is a call processing software used for IP telephony.

  • CUC stands for Cisco Unity Connection and is a voicemail and unified messaging platform.

  • Both technologies are used for communication and collaboration in a networked environment.

  • They are commonly used in enterprise environments for managing and routing calls and messages.

  • CUCM and CUC are ...read more

Add your answer

Q87. What is ost a file?

Ans.

An OST file is an offline storage table file used by Microsoft Outlook to store a copy of mailbox data from an Exchange server.

  • OST files allow users to access their mailbox data even when offline

  • Changes made to an OST file while offline will sync with the Exchange server once online

  • OST files can be created when using Outlook in Cached Exchange Mode

Add your answer

Q88. What is entry criteria & exit criteria

Ans.

Entry criteria and exit criteria are conditions that must be met before and after testing, respectively.

  • Entry criteria are the conditions that must be fulfilled before testing can begin

  • Exit criteria are the conditions that must be fulfilled before testing can be considered complete

  • Entry criteria can include having test data ready, test environment set up, and test cases prepared

  • Exit criteria can include all test cases executed, all defects fixed, and test reports generated

Add your answer

Q89. Explanation (to customer) for missed SLA

Ans.

The explanation should include the reason for the delay and steps taken to prevent it in the future.

  • Acknowledge the missed SLA and apologize for the inconvenience caused to the customer.

  • Explain the reason for the delay, whether it was due to unforeseen circumstances or internal issues.

  • Provide assurance that steps have been taken to prevent such delays in the future.

  • Offer a solution or compensation to the customer if possible.

  • Thank the customer for their patience and understan...read more

Add your answer

Q90. write a flowchart for a given problem statement

Ans.

Flowchart for a given problem statement

  • Start with the beginning of the process

  • Define decision points and actions

  • Use appropriate symbols for processes, decisions, and terminators

  • Connect the symbols with arrows to show the flow of the process

  • Include loops or repetitions if necessary

Add your answer

Q91. What are Azure Security Policies

Ans.

Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.

  • Azure Security Policies help ensure compliance with security standards and best practices

  • They can be used to enforce specific security configurations, such as requiring encryption for storage accounts

  • Policies can be assigned at the subscription, resource group, or resource level

Add your answer

Q92. Q.2) Golden rules of accounting?

Ans.

Golden rules of accounting are basic principles to maintain financial records accurately.

  • Debit the receiver, credit the giver

  • Debit what comes in, credit what goes out

  • Debit all expenses and losses, credit all incomes and gains

Add your answer

Q93. What are service value system?

Ans.

A service value system is a framework that defines the values, principles, and practices that guide an organization in delivering value to its customers.

  • Defines the values, principles, and practices of an organization

  • Guides the organization in delivering value to customers

  • Helps in aligning the organization's goals with customer needs

Add your answer

Q94. How many expenser

Ans.

The number of expensers is not specified in the question.

  • The question does not provide any specific information about the number of expensers.

  • It is unclear what is meant by 'expenser' without further context or clarification.

View 1 answer

Q95. What is bgp and working

Ans.

BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.

  • BGP is used by internet service providers to make routing decisions.

  • It operates on TCP port 179.

  • BGP uses path attributes to determine the best route to a destination.

  • BGP can be configured in different ways such as eBGP (external BGP) and iBGP (internal BGP).

Add your answer

Q96. What is ITIL Process.

Add your answer

Q97. What is Protocol in swift?

Ans.

Protocols in Swift define a blueprint of methods, properties, and other requirements that a class, struct, or enum must adopt.

  • Protocols are used to define a set of rules or capabilities that a type must conform to.

  • They allow for code reuse and provide a way to define common behavior across different types.

  • A type can adopt multiple protocols, enabling it to conform to multiple sets of rules.

  • Protocols can require properties, methods, initializers, and associated types.

  • They can ...read more

Add your answer

Q98. What is Dependency Injection.?

Ans.

Dependency Injection is a design pattern where the dependencies of an object are provided externally rather than being created internally.

  • Dependency Injection helps in achieving loose coupling between classes.

  • It allows for easier testing and maintenance of code.

  • There are three types of Dependency Injection: Constructor Injection, Setter Injection, and Interface Injection.

  • Example: In iOS development, we can use Dependency Injection to inject dependencies like network clients, ...read more

Add your answer

Q99. What is Generics in swift.?

Ans.

Generics in Swift allow you to write flexible and reusable code by creating functions, classes, and structures that can work with any type.

  • Generics enable you to write code that can be used with different types, without duplicating code.

  • You can define generic functions, types, and protocols to work with a wide range of types.

  • Generics are particularly useful when working with collections, such as arrays and dictionaries.

  • They allow you to write generic algorithms that can opera...read more

Add your answer

Q100. What is Associate types ?

Ans.

Associate types are a way to create a relationship between two types in Swift.

  • Associate types are defined using the 'associatedtype' keyword.

  • They are used in protocols to define a placeholder type that will be specified by the conforming type.

  • The conforming type can provide its own concrete type for the associated type.

  • This allows protocols to be more flexible and reusable.

  • For example, a protocol for a container type can have an associated type for the type of elements it con...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Acurus Solutions

based on 253 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 199 Interview Questions
3.7
 • 193 Interview Questions
4.2
 • 192 Interview Questions
4.2
 • 157 Interview Questions
4.2
 • 142 Interview Questions
3.7
 • 138 Interview Questions
View all
Top NTT Data Information Processing Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter