PwC
90+ JTS Jobs Consultancy Interview Questions and Answers
Q1. Create a table with specified columns Alter the table and add new columns Create another table with help of existing tables Write a query which uses group by clause Write a query which uses having clause
Answering SQL related questions on table creation, alteration, and querying with group by and having clauses.
To create a table with specified columns, use the CREATE TABLE statement with column names and data types.
To alter a table and add new columns, use the ALTER TABLE statement with ADD COLUMN keyword.
To create another table with help of existing tables, use the CREATE TABLE statement with SELECT statement.
To write a query which uses group by clause, use the GROUP BY keyw...read more
Q2. Write code to check if two strings are anagram or not.
Code to check if two strings are anagram or not.
Convert both strings to lowercase to avoid case sensitivity
Sort both strings and compare them
Use a hash table to count the frequency of each character in both strings and compare the hash tables
Q3. What are the Fundamental Accounting Assumptions?
Fundamental Accounting Assumptions are basic principles that guide the preparation of financial statements.
The assumptions include: Going Concern, Consistency, Accrual, and Materiality
Going Concern assumes that the company will continue to operate in the foreseeable future
Consistency assumes that the company will use the same accounting methods and principles from period to period
Accrual assumes that revenues and expenses are recognized when earned or incurred, regardless of ...read more
Q4. Do you know about stlc explain something about stlc.
STLC stands for Software Testing Life Cycle. It is a process followed to ensure quality in software development.
STLC involves planning, designing, executing and reporting of tests.
It includes various stages like requirement analysis, test planning, test design, test execution, and test closure.
Each stage has its own set of deliverables and objectives.
STLC helps in identifying defects early in the development cycle, reducing the cost of fixing them later.
Examples of STLC model...read more
Q5. What is normalization and explain all normal forms.
Normalization is the process of organizing data in a database to reduce redundancy and dependency.
First Normal Form (1NF) - Eliminate duplicate columns from the same table.
Second Normal Form (2NF) - Create separate tables for sets of values that apply to multiple records.
Third Normal Form (3NF) - Eliminate fields that do not depend on the primary key.
Fourth Normal Form (4NF) - Eliminate multi-valued dependencies.
Fifth Normal Form (5NF) - Eliminate redundant data using a join ...read more
Q6. Tell me about the collections in java. 4Write the code which uses collection ( to print the elements in reverse order
Java collections are a group of classes and interfaces used to store and manipulate groups of objects.
To print elements in reverse order, use the Collections.reverse() method.
This method takes a List as an argument and reverses the order of its elements.
Example: List
names = new ArrayList<>(); Collections.reverse(names); Other commonly used collections in Java include Set, Map, Queue, and Stack.
Q7. Difference between where and having clause Types of joins, explain with examples Combine two tables and write the output
Explaining the difference between WHERE and HAVING clause and types of joins with examples.
WHERE clause is used to filter rows based on a condition while HAVING clause is used to filter groups based on a condition
INNER JOIN returns only the matching rows from both tables while LEFT JOIN returns all rows from the left table and matching rows from the right table
Combining two tables can be done using JOIN clause with a common column between them
Example: SELECT * FROM table1 INN...read more
Q8. What is your preferred programming language?
My preferred programming language is Python.
Python is easy to learn and has a simple syntax.
It has a vast library of modules and frameworks for various purposes.
Python is widely used in data science and machine learning.
It is also great for web development and automation tasks.
Examples: Flask, Django, NumPy, Pandas, TensorFlow.
Q9. On which technology would you like to work on?
I would like to work on Artificial Intelligence.
Developing machine learning algorithms for predictive analysis
Creating chatbots for customer service
Implementing computer vision for object recognition
Exploring natural language processing for sentiment analysis
Q10. Write a code to print the second largest element in array.
Code to print the second largest element in array
Sort the array in descending order and return the second element
Iterate through the array and keep track of the largest and second largest elements
Use a priority queue to find the second largest element
Q11. Concepts of Ind As 115 & Ind AS 116
Ind AS 115 and Ind AS 116 are accounting standards used for revenue recognition and lease accounting respectively.
Ind AS 115: It provides guidance on how to recognize revenue from contracts with customers.
Ind AS 116: It outlines the principles for recognizing, measuring, presenting, and disclosing leases.
Both standards are part of the Indian Accounting Standards (Ind AS) framework.
Ind AS 115 replaces the previous revenue recognition standard (Ind AS 18) and provides a compreh...read more
Q12. Write a query to fetch second highest salary in sql
Query to fetch second highest salary in SQL
Use ORDER BY and LIMIT to select the second highest salary
Assuming the table name is 'employees' and salary column name is 'salary':
SELECT salary FROM employees ORDER BY salary DESC LIMIT 1,1
Q13. Explain the whole cycle of stlc.
STLC is a process of testing software from planning to deployment. It includes planning, designing, executing, and reporting.
Planning phase involves defining scope, objectives, and test strategy.
Design phase includes creating test cases, test scenarios, and test data.
Execution phase involves running test cases, reporting defects, and retesting.
Reporting phase includes preparing test summary reports and defect reports.
STLC ensures that software meets quality standards and cust...read more
Q14. Capital Gains Types of CG Income tax heads Real life example of long term and short term capital gain Treatment of issue of shares in premium Questions about Different entries balance sheet income statement etc...
read moreAnswering questions about capital gains, income tax heads, and financial statements.
Capital gains can be short-term or long-term, with different tax rates applied to each.
Income tax heads include salary, business/profession, capital gains, house property, and other sources.
An example of long-term capital gain is selling a property after holding it for more than 2 years.
An example of short-term capital gain is selling stocks after holding them for less than 1 year.
Issue of sha...read more
Q15. What is singleton class? How do we achieve that!?
A singleton class is a class that can only have one instance at a time.
To achieve a singleton class, we need to make the constructor private so that it cannot be instantiated from outside the class.
We then create a static method that returns the instance of the class, and if the instance does not exist, it creates one.
Singleton classes are often used for managing resources that should only have one instance, such as database connections or configuration settings.
Q16. What are design patterns in java?
Design patterns are reusable solutions to common software problems in Java.
Design patterns provide a standard way to solve common problems in software development.
They help in making code more maintainable, flexible and reusable.
Examples of design patterns include Singleton, Factory, Observer, and Decorator.
Design patterns can be categorized into three types: creational, structural, and behavioral.
Q17. What is normalization?
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables.
Each table should have a primary key and only contain data that is related to that key.
Normalization helps to prevent data inconsistencies and anomalies.
There are different levels of normalization, with each level building on the previous one.
For example, first normal form (1NF) requi...read more
Q18. What is the use of catch block?
Catch block is used to handle exceptions that occur during program execution.
Catch block is used in conjunction with try block.
It catches and handles exceptions that occur in the try block.
Multiple catch blocks can be used to handle different types of exceptions.
Finally block can be used to execute code regardless of whether an exception was thrown or not.
Example: try { //code that may throw exception } catch (Exception e) { //handle the exception } finally { //code that will...read more
Q19. What do you know about PWC?
PWC is a multinational professional services network.
PWC stands for PricewaterhouseCoopers.
It provides services in audit, tax, and advisory.
It operates in over 150 countries.
Some of its clients include Coca-Cola, Google, and Microsoft.
It is one of the Big Four accounting firms.
Q20. Random questions:-How do earthquakes occur? What is metamorphosis?
Earthquakes occur due to the movement of tectonic plates. Metamorphosis is the process of transformation in living organisms.
Earthquakes occur when two tectonic plates move against each other, causing a release of energy in the form of seismic waves.
Metamorphosis is a process of transformation in living organisms, where an organism undergoes a physical change in form and structure.
Examples of metamorphosis include the transformation of a caterpillar into a butterfly and the t...read more
Q21. Difference between error and exception.
Error is a mistake in code syntax or logic, while exception is an unexpected event during program execution.
Errors are caused by mistakes in code, such as syntax errors or logical errors.
Exceptions are unexpected events that occur during program execution, such as a division by zero or a file not found error.
Errors can be caught and fixed during development, while exceptions are handled during runtime.
Errors can cause the program to crash, while exceptions can be handled and ...read more
Q22. What is materiality,audit risk,assertions.
Materiality, audit risk, and assertions are important concepts in auditing.
Materiality refers to the significance of an item or transaction in the financial statements.
Audit risk is the risk that the auditor may issue an incorrect opinion on the financial statements.
Assertions are the representations made by management in the financial statements.
There are five types of assertions: existence, completeness, accuracy, valuation, and presentation and disclosure.
Auditors use mate...read more
Q23. Sort the give series of unsorted numbers using any comfortable sorting techniques.
I would use the quicksort algorithm to efficiently sort the given series of unsorted numbers.
Implement the quicksort algorithm by selecting a pivot element and partitioning the array into two sub-arrays based on the pivot.
Recursively apply the quicksort algorithm to the sub-arrays until the entire array is sorted.
Time complexity of quicksort is O(n log n) on average, making it a good choice for sorting large datasets.
Q24. What are the steps involved in SDLC process?
SDLC process involves planning, designing, developing, testing, and deploying software.
1. Planning phase involves defining project scope, requirements, and creating a project plan.
2. Design phase includes creating system architecture, database design, and user interface design.
3. Development phase involves coding, unit testing, and integration testing.
4. Testing phase includes system testing, user acceptance testing, and fixing bugs.
5. Deployment phase involves releasing the ...read more
Q25. What is your comfortable coding language.
My comfortable coding language is Python.
Python is versatile and easy to read
I have experience with libraries like Pandas and NumPy
I have used Python for web development projects
Q26. Reverse a string using any programming language
Reverse a string using any programming language
Use a loop to iterate through the string and append each character to a new string in reverse order
Alternatively, use built-in string reversal functions or methods depending on the programming language
Some languages, like Python, allow for string slicing to reverse a string
Q27. Tell me about Business process
Business process refers to a series of steps or activities that are undertaken to achieve a specific goal or outcome within an organization.
Business processes can involve multiple departments or functions working together towards a common objective.
They often include tasks such as planning, execution, monitoring, and optimization.
Examples of business processes include procurement, sales, customer service, and product development.
Q28. 5 major gaps found during IA
The 5 major gaps found during IA were lack of documentation, inadequate risk assessment, insufficient testing, ineffective communication, and inadequate follow-up.
Lack of documentation: Missing or incomplete records of audit findings and recommendations.
Inadequate risk assessment: Failure to properly identify and assess potential risks to the organization.
Insufficient testing: Limited scope or depth of testing procedures during the internal audit process.
Ineffective communica...read more
Q29. Fly ash content in cement
Fly ash is a byproduct of coal combustion and is often used as a supplementary cementitious material in concrete.
Fly ash is a fine powder that is produced when coal is burned in power plants.
It can be used as a partial replacement for Portland cement in concrete to improve workability, durability, and strength.
The amount of fly ash in cement is typically limited to around 15-35% by weight of the total cementitious materials.
Fly ash can also reduce the carbon footprint of conc...read more
Q30. what is oops concepts
Oops concepts refer to Object-Oriented Programming concepts which include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q31. difference between queue and stack
Queue is a data structure that follows First In First Out (FIFO) principle, while stack follows Last In First Out (LIFO) principle.
Queue: elements are added at the rear and removed from the front.
Stack: elements are added and removed from the top.
Example: In a queue, people waiting in line at a ticket counter are served in the order they arrived. In a stack, plates in a stack are removed from the top.
Q32. what is oops concept
Oops concept stands for Object-Oriented Programming concepts which include principles like inheritance, encapsulation, polymorphism, and abstraction.
Oops concept is a programming paradigm that focuses on objects and classes.
It includes principles like inheritance, where a class can inherit properties and methods from another class.
Encapsulation is another principle where data is kept private within a class and can only be accessed through methods.
Polymorphism allows objects t...read more
Q33. Problems faced in articleship
Problems faced during articleship
Long working hours
Lack of guidance from seniors
Low stipend
Unfair treatment by employers
Difficulty in balancing work and studies
Q34. What are audit assertions?
Audit assertions are the claims made by management regarding the accuracy and completeness of financial statements.
Audit assertions are used by auditors to assess the risk of material misstatement in financial statements.
There are six types of audit assertions: existence, completeness, accuracy, valuation, rights and obligations, and presentation and disclosure.
For example, existence assertion refers to whether the assets and liabilities actually exist, while completeness ass...read more
Q35. What are the descripencies identify during your experinced IA client
Discrepancies identified during experienced IA client engagements
Identified discrepancies in financial statements such as misstatements or errors
Discovered inconsistencies in internal controls leading to potential risks
Uncovered discrepancies in inventory counts or valuation methods
Identified discrepancies in compliance with regulatory requirements
Found discrepancies in data analysis or reporting processes
Q36. what is Materiality?
Materiality refers to the significance or importance of information in relation to a company's financial statements.
Materiality is a concept used in accounting and auditing.
It helps determine what information is important enough to be included in financial statements.
Materiality is based on the amount or nature of the information and its impact on the financial statements.
For example, a $10,000 error in a company with $1 million in revenue may not be material, but the same er...read more
Q37. Breif about prior exprince in feild or IA
I have over 5 years of experience in the field of internal audit, working with various industries and conducting risk assessments, compliance audits, and process improvements.
Conducted risk assessments to identify potential areas of concern
Performed compliance audits to ensure adherence to regulations and policies
Implemented process improvements to enhance efficiency and effectiveness
Worked with diverse industries such as manufacturing, healthcare, and finance
Utilized data an...read more
Q38. Backend tables of all the frameworks
Backend tables of frameworks store data related to the application's functionality.
Backend tables in frameworks like Django, Ruby on Rails, and Laravel store data such as user information, posts, comments, etc.
These tables are designed based on the application's requirements and relationships between different entities.
Developers can interact with these tables using ORM (Object-Relational Mapping) tools to perform CRUD operations.
Proper indexing and normalization of tables ar...read more
Q39. How to calculate Net Debt
Net Debt is calculated by subtracting total cash and cash equivalents from total debt.
Net Debt = Total Debt - Total Cash and Cash Equivalents
Total Debt includes all forms of debt such as bank loans, bonds, and other liabilities
Total Cash and Cash Equivalents includes cash on hand, short-term investments, and other liquid assets
Net Debt is used to assess a company's financial health and ability to repay its debts
Q40. What are audit asserstions
Audit assertions are the claims made by management regarding the financial statements being audited.
Audit assertions include existence, completeness, valuation, rights and obligations, and presentation and disclosure.
They help auditors assess the accuracy and reliability of financial statements.
For example, existence assertion ensures that assets and liabilities actually exist at a given date.
Q41. What are audit assertion
Audit assertions are the claims made by management regarding the financial statements being audited.
Audit assertions include existence, completeness, valuation, rights and obligations, and presentation and disclosure.
They help auditors assess the accuracy and reliability of financial statements.
For example, existence assertion ensures that assets and liabilities actually exist, while completeness assertion ensures that all transactions are recorded.
Auditors test these asserti...read more
Q42. Professional skeptic used in audit
Professional skepticism is a critical mindset used in audit to question information and evidence.
Professional skepticism involves questioning the reliability of information provided by clients.
Auditors must remain independent and objective in their assessments.
Examples of professional skepticism include verifying financial data with third-party sources and challenging management's assumptions.
Auditors should not automatically accept information at face value but instead criti...read more
Q43. Proposed dividend?
The proposed dividend is currently under review and will be announced at a later date.
The company is currently reviewing its financials to determine the feasibility of a dividend payout
The decision on the proposed dividend will depend on various factors such as profitability, cash flow, and future growth prospects
The announcement of the proposed dividend will be made after the review process is complete
Q44. What is EPS and DPS
EPS stands for Earnings Per Share, a financial metric indicating the portion of a company's profit allocated to each outstanding share of common stock. DPS stands for Dividends Per Share, representing the total dividends paid out to shareholders per share of stock.
EPS is calculated by dividing the company's net income by the number of outstanding shares of common stock.
EPS is an important indicator of a company's profitability and is often used by investors to evaluate a comp...read more
Q45. Dih fsdf and it's operations
Dih fsdf is a company specializing in technology solutions and its operations involve software development and IT consulting.
Dih fsdf is known for its innovative software solutions.
The company offers IT consulting services to help businesses improve their technology infrastructure.
Dih fsdf's operations include software development for various industries such as healthcare, finance, and retail.
Q46. Explain Projects
Projects are unique endeavors with specific goals, timelines, and resources allocated to achieve desired outcomes.
Projects are temporary in nature, with a defined start and end date.
They have specific objectives and deliverables to be achieved within a set timeframe.
Projects require resources such as budget, team members, and materials to be allocated.
Project management methodologies like Agile or Waterfall are often used to plan, execute, and monitor progress.
Examples of pro...read more
Q47. Estimate the number of pasta sauce bottles that are sold in a month in Mumbai.
Estimating the number of pasta sauce bottles sold in a month in Mumbai.
Consider the population of Mumbai and the average consumption of pasta sauce per person.
Research the market share of different pasta sauce brands in Mumbai.
Analyze the sales data of pasta sauce in supermarkets and grocery stores in Mumbai.
Take into account the demand during festive seasons or special events.
Consider the popularity of pasta dishes and the frequency of their consumption in Mumbai.
Q48. Reduce costs for an automobile company.
Implement lean manufacturing principles to reduce production costs.
Analyze the current production process to identify areas of waste and inefficiency.
Implement just-in-time inventory management to reduce inventory holding costs.
Optimize the supply chain to minimize transportation and logistics costs.
Invest in automation and technology to improve productivity and reduce labor costs.
Implement energy-saving measures to reduce utility costs.
Negotiate better deals with suppliers t...read more
You are given an infinite supply of coins of each of denominations D = {D0, D1, D2, D3, ...... Dn-1}. You need to figure out the total number of ways W, in which you can make a change fo...read more
Q50. What is virtualisation? what is paging? what is thrashing? what is bellady's anonaly? and some more OS questions
Virtualisation is the process of creating a virtual version of something, such as a server, storage device, network or operating system.
Virtualisation allows multiple operating systems to run on a single physical machine.
Paging is a memory management scheme that allows the operating system to move pages of memory between main memory and secondary storage.
Thrashing occurs when a computer's operating system spends a lot of time swapping data between RAM and virtual memory, slow...read more
Q51. Do you know about SAP or enterprise apps?
Yes, I am familiar with SAP and enterprise apps.
I have experience working with SAP software for managing business operations.
I am knowledgeable about enterprise applications used for resource planning and customer relationship management.
I have implemented SAP solutions for clients to streamline their business processes.
I have integrated enterprise apps with other systems to improve efficiency and productivity.
Given a sequence of numbers ‘ARR’. Your task is to return a sorted sequence of ‘ARR’ in non-descending order with help of the merge sort algorithm.
Example :
Merge Sort Algorithm - Merge sort is a Div...read more
Bubble Sort is one of the sorting algorithms that works by repeatedly swapping the adjacent elements of the array if they are not in sorted order.
You are given an unsorted array consisting of N non-...read more
Selection sort is one of the sorting algorithms that works by repeatedly finding the minimum element from the unsorted part of the array and putting it at the beginning of the unsorted region of t...read more
Q55. Mention some specific instance of data breach loss suffered by any MNC and how did they recover from it.
MNCs have suffered data breaches, but recovery is possible.
In 2013, Target suffered a data breach that affected 40 million customers. They recovered by investing in cybersecurity and offering free credit monitoring to affected customers.
In 2017, Equifax suffered a data breach that exposed the personal information of 143 million customers. They recovered by offering free credit monitoring and identity theft protection to affected customers.
MNCs can recover from data breaches b...read more
Q56. What is OSI model and explain 7 layers
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
Layer 1 - Physical layer: Deals with physical connections and transmission of raw data. Example: Ethernet cables
Layer 2 - Data link layer: Manages data transfer between devices on the same network. Example: MAC addresses
Layer 3 - Network layer: Handles routing and forwarding of data packets. Example: IP addresses
Layer 4 - Transport layer: Ensure...read more
Q57. What came first - egg or chicken? Justify your answer with proof.
The egg came first, as it was laid by a bird that was not quite a chicken.
The egg came first because it was laid by a bird that was not quite a chicken.
According to evolutionary biology, the first chicken would have evolved from a different species through a series of genetic mutations. The first bird that could be called a chicken would have laid the egg from which the first true chicken hatched.
Therefore, the egg came first in the evolutionary timeline.
Q58. What is the meaning of taxation
Taxation is the process of imposing a financial charge or other levy upon a taxpayer by a state or the functional equivalent of a state.
Taxation is the means by which governments finance their spending by imposing charges on citizens and corporate entities.
It involves the collection of taxes from individuals and businesses based on their income, profits, or property.
Taxation can take various forms such as income tax, sales tax, property tax, and corporate tax.
The revenue gene...read more
Q59. what is encryption-decryption ? what do you mean by cryptography? what is the difference between a switch and a router ?
Encryption-decryption is the process of converting plain text into a coded message and then back to plain text. Cryptography is the study of secure communication techniques.
Encryption is the process of converting plain text into a coded message using an algorithm and a key.
Decryption is the process of converting the coded message back to plain text using the same algorithm and key.
Cryptography involves techniques for secure communication, including encryption, decryption, and...read more
Q60. Sql query: Find top 3 salary from each department from employee table
Use SQL query to find top 3 salaries from each department in employee table.
Use window functions like ROW_NUMBER() to rank salaries within each department
Partition the data by department and order by salary in descending order
Filter the results to only include rows where the row number is less than or equal to 3
Q61. explain Encapsulation and Polymorphism. Explain , what do you mean by cloud computing. Difference between Http and Https , also discuss about the 3-tier architecture.
Explanation of encapsulation, polymorphism, cloud computing, HTTP/HTTPS, and 3-tier architecture.
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Polymorphism is the ability of an object to take on many forms.
Cloud computing is the delivery of computing services over the internet.
HTTP is a protocol for transferring data over the internet, while HTTPS is a secure version of HTTP.
3-tier architecture is a client-server archite...read more
Q62. Implement Reverse Array code
Implement a code to reverse an array of strings.
Create a function that takes an array of strings as input
Use a loop to iterate through the array and swap the elements from start to end
Return the reversed array
Q63. What is PwC known for?
PwC is known for providing professional services in the areas of audit, tax, and consulting.
Global network of firms offering assurance, tax, and consulting services
Known for their expertise in various industries such as technology, healthcare, and financial services
Provides services to help clients solve complex business problems and achieve their goals
Q64. Who is the father of Antarctica?
The father of Antarctica is considered to be James Cook, the British explorer who first crossed the Antarctic Circle in 1773.
James Cook was the first to cross the Antarctic Circle in 1773, making significant contributions to the exploration of Antarctica.
Although Cook did not actually set foot on the continent, his voyages laid the groundwork for future expeditions to Antarctica.
Cook's exploration of the Southern Ocean and his determination to reach the Antarctic region earne...read more
Q65. What is materiality in audit terms
Materiality is the concept of determining the significance of an item or event in relation to the financial statements as a whole.
Materiality is a key concept in auditing and is used to determine the level of detail required in an audit.
It involves assessing the significance of an item or event in relation to the financial statements as a whole.
Materiality is a matter of professional judgment and is influenced by factors such as the size and nature of the item or event, the c...read more
Q66. Revenue recognition describe 5 step model
The 5-step model for revenue recognition involves identifying the contract, identifying performance obligations, determining the transaction price, allocating the transaction price, and recognizing revenue when performance obligations are met.
Step 1: Identify the contract and its terms
Step 2: Identify the performance obligations in the contract
Step 3: Determine the transaction price
Step 4: Allocate the transaction price to the performance obligations
Step 5: Recognize revenue ...read more
Q67. why joins are used in SQL?
Joins are used in SQL to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query.
They are used to combine data based on a related column or key.
There are different types of joins such as inner join, left join, right join, and full outer join.
Joins can be used to filter data based on specific conditions.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id;
Q68. Favourite subject
My favourite subject is computer science because I enjoy problem-solving and creating innovative solutions.
I love learning about algorithms and data structures
I enjoy programming and coding in languages like Java and Python
I find networking and cybersecurity fascinating
Q69. How would you check if someone has hacked your computer?
To check if someone has hacked your computer, look for unusual behavior, unknown programs, strange network activity, and changes in settings.
Monitor for any unusual behavior on your computer such as slow performance, unexpected pop-ups, or unexplained changes.
Check for unknown programs or files that you did not install or recognize.
Monitor network activity for any suspicious connections or data transfers.
Look for changes in settings, passwords, or security configurations that...read more
Q70. can you return an array with the count of digits in the given array?
Q71. How would you rate your python, sql and tableau skills
Q72. Process of Identification of risk
Identification of risk involves a systematic process of identifying potential threats and assessing their likelihood and impact.
Identify potential risks through brainstorming, historical data analysis, and expert opinions
Assess the likelihood and impact of each identified risk
Prioritize risks based on their potential impact and likelihood
Develop strategies to mitigate or manage identified risks
Regularly review and update the risk identification process
Q73. Write a program to find character occurances in "Hello World"
Program to find character occurances in 'Hello World'
Create a map to store character occurrences
Iterate through each character in the string and update the map
Print the character occurrences from the map
Q74. What is polymorphism?
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It can be achieved through method overloading or method overriding.
Example: A shape class can have different subclasses like circle, square, and triangle, each with their own implementation of the draw method.
Polymorphism makes code more flexible and reusable.
Q75. How many credit card transactions occur in a day
Q76. What is Hash map? What app did you build How do u maintain app life cycle
A hash map is a data structure that allows for efficient storage and retrieval of key-value pairs.
A hash map uses a hash function to convert keys into array indices.
It provides constant-time average case complexity for insertion, deletion, and retrieval operations.
Hash maps are commonly used in programming languages and databases for fast data access.
Example: HashMap
map = new HashMap<>(); map.put("apple", 5);
int value = map.get("apple"); // returns 5
Q77. what is virtual dom in react js
Virtual DOM is a lightweight copy of the actual DOM in React.js, used for efficient updates and rendering.
Virtual DOM is a concept where a lightweight copy of the actual DOM is maintained by React.js.
It allows React to efficiently update and render components by comparing the virtual DOM with the actual DOM.
When changes are made to the virtual DOM, React calculates the most efficient way to update the actual DOM.
This helps in improving performance and reducing unnecessary re-...read more
Q78. What are the annotations used in TestNG
TestNG annotations are used to control the flow of test methods and provide additional information about the test.
Annotations like @Test, @BeforeSuite, @AfterSuite are used to define test methods and setup/teardown methods
Annotations like @BeforeTest, @AfterTest are used to run setup/teardown methods before/after a test
Annotations like @BeforeClass, @AfterClass are used to run setup/teardown methods before/after a test class
Annotations like @BeforeMethod, @AfterMethod are use...read more
Q79. What was your aggregate percentage in MBA
My aggregate percentage in MBA was 85%.
I scored 85% in my MBA program.
I was among the top performers in my MBA class.
My GPA in MBA was 3.8 out of 4.0.
Q80. what is dom? in javaScript
DOM stands for Document Object Model. It is a programming interface for web documents that allows scripts to dynamically access and update the content, structure, and style of a webpage.
DOM is a tree-like structure that represents the elements of an HTML document.
It allows developers to manipulate the content and structure of a webpage using JavaScript.
Example: document.getElementById('myElement') allows you to access an element with a specific ID.
Q81. Audit assertion for BS, PL and Off balance sheet items
Q82. Why you choose ML over Mechanical
I chose ML over Mechanical because of my passion for data analysis and problem-solving.
Passion for data analysis and problem-solving
Interest in cutting-edge technology and AI
Opportunities for growth and innovation in ML field
Q83. Use error handling method with Stored Procedure
Use TRY...CATCH block in SQL to handle errors in Stored Procedures
Enclose the code inside a TRY block
Use a CATCH block to handle any errors that occur
Use RAISEERROR or THROW statement to raise custom error messages
Use @@ERROR or @@ROWCOUNT to check for errors or affected rows
Q84. what is phishing and Vphishing?
Phishing is a type of cyber attack where attackers impersonate legitimate entities to trick individuals into providing sensitive information. Vphishing is a variation of phishing that involves using voice communication.
Phishing involves sending fraudulent emails or messages that appear to be from reputable sources, in order to deceive individuals into revealing personal information such as passwords or credit card numbers.
Vphishing, or voice phishing, uses phone calls or voic...read more
Q85. What is multithreading
Multithreading is the ability of a CPU to execute multiple threads concurrently, allowing for better performance and resource utilization.
Multithreading allows multiple threads to run concurrently within the same process.
Each thread has its own stack and shares the same memory space.
Multithreading can improve performance by utilizing multiple CPU cores efficiently.
Examples of multithreading include running multiple tasks simultaneously in a web server or processing data in pa...read more
Q86. Why is your CGPA what it is?
My CGPA is a reflection of my consistent hard work, dedication, and passion for learning.
I consistently attended classes and actively participated in discussions
I sought help from professors and peers whenever I faced challenges
I dedicated time to studying and preparing for exams
I completed assignments and projects with attention to detail
I engaged in extracurricular activities to enhance my skills and knowledge
Q87. Stored Procedure to get user input
Use a stored procedure to prompt user for input in ETL process.
Create a stored procedure with parameters to accept user input.
Use the parameters in the stored procedure to filter or manipulate data.
Prompt the user for input values when calling the stored procedure.
Q88. can we overload main method?
No, the main method in Java cannot be overloaded.
The main method in Java is the entry point of a program and must have a specific signature: public static void main(String[] args).
Attempting to overload the main method by changing the number or type of parameters will result in a compilation error.
Instead of overloading the main method, you can create additional methods in the same class to perform different tasks.
Q89. Test cases for bottle
Test cases for bottle include checking for leaks, verifying capacity, ensuring material quality, and assessing durability.
Verify that the bottle does not leak when filled with water
Check if the bottle's capacity matches the stated volume
Inspect the material quality of the bottle for any defects
Assess the durability of the bottle by dropping it from a certain height
Q90. Understandings of ESG
ESG stands for Environmental, Social, and Governance criteria used to evaluate a company's sustainability and ethical impact.
ESG criteria are used by investors to assess the sustainability and ethical impact of a company.
Environmental criteria focus on a company's impact on the environment, such as carbon emissions and resource usage.
Social criteria evaluate a company's relationships with employees, customers, suppliers, and the communities in which it operates.
Governance cri...read more
More about working at PwC
Top HR Questions asked in JTS Jobs Consultancy
Interview Process at JTS Jobs Consultancy
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month