Add office photos
Premium Employer

NTT Data

3.9
based on 3.7k Reviews
Filter interviews by

300+ M.V.Associates Interview Questions and Answers

Updated 23 Jan 2025
Popular Designations

Q101. What is router ? What are the type of routers?

Add your answer

Q102. How a new entrant can compete with dominant market leaders

Ans.

A new entrant can compete with dominant market leaders by focusing on niche markets, offering unique value propositions, leveraging technology, and building strong relationships.

  • Identify and target niche markets where the dominant players may not be as strong

  • Offer unique value propositions that differentiate your product or service from competitors

  • Leverage technology to streamline operations, improve efficiency, and enhance customer experience

  • Build strong relationships with c...read more

Add your answer

Q103. How does data packets move in a personal network environment

Ans.

Data packets move in a personal network environment through a series of steps involving routing, addressing, and transmission.

  • Data packets are created at the source device and are broken down into smaller chunks for transmission.

  • Each packet is assigned a destination address, which helps routers determine the best path for delivery.

  • Routers along the network route the packets based on the destination address, ensuring they reach the intended recipient.

  • Packets may take different...read more

Add your answer

Q104. What are the information in TCP IP Header?

Ans.

TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.

  • Source IP address

  • Destination IP address

  • Source port number

  • Destination port number

  • Sequence number

  • Acknowledgment number

  • Header length

  • Checksum

Add your answer
Discover M.V.Associates interview dos and don'ts from real experiences

Q105. What is Active Directory Federation Service

Ans.

Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.

  • AD FS allows users to access multiple applications with a single set of credentials

  • It enables secure sharing of identity information between trusted partners

  • AD FS uses claims-based authentication to verify user identity

  • It supports integration with cloud-based services like Office 365

Add your answer

Q106. Which programs are managed by you

Ans.

I manage multiple programs including X, Y, and Z.

  • Program X focuses on improving customer experience through new product development.

  • Program Y is aimed at reducing operational costs by streamlining processes.

  • Program Z involves implementing a new software system to enhance data analysis capabilities.

Add your answer
Are these interview questions helpful?

Q107. difference between link state and DV. STP. BGP.

Ans.

Link state and DV are routing protocols, STP is for loop prevention, BGP is for inter-domain routing.

  • Link state protocols (e.g. OSPF) use Dijkstra's algorithm to calculate shortest path.

  • Distance vector protocols (e.g. RIP) use Bellman-Ford algorithm and exchange routing tables.

  • STP (Spanning Tree Protocol) prevents loops in Ethernet networks by blocking redundant paths.

  • BGP (Border Gateway Protocol) is used for inter-domain routing and is based on path vector algorithm.

  • Link sta...read more

Add your answer

Q108. what is use of routing and its uses?

Ans.

Routing is the process of selecting the best path for network traffic to reach its destination.

  • Routing helps in directing network traffic efficiently

  • It determines the best path for data packets to travel from source to destination

  • Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information

  • Routing tables are used to store information about network paths

  • Dynamic routing adjusts to network changes automatically

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. difference between systemd and services?

Ans.

systemd is a system and service manager while services are individual programs that run in the background.

  • systemd is responsible for managing the system's startup and shutdown processes

  • services are individual programs that run in the background and can be managed by systemd

  • systemd can start, stop, restart, enable, and disable services

  • services can be configured to start automatically at boot time using systemd

  • systemd provides better logging and error reporting for services com...read more

Add your answer

Q110. What is Border Gateway Protocol

Ans.

Border Gateway Protocol (BGP) is a routing protocol used to exchange routing information between different autonomous systems (AS) on the internet.

  • BGP is an exterior gateway protocol used for inter-domain routing.

  • It allows routers in different autonomous systems to exchange information about the best paths for routing traffic.

  • BGP uses a path vector algorithm to determine the best path for routing.

  • It is commonly used by internet service providers (ISPs) to connect their networ...read more

View 1 answer

Q111. How to improve the performance of asp application

Ans.

To improve the performance of an ASP application, consider optimizing database queries, caching frequently accessed data, minimizing server requests, and using asynchronous programming.

  • Optimize database queries by using indexes, avoiding unnecessary joins, and limiting the amount of data retrieved.

  • Implement caching for frequently accessed data to reduce the load on the server and improve response times.

  • Minimize server requests by combining multiple requests into a single requ...read more

Add your answer

Q112. What is ip address , different types of ip

Ans.

An IP address is a unique identifier assigned to devices on a network. There are two types of IP addresses: IPv4 and IPv6.

  • IP stands for Internet Protocol

  • IPv4 addresses are 32-bit and expressed in dotted decimal notation (e.g. 192.168.0.1)

  • IPv6 addresses are 128-bit and expressed in hexadecimal notation (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)

  • Private IP addresses are used within a local network and are not accessible from the internet

  • Public IP addresses are assigned by an...read more

Add your answer

Q113. How do we use Conditional Access in Azure

Ans.

Conditional Access in Azure is used to control access to resources based on specific conditions.

  • Conditional Access policies can be set up to require multi-factor authentication for certain users or devices

  • It can restrict access based on location, device compliance, or other factors

  • Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data

Add your answer

Q114. What is the North Bridge ans South Bridge

Ans.

The North Bridge and South Bridge are components of a computer's motherboard responsible for connecting the CPU, RAM, and other high-speed components.

  • North Bridge connects the CPU, RAM, and high-speed components directly

  • South Bridge connects the slower peripheral devices like USB, SATA, and audio controllers

  • North Bridge and South Bridge work together to facilitate communication between the CPU and other components

  • Example: In older computers, the North Bridge and South Bridge ...read more

Add your answer

Q115. OSPF LSA types and which routes generates each LSA

Ans.

OSPF LSA types include Router LSA, Network LSA, Summary LSA, and ASBR Summary LSA.

  • Router LSA (Type 1) - Generated by all routers and contains information about directly connected links.

  • Network LSA (Type 2) - Generated by DR to advertise the network segment.

  • Summary LSA (Type 3, 4, 5) - Generated by ABR to advertise routes to other areas.

  • ASBR Summary LSA (Type 4) - Generated by ABR to advertise ASBR information to other areas.

Add your answer

Q116. What are backups? what are ports?

Ans.

Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.

  • Backups are essential for data recovery in case of disasters or system failures

  • Ports are identified by numbers and are used to establish connections between devices

  • Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.

Add your answer

Q117. What is a HashMap?

Ans.

HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.

  • HashMap is part of the Java Collections Framework.

  • It uses hashing to store and retrieve elements.

  • It allows null values and null keys.

  • It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.

  • Example: HashMap map = new HashMap<>(); map.put("apple", 1); map.put("banana", 2); int value = map.get("banana"); // returns 2

Add your answer

Q118. how will you do capacity planning

Ans.

Capacity planning involves estimating future resource needs based on current and projected usage.

  • Analyze current usage patterns and trends

  • Forecast future demand based on growth projections

  • Consider potential changes in technology or business needs

  • Identify potential bottlenecks and plan for scalability

  • Regularly review and adjust plans as needed

View 1 answer

Q119. Ajy improvements that u worked for response optimisation

Ans.

Implemented caching and compression techniques to reduce response time.

  • Used Memcached to cache frequently accessed data.

  • Enabled Gzip compression to reduce response size.

  • Optimized database queries to reduce response time.

  • Used CDN to serve static content.

  • Implemented lazy loading of resources to reduce initial load time.

Add your answer

Q120. Why we use angular? Limitations

Ans.

Angular is a popular front-end framework for building dynamic web applications.

  • Angular provides a powerful set of tools for building complex user interfaces

  • It uses a component-based architecture for organizing code

  • It offers two-way data binding and dependency injection for efficient development

  • Limitations include a steep learning curve and potential performance issues with large applications

Add your answer

Q121. Which tools do you use to administer Hana db

Ans.

I use SAP HANA Studio, SAP HANA Cockpit, and SAP HANA Database Explorer to administer Hana db.

  • SAP HANA Studio is a tool used for administration, development, and monitoring of Hana databases.

  • SAP HANA Cockpit provides a web-based interface for monitoring and managing Hana systems.

  • SAP HANA Database Explorer is a tool for exploring and querying Hana databases.

  • SQL Console can also be used for executing SQL queries directly on the Hana database.

Add your answer

Q122. -Expert mode in PFCG?

Ans.

Expert mode in PFCG allows advanced customization of authorization roles.

  • Expert mode provides access to additional tabs and fields for fine-tuning roles.

  • It allows for more complex authorization logic and the ability to add custom fields.

  • Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.

  • Examples of advanced customization include restricting access to specific transactions or fields within transactions.

Add your answer

Q123. What are the structure of O365 and it’s function

Ans.

O365 is a cloud-based subscription service that provides access to various Microsoft applications and services.

  • O365 includes applications such as Outlook, Word, Excel, PowerPoint, and OneNote.

  • It also includes cloud services such as OneDrive, SharePoint, Teams, and Yammer.

  • The structure of O365 is based on a subscription model, where users pay a monthly or yearly fee to access the applications and services.

  • O365 allows for collaboration and communication among users, with featur...read more

Add your answer

Q124. roles and responsibilities ,how to reslove the laptop issues

Add your answer

Q125. What OSPF and its state and LSAs

Ans.

OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

  • OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to each network.

  • OSPF routers exchange Link State Advertisements (LSAs) to build a topology database.

  • There are several types of LSAs, including Router LSAs, Network LSAs, Summary LSAs, and AS External LSAs.

  • OSPF routers maintain neighbor relationships and exchange H...read more

Add your answer

Q126. Sorting program without using any in built functions

Ans.

Implement a sorting program without using any built-in functions

  • Iterate through the array and compare each element with the rest to sort

  • Use a sorting algorithm like bubble sort, selection sort, or insertion sort

  • Implement the sorting logic using loops and conditional statements

Add your answer

Q127. How you handle if worker node fail

Ans.

We ensure high availability by configuring multiple worker nodes and using load balancers.

  • Configure multiple worker nodes to distribute the load and ensure redundancy.

  • Use load balancers to distribute the traffic among the available worker nodes.

  • Monitor the worker nodes for any failures and take appropriate actions to replace or repair them.

  • Ensure that the Tableau Server is configured to automatically recover from worker node failures.

  • Perform regular backups to ensure that dat...read more

Add your answer

Q128. How to debug smartform

Ans.

To debug a smartform, use transaction SMARTFORMS and set breakpoints in the code.

  • Open transaction SMARTFORMS

  • Select the smartform to be debugged

  • Click on the 'Debugging' button

  • Set breakpoints in the code

  • Execute the smartform and the debugger will stop at the breakpoints

Add your answer

Q129. How do express your idea or point of view?

Ans.

I express my ideas clearly and confidently through effective communication skills.

  • I use clear and concise language to convey my thoughts

  • I provide examples or evidence to support my point of view

  • I actively listen to others' perspectives and incorporate feedback into my ideas

Add your answer

Q130. Advantages of Agile Methodology

Ans.

Agile methodology allows for flexibility, collaboration, and faster delivery of high-quality software.

  • Encourages customer involvement and feedback throughout the development process

  • Allows for changes and adjustments to be made quickly and efficiently

  • Promotes teamwork and communication among team members

  • Delivers working software in shorter timeframes

  • Reduces the risk of project failure

  • Increases customer satisfaction

  • Examples: Scrum, Kanban, Extreme Programming (XP)

Add your answer

Q131. Different types of joins in SQL.

Ans.

Different types of joins in SQL include inner join, outer join, left join, right join, and full join.

  • Inner join: Returns rows when there is a match in both tables.

  • Outer join: Returns all rows when there is a match in one of the tables.

  • Left join: Returns all rows from the left table and the matched rows from the right table.

  • Right join: Returns all rows from the right table and the matched rows from the left table.

  • Full join: Returns rows when there is a match in one of the tabl...read more

View 1 answer

Q132. Explain the Defect Life Cycle and its Categories?

Ans.

Defect Life Cycle is a process followed by testers to identify, report, and resolve defects in software.

  • Defect is identified and reported by tester

  • Defect is reviewed by development team

  • Defect is assigned to a developer for fixing

  • Defect is fixed by developer

  • Defect is retested by tester

  • Defect is closed if it passes retest, else reopened

  • Categories include New, Open, In Progress, Fixed, Reopened, Closed

Add your answer

Q133. What are pointers in java language?

Ans.

Pointers in Java are variables that store memory addresses of other variables or objects.

  • Pointers in Java are not directly supported like in languages such as C or C++.

  • Instead, Java uses references to objects, which act like pointers but with restrictions.

  • Example: String str = new String("Hello"); // str is a reference to the String object

Add your answer

Q134. What is difference between a budget and forecast

Ans.

Budget is a financial plan for a specific period, while forecast is a prediction of future financial outcomes.

  • Budget is a detailed financial plan that outlines expected revenues and expenses for a specific period, usually a year.

  • Forecast is a prediction of future financial outcomes based on past data and trends.

  • Budgets are typically set at the beginning of a fiscal year and are used as a benchmark to measure actual performance against.

  • Forecasts are updated regularly to reflec...read more

Add your answer

Q135. Difference between Nortons current and load current?

Ans.

Norton's current is the current flowing through a short circuit while load current is the current flowing through a load connected to the circuit.

  • Norton's current is the current that would flow through a short circuit connected across the output terminals of a circuit.

  • Load current is the current that flows through the load connected to the circuit, such as a resistor or a device.

  • Norton's current is independent of the load connected to the circuit, while load current depends o...read more

Add your answer

Q136. kubernetes pod creation teplicatset events in kubernetes ingress controller

Ans.

Kubernetes pod creation and replicaset events in Kubernetes Ingress controller.

  • Pod creation involves defining a pod specification in a YAML file and using 'kubectl create' command to create the pod.

  • Replicaset events can be monitored using 'kubectl describe replicaset' command to check for events related to the replicaset.

  • Ingress controller manages external access to services in a Kubernetes cluster by routing traffic based on rules defined in the Ingress resource.

  • Events relat...read more

Add your answer

Q137. How you will write the test scenario for elevator

Ans.

Test scenarios for an elevator to ensure proper functionality and safety

  • Test the elevator buttons for all floors

  • Test emergency stop button functionality

  • Test door opening and closing mechanism

  • Test elevator capacity by loading it with maximum weight limit

  • Test response time for elevator arrival at different floors

Add your answer

Q138. How you approach a busy stakeholder?

Ans.

Approach with clear communication, understanding their priorities, and offering solutions.

  • Schedule a meeting at a convenient time for the stakeholder

  • Clearly communicate the purpose of the meeting and the desired outcomes

  • Listen actively to understand their priorities and challenges

  • Offer solutions that align with their goals and address their concerns

  • Follow up with any additional information or support they may need

Add your answer

Q139. What to do you understand by procurement

Add your answer

Q140. Expalin what is ABAP dictionary Events in ALV report Have you worked on oops abp

Ans.

ABAP Dictionary is a central repository for data definitions used in SAP applications. ALV report events are user actions in ALV grid. OOPs ABAP is object-oriented programming in ABAP.

  • ABAP Dictionary is used to define and manage data definitions in SAP applications

  • ALV report events include user actions like clicking on a row or column header

  • OOPs ABAP allows for object-oriented programming concepts like classes and inheritance

Add your answer

Q141. how to approach rdp connection during analysis

Ans.

Approach RDP connection during analysis by examining logs, network traffic, and user activity.

  • Review RDP logs for any suspicious activity or unauthorized access.

  • Analyze network traffic for any anomalies or unusual patterns related to RDP connections.

  • Monitor user activity to identify any unauthorized or suspicious RDP sessions.

  • Consider using tools like Wireshark, Splunk, or ELK stack for in-depth analysis.

  • Look for failed login attempts, unusual login times, or multiple simulta...read more

Add your answer

Q142. What are technologies you have worked so far

Ans.

I have worked with a variety of technologies including Java, Python, SQL, AWS, and Docker.

  • Proficient in Java and Python programming languages

  • Experience with SQL databases and data modeling

  • Familiarity with AWS cloud services and infrastructure

  • Knowledge of containerization using Docker

  • Experience with version control using Git

Add your answer

Q143. What is Domain Name System

Ans.

DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other.

  • DNS stands for Domain Name System

  • It is responsible for translating domain names into IP addresses

  • DNS allows computers to communicate with each other over the internet

  • DNS uses a hierarchical system of domain names, with the top-level domains being .com, .org, .net, etc.

  • DNS servers store information about domain names and their corresponding IP addresses

Add your answer

Q144. What is Normalisation?

Ans.

Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • It involves dividing larger tables into smaller ones and defining relationships between them.

  • Normalization helps to eliminate data inconsistencies and anomalies.

  • There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.

  • Normalization can improve database performance and make it easier to maintain.

  • Example: A custom...read more

View 1 answer

Q145. What is polimorphism?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • It allows objects of different classes to be treated as if they were objects of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A shape class can have multiple subclasses like circle, square, etc. and all can be treated as shapes.

  • Example: A method can take an object of a parent class as a parameter and it can accept any of its child classes.

View 1 answer

Q146. What is App ID in Palo Alto Firewalls?

Ans.

App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.

  • App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.

  • It allows administrators to create policies based on specific applications rather than just ports or protocols.

  • App ID helps in enhancing security by allowing granular control over application usage within the network.

  • Examples...read more

Add your answer

Q147. What is User Acceptance Testing?

Ans.

User Acceptance Testing (UAT) is the final phase of testing where end-users test the software to ensure it meets their requirements.

  • UAT is performed by end-users or business representatives

  • It is done in a real-world environment

  • The focus is on validating the software's functionality and usability

  • UAT is conducted after all other testing phases are completed

  • Defects found during UAT are reported and fixed before the software is released

Add your answer

Q148. What is modifier

Ans.

A modifier is a two-digit code added to a CPT or HCPCS code to provide additional information about a service or procedure.

  • Modifiers are used to indicate that a service or procedure has been altered in some way but not changed in its definition

  • Modifiers can affect reimbursement rates and are used to indicate that multiple procedures were performed during a single session

  • Examples of modifiers include -22 (increased procedural services) and -59 (distinct procedural service)

  • Modi...read more

Add your answer

Q149. What is Profit and Loss Statement?

Ans.

A Profit and Loss Statement is a financial report that summarizes a company's revenues, expenses, and profits over a specific period of time.

  • It shows the company's total revenue, total expenses, and net income or loss for a specific period, typically a month, quarter, or year.

  • Revenue includes sales, interest income, and other sources of income, while expenses include costs of goods sold, operating expenses, and taxes.

  • The net income is calculated by subtracting total expenses ...read more

Add your answer

Q150. Define firewall generations and their roles

Ans.

Firewall generations refer to the evolution of firewall technology and their roles in network security.

  • First generation firewalls - packet filtering based on IP addresses and ports

  • Second generation firewalls - stateful inspection and improved security features

  • Third generation firewalls - application layer filtering and deep packet inspection

  • Fourth generation firewalls - next-generation firewalls with advanced threat protection capabilities

  • Each generation builds upon the previ...read more

Add your answer

Q151. What do you understand by procurement

Add your answer

Q152. how router and switches work in network?

Add your answer

Q153. Define one body system like urinary, digestive

Ans.

The respiratory system is responsible for breathing and gas exchange.

  • Includes organs such as the lungs, trachea, and bronchi

  • Works to bring oxygen into the body and remove carbon dioxide

  • Can be affected by diseases such as asthma and pneumonia

Add your answer

Q154. Validation of data between source and target

Ans.

Validation of data between source and target is a crucial step in ETL process.

  • Compare the data types and formats of source and target data

  • Check for missing or extra data in target

  • Verify data transformation rules are applied correctly

  • Perform data profiling to identify anomalies

  • Use checksums or hash values to ensure data integrity

Add your answer

Q155. What are screen Reader modes

Ans.

Screen Reader modes are different ways in which a screen reader can read and interpret content on a webpage.

  • Screen Reader modes can include reading the entire page, reading only headings or links, or reading specific sections of the page.

  • Screen Reader modes can also include different levels of verbosity, such as reading only the most important information or providing detailed descriptions of all content.

  • Examples of screen reader modes include NVDA's browse mode, JAWS' virtua...read more

Add your answer

Q156. How will you Schedule Jobs using TWS in Mainframe

Ans.

Scheduling jobs using TWS in Mainframe involves creating job definitions, specifying dependencies, setting up schedules, and monitoring job execution.

  • Create job definitions with specific parameters and requirements

  • Specify job dependencies to ensure proper sequencing

  • Set up schedules for job execution based on time, frequency, or event triggers

  • Monitor job execution and troubleshoot any issues that arise

Add your answer

Q157. what is network

Ans.

A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another to share data and resources.

  • Networks can be wired or wireless

  • They can be local (LAN), wide (WAN), or global (Internet)

  • Networks use protocols like TCP/IP to communicate

  • Examples include Ethernet, Wi-Fi, and cellular networks

Add your answer

Q158. Tell me something about windows!?

Add your answer

Q159. what is the difference lookup ,join ,merge

Ans.

Lookup is used to search for a specific value in a dataset, join is used to combine two datasets based on a common key, and merge is used to combine datasets based on common columns.

  • Lookup is used to find a specific value in a dataset

  • Join is used to combine two datasets based on a common key

  • Merge is used to combine datasets based on common columns

  • Example: Lookup - searching for a customer's email address in a customer dataset

  • Example: Join - combining sales data with customer ...read more

Add your answer

Q160. BGP attributes and how they work

Ans.

BGP attributes are used to influence the path selection process in BGP routing.

  • BGP attributes include AS_PATH, NEXT_HOP, LOCAL_PREF, etc.

  • AS_PATH is a list of AS numbers that the route has traversed.

  • NEXT_HOP is the IP address to reach the next hop towards the destination.

  • LOCAL_PREF is used to influence outbound traffic.

  • MED (Multi-Exit Discriminator) is used to influence inbound traffic.

  • Weight is a Cisco-specific attribute used for path selection within the same AS.

  • Communities ...read more

Add your answer

Q161. What is IPS? How does it work?

Ans.

IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.

  • IPS is a network security technology that monitors network traffic in real-time.

  • It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.

  • IPS works by analyzing network packets, comparing them to a database of known threats, and taking action to block or allow t...read more

Add your answer

Q162. What is test NG annotation, Can you define priority 0

Ans.

TestNG annotation is used in TestNG framework to provide additional information about test methods or classes.

  • TestNG annotations are used to control the execution flow of test methods.

  • They can be used to set the priority of test methods, define dependencies, configure test groups, etc.

  • Examples of TestNG annotations include @Test, @BeforeMethod, @AfterMethod, @DataProvider, etc.

Add your answer

Q163. How do you start a program

Ans.

Starting a program involves defining goals, assembling a team, creating a plan, and securing resources.

  • Define program goals and objectives

  • Assemble a team with the necessary skills and expertise

  • Create a detailed program plan with timelines and milestones

  • Secure necessary resources, including funding and equipment

  • Establish communication channels and reporting mechanisms

  • Monitor progress and adjust plans as necessary

Add your answer

Q164. What is Blue Screen of Death?

Ans.

Blue Screen of Death is a Windows operating system error screen that appears when the system encounters a critical error.

  • Occurs when Windows encounters a critical system error and cannot recover

  • Displays a blue screen with error message and code

  • Often requires a system restart to resolve

  • Can be caused by hardware or software issues

Add your answer

Q165. What do you know about VPN?

Ans.

A VPN, or Virtual Private Network, is a secure network connection that allows users to access the internet privately and securely.

  • VPN encrypts data to ensure privacy and security

  • It allows users to access restricted websites or content

  • Commonly used for remote work or accessing company networks

  • Examples include NordVPN, ExpressVPN, and Cisco AnyConnect

Add your answer

Q166. Networking and difference between UDP AND TCP

Ans.

UDP and TCP are protocols used in networking. UDP is faster but less reliable, while TCP is slower but more reliable.

  • UDP stands for User Datagram Protocol and is connectionless

  • TCP stands for Transmission Control Protocol and is connection-oriented

  • UDP is faster because it doesn't establish a connection before sending data

  • TCP is more reliable because it ensures all data is received and in the correct order

  • UDP is used for applications where speed is more important than reliabili...read more

Add your answer

Q167. Spark internal working and optimization techniques

Ans.

Spark internal working and optimization techniques

  • Spark uses Directed Acyclic Graph (DAG) for optimizing workflows

  • Lazy evaluation helps in optimizing transformations by combining them into a single stage

  • Caching and persistence of intermediate results can improve performance

  • Partitioning data can help in parallel processing and reducing shuffle operations

Add your answer

Q168. What is material requirements planning

Ans.

Material Requirements Planning (MRP) is a production planning and inventory control system.

  • MRP helps in determining the quantity and timing of raw materials, components, and subassemblies needed to manufacture a product.

  • It ensures that the right materials are available at the right time to meet production demand.

  • MRP takes into account factors such as lead times, inventory levels, and production schedules to calculate material requirements.

  • It helps in reducing inventory costs ...read more

Add your answer

Q169. Tell some features of Java 8

Ans.

Java 8 introduced several new features including lambda expressions, streams, and default methods.

  • Lambda expressions allow for functional programming and simplify code.

  • Streams provide a way to process collections of data in a parallel and efficient manner.

  • Default methods allow for adding new methods to interfaces without breaking existing implementations.

  • Date and Time API provides a more comprehensive and flexible way to handle date and time.

  • Nashorn JavaScript engine allows f...read more

View 1 answer

Q170. What is the complex integration you did?

Ans.

I led a complex integration project between two large financial institutions to streamline their data sharing processes.

  • Designed a custom API to facilitate real-time data exchange between the systems

  • Implemented data mapping and transformation logic to ensure compatibility between the different data formats

  • Worked closely with both technical teams to troubleshoot and resolve integration issues

  • Developed a comprehensive testing plan to validate the integration and ensure data acc...read more

Add your answer

Q171. Explain SLA management how to do it

Ans.

SLA management involves setting, monitoring, and meeting service level agreements with customers.

  • Define clear and measurable SLA metrics with customers

  • Monitor performance against SLA targets regularly

  • Implement processes to address SLA breaches

  • Communicate effectively with customers about SLA status

  • Use SLA management tools to track and report on performance

  • Review and update SLAs periodically based on feedback and performance

Add your answer

Q172. difference between ram and rom

Ans.

RAM is volatile memory used for temporary storage, while ROM is non-volatile memory used for permanent storage.

  • RAM stands for Random Access Memory, used for temporary storage of data and program instructions

  • ROM stands for Read-Only Memory, used for permanent storage of data and program instructions

  • RAM is volatile, meaning data is lost when power is turned off

  • ROM is non-volatile, meaning data is retained even when power is turned off

Add your answer

Q173. Explain about VLAN and how it works?

Ans.

VLAN is a virtual LAN that separates network traffic based on logical grouping, improving network security and performance.

  • VLANs divide a physical network into multiple logical networks, allowing for better traffic management.

  • Devices within the same VLAN can communicate directly with each other, while devices in different VLANs require a router to communicate.

  • VLANs can be configured based on port, MAC address, or protocol.

  • Example: VLAN 10 for finance department, VLAN 20 for m...read more

Add your answer

Q174. Explain about Table B components in MDM scoresheet?

Add your answer

Q175. What is CUCM, CUC, Regarding Networking.

Ans.

CUCM and CUC are networking technologies used for communication and collaboration.

  • CUCM stands for Cisco Unified Communications Manager and is a call processing software used for IP telephony.

  • CUC stands for Cisco Unity Connection and is a voicemail and unified messaging platform.

  • Both technologies are used for communication and collaboration in a networked environment.

  • They are commonly used in enterprise environments for managing and routing calls and messages.

  • CUCM and CUC are ...read more

Add your answer

Q176. What actions I have used fromDWPC

Ans.

I have used actions from DWPC to integrate systems and streamline processes.

  • Implemented data mapping and transformation using DWPC

  • Automated data transfer between different systems

  • Configured workflows to trigger actions based on specific events

  • Monitored system integrations for errors and performance issues

Add your answer

Q177. Explain LSA Types in detail

Ans.

LSA Types are used in OSPF to describe the type of information contained in the LSA.

  • Type 1: Router LSA - contains information about the router and its directly connected networks

  • Type 2: Network LSA - describes the networks connected to a multi-access network

  • Type 3: Summary LSA - contains information about networks outside of the area

  • Type 4: ASBR Summary LSA - describes the ASBR router to the rest of the OSPF domain

  • Type 5: External LSA - contains information about external net...read more

Add your answer

Q178. What is Linux Boot Process ?

Ans.

Linux Boot Process is the sequence of events that occur from power on to the login prompt.

  • BIOS/UEFI firmware initializes hardware

  • Bootloader loads kernel into memory

  • Kernel initializes system processes and mounts filesystems

  • Init process starts system services and user login

  • Graphical user interface (GUI) or command line interface (CLI) is presented to user

Add your answer

Q179. Do you know excel microsoft

Ans.

Yes, I know Excel Microsoft.

  • I am proficient in using Excel for data analysis and reporting.

  • I have experience in creating pivot tables, charts, and graphs.

  • I am familiar with advanced functions such as VLOOKUP, IF, and SUMIF.

  • I have used Excel for budgeting, forecasting, and project management.

  • I am comfortable working with large datasets and can manipulate data using filters and sorting.

View 1 answer

Q180. What is entry criteria &amp; exit criteria

Ans.

Entry criteria and exit criteria are conditions that must be met before and after testing, respectively.

  • Entry criteria are the conditions that must be fulfilled before testing can begin

  • Exit criteria are the conditions that must be fulfilled before testing can be considered complete

  • Entry criteria can include having test data ready, test environment set up, and test cases prepared

  • Exit criteria can include all test cases executed, all defects fixed, and test reports generated

Add your answer

Q181. Firewall works at what layer?

Ans.

Firewall works at the network layer.

  • Firewall operates at the network layer of the OSI model.

  • It filters and controls incoming and outgoing network traffic based on predetermined security rules.

  • Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.

Add your answer

Q182. how to deal with s/w shortcommings

Ans.

Addressing software shortcomings involves identifying the issues, prioritizing them, creating a plan for improvement, and implementing solutions.

  • Identify the specific shortcomings in the software

  • Prioritize the issues based on impact and urgency

  • Create a plan for addressing each shortcoming, including assigning tasks and setting deadlines

  • Implement solutions, which may involve coding changes, testing, and deployment

  • Monitor the effectiveness of the solutions and make adjustments ...read more

Add your answer

Q183. What is Virtual Private Network?

Ans.

A Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a public network, allowing users to access private networks remotely.

  • Encrypts data to ensure privacy and security

  • Allows users to access private networks remotely

  • Masks IP address to maintain anonymity

  • Commonly used for remote work, accessing geo-blocked content, and enhancing online security

  • Examples: NordVPN, ExpressVPN, Cisco AnyConnect

Add your answer

Q184. What is meant by bpo?

Ans.

BPO stands for Business Process Outsourcing. It refers to the practice of contracting specific business processes to a third-party service provider.

  • BPO involves outsourcing non-core business functions to external vendors.

  • It helps companies reduce costs, improve efficiency, and focus on their core competencies.

  • Examples of BPO services include customer support, data entry, payroll processing, and IT support.

  • BPO can be onshore (within the same country), nearshore (in neighboring...read more

View 1 answer

Q185. Where is the headquarters of NTT located

Ans.

NTT's headquarters is located in Tokyo, Japan.

  • NTT's headquarters is in Tokyo, Japan

  • NTT stands for Nippon Telegraph and Telephone Corporation

  • Tokyo is the capital city of Japan

Add your answer

Q186. Explain the pseudocode of displaying the nth Prime number.

Add your answer

Q187. What is icd

Ans.

ICD stands for International Classification of Diseases, a system used to classify and code diagnoses, symptoms, and procedures.

  • ICD is used by healthcare providers to accurately document and communicate patient conditions and treatments.

  • ICD codes are updated regularly to reflect changes in medical knowledge and technology.

  • ICD codes are used for billing and reimbursement purposes by insurance companies and government programs like Medicare and Medicaid.

  • Examples of ICD codes in...read more

Add your answer

Q188. What is consumption based planning

Ans.

Consumption based planning is a method of inventory management where the demand for a product determines the production or procurement of it.

  • It is a pull-based planning approach

  • It is used to manage inventory levels based on actual customer demand

  • It helps to avoid overproduction and stockouts

  • It requires accurate demand forecasting and real-time inventory tracking

  • Examples include Just-in-Time (JIT) and Kanban systems

Add your answer

Q189. Write a test case in selenium.

Ans.

Test case to verify login functionality on a website using Selenium

  • Open the browser and navigate to the login page

  • Enter valid username and password

  • Click on the login button

  • Verify that user is successfully logged in

Add your answer

Q190. How you do Xamarin Forms migration

Ans.

Xamarin Forms migration involves updating code, libraries, and UI elements to the latest version.

  • Start by updating Xamarin Forms NuGet packages to the latest version

  • Check for any deprecated APIs and update them to the new equivalents

  • Test the app thoroughly on different devices and screen sizes to ensure compatibility

  • Update any custom renderers or platform-specific code to match the new Xamarin Forms version

Add your answer

Q191. What is do know about BSOD?

Ans.

BSOD stands for Blue Screen of Death, a Windows error screen displayed when a system encounters a critical error.

  • BSOD is a stop error screen that appears when a Windows operating system encounters a system crash or critical error.

  • It is often displayed with white text on a blue background, hence the name Blue Screen of Death.

  • BSOD can be caused by hardware failures, software issues, driver problems, or system overheating.

  • Common error messages on BSOD include 'IRQL_NOT_LESS_OR_E...read more

Add your answer

Q192. What are Azure Security Policies

Ans.

Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.

  • Azure Security Policies help ensure compliance with security standards and best practices

  • They can be used to enforce specific security configurations, such as requiring encryption for storage accounts

  • Policies can be assigned at the subscription, resource group, or resource level

Add your answer

Q193. How 150 Computer at time connect

Ans.

150 computers can connect simultaneously through a network switch or router.

  • Use a network switch or router to connect all 150 computers simultaneously.

  • Ensure that the network infrastructure can handle the bandwidth and traffic of 150 computers.

  • Set up the network with proper IP addressing and subnetting to avoid conflicts.

  • Consider using VLANs to segregate traffic and improve network performance.

  • Implement security measures such as firewalls and access control lists to protect t...read more

Add your answer

Q194. BGP and its states and attributes

Ans.

BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems.

  • BGP has four main states: Idle, Connect, OpenSent, and Established.

  • BGP attributes include AS_PATH, NEXT_HOP, LOCAL_PREF, and ORIGIN.

  • AS_PATH attribute shows the path the route has taken through different autonomous systems.

  • NEXT_HOP attribute specifies the next hop IP address to reach a particular destination.

  • LOCAL_PREF attribute is used to influence out...read more

Add your answer

Q195. What is Infrastructure library?

Ans.

Infrastructure Library (ITIL) is a set of best practices for IT service management.

  • ITIL provides a framework for organizations to plan, deliver, and support IT services.

  • It helps improve efficiency, reduce costs, and enhance customer satisfaction.

  • Examples of ITIL processes include incident management, change management, and service level management.

Add your answer

Q196. What is VPN and why it is used for

Ans.

VPN stands for Virtual Private Network. It is used to create a secure connection over the internet, allowing users to access private networks remotely.

  • VPN encrypts data to ensure privacy and security

  • It allows users to access restricted websites or content

  • VPN can be used to bypass geo-restrictions and access region-locked content

  • It is commonly used by remote workers to securely connect to their company's network

Add your answer

Q197. Q.2) Golden rules of accounting?

Ans.

Golden rules of accounting are basic principles to maintain financial records accurately.

  • Debit the receiver, credit the giver

  • Debit what comes in, credit what goes out

  • Debit all expenses and losses, credit all incomes and gains

Add your answer

Q198. What does NTT company do?

Ans.

NTT is a global technology services company that provides IT solutions and services to clients worldwide.

  • NTT offers a wide range of services including cloud computing, cybersecurity, data analytics, and IoT solutions.

  • The company operates in over 80 countries and has over 300,000 employees.

  • NTT is also involved in research and development in areas such as artificial intelligence and quantum computing.

  • Some of NTT's clients include major corporations in industries such as finance...read more

Add your answer

Q199. BGP Attributes in detail

Ans.

BGP attributes are used to determine the best path for routing traffic between autonomous systems.

  • BGP attributes include: AS Path, Next Hop, Local Preference, Weight, Multi-Exit Discriminator (MED), Origin, and Community

  • AS Path is a list of autonomous systems that the route has passed through

  • Next Hop is the IP address of the next router in the path

  • Local Preference is used to indicate the preferred path for outbound traffic

  • Weight is a Cisco-specific attribute used to indicate ...read more

Add your answer

Q200. What is ost a file?

Ans.

An OST file is an offline storage table file used by Microsoft Outlook to store a copy of mailbox data from an Exchange server.

  • OST files allow users to access their mailbox data even when offline

  • Changes made to an OST file while offline will sync with the Exchange server once online

  • OST files can be created when using Outlook in Cached Exchange Mode

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at M.V.Associates

based on 350 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 693 Interview Questions
3.9
 • 402 Interview Questions
3.5
 • 381 Interview Questions
4.2
 • 349 Interview Questions
3.8
 • 206 Interview Questions
3.9
 • 174 Interview Questions
View all
Top NTT Data Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter