Add office photos
Employer?
Claim Account for FREE

PwC

3.4
based on 8.7k Reviews
Filter interviews by

90+ JTS Jobs Consultancy Interview Questions and Answers

Updated 11 Jan 2025
Popular Designations

Q1. Create a table with specified columns Alter the table and add new columns Create another table with help of existing tables Write a query which uses group by clause Write a query which uses having clause

Ans.

Answering SQL related questions on table creation, alteration, and querying with group by and having clauses.

  • To create a table with specified columns, use the CREATE TABLE statement with column names and data types.

  • To alter a table and add new columns, use the ALTER TABLE statement with ADD COLUMN keyword.

  • To create another table with help of existing tables, use the CREATE TABLE statement with SELECT statement.

  • To write a query which uses group by clause, use the GROUP BY keyw...read more

View 1 answer

Q2. Write code to check if two strings are anagram or not.

Ans.

Code to check if two strings are anagram or not.

  • Convert both strings to lowercase to avoid case sensitivity

  • Sort both strings and compare them

  • Use a hash table to count the frequency of each character in both strings and compare the hash tables

View 1 answer

Q3. What are the Fundamental Accounting Assumptions?

Ans.

Fundamental Accounting Assumptions are basic principles that guide the preparation of financial statements.

  • The assumptions include: Going Concern, Consistency, Accrual, and Materiality

  • Going Concern assumes that the company will continue to operate in the foreseeable future

  • Consistency assumes that the company will use the same accounting methods and principles from period to period

  • Accrual assumes that revenues and expenses are recognized when earned or incurred, regardless of ...read more

View 2 more answers

Q4. Do you know about stlc explain something about stlc.

Ans.

STLC stands for Software Testing Life Cycle. It is a process followed to ensure quality in software development.

  • STLC involves planning, designing, executing and reporting of tests.

  • It includes various stages like requirement analysis, test planning, test design, test execution, and test closure.

  • Each stage has its own set of deliverables and objectives.

  • STLC helps in identifying defects early in the development cycle, reducing the cost of fixing them later.

  • Examples of STLC model...read more

Add your answer
Discover JTS Jobs Consultancy interview dos and don'ts from real experiences

Q5. What is normalization and explain all normal forms.

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and dependency.

  • First Normal Form (1NF) - Eliminate duplicate columns from the same table.

  • Second Normal Form (2NF) - Create separate tables for sets of values that apply to multiple records.

  • Third Normal Form (3NF) - Eliminate fields that do not depend on the primary key.

  • Fourth Normal Form (4NF) - Eliminate multi-valued dependencies.

  • Fifth Normal Form (5NF) - Eliminate redundant data using a join ...read more

Add your answer

Q6. Tell me about the collections in java. 4Write the code which uses collection ( to print the elements in reverse order

Ans.

Java collections are a group of classes and interfaces used to store and manipulate groups of objects.

  • To print elements in reverse order, use the Collections.reverse() method.

  • This method takes a List as an argument and reverses the order of its elements.

  • Example: List names = new ArrayList<>(); Collections.reverse(names);

  • Other commonly used collections in Java include Set, Map, Queue, and Stack.

Add your answer
Are these interview questions helpful?

Q7. Difference between where and having clause Types of joins, explain with examples Combine two tables and write the output

Ans.

Explaining the difference between WHERE and HAVING clause and types of joins with examples.

  • WHERE clause is used to filter rows based on a condition while HAVING clause is used to filter groups based on a condition

  • INNER JOIN returns only the matching rows from both tables while LEFT JOIN returns all rows from the left table and matching rows from the right table

  • Combining two tables can be done using JOIN clause with a common column between them

  • Example: SELECT * FROM table1 INN...read more

Add your answer

Q8. What is your preferred programming language?

Ans.

My preferred programming language is Python.

  • Python is easy to learn and has a simple syntax.

  • It has a vast library of modules and frameworks for various purposes.

  • Python is widely used in data science and machine learning.

  • It is also great for web development and automation tasks.

  • Examples: Flask, Django, NumPy, Pandas, TensorFlow.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. On which technology would you like to work on?

Ans.

I would like to work on Artificial Intelligence.

  • Developing machine learning algorithms for predictive analysis

  • Creating chatbots for customer service

  • Implementing computer vision for object recognition

  • Exploring natural language processing for sentiment analysis

Add your answer

Q10. Write a code to print the second largest element in array.

Ans.

Code to print the second largest element in array

  • Sort the array in descending order and return the second element

  • Iterate through the array and keep track of the largest and second largest elements

  • Use a priority queue to find the second largest element

Add your answer

Q11. Concepts of Ind As 115 &amp; Ind AS 116

Ans.

Ind AS 115 and Ind AS 116 are accounting standards used for revenue recognition and lease accounting respectively.

  • Ind AS 115: It provides guidance on how to recognize revenue from contracts with customers.

  • Ind AS 116: It outlines the principles for recognizing, measuring, presenting, and disclosing leases.

  • Both standards are part of the Indian Accounting Standards (Ind AS) framework.

  • Ind AS 115 replaces the previous revenue recognition standard (Ind AS 18) and provides a compreh...read more

View 2 more answers

Q12. Write a query to fetch second highest salary in sql

Ans.

Query to fetch second highest salary in SQL

  • Use ORDER BY and LIMIT to select the second highest salary

  • Assuming the table name is 'employees' and salary column name is 'salary':

  • SELECT salary FROM employees ORDER BY salary DESC LIMIT 1,1

Add your answer

Q13. Explain the whole cycle of stlc.

Ans.

STLC is a process of testing software from planning to deployment. It includes planning, designing, executing, and reporting.

  • Planning phase involves defining scope, objectives, and test strategy.

  • Design phase includes creating test cases, test scenarios, and test data.

  • Execution phase involves running test cases, reporting defects, and retesting.

  • Reporting phase includes preparing test summary reports and defect reports.

  • STLC ensures that software meets quality standards and cust...read more

Add your answer

Q14. Capital Gains Types of CG Income tax heads Real life example of long term and short term capital gain Treatment of issue of shares in premium Questions about Different entries balance sheet income statement etc...

read more
Ans.

Answering questions about capital gains, income tax heads, and financial statements.

  • Capital gains can be short-term or long-term, with different tax rates applied to each.

  • Income tax heads include salary, business/profession, capital gains, house property, and other sources.

  • An example of long-term capital gain is selling a property after holding it for more than 2 years.

  • An example of short-term capital gain is selling stocks after holding them for less than 1 year.

  • Issue of sha...read more

Add your answer

Q15. What is singleton class? How do we achieve that!?

Ans.

A singleton class is a class that can only have one instance at a time.

  • To achieve a singleton class, we need to make the constructor private so that it cannot be instantiated from outside the class.

  • We then create a static method that returns the instance of the class, and if the instance does not exist, it creates one.

  • Singleton classes are often used for managing resources that should only have one instance, such as database connections or configuration settings.

Add your answer

Q16. What are design patterns in java?

Ans.

Design patterns are reusable solutions to common software problems in Java.

  • Design patterns provide a standard way to solve common problems in software development.

  • They help in making code more maintainable, flexible and reusable.

  • Examples of design patterns include Singleton, Factory, Observer, and Decorator.

  • Design patterns can be categorized into three types: creational, structural, and behavioral.

Add your answer

Q17. What is normalization?

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a database into smaller, more manageable tables.

  • Each table should have a primary key and only contain data that is related to that key.

  • Normalization helps to prevent data inconsistencies and anomalies.

  • There are different levels of normalization, with each level building on the previous one.

  • For example, first normal form (1NF) requi...read more

Add your answer

Q18. What is the use of catch block?

Ans.

Catch block is used to handle exceptions that occur during program execution.

  • Catch block is used in conjunction with try block.

  • It catches and handles exceptions that occur in the try block.

  • Multiple catch blocks can be used to handle different types of exceptions.

  • Finally block can be used to execute code regardless of whether an exception was thrown or not.

  • Example: try { //code that may throw exception } catch (Exception e) { //handle the exception } finally { //code that will...read more

Add your answer

Q19. What do you know about PWC?

Ans.

PWC is a multinational professional services network.

  • PWC stands for PricewaterhouseCoopers.

  • It provides services in audit, tax, and advisory.

  • It operates in over 150 countries.

  • Some of its clients include Coca-Cola, Google, and Microsoft.

  • It is one of the Big Four accounting firms.

Add your answer

Q20. Random questions:-How do earthquakes occur? What is metamorphosis?

Ans.

Earthquakes occur due to the movement of tectonic plates. Metamorphosis is the process of transformation in living organisms.

  • Earthquakes occur when two tectonic plates move against each other, causing a release of energy in the form of seismic waves.

  • Metamorphosis is a process of transformation in living organisms, where an organism undergoes a physical change in form and structure.

  • Examples of metamorphosis include the transformation of a caterpillar into a butterfly and the t...read more

Add your answer

Q21. Difference between error and exception.

Ans.

Error is a mistake in code syntax or logic, while exception is an unexpected event during program execution.

  • Errors are caused by mistakes in code, such as syntax errors or logical errors.

  • Exceptions are unexpected events that occur during program execution, such as a division by zero or a file not found error.

  • Errors can be caught and fixed during development, while exceptions are handled during runtime.

  • Errors can cause the program to crash, while exceptions can be handled and ...read more

Add your answer

Q22. What is materiality,audit risk,assertions.

Ans.

Materiality, audit risk, and assertions are important concepts in auditing.

  • Materiality refers to the significance of an item or transaction in the financial statements.

  • Audit risk is the risk that the auditor may issue an incorrect opinion on the financial statements.

  • Assertions are the representations made by management in the financial statements.

  • There are five types of assertions: existence, completeness, accuracy, valuation, and presentation and disclosure.

  • Auditors use mate...read more

Add your answer

Q23. Sort the give series of unsorted numbers using any comfortable sorting techniques.

Ans.

I would use the quicksort algorithm to efficiently sort the given series of unsorted numbers.

  • Implement the quicksort algorithm by selecting a pivot element and partitioning the array into two sub-arrays based on the pivot.

  • Recursively apply the quicksort algorithm to the sub-arrays until the entire array is sorted.

  • Time complexity of quicksort is O(n log n) on average, making it a good choice for sorting large datasets.

Add your answer

Q24. What are the steps involved in SDLC process?

Ans.

SDLC process involves planning, designing, developing, testing, and deploying software.

  • 1. Planning phase involves defining project scope, requirements, and creating a project plan.

  • 2. Design phase includes creating system architecture, database design, and user interface design.

  • 3. Development phase involves coding, unit testing, and integration testing.

  • 4. Testing phase includes system testing, user acceptance testing, and fixing bugs.

  • 5. Deployment phase involves releasing the ...read more

Add your answer

Q25. What is your comfortable coding language.

Ans.

My comfortable coding language is Python.

  • Python is versatile and easy to read

  • I have experience with libraries like Pandas and NumPy

  • I have used Python for web development projects

Add your answer

Q26. Reverse a string using any programming language

Ans.

Reverse a string using any programming language

  • Use a loop to iterate through the string and append each character to a new string in reverse order

  • Alternatively, use built-in string reversal functions or methods depending on the programming language

  • Some languages, like Python, allow for string slicing to reverse a string

Add your answer

Q27. Tell me about Business process

Ans.

Business process refers to a series of steps or activities that are undertaken to achieve a specific goal or outcome within an organization.

  • Business processes can involve multiple departments or functions working together towards a common objective.

  • They often include tasks such as planning, execution, monitoring, and optimization.

  • Examples of business processes include procurement, sales, customer service, and product development.

Add your answer

Q28. 5 major gaps found during IA

Ans.

The 5 major gaps found during IA were lack of documentation, inadequate risk assessment, insufficient testing, ineffective communication, and inadequate follow-up.

  • Lack of documentation: Missing or incomplete records of audit findings and recommendations.

  • Inadequate risk assessment: Failure to properly identify and assess potential risks to the organization.

  • Insufficient testing: Limited scope or depth of testing procedures during the internal audit process.

  • Ineffective communica...read more

Add your answer

Q29. Fly ash content in cement

Ans.

Fly ash is a byproduct of coal combustion and is often used as a supplementary cementitious material in concrete.

  • Fly ash is a fine powder that is produced when coal is burned in power plants.

  • It can be used as a partial replacement for Portland cement in concrete to improve workability, durability, and strength.

  • The amount of fly ash in cement is typically limited to around 15-35% by weight of the total cementitious materials.

  • Fly ash can also reduce the carbon footprint of conc...read more

Add your answer

Q30. what is oops concepts

Ans.

Oops concepts refer to Object-Oriented Programming concepts which include inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q31. difference between queue and stack

Ans.

Queue is a data structure that follows First In First Out (FIFO) principle, while stack follows Last In First Out (LIFO) principle.

  • Queue: elements are added at the rear and removed from the front.

  • Stack: elements are added and removed from the top.

  • Example: In a queue, people waiting in line at a ticket counter are served in the order they arrived. In a stack, plates in a stack are removed from the top.

Add your answer

Q32. what is oops concept

Ans.

Oops concept stands for Object-Oriented Programming concepts which include principles like inheritance, encapsulation, polymorphism, and abstraction.

  • Oops concept is a programming paradigm that focuses on objects and classes.

  • It includes principles like inheritance, where a class can inherit properties and methods from another class.

  • Encapsulation is another principle where data is kept private within a class and can only be accessed through methods.

  • Polymorphism allows objects t...read more

Add your answer

Q33. Problems faced in articleship

Ans.

Problems faced during articleship

  • Long working hours

  • Lack of guidance from seniors

  • Low stipend

  • Unfair treatment by employers

  • Difficulty in balancing work and studies

Add your answer

Q34. What are audit assertions?

Ans.

Audit assertions are the claims made by management regarding the accuracy and completeness of financial statements.

  • Audit assertions are used by auditors to assess the risk of material misstatement in financial statements.

  • There are six types of audit assertions: existence, completeness, accuracy, valuation, rights and obligations, and presentation and disclosure.

  • For example, existence assertion refers to whether the assets and liabilities actually exist, while completeness ass...read more

View 1 answer

Q35. What are the descripencies identify during your experinced IA client

Ans.

Discrepancies identified during experienced IA client engagements

  • Identified discrepancies in financial statements such as misstatements or errors

  • Discovered inconsistencies in internal controls leading to potential risks

  • Uncovered discrepancies in inventory counts or valuation methods

  • Identified discrepancies in compliance with regulatory requirements

  • Found discrepancies in data analysis or reporting processes

Add your answer

Q36. what is Materiality?

Ans.

Materiality refers to the significance or importance of information in relation to a company's financial statements.

  • Materiality is a concept used in accounting and auditing.

  • It helps determine what information is important enough to be included in financial statements.

  • Materiality is based on the amount or nature of the information and its impact on the financial statements.

  • For example, a $10,000 error in a company with $1 million in revenue may not be material, but the same er...read more

Add your answer

Q37. Breif about prior exprince in feild or IA

Ans.

I have over 5 years of experience in the field of internal audit, working with various industries and conducting risk assessments, compliance audits, and process improvements.

  • Conducted risk assessments to identify potential areas of concern

  • Performed compliance audits to ensure adherence to regulations and policies

  • Implemented process improvements to enhance efficiency and effectiveness

  • Worked with diverse industries such as manufacturing, healthcare, and finance

  • Utilized data an...read more

Add your answer

Q38. Backend tables of all the frameworks

Ans.

Backend tables of frameworks store data related to the application's functionality.

  • Backend tables in frameworks like Django, Ruby on Rails, and Laravel store data such as user information, posts, comments, etc.

  • These tables are designed based on the application's requirements and relationships between different entities.

  • Developers can interact with these tables using ORM (Object-Relational Mapping) tools to perform CRUD operations.

  • Proper indexing and normalization of tables ar...read more

Add your answer

Q39. How to calculate Net Debt

Ans.

Net Debt is calculated by subtracting total cash and cash equivalents from total debt.

  • Net Debt = Total Debt - Total Cash and Cash Equivalents

  • Total Debt includes all forms of debt such as bank loans, bonds, and other liabilities

  • Total Cash and Cash Equivalents includes cash on hand, short-term investments, and other liquid assets

  • Net Debt is used to assess a company's financial health and ability to repay its debts

Add your answer

Q40. What are audit asserstions

Ans.

Audit assertions are the claims made by management regarding the financial statements being audited.

  • Audit assertions include existence, completeness, valuation, rights and obligations, and presentation and disclosure.

  • They help auditors assess the accuracy and reliability of financial statements.

  • For example, existence assertion ensures that assets and liabilities actually exist at a given date.

Add your answer

Q41. What are audit assertion

Ans.

Audit assertions are the claims made by management regarding the financial statements being audited.

  • Audit assertions include existence, completeness, valuation, rights and obligations, and presentation and disclosure.

  • They help auditors assess the accuracy and reliability of financial statements.

  • For example, existence assertion ensures that assets and liabilities actually exist, while completeness assertion ensures that all transactions are recorded.

  • Auditors test these asserti...read more

Add your answer

Q42. Professional skeptic used in audit

Ans.

Professional skepticism is a critical mindset used in audit to question information and evidence.

  • Professional skepticism involves questioning the reliability of information provided by clients.

  • Auditors must remain independent and objective in their assessments.

  • Examples of professional skepticism include verifying financial data with third-party sources and challenging management's assumptions.

  • Auditors should not automatically accept information at face value but instead criti...read more

Add your answer

Q43. Proposed dividend?

Ans.

The proposed dividend is currently under review and will be announced at a later date.

  • The company is currently reviewing its financials to determine the feasibility of a dividend payout

  • The decision on the proposed dividend will depend on various factors such as profitability, cash flow, and future growth prospects

  • The announcement of the proposed dividend will be made after the review process is complete

Add your answer

Q44. What is EPS and DPS

Ans.

EPS stands for Earnings Per Share, a financial metric indicating the portion of a company's profit allocated to each outstanding share of common stock. DPS stands for Dividends Per Share, representing the total dividends paid out to shareholders per share of stock.

  • EPS is calculated by dividing the company's net income by the number of outstanding shares of common stock.

  • EPS is an important indicator of a company's profitability and is often used by investors to evaluate a comp...read more

Add your answer

Q45. Dih fsdf and it's operations

Ans.

Dih fsdf is a company specializing in technology solutions and its operations involve software development and IT consulting.

  • Dih fsdf is known for its innovative software solutions.

  • The company offers IT consulting services to help businesses improve their technology infrastructure.

  • Dih fsdf's operations include software development for various industries such as healthcare, finance, and retail.

Add your answer

Q46. Explain Projects

Ans.

Projects are unique endeavors with specific goals, timelines, and resources allocated to achieve desired outcomes.

  • Projects are temporary in nature, with a defined start and end date.

  • They have specific objectives and deliverables to be achieved within a set timeframe.

  • Projects require resources such as budget, team members, and materials to be allocated.

  • Project management methodologies like Agile or Waterfall are often used to plan, execute, and monitor progress.

  • Examples of pro...read more

Add your answer

Q47. Estimate the number of pasta sauce bottles that are sold in a month in Mumbai.

Ans.

Estimating the number of pasta sauce bottles sold in a month in Mumbai.

  • Consider the population of Mumbai and the average consumption of pasta sauce per person.

  • Research the market share of different pasta sauce brands in Mumbai.

  • Analyze the sales data of pasta sauce in supermarkets and grocery stores in Mumbai.

  • Take into account the demand during festive seasons or special events.

  • Consider the popularity of pasta dishes and the frequency of their consumption in Mumbai.

View 1 answer

Q48. Reduce costs for an automobile company.

Ans.

Implement lean manufacturing principles to reduce production costs.

  • Analyze the current production process to identify areas of waste and inefficiency.

  • Implement just-in-time inventory management to reduce inventory holding costs.

  • Optimize the supply chain to minimize transportation and logistics costs.

  • Invest in automation and technology to improve productivity and reduce labor costs.

  • Implement energy-saving measures to reduce utility costs.

  • Negotiate better deals with suppliers t...read more

View 1 answer
Q49. Ways To Make Coin Change

You are given an infinite supply of coins of each of denominations D = {D0, D1, D2, D3, ...... Dn-1}. You need to figure out the total number of ways W, in which you can make a change fo...read more

Add your answer

Q50. What is virtualisation? what is paging? what is thrashing? what is bellady's anonaly? and some more OS questions

Ans.

Virtualisation is the process of creating a virtual version of something, such as a server, storage device, network or operating system.

  • Virtualisation allows multiple operating systems to run on a single physical machine.

  • Paging is a memory management scheme that allows the operating system to move pages of memory between main memory and secondary storage.

  • Thrashing occurs when a computer's operating system spends a lot of time swapping data between RAM and virtual memory, slow...read more

Add your answer

Q51. Do you know about SAP or enterprise apps?

Ans.

Yes, I am familiar with SAP and enterprise apps.

  • I have experience working with SAP software for managing business operations.

  • I am knowledgeable about enterprise applications used for resource planning and customer relationship management.

  • I have implemented SAP solutions for clients to streamline their business processes.

  • I have integrated enterprise apps with other systems to improve efficiency and productivity.

Add your answer
Q52. Merge Sort

Given a sequence of numbers ‘ARR’. Your task is to return a sorted sequence of ‘ARR’ in non-descending order with help of the merge sort algorithm.

Example :

Merge Sort Algorithm - Merge sort is a Div...read more
Add your answer
Q53. Bubble Sort

Bubble Sort is one of the sorting algorithms that works by repeatedly swapping the adjacent elements of the array if they are not in sorted order.

You are given an unsorted array consisting of N non-...read more

Add your answer
Q54. Selection Sort

Selection sort is one of the sorting algorithms that works by repeatedly finding the minimum element from the unsorted part of the array and putting it at the beginning of the unsorted region of t...read more

Add your answer

Q55. Mention some specific instance of data breach loss suffered by any MNC and how did they recover from it.

Ans.

MNCs have suffered data breaches, but recovery is possible.

  • In 2013, Target suffered a data breach that affected 40 million customers. They recovered by investing in cybersecurity and offering free credit monitoring to affected customers.

  • In 2017, Equifax suffered a data breach that exposed the personal information of 143 million customers. They recovered by offering free credit monitoring and identity theft protection to affected customers.

  • MNCs can recover from data breaches b...read more

Add your answer

Q56. What is OSI model and explain 7 layers

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • Layer 1 - Physical layer: Deals with physical connections and transmission of raw data. Example: Ethernet cables

  • Layer 2 - Data link layer: Manages data transfer between devices on the same network. Example: MAC addresses

  • Layer 3 - Network layer: Handles routing and forwarding of data packets. Example: IP addresses

  • Layer 4 - Transport layer: Ensure...read more

Add your answer

Q57. What came first - egg or chicken? Justify your answer with proof.

Ans.

The egg came first, as it was laid by a bird that was not quite a chicken.

  • The egg came first because it was laid by a bird that was not quite a chicken.

  • According to evolutionary biology, the first chicken would have evolved from a different species through a series of genetic mutations. The first bird that could be called a chicken would have laid the egg from which the first true chicken hatched.

  • Therefore, the egg came first in the evolutionary timeline.

Add your answer

Q58. What is the meaning of taxation

Ans.

Taxation is the process of imposing a financial charge or other levy upon a taxpayer by a state or the functional equivalent of a state.

  • Taxation is the means by which governments finance their spending by imposing charges on citizens and corporate entities.

  • It involves the collection of taxes from individuals and businesses based on their income, profits, or property.

  • Taxation can take various forms such as income tax, sales tax, property tax, and corporate tax.

  • The revenue gene...read more

Add your answer

Q59. what is encryption-decryption ? what do you mean by cryptography? what is the difference between a switch and a router ?

Ans.

Encryption-decryption is the process of converting plain text into a coded message and then back to plain text. Cryptography is the study of secure communication techniques.

  • Encryption is the process of converting plain text into a coded message using an algorithm and a key.

  • Decryption is the process of converting the coded message back to plain text using the same algorithm and key.

  • Cryptography involves techniques for secure communication, including encryption, decryption, and...read more

Add your answer

Q60. Sql query: Find top 3 salary from each department from employee table

Ans.

Use SQL query to find top 3 salaries from each department in employee table.

  • Use window functions like ROW_NUMBER() to rank salaries within each department

  • Partition the data by department and order by salary in descending order

  • Filter the results to only include rows where the row number is less than or equal to 3

Add your answer

Q61. explain Encapsulation and Polymorphism. Explain , what do you mean by cloud computing. Difference between Http and Https , also discuss about the 3-tier architecture.

Ans.

Explanation of encapsulation, polymorphism, cloud computing, HTTP/HTTPS, and 3-tier architecture.

  • Encapsulation is the process of hiding implementation details and exposing only necessary information.

  • Polymorphism is the ability of an object to take on many forms.

  • Cloud computing is the delivery of computing services over the internet.

  • HTTP is a protocol for transferring data over the internet, while HTTPS is a secure version of HTTP.

  • 3-tier architecture is a client-server archite...read more

Add your answer

Q62. Implement Reverse Array code

Ans.

Implement a code to reverse an array of strings.

  • Create a function that takes an array of strings as input

  • Use a loop to iterate through the array and swap the elements from start to end

  • Return the reversed array

Add your answer

Q63. What is PwC known for?

Ans.

PwC is known for providing professional services in the areas of audit, tax, and consulting.

  • Global network of firms offering assurance, tax, and consulting services

  • Known for their expertise in various industries such as technology, healthcare, and financial services

  • Provides services to help clients solve complex business problems and achieve their goals

Add your answer

Q64. Who is the father of Antarctica?

Ans.

The father of Antarctica is considered to be James Cook, the British explorer who first crossed the Antarctic Circle in 1773.

  • James Cook was the first to cross the Antarctic Circle in 1773, making significant contributions to the exploration of Antarctica.

  • Although Cook did not actually set foot on the continent, his voyages laid the groundwork for future expeditions to Antarctica.

  • Cook's exploration of the Southern Ocean and his determination to reach the Antarctic region earne...read more

Add your answer

Q65. What is materiality in audit terms

Ans.

Materiality is the concept of determining the significance of an item or event in relation to the financial statements as a whole.

  • Materiality is a key concept in auditing and is used to determine the level of detail required in an audit.

  • It involves assessing the significance of an item or event in relation to the financial statements as a whole.

  • Materiality is a matter of professional judgment and is influenced by factors such as the size and nature of the item or event, the c...read more

Add your answer

Q66. Revenue recognition describe 5 step model

Ans.

The 5-step model for revenue recognition involves identifying the contract, identifying performance obligations, determining the transaction price, allocating the transaction price, and recognizing revenue when performance obligations are met.

  • Step 1: Identify the contract and its terms

  • Step 2: Identify the performance obligations in the contract

  • Step 3: Determine the transaction price

  • Step 4: Allocate the transaction price to the performance obligations

  • Step 5: Recognize revenue ...read more

Add your answer

Q67. why joins are used in SQL?

Ans.

Joins are used in SQL to combine data from two or more tables based on a related column.

  • Joins are used to retrieve data from multiple tables in a single query.

  • They are used to combine data based on a related column or key.

  • There are different types of joins such as inner join, left join, right join, and full outer join.

  • Joins can be used to filter data based on specific conditions.

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id;

Add your answer

Q68. Favourite subject

Ans.

My favourite subject is computer science because I enjoy problem-solving and creating innovative solutions.

  • I love learning about algorithms and data structures

  • I enjoy programming and coding in languages like Java and Python

  • I find networking and cybersecurity fascinating

Add your answer

Q69. How would you check if someone has hacked your computer?

Ans.

To check if someone has hacked your computer, look for unusual behavior, unknown programs, strange network activity, and changes in settings.

  • Monitor for any unusual behavior on your computer such as slow performance, unexpected pop-ups, or unexplained changes.

  • Check for unknown programs or files that you did not install or recognize.

  • Monitor network activity for any suspicious connections or data transfers.

  • Look for changes in settings, passwords, or security configurations that...read more

Add your answer

Q70. can you return an array with the count of digits in the given array?

Add your answer

Q71. How would you rate your python, sql and tableau skills

Add your answer

Q72. Process of Identification of risk

Ans.

Identification of risk involves a systematic process of identifying potential threats and assessing their likelihood and impact.

  • Identify potential risks through brainstorming, historical data analysis, and expert opinions

  • Assess the likelihood and impact of each identified risk

  • Prioritize risks based on their potential impact and likelihood

  • Develop strategies to mitigate or manage identified risks

  • Regularly review and update the risk identification process

Add your answer

Q73. Write a program to find character occurances in "Hello World"

Ans.

Program to find character occurances in 'Hello World'

  • Create a map to store character occurrences

  • Iterate through each character in the string and update the map

  • Print the character occurrences from the map

Add your answer

Q74. What is polymorphism?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • It can be achieved through method overloading or method overriding.

  • Example: A shape class can have different subclasses like circle, square, and triangle, each with their own implementation of the draw method.

  • Polymorphism makes code more flexible and reusable.

Add your answer

Q75. How many credit card transactions occur in a day

Add your answer

Q76. What is Hash map? What app did you build How do u maintain app life cycle

Ans.

A hash map is a data structure that allows for efficient storage and retrieval of key-value pairs.

  • A hash map uses a hash function to convert keys into array indices.

  • It provides constant-time average case complexity for insertion, deletion, and retrieval operations.

  • Hash maps are commonly used in programming languages and databases for fast data access.

  • Example: HashMap map = new HashMap<>();

  • map.put("apple", 5);

  • int value = map.get("apple"); // returns 5

Add your answer

Q77. what is virtual dom in react js

Ans.

Virtual DOM is a lightweight copy of the actual DOM in React.js, used for efficient updates and rendering.

  • Virtual DOM is a concept where a lightweight copy of the actual DOM is maintained by React.js.

  • It allows React to efficiently update and render components by comparing the virtual DOM with the actual DOM.

  • When changes are made to the virtual DOM, React calculates the most efficient way to update the actual DOM.

  • This helps in improving performance and reducing unnecessary re-...read more

Add your answer

Q78. What are the annotations used in TestNG

Ans.

TestNG annotations are used to control the flow of test methods and provide additional information about the test.

  • Annotations like @Test, @BeforeSuite, @AfterSuite are used to define test methods and setup/teardown methods

  • Annotations like @BeforeTest, @AfterTest are used to run setup/teardown methods before/after a test

  • Annotations like @BeforeClass, @AfterClass are used to run setup/teardown methods before/after a test class

  • Annotations like @BeforeMethod, @AfterMethod are use...read more

Add your answer

Q79. What was your aggregate percentage in MBA

Ans.

My aggregate percentage in MBA was 85%.

  • I scored 85% in my MBA program.

  • I was among the top performers in my MBA class.

  • My GPA in MBA was 3.8 out of 4.0.

Add your answer

Q80. what is dom? in javaScript

Ans.

DOM stands for Document Object Model. It is a programming interface for web documents that allows scripts to dynamically access and update the content, structure, and style of a webpage.

  • DOM is a tree-like structure that represents the elements of an HTML document.

  • It allows developers to manipulate the content and structure of a webpage using JavaScript.

  • Example: document.getElementById('myElement') allows you to access an element with a specific ID.

Add your answer

Q81. Audit assertion for BS, PL and Off balance sheet items

Add your answer

Q82. Why you choose ML over Mechanical

Ans.

I chose ML over Mechanical because of my passion for data analysis and problem-solving.

  • Passion for data analysis and problem-solving

  • Interest in cutting-edge technology and AI

  • Opportunities for growth and innovation in ML field

Add your answer

Q83. Use error handling method with Stored Procedure

Ans.

Use TRY...CATCH block in SQL to handle errors in Stored Procedures

  • Enclose the code inside a TRY block

  • Use a CATCH block to handle any errors that occur

  • Use RAISEERROR or THROW statement to raise custom error messages

  • Use @@ERROR or @@ROWCOUNT to check for errors or affected rows

Add your answer

Q84. what is phishing and Vphishing?

Ans.

Phishing is a type of cyber attack where attackers impersonate legitimate entities to trick individuals into providing sensitive information. Vphishing is a variation of phishing that involves using voice communication.

  • Phishing involves sending fraudulent emails or messages that appear to be from reputable sources, in order to deceive individuals into revealing personal information such as passwords or credit card numbers.

  • Vphishing, or voice phishing, uses phone calls or voic...read more

Add your answer

Q85. What is multithreading

Ans.

Multithreading is the ability of a CPU to execute multiple threads concurrently, allowing for better performance and resource utilization.

  • Multithreading allows multiple threads to run concurrently within the same process.

  • Each thread has its own stack and shares the same memory space.

  • Multithreading can improve performance by utilizing multiple CPU cores efficiently.

  • Examples of multithreading include running multiple tasks simultaneously in a web server or processing data in pa...read more

Add your answer

Q86. Why is your CGPA what it is?

Ans.

My CGPA is a reflection of my consistent hard work, dedication, and passion for learning.

  • I consistently attended classes and actively participated in discussions

  • I sought help from professors and peers whenever I faced challenges

  • I dedicated time to studying and preparing for exams

  • I completed assignments and projects with attention to detail

  • I engaged in extracurricular activities to enhance my skills and knowledge

Add your answer

Q87. Stored Procedure to get user input

Ans.

Use a stored procedure to prompt user for input in ETL process.

  • Create a stored procedure with parameters to accept user input.

  • Use the parameters in the stored procedure to filter or manipulate data.

  • Prompt the user for input values when calling the stored procedure.

Add your answer

Q88. can we overload main method?

Ans.

No, the main method in Java cannot be overloaded.

  • The main method in Java is the entry point of a program and must have a specific signature: public static void main(String[] args).

  • Attempting to overload the main method by changing the number or type of parameters will result in a compilation error.

  • Instead of overloading the main method, you can create additional methods in the same class to perform different tasks.

Add your answer

Q89. Test cases for bottle

Ans.

Test cases for bottle include checking for leaks, verifying capacity, ensuring material quality, and assessing durability.

  • Verify that the bottle does not leak when filled with water

  • Check if the bottle's capacity matches the stated volume

  • Inspect the material quality of the bottle for any defects

  • Assess the durability of the bottle by dropping it from a certain height

Add your answer

Q90. Understandings of ESG

Ans.

ESG stands for Environmental, Social, and Governance criteria used to evaluate a company's sustainability and ethical impact.

  • ESG criteria are used by investors to assess the sustainability and ethical impact of a company.

  • Environmental criteria focus on a company's impact on the environment, such as carbon emissions and resource usage.

  • Social criteria evaluate a company's relationships with employees, customers, suppliers, and the communities in which it operates.

  • Governance cri...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at JTS Jobs Consultancy

based on 586 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 2k Interview Questions
3.8
 • 388 Interview Questions
3.9
 • 206 Interview Questions
3.6
 • 171 Interview Questions
3.4
 • 168 Interview Questions
3.8
 • 131 Interview Questions
View all
Top PwC Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter