PwC
10+ Mothers Recipe Interview Questions and Answers
Q1. How to check the performance of BI Report
Performance of BI Report can be checked by analyzing response time, data accuracy, user feedback, and system resource usage.
Analyze response time to ensure reports load quickly
Verify data accuracy by comparing with source data
Collect user feedback to identify any issues or improvements needed
Monitor system resource usage to ensure optimal performance
Q2. How to encrypt the BIP Report in Oracle fusion
Encrypting BIP Report in Oracle Fusion
Use BI Publisher to create the report
Set up data model and layout for the report
Navigate to the report properties and select 'Encrypt Output' option
Choose the encryption method and provide necessary details
Run the report to generate encrypted output
Q3. Integration processes and protocols used for standard integration of HES with MDM system
Standard integration of HES with MDM system involves utilizing APIs, data mapping, data transformation, and data synchronization processes.
Utilize APIs to establish communication between HES and MDM system
Implement data mapping to ensure proper alignment of data fields between systems
Utilize data transformation processes to convert data formats as needed
Implement data synchronization to ensure real-time data updates between systems
Q4. What does Pick Action do in OIC?
Pick Action in OIC allows users to select and perform actions on specific data records.
Pick Action is used to select individual data records in OIC for further processing.
Users can perform actions such as update, delete, or send notifications on the selected records.
It helps in streamlining data management and automating processes in OIC.
Q5. Authentication & Authorization used in our project
Our project uses authentication and authorization to control access to resources.
We use OAuth 2.0 for authentication.
Authorization is based on user roles and permissions.
Access control lists (ACLs) are used to restrict access to specific resources.
We also implement two-factor authentication for added security.
All authentication and authorization events are logged for auditing purposes.
Q6. Centralised exception handling in spring boot application
Centralised exception handling in Spring Boot allows for consistent error handling across the application.
Use @ControllerAdvice annotation to define global exception handling for all controllers
Create a class annotated with @ControllerAdvice and define methods with @ExceptionHandler for specific exceptions
Return ResponseEntity with appropriate status codes and error messages in the exception handling methods
Q7. How pragma is used in PLSQL?
Pragma is used in PL/SQL to provide instructions to the compiler.
Pragma is used to provide instructions to the compiler in PL/SQL.
It can be used to control aspects like optimization, warnings, and errors.
Pragma directives are placed at the beginning of a block or subprogram.
Example: PRAGMA EXCEPTION_INIT to associate an exception name with an Oracle error code.
Q8. Compare monolithic and microservices pros and cons
Monolithic vs Microservices pros and cons comparison
Monolithic: easier to develop and test, simpler deployment process
Monolithic: harder to scale and maintain, risk of single point of failure
Microservices: scalable and flexible, easier to maintain and update
Microservices: complex to develop and test, increased operational overhead
Example: Monolithic - traditional web applications, Example: Microservices - Netflix, Amazon
Q9. Explain your knowlege on azure migrations
Knowledge on Azure migrations involves understanding the process of moving on-premises infrastructure to Azure cloud services.
Understanding different types of Azure migrations such as lift-and-shift, re-platforming, and re-architecting
Knowledge of Azure services like Azure Migrate, Azure Site Recovery, and Azure Database Migration Service
Experience in assessing on-premises workloads for migration suitability
Ability to create migration plans and execute migrations with minimal...read more
Q10. Type of Routing
Routing is the process of selecting the best path for data packets to travel from one network to another.
Routing protocols determine the best path for data packets based on factors like cost, speed, and reliability.
Common types of routing include static routing, dynamic routing, and default routing.
Examples of routing protocols include RIP, OSPF, and BGP.
More about working at PwC
Top HR Questions asked in Mothers Recipe
Interview Process at Mothers Recipe
Reviews
Interviews
Salaries
Users/Month