Add office photos
Premium Employer

NTT Data Information Processing Services

4.0
based on 6.5k Reviews
Filter interviews by

300+ Interview Questions and Answers

Updated 11 Dec 2024
Popular Designations

Q101. What is bdc and how many type

Ans.

BDC stands for Batch Data Communication. It is a method used in SAP ABAP to transfer data from external systems to SAP.

  • BDC is used to automate the process of data entry in SAP.

  • There are two types of BDC: Classic BDC and Call Transaction Method.

  • Classic BDC involves creating a batch input session and processing it using transaction codes.

  • Call Transaction Method uses the CALL TRANSACTION statement to directly process data without creating a session.

  • BDC is commonly used for tasks...read more

Add your answer

Q102. how will you install, support and manage platform

Ans.

I will use a combination of automation tools and manual processes to install, support and manage the platform.

  • I will use automation tools like Ansible, Puppet or Chef to automate the installation process.

  • I will create documentation and provide training to support the platform.

  • I will monitor the platform using tools like Nagios or Zabbix to ensure it is running smoothly.

  • I will provide support to users and troubleshoot any issues that arise.

  • I will perform regular maintenance ta...read more

View 1 answer

Q103. How to troubleshoot outlook issues?

Ans.

To troubleshoot Outlook issues, check for connectivity, repair the application, and recreate the profile.

  • Check internet connectivity and server status

  • Repair the Outlook application using the built-in repair tool

  • Recreate the Outlook profile

  • Disable add-ins and antivirus software temporarily

  • Check for any recent updates or changes made to the system

  • Clear the Outlook cache

  • Check for any conflicting software or applications

  • Contact IT support if issue persists

View 1 answer

Q104. Do you have experience in ESXI, Vsphere, Vcenter?

Ans.

Yes, I have experience in ESXI, Vsphere, and Vcenter.

  • I have worked with ESXI to create and manage virtual machines.

  • I am familiar with Vsphere for virtualization management.

  • I have used Vcenter for centralized management of virtualized environments.

Add your answer
Discover null interview dos and don'ts from real experiences

Q105. Three layers of skin

Ans.

The three layers of skin are the epidermis, dermis, and subcutaneous tissue.

  • The epidermis is the outermost layer and provides a barrier to the environment.

  • The dermis contains blood vessels, nerves, and hair follicles.

  • The subcutaneous tissue is the deepest layer and contains fat and connective tissue.

  • Each layer has a specific function and works together to protect and regulate the body.

  • Examples of skin conditions that affect these layers include eczema, acne, and cellulitis.

View 4 more answers

Q106. Explain the technical part and Implementation project and Enchancements and abap core and tcode?

Ans.

Technical aspects of SAP ABAP development including implementation projects, enhancements, ABAP core, and transaction codes.

  • Implementation projects involve customizing SAP systems to meet specific business requirements.

  • Enhancements are modifications made to standard SAP programs to add new functionality.

  • ABAP core refers to the basic programming language used in SAP development.

  • Transaction codes are shortcuts to access specific functions in SAP systems.

  • Example: Implementing a ...read more

Add your answer
Are these interview questions helpful?

Q107. How do you estimate user stories

Ans.

User story estimation is done using relative sizing and team consensus.

  • Use story points to estimate complexity and effort

  • Relative sizing is used to compare user stories

  • Team consensus is important for accurate estimation

  • Estimation should be done by the entire team, including developers and stakeholders

Add your answer

Q108. What does backlog mean?

Ans.

Backlog is a list of tasks or requirements that need to be completed in a project.

  • Backlog is a prioritized list of work items

  • It includes user stories, bugs, and technical tasks

  • It is constantly updated throughout the project

  • It helps the team to plan and track progress

  • Examples: JIRA, Trello, Asana

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. Explain booting process?

Ans.

Booting process is the sequence of events that occur when a computer system is turned on.

  • BIOS/UEFI firmware initializes hardware components

  • Bootloader loads the kernel into memory

  • Kernel initializes system processes and drivers

  • Init system starts user space processes and services

  • Graphical user interface (GUI) is loaded for user interaction

View 1 answer

Q110. When does Mixed DML Exception occurs?

Ans.

Mixed DML Exception occurs when DML operations are performed on setup and non-setup objects in a single transaction.

  • Occurs when DML operations are performed on both setup and non-setup objects in a single transaction

  • Setup objects include User, Profile, PermissionSet, etc.

  • Non-setup objects include custom objects, standard objects like Account, Contact, etc.

Add your answer

Q111. How a new entrant can compete with dominant market leaders

Ans.

A new entrant can compete with dominant market leaders by focusing on niche markets, offering unique value propositions, leveraging technology, and building strong relationships.

  • Identify and target niche markets where the dominant players may not be as strong

  • Offer unique value propositions that differentiate your product or service from competitors

  • Leverage technology to streamline operations, improve efficiency, and enhance customer experience

  • Build strong relationships with c...read more

Add your answer

Q112. What is router ? What are the type of routers?

Add your answer

Q113. What are the information in TCP IP Header?

Ans.

TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.

  • Source IP address

  • Destination IP address

  • Source port number

  • Destination port number

  • Sequence number

  • Acknowledgment number

  • Header length

  • Checksum

Add your answer

Q114. What are strength and weakness?

Ans.

Strengths are positive attributes that contribute to success, while weaknesses are areas that need improvement.

  • Strengths: leadership skills, attention to detail, problem-solving abilities

  • Weaknesses: public speaking, time management, delegation

  • Examples: Strength - ability to motivate team members; Weakness - tendency to procrastinate

View 1 answer

Q115. What is Active Directory Federation Service

Ans.

Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.

  • AD FS allows users to access multiple applications with a single set of credentials

  • It enables secure sharing of identity information between trusted partners

  • AD FS uses claims-based authentication to verify user identity

  • It supports integration with cloud-based services like Office 365

Add your answer

Q116. Project management life cycle What is admin account in AD What is OU

Ans.

Admin account in AD is a privileged account with full control over Active Directory. OU stands for Organizational Unit, a container object in AD.

  • Admin account has full control over AD objects and can perform any action on them

  • OU is a container object used to organize and manage AD objects

  • OU can be used to delegate administrative control over specific objects to non-administrative users

  • Example: Sales OU can contain all user accounts and resources related to the sales departmen...read more

Add your answer

Q117. difference between link state and DV. STP. BGP.

Ans.

Link state and DV are routing protocols, STP is for loop prevention, BGP is for inter-domain routing.

  • Link state protocols (e.g. OSPF) use Dijkstra's algorithm to calculate shortest path.

  • Distance vector protocols (e.g. RIP) use Bellman-Ford algorithm and exchange routing tables.

  • STP (Spanning Tree Protocol) prevents loops in Ethernet networks by blocking redundant paths.

  • BGP (Border Gateway Protocol) is used for inter-domain routing and is based on path vector algorithm.

  • Link sta...read more

Add your answer

Q118. what is use of routing and its uses?

Ans.

Routing is the process of selecting the best path for network traffic to reach its destination.

  • Routing helps in directing network traffic efficiently

  • It determines the best path for data packets to travel from source to destination

  • Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information

  • Routing tables are used to store information about network paths

  • Dynamic routing adjusts to network changes automatically

Add your answer

Q119. Which programs are managed by you

Ans.

I manage multiple programs including X, Y, and Z.

  • Program X focuses on improving customer experience through new product development.

  • Program Y is aimed at reducing operational costs by streamlining processes.

  • Program Z involves implementing a new software system to enhance data analysis capabilities.

Add your answer

Q120. difference between systemd and services?

Ans.

systemd is a system and service manager while services are individual programs that run in the background.

  • systemd is responsible for managing the system's startup and shutdown processes

  • services are individual programs that run in the background and can be managed by systemd

  • systemd can start, stop, restart, enable, and disable services

  • services can be configured to start automatically at boot time using systemd

  • systemd provides better logging and error reporting for services com...read more

Add your answer

Q121. What is Border Gateway Protocol

Ans.

Border Gateway Protocol (BGP) is a routing protocol used to exchange routing information between different autonomous systems (AS) on the internet.

  • BGP is an exterior gateway protocol used for inter-domain routing.

  • It allows routers in different autonomous systems to exchange information about the best paths for routing traffic.

  • BGP uses a path vector algorithm to determine the best path for routing.

  • It is commonly used by internet service providers (ISPs) to connect their networ...read more

View 1 answer

Q122. What is ip address , different types of ip

Ans.

An IP address is a unique identifier assigned to devices on a network. There are two types of IP addresses: IPv4 and IPv6.

  • IP stands for Internet Protocol

  • IPv4 addresses are 32-bit and expressed in dotted decimal notation (e.g. 192.168.0.1)

  • IPv6 addresses are 128-bit and expressed in hexadecimal notation (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)

  • Private IP addresses are used within a local network and are not accessible from the internet

  • Public IP addresses are assigned by an...read more

Add your answer

Q123. How do we use Conditional Access in Azure

Ans.

Conditional Access in Azure is used to control access to resources based on specific conditions.

  • Conditional Access policies can be set up to require multi-factor authentication for certain users or devices

  • It can restrict access based on location, device compliance, or other factors

  • Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data

Add your answer

Q124. What is the North Bridge ans South Bridge

Ans.

The North Bridge and South Bridge are components of a computer's motherboard responsible for connecting the CPU, RAM, and other high-speed components.

  • North Bridge connects the CPU, RAM, and high-speed components directly

  • South Bridge connects the slower peripheral devices like USB, SATA, and audio controllers

  • North Bridge and South Bridge work together to facilitate communication between the CPU and other components

  • Example: In older computers, the North Bridge and South Bridge ...read more

Add your answer

Q125. What are backups? what are ports?

Ans.

Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.

  • Backups are essential for data recovery in case of disasters or system failures

  • Ports are identified by numbers and are used to establish connections between devices

  • Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.

Add your answer

Q126. How do we configure FAILOVER via static Route?

Ans.

Configuring FAILOVER via static Route involves setting up multiple routes with different priorities.

  • Create multiple static routes with different next-hop IP addresses

  • Assign different administrative distances to each static route

  • Configure IP SLA to track the primary route and switch to the secondary route if the primary route fails

Add your answer

Q127. What is a HashMap?

Ans.

HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.

  • HashMap is part of the Java Collections Framework.

  • It uses hashing to store and retrieve elements.

  • It allows null values and null keys.

  • It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.

  • Example: HashMap map = new HashMap<>(); map.put("apple", 1); map.put("banana", 2); int value = map.get("banana"); // returns 2

Add your answer

Q128. how will you do capacity planning

Ans.

Capacity planning involves estimating future resource needs based on current and projected usage.

  • Analyze current usage patterns and trends

  • Forecast future demand based on growth projections

  • Consider potential changes in technology or business needs

  • Identify potential bottlenecks and plan for scalability

  • Regularly review and adjust plans as needed

View 1 answer

Q129. Ajy improvements that u worked for response optimisation

Ans.

Implemented caching and compression techniques to reduce response time.

  • Used Memcached to cache frequently accessed data.

  • Enabled Gzip compression to reduce response size.

  • Optimized database queries to reduce response time.

  • Used CDN to serve static content.

  • Implemented lazy loading of resources to reduce initial load time.

Add your answer

Q130. Network call flows and interfaces in 2G,3G4G and IMS

Ans.

Understanding network call flows and interfaces is crucial for testing 2G, 3G, 4G, and IMS technologies.

  • 2G call flow involves circuit-switched technology and uses GSM architecture

  • 3G call flow involves packet-switched technology and uses UMTS architecture

  • 4G call flow involves all-IP technology and uses LTE architecture

  • IMS call flow involves VoIP technology and uses SIP protocol

  • Interfaces include RAN, Core Network, and IMS

  • Testing involves verifying call setup, handovers, and da...read more

Add your answer

Q131. Why we use angular? Limitations

Ans.

Angular is a popular front-end framework for building dynamic web applications.

  • Angular provides a powerful set of tools for building complex user interfaces

  • It uses a component-based architecture for organizing code

  • It offers two-way data binding and dependency injection for efficient development

  • Limitations include a steep learning curve and potential performance issues with large applications

Add your answer

Q132. Which tools do you use to administer Hana db

Ans.

I use SAP HANA Studio, SAP HANA Cockpit, and SAP HANA Database Explorer to administer Hana db.

  • SAP HANA Studio is a tool used for administration, development, and monitoring of Hana databases.

  • SAP HANA Cockpit provides a web-based interface for monitoring and managing Hana systems.

  • SAP HANA Database Explorer is a tool for exploring and querying Hana databases.

  • SQL Console can also be used for executing SQL queries directly on the Hana database.

Add your answer

Q133. -Expert mode in PFCG?

Ans.

Expert mode in PFCG allows advanced customization of authorization roles.

  • Expert mode provides access to additional tabs and fields for fine-tuning roles.

  • It allows for more complex authorization logic and the ability to add custom fields.

  • Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.

  • Examples of advanced customization include restricting access to specific transactions or fields within transactions.

Add your answer

Q134. What are the bgp state's?

Ans.

BGP states are the different stages a BGP session goes through during establishment and maintenance.

  • BGP Idle state

  • BGP Connect state

  • BGP Active state

  • BGP OpenSent state

  • BGP OpenConfirm state

  • BGP Established state

Add your answer

Q135. What are the structure of O365 and it’s function

Ans.

O365 is a cloud-based subscription service that provides access to various Microsoft applications and services.

  • O365 includes applications such as Outlook, Word, Excel, PowerPoint, and OneNote.

  • It also includes cloud services such as OneDrive, SharePoint, Teams, and Yammer.

  • The structure of O365 is based on a subscription model, where users pay a monthly or yearly fee to access the applications and services.

  • O365 allows for collaboration and communication among users, with featur...read more

Add your answer

Q136. roles and responsibilities ,how to reslove the laptop issues

Add your answer

Q137. Sorting program without using any in built functions

Ans.

Implement a sorting program without using any built-in functions

  • Iterate through the array and compare each element with the rest to sort

  • Use a sorting algorithm like bubble sort, selection sort, or insertion sort

  • Implement the sorting logic using loops and conditional statements

Add your answer

Q138. How you handle if worker node fail

Ans.

We ensure high availability by configuring multiple worker nodes and using load balancers.

  • Configure multiple worker nodes to distribute the load and ensure redundancy.

  • Use load balancers to distribute the traffic among the available worker nodes.

  • Monitor the worker nodes for any failures and take appropriate actions to replace or repair them.

  • Ensure that the Tableau Server is configured to automatically recover from worker node failures.

  • Perform regular backups to ensure that dat...read more

Add your answer

Q139. How to debug smartform

Ans.

To debug a smartform, use transaction SMARTFORMS and set breakpoints in the code.

  • Open transaction SMARTFORMS

  • Select the smartform to be debugged

  • Click on the 'Debugging' button

  • Set breakpoints in the code

  • Execute the smartform and the debugger will stop at the breakpoints

Add your answer

Q140. What are pointers in java language?

Ans.

Pointers in Java are variables that store memory addresses of other variables or objects.

  • Pointers in Java are not directly supported like in languages such as C or C++.

  • Instead, Java uses references to objects, which act like pointers but with restrictions.

  • Example: String str = new String("Hello"); // str is a reference to the String object

Add your answer

Q141. How do express your idea or point of view?

Ans.

I express my ideas clearly and confidently through effective communication skills.

  • I use clear and concise language to convey my thoughts

  • I provide examples or evidence to support my point of view

  • I actively listen to others' perspectives and incorporate feedback into my ideas

Add your answer

Q142. Different types of joins in SQL.

Ans.

Different types of joins in SQL include inner join, outer join, left join, right join, and full join.

  • Inner join: Returns rows when there is a match in both tables.

  • Outer join: Returns all rows when there is a match in one of the tables.

  • Left join: Returns all rows from the left table and the matched rows from the right table.

  • Right join: Returns all rows from the right table and the matched rows from the left table.

  • Full join: Returns rows when there is a match in one of the tabl...read more

View 1 answer

Q143. Advantages of Agile Methodology

Ans.

Agile methodology allows for flexibility, collaboration, and faster delivery of high-quality software.

  • Encourages customer involvement and feedback throughout the development process

  • Allows for changes and adjustments to be made quickly and efficiently

  • Promotes teamwork and communication among team members

  • Delivers working software in shorter timeframes

  • Reduces the risk of project failure

  • Increases customer satisfaction

  • Examples: Scrum, Kanban, Extreme Programming (XP)

Add your answer

Q144. Explain the Defect Life Cycle and its Categories?

Ans.

Defect Life Cycle is a process followed by testers to identify, report, and resolve defects in software.

  • Defect is identified and reported by tester

  • Defect is reviewed by development team

  • Defect is assigned to a developer for fixing

  • Defect is fixed by developer

  • Defect is retested by tester

  • Defect is closed if it passes retest, else reopened

  • Categories include New, Open, In Progress, Fixed, Reopened, Closed

Add your answer

Q145. What is difference between a budget and forecast

Ans.

Budget is a financial plan for a specific period, while forecast is a prediction of future financial outcomes.

  • Budget is a detailed financial plan that outlines expected revenues and expenses for a specific period, usually a year.

  • Forecast is a prediction of future financial outcomes based on past data and trends.

  • Budgets are typically set at the beginning of a fiscal year and are used as a benchmark to measure actual performance against.

  • Forecasts are updated regularly to reflec...read more

Add your answer

Q146. Difference between Nortons current and load current?

Ans.

Norton's current is the current flowing through a short circuit while load current is the current flowing through a load connected to the circuit.

  • Norton's current is the current that would flow through a short circuit connected across the output terminals of a circuit.

  • Load current is the current that flows through the load connected to the circuit, such as a resistor or a device.

  • Norton's current is independent of the load connected to the circuit, while load current depends o...read more

Add your answer

Q147. How you will write the test scenario for elevator

Ans.

Test scenarios for an elevator to ensure proper functionality and safety

  • Test the elevator buttons for all floors

  • Test emergency stop button functionality

  • Test door opening and closing mechanism

  • Test elevator capacity by loading it with maximum weight limit

  • Test response time for elevator arrival at different floors

Add your answer

Q148. kubernetes pod creation teplicatset events in kubernetes ingress controller

Ans.

Kubernetes pod creation and replicaset events in Kubernetes Ingress controller.

  • Pod creation involves defining a pod specification in a YAML file and using 'kubectl create' command to create the pod.

  • Replicaset events can be monitored using 'kubectl describe replicaset' command to check for events related to the replicaset.

  • Ingress controller manages external access to services in a Kubernetes cluster by routing traffic based on rules defined in the Ingress resource.

  • Events relat...read more

Add your answer

Q149. Expalin what is ABAP dictionary Events in ALV report Have you worked on oops abp

Ans.

ABAP Dictionary is a central repository for data definitions used in SAP applications. ALV report events are user actions in ALV grid. OOPs ABAP is object-oriented programming in ABAP.

  • ABAP Dictionary is used to define and manage data definitions in SAP applications

  • ALV report events include user actions like clicking on a row or column header

  • OOPs ABAP allows for object-oriented programming concepts like classes and inheritance

Add your answer

Q150. How you approach a busy stakeholder?

Ans.

Approach with clear communication, understanding their priorities, and offering solutions.

  • Schedule a meeting at a convenient time for the stakeholder

  • Clearly communicate the purpose of the meeting and the desired outcomes

  • Listen actively to understand their priorities and challenges

  • Offer solutions that align with their goals and address their concerns

  • Follow up with any additional information or support they may need

Add your answer

Q151. how to approach rdp connection during analysis

Ans.

Approach RDP connection during analysis by examining logs, network traffic, and user activity.

  • Review RDP logs for any suspicious activity or unauthorized access.

  • Analyze network traffic for any anomalies or unusual patterns related to RDP connections.

  • Monitor user activity to identify any unauthorized or suspicious RDP sessions.

  • Consider using tools like Wireshark, Splunk, or ELK stack for in-depth analysis.

  • Look for failed login attempts, unusual login times, or multiple simulta...read more

Add your answer

Q152. What to do you understand by procurement

Add your answer

Q153. What is Domain Name System

Ans.

DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other.

  • DNS stands for Domain Name System

  • It is responsible for translating domain names into IP addresses

  • DNS allows computers to communicate with each other over the internet

  • DNS uses a hierarchical system of domain names, with the top-level domains being .com, .org, .net, etc.

  • DNS servers store information about domain names and their corresponding IP addresses

Add your answer

Q154. What are technologies you have worked so far

Ans.

I have worked with a variety of technologies including Java, Python, SQL, AWS, and Docker.

  • Proficient in Java and Python programming languages

  • Experience with SQL databases and data modeling

  • Familiarity with AWS cloud services and infrastructure

  • Knowledge of containerization using Docker

  • Experience with version control using Git

Add your answer

Q155. What is Normalisation?

Ans.

Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • It involves dividing larger tables into smaller ones and defining relationships between them.

  • Normalization helps to eliminate data inconsistencies and anomalies.

  • There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.

  • Normalization can improve database performance and make it easier to maintain.

  • Example: A custom...read more

View 1 answer

Q156. What is polimorphism?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • It allows objects of different classes to be treated as if they were objects of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A shape class can have multiple subclasses like circle, square, etc. and all can be treated as shapes.

  • Example: A method can take an object of a parent class as a parameter and it can accept any of its child classes.

View 1 answer

Q157. What is App ID in Palo Alto Firewalls?

Ans.

App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.

  • App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.

  • It allows administrators to create policies based on specific applications rather than just ports or protocols.

  • App ID helps in enhancing security by allowing granular control over application usage within the network.

  • Examples...read more

Add your answer

Q158. Diff b/w Virtual and new keyword?

Ans.

Virtual keyword is used for method overriding while new keyword is used for hiding base class member.

  • Virtual keyword is used to allow a derived class to override a method in the base class.

  • New keyword is used to hide a base class member in the derived class.

  • Virtual keyword is used with the base class method while new keyword is used with the derived class method.

  • Virtual keyword is used for runtime polymorphism while new keyword is used for compile-time polymorphism.

Add your answer

Q159. What is User Acceptance Testing?

Ans.

User Acceptance Testing (UAT) is the final phase of testing where end-users test the software to ensure it meets their requirements.

  • UAT is performed by end-users or business representatives

  • It is done in a real-world environment

  • The focus is on validating the software's functionality and usability

  • UAT is conducted after all other testing phases are completed

  • Defects found during UAT are reported and fixed before the software is released

Add your answer

Q160. What is modifier

Ans.

A modifier is a two-digit code added to a CPT or HCPCS code to provide additional information about a service or procedure.

  • Modifiers are used to indicate that a service or procedure has been altered in some way but not changed in its definition

  • Modifiers can affect reimbursement rates and are used to indicate that multiple procedures were performed during a single session

  • Examples of modifiers include -22 (increased procedural services) and -59 (distinct procedural service)

  • Modi...read more

Add your answer

Q161. Define firewall generations and their roles

Ans.

Firewall generations refer to the evolution of firewall technology and their roles in network security.

  • First generation firewalls - packet filtering based on IP addresses and ports

  • Second generation firewalls - stateful inspection and improved security features

  • Third generation firewalls - application layer filtering and deep packet inspection

  • Fourth generation firewalls - next-generation firewalls with advanced threat protection capabilities

  • Each generation builds upon the previ...read more

Add your answer

Q162. Define one body system like urinary, digestive

Ans.

The respiratory system is responsible for breathing and gas exchange.

  • Includes organs such as the lungs, trachea, and bronchi

  • Works to bring oxygen into the body and remove carbon dioxide

  • Can be affected by diseases such as asthma and pneumonia

Add your answer

Q163. What do you understand by procurement

Add your answer

Q164. Validation of data between source and target

Ans.

Validation of data between source and target is a crucial step in ETL process.

  • Compare the data types and formats of source and target data

  • Check for missing or extra data in target

  • Verify data transformation rules are applied correctly

  • Perform data profiling to identify anomalies

  • Use checksums or hash values to ensure data integrity

Add your answer

Q165. What are screen Reader modes

Ans.

Screen Reader modes are different ways in which a screen reader can read and interpret content on a webpage.

  • Screen Reader modes can include reading the entire page, reading only headings or links, or reading specific sections of the page.

  • Screen Reader modes can also include different levels of verbosity, such as reading only the most important information or providing detailed descriptions of all content.

  • Examples of screen reader modes include NVDA's browse mode, JAWS' virtua...read more

Add your answer

Q166. How will you Schedule Jobs using TWS in Mainframe

Ans.

Scheduling jobs using TWS in Mainframe involves creating job definitions, specifying dependencies, setting up schedules, and monitoring job execution.

  • Create job definitions with specific parameters and requirements

  • Specify job dependencies to ensure proper sequencing

  • Set up schedules for job execution based on time, frequency, or event triggers

  • Monitor job execution and troubleshoot any issues that arise

Add your answer

Q167. what is network

Ans.

A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another to share data and resources.

  • Networks can be wired or wireless

  • They can be local (LAN), wide (WAN), or global (Internet)

  • Networks use protocols like TCP/IP to communicate

  • Examples include Ethernet, Wi-Fi, and cellular networks

Add your answer

Q168. what is the difference lookup ,join ,merge

Ans.

Lookup is used to search for a specific value in a dataset, join is used to combine two datasets based on a common key, and merge is used to combine datasets based on common columns.

  • Lookup is used to find a specific value in a dataset

  • Join is used to combine two datasets based on a common key

  • Merge is used to combine datasets based on common columns

  • Example: Lookup - searching for a customer's email address in a customer dataset

  • Example: Join - combining sales data with customer ...read more

Add your answer

Q169. Tell me something about windows!?

Add your answer

Q170. What OSPF and its state and LSAs

Ans.

OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

  • OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to each network.

  • OSPF routers exchange Link State Advertisements (LSAs) to build a topology database.

  • There are several types of LSAs, including Router LSAs, Network LSAs, Summary LSAs, and AS External LSAs.

  • OSPF routers maintain neighbor relationships and exchange H...read more

Add your answer

Q171. What is method hiding?

Ans.

Method hiding is a technique in object-oriented programming where a subclass provides a method with the same name as a method in its superclass.

  • Method hiding is also known as static polymorphism or compile-time polymorphism.

  • It allows a subclass to provide its own implementation of a method without affecting the superclass's implementation.

  • The method in the subclass must have the same name and signature as the method in the superclass.

  • Method hiding is achieved by using the 'ne...read more

Add your answer

Q172. Difference between Problem and Incident

Ans.

Problem is the underlying cause of one or more incidents, while an incident is an event that disrupts normal service operation.

  • A problem is a root cause of one or more incidents, while an incident is a disruption of normal service operation.

  • Problems are identified through multiple incidents, while incidents are reported as soon as they occur.

  • Problems require investigation and resolution, while incidents require immediate action to restore service.

  • Examples of problems include ...read more

Add your answer

Q173. Why bgp used, state, LP and weight, med

Ans.

BGP is used for routing between autonomous systems. LP and weight are used for path selection. MED is used for path advertisement.

  • BGP is used for inter-domain routing between autonomous systems.

  • LP (Local Preference) is used to select the preferred path among multiple paths within the same AS.

  • Weight is a Cisco proprietary parameter used to select the preferred path among multiple paths within the same AS.

  • MED (Multi-Exit Discriminator) is used to influence the path selection in...read more

Add your answer

Q174. What is test NG annotation, Can you define priority 0

Ans.

TestNG annotation is used in TestNG framework to provide additional information about test methods or classes.

  • TestNG annotations are used to control the execution flow of test methods.

  • They can be used to set the priority of test methods, define dependencies, configure test groups, etc.

  • Examples of TestNG annotations include @Test, @BeforeMethod, @AfterMethod, @DataProvider, etc.

Add your answer

Q175. What is IPS? How does it work?

Ans.

IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.

  • IPS is a network security technology that monitors network traffic in real-time.

  • It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.

  • IPS works by analyzing network packets, comparing them to a database of known threats, and taking action to block or allow t...read more

Add your answer

Q176. How do you start a program

Ans.

Starting a program involves defining goals, assembling a team, creating a plan, and securing resources.

  • Define program goals and objectives

  • Assemble a team with the necessary skills and expertise

  • Create a detailed program plan with timelines and milestones

  • Secure necessary resources, including funding and equipment

  • Establish communication channels and reporting mechanisms

  • Monitor progress and adjust plans as necessary

Add your answer

Q177. What is Blue Screen of Death?

Ans.

Blue Screen of Death is a Windows operating system error screen that appears when the system encounters a critical error.

  • Occurs when Windows encounters a critical system error and cannot recover

  • Displays a blue screen with error message and code

  • Often requires a system restart to resolve

  • Can be caused by hardware or software issues

Add your answer

Q178. What do you know about VPN?

Ans.

A VPN, or Virtual Private Network, is a secure network connection that allows users to access the internet privately and securely.

  • VPN encrypts data to ensure privacy and security

  • It allows users to access restricted websites or content

  • Commonly used for remote work or accessing company networks

  • Examples include NordVPN, ExpressVPN, and Cisco AnyConnect

Add your answer

Q179. Networking and difference between UDP AND TCP

Ans.

UDP and TCP are protocols used in networking. UDP is faster but less reliable, while TCP is slower but more reliable.

  • UDP stands for User Datagram Protocol and is connectionless

  • TCP stands for Transmission Control Protocol and is connection-oriented

  • UDP is faster because it doesn't establish a connection before sending data

  • TCP is more reliable because it ensures all data is received and in the correct order

  • UDP is used for applications where speed is more important than reliabili...read more

Add your answer

Q180. Spark internal working and optimization techniques

Ans.

Spark internal working and optimization techniques

  • Spark uses Directed Acyclic Graph (DAG) for optimizing workflows

  • Lazy evaluation helps in optimizing transformations by combining them into a single stage

  • Caching and persistence of intermediate results can improve performance

  • Partitioning data can help in parallel processing and reducing shuffle operations

Add your answer

Q181. What is material requirements planning

Ans.

Material Requirements Planning (MRP) is a production planning and inventory control system.

  • MRP helps in determining the quantity and timing of raw materials, components, and subassemblies needed to manufacture a product.

  • It ensures that the right materials are available at the right time to meet production demand.

  • MRP takes into account factors such as lead times, inventory levels, and production schedules to calculate material requirements.

  • It helps in reducing inventory costs ...read more

Add your answer

Q182. What is the complex integration you did?

Ans.

I led a complex integration project between two large financial institutions to streamline their data sharing processes.

  • Designed a custom API to facilitate real-time data exchange between the systems

  • Implemented data mapping and transformation logic to ensure compatibility between the different data formats

  • Worked closely with both technical teams to troubleshoot and resolve integration issues

  • Developed a comprehensive testing plan to validate the integration and ensure data acc...read more

Add your answer

Q183. What are account type s on fico?

Ans.

Account types in FICO include asset accounts, liability accounts, equity accounts, revenue accounts, and expense accounts.

  • Asset accounts represent resources owned by the company, such as cash, inventory, and equipment.

  • Liability accounts represent obligations owed by the company, such as loans and accounts payable.

  • Equity accounts represent the owner's stake in the company.

  • Revenue accounts track income generated by the company, such as sales revenue.

  • Expense accounts track costs...read more

Add your answer

Q184. Tell some features of Java 8

Ans.

Java 8 introduced several new features including lambda expressions, streams, and default methods.

  • Lambda expressions allow for functional programming and simplify code.

  • Streams provide a way to process collections of data in a parallel and efficient manner.

  • Default methods allow for adding new methods to interfaces without breaking existing implementations.

  • Date and Time API provides a more comprehensive and flexible way to handle date and time.

  • Nashorn JavaScript engine allows f...read more

View 1 answer

Q185. Explain SLA management how to do it

Ans.

SLA management involves setting, monitoring, and meeting service level agreements with customers.

  • Define clear and measurable SLA metrics with customers

  • Monitor performance against SLA targets regularly

  • Implement processes to address SLA breaches

  • Communicate effectively with customers about SLA status

  • Use SLA management tools to track and report on performance

  • Review and update SLAs periodically based on feedback and performance

Add your answer

Q186. Quick troubleshooting for admins like SCCM, AD and Azure

Ans.

Quick troubleshooting tips for SCCM, AD, and Azure

  • Check event logs for errors or warnings

  • Verify network connectivity

  • Restart services related to the issue

  • Check permissions and group memberships

  • Review SCCM logs for client issues

  • Use Azure Resource Health for Azure service status

  • Check AD replication status

Add your answer

Q187. difference between ram and rom

Ans.

RAM is volatile memory used for temporary storage, while ROM is non-volatile memory used for permanent storage.

  • RAM stands for Random Access Memory, used for temporary storage of data and program instructions

  • ROM stands for Read-Only Memory, used for permanent storage of data and program instructions

  • RAM is volatile, meaning data is lost when power is turned off

  • ROM is non-volatile, meaning data is retained even when power is turned off

Add your answer

Q188. Explain about VLAN and how it works?

Ans.

VLAN is a virtual LAN that separates network traffic based on logical grouping, improving network security and performance.

  • VLANs divide a physical network into multiple logical networks, allowing for better traffic management.

  • Devices within the same VLAN can communicate directly with each other, while devices in different VLANs require a router to communicate.

  • VLANs can be configured based on port, MAC address, or protocol.

  • Example: VLAN 10 for finance department, VLAN 20 for m...read more

Add your answer

Q189. What actions I have used fromDWPC

Ans.

I have used actions from DWPC to integrate systems and streamline processes.

  • Implemented data mapping and transformation using DWPC

  • Automated data transfer between different systems

  • Configured workflows to trigger actions based on specific events

  • Monitored system integrations for errors and performance issues

Add your answer

Q190. What is CUCM, CUC, Regarding Networking.

Ans.

CUCM and CUC are networking technologies used for communication and collaboration.

  • CUCM stands for Cisco Unified Communications Manager and is a call processing software used for IP telephony.

  • CUC stands for Cisco Unity Connection and is a voicemail and unified messaging platform.

  • Both technologies are used for communication and collaboration in a networked environment.

  • They are commonly used in enterprise environments for managing and routing calls and messages.

  • CUCM and CUC are ...read more

Add your answer

Q191. Explain about Table B components in MDM scoresheet?

Add your answer

Q192. Do you know excel microsoft

Ans.

Yes, I know Excel Microsoft.

  • I am proficient in using Excel for data analysis and reporting.

  • I have experience in creating pivot tables, charts, and graphs.

  • I am familiar with advanced functions such as VLOOKUP, IF, and SUMIF.

  • I have used Excel for budgeting, forecasting, and project management.

  • I am comfortable working with large datasets and can manipulate data using filters and sorting.

View 1 answer

Q193. What is entry criteria &amp; exit criteria

Ans.

Entry criteria and exit criteria are conditions that must be met before and after testing, respectively.

  • Entry criteria are the conditions that must be fulfilled before testing can begin

  • Exit criteria are the conditions that must be fulfilled before testing can be considered complete

  • Entry criteria can include having test data ready, test environment set up, and test cases prepared

  • Exit criteria can include all test cases executed, all defects fixed, and test reports generated

Add your answer

Q194. Explanation (to customer) for missed SLA

Ans.

The explanation should include the reason for the delay and steps taken to prevent it in the future.

  • Acknowledge the missed SLA and apologize for the inconvenience caused to the customer.

  • Explain the reason for the delay, whether it was due to unforeseen circumstances or internal issues.

  • Provide assurance that steps have been taken to prevent such delays in the future.

  • Offer a solution or compensation to the customer if possible.

  • Thank the customer for their patience and understan...read more

Add your answer

Q195. how to deal with s/w shortcommings

Ans.

Addressing software shortcomings involves identifying the issues, prioritizing them, creating a plan for improvement, and implementing solutions.

  • Identify the specific shortcomings in the software

  • Prioritize the issues based on impact and urgency

  • Create a plan for addressing each shortcoming, including assigning tasks and setting deadlines

  • Implement solutions, which may involve coding changes, testing, and deployment

  • Monitor the effectiveness of the solutions and make adjustments ...read more

Add your answer

Q196. Firewall works at what layer?

Ans.

Firewall works at the network layer.

  • Firewall operates at the network layer of the OSI model.

  • It filters and controls incoming and outgoing network traffic based on predetermined security rules.

  • Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.

Add your answer

Q197. What are production management?

Ans.

Production management involves planning, organizing, directing, and controlling the production process to ensure efficient and effective operations.

  • Planning and scheduling production activities

  • Managing resources such as labor, materials, and equipment

  • Ensuring quality control and meeting production targets

  • Implementing and improving production processes

  • Managing budgets and costs

  • Coordinating with other departments such as sales and marketing

  • Ensuring compliance with safety and en...read more

Add your answer

Q198. What is Virtual Private Network?

Ans.

A Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a public network, allowing users to access private networks remotely.

  • Encrypts data to ensure privacy and security

  • Allows users to access private networks remotely

  • Masks IP address to maintain anonymity

  • Commonly used for remote work, accessing geo-blocked content, and enhancing online security

  • Examples: NordVPN, ExpressVPN, Cisco AnyConnect

Add your answer

Q199. Where is the headquarters of NTT located

Ans.

NTT's headquarters is located in Tokyo, Japan.

  • NTT's headquarters is in Tokyo, Japan

  • NTT stands for Nippon Telegraph and Telephone Corporation

  • Tokyo is the capital city of Japan

Add your answer

Q200. What is meant by bpo?

Ans.

BPO stands for Business Process Outsourcing. It refers to the practice of contracting specific business processes to a third-party service provider.

  • BPO involves outsourcing non-core business functions to external vendors.

  • It helps companies reduce costs, improve efficiency, and focus on their core competencies.

  • Examples of BPO services include customer support, data entry, payroll processing, and IT support.

  • BPO can be onshore (within the same country), nearshore (in neighboring...read more

View 1 answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 254 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 384 Interview Questions
3.9
 • 202 Interview Questions
3.8
 • 169 Interview Questions
3.9
 • 151 Interview Questions
4.3
 • 135 Interview Questions
View all
Top NTT Data Information Processing Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter