PwC
700+ Rajni Devi Global Village School Interview Questions and Answers
Q201. What is risk in your process
Risk in my process refers to the potential for negative outcomes or failures due to uncertainties or unforeseen events.
Risk can arise from various sources such as human error, technical failures, or external factors.
Identifying and assessing risks is crucial for effective risk management.
Examples of risks in my process could include delays in project timelines, budget overruns, or data security breaches.
Q202. What are the management assertions
Management assertions are the claims made by management regarding the accuracy and completeness of financial statements.
Management assertions are used to ensure the reliability of financial statements.
There are six management assertions: existence, completeness, accuracy, valuation and allocation, rights and obligations, and presentation and disclosure.
Existence assertion ensures that the assets and liabilities in the financial statements actually exist.
Completeness assertion...read more
Q203. Tax percentage of different countries in EU
The tax percentages vary across different countries in the EU.
Tax percentages in the EU vary due to different tax systems and policies.
Some countries have higher tax rates to fund social welfare programs.
Others have lower tax rates to attract foreign investments.
Tax rates can differ for various types of taxes, such as income tax, corporate tax, and value-added tax (VAT).
For example, the top income tax rate in Sweden is 57.1%, while in Bulgaria it is 10%.
In terms of corporate ...read more
Q204. Your experience in Internal audit?
I have 3 years of experience in internal audit, conducting risk assessments, evaluating controls, and preparing audit reports.
Conducted risk assessments to identify potential areas of concern
Evaluated internal controls to ensure compliance with policies and regulations
Prepared detailed audit reports outlining findings and recommendations
Collaborated with management to implement corrective actions
Performed follow-up audits to track progress on remediation efforts
Q205. Different stages of software development
Different stages of software development
Planning and requirements gathering
Design and architecture
Implementation and coding
Testing and quality assurance
Deployment and maintenance
Q206. Credit Agreement and types of deals and facilities
Credit agreements are legal documents outlining terms and conditions of a loan. Deals and facilities include term loans, revolving credit, and letters of credit.
Credit agreements are used to formalize lending arrangements between a borrower and a lender.
They outline the terms and conditions of the loan, including interest rates, repayment schedules, and collateral requirements.
Types of deals and facilities include term loans, revolving credit, and letters of credit.
Term loans...read more
Q207. What is the SQL query to find the third highest salary from a given table?
Use SQL query with ORDER BY and LIMIT to find the third highest salary from a table.
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 1 OFFSET 2 to skip the first two highest salaries
Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 2
Q208. Cut off procedure in revenue recognition
Cut off procedure is used to determine the period in which revenue should be recognized.
Cut off procedure is used to determine the period in which revenue should be recognized
It involves identifying the point at which the revenue is earned and determining the period in which it should be recognized
This is important for accurate financial reporting and compliance with accounting standards
Examples of cut off procedures include analyzing sales orders, shipping documents, and inv...read more
Q209. 2- what is phishing attack?
Phishing attack is a type of social engineering attack where attackers trick victims into revealing sensitive information.
Phishing attacks can be carried out through emails, phone calls, or text messages.
Attackers often use fake websites or login pages to steal login credentials.
Phishing attacks can also be used to distribute malware or ransomware.
Examples of phishing attacks include spear phishing, whaling, and vishing.
Phishing attacks can be prevented by being cautious of s...read more
Q210. How do you work on Manual to Automation conversation ratio?
I work on manual to automation conversion ratio by analyzing the repetitive and time-consuming manual tasks and automating them.
Identify the manual tasks that are repetitive and time-consuming
Analyze the feasibility of automating those tasks
Prioritize the tasks based on their impact on the testing process
Create a plan for automation and execute it
Regularly review and update the automation plan
Collaborate with the team to ensure the automation is effective
Q211. Different types of risks and controls
Different types of risks and controls involve identifying, assessing, and managing potential threats to an organization.
Types of risks include strategic, financial, operational, compliance, and reputational risks.
Controls are measures put in place to mitigate risks, such as policies, procedures, and internal audits.
Examples of controls include segregation of duties, access controls, and regular risk assessments.
Risk management involves identifying risks, assessing their poten...read more
Q212. Controls in Procure to pay process
Controls in Procure to pay process ensure accuracy, efficiency, and compliance in purchasing and payment activities.
Segregation of duties to prevent fraud
Approval hierarchy for purchase orders and invoices
Vendor master data maintenance and verification
Matching of purchase orders, goods receipts, and invoices
Regular reconciliation of accounts payable
Use of electronic procurement systems for audit trails
Q213. How will you approach to identify improvement area in any manufacturing company
I will conduct a thorough analysis of the manufacturing processes, gather feedback from employees, and benchmark against industry standards.
Conduct a detailed analysis of the current manufacturing processes
Gather feedback from employees at all levels of the organization
Benchmark the company's performance against industry standards
Identify key performance indicators (KPIs) to track improvements
Implement continuous improvement initiatives based on findings
Q214. What is reactive programming?
Reactive programming is a programming paradigm focused on asynchronous data streams and the propagation of changes.
Uses data streams to represent changes over time
Emphasizes declarative programming
Commonly used in frameworks like RxJava and Reactor
Q215. What if PR is raised after PO?
If PR is raised after PO, it may impact the risk assessment and mitigation plan.
The risk assessment and mitigation plan may need to be updated to include the new PR.
The impact of the PR on the project should be evaluated to determine if any additional risks have arisen.
The project team should communicate the PR to stakeholders and determine if any changes to the project timeline or budget are necessary.
The project manager should work with the team to determine the best course...read more
Q216. What came first - egg or chicken? Justify your answer with proof.
The egg came first, as it was laid by a bird that was not quite a chicken.
The egg came first because it was laid by a bird that was not quite a chicken.
According to evolutionary biology, the first chicken would have evolved from a different species through a series of genetic mutations. The first bird that could be called a chicken would have laid the egg from which the first true chicken hatched.
Therefore, the egg came first in the evolutionary timeline.
Q217. If we have streaming data coming from kafka and spark , how will you handle fault tolerance?
Implement fault tolerance by using checkpointing, replication, and monitoring mechanisms.
Enable checkpointing in Spark Streaming to save the state of the computation periodically to a reliable storage like HDFS or S3.
Use replication in Kafka to ensure that data is not lost in case of node failures.
Monitor the health of the Kafka and Spark clusters using tools like Prometheus and Grafana to detect and address issues proactively.
Q218. Behaviour towards critical problem thinking
I approach critical problems with a calm and analytical mindset, breaking down the issue into smaller parts to find a solution.
I take time to fully understand the problem before jumping to conclusions
I break down the problem into smaller parts to identify the root cause
I consider multiple solutions and weigh the pros and cons before making a decision
I remain calm and focused under pressure to find a solution
Example: In my previous role, I was tasked with resolving a critical ...read more
Q219. P2P Process with the different risks and controla to mitigate them?
P2P process involves risks such as fraud, errors, and non-compliance. Controls like segregation of duties, approvals, and audits can mitigate them.
P2P process involves procurement, receiving, and payment
Risks include fraud, errors, and non-compliance with policies and regulations
Controls include segregation of duties, approvals, and audits
Segregation of duties ensures that no single person has complete control over the process
Approvals ensure that all transactions are authori...read more
Q220. Fly ash content in cement
Fly ash is a byproduct of coal combustion and is often used as a supplementary cementitious material in concrete.
Fly ash is a fine powder that is produced when coal is burned in power plants.
It can be used as a partial replacement for Portland cement in concrete to improve workability, durability, and strength.
The amount of fly ash in cement is typically limited to around 15-35% by weight of the total cementitious materials.
Fly ash can also reduce the carbon footprint of conc...read more
Q221. What are transformations, and how many types of transformations exist?
Transformations are operations performed on data to convert it from one form to another. There are mainly two types of transformations: narrow and wide.
Transformations are operations performed on data to convert it from one form to another.
Narrow transformations are those where each input partition will contribute to only one output partition, e.g., map, filter.
Wide transformations are those where each input partition may contribute to multiple output partitions, e.g., groupB...read more
Q222. How to manage 3 or 4 clients simultaneously.
Managing multiple clients requires effective communication, organization, and prioritization.
Establish clear communication channels with each client to ensure their needs and expectations are understood.
Create a detailed schedule or timeline to track deadlines and deliverables for each client.
Prioritize tasks based on urgency and importance to ensure all clients receive timely attention.
Delegate tasks to team members or colleagues when necessary to manage workload effectively...read more
Q223. Could you please elaborate on all the steps involved from Business Blueprint Phase (BBP) to Hypercare?
Overview of steps from Business Blueprint Phase to Hypercare in project management.
Business Blueprint Phase (BBP): Define project scope, gather requirements, and document business processes.
Realization Phase: Configure the system based on the BBP, develop prototypes, and conduct unit testing.
Final Preparation: Conduct user training, finalize data migration, and perform system testing.
Go-Live: Transition to the new system, monitor performance, and ensure all functionalities ar...read more
Q224. What is difference between smoke and sanity testing?
Smoke testing is a quick test to check if the software build is stable, while sanity testing is a more thorough test to check specific functionalities.
Smoke testing is done to ensure the critical functionalities of the software are working fine after a build, while sanity testing is done to verify specific features or functionalities.
Smoke testing is usually performed before detailed testing, while sanity testing is performed after regression testing.
Smoke testing is a subset...read more
Q225. what is azure devops what are the projects that you worked on Ci/Cd pipeline what are the branching strategies that you follow in your project
Azure DevOps is a cloud-based platform for managing the entire DevOps lifecycle.
Azure DevOps provides tools for project management, version control, continuous integration and delivery, testing, and deployment.
I have worked on projects that involved setting up CI/CD pipelines using Azure DevOps, managing releases, and automating testing.
For branching strategies, I have used GitFlow and Trunk-based development depending on the project requirements.
Q226. Why we need materiality level?
Materiality level is necessary to determine the significance of information in financial reporting.
Materiality level helps in determining what information should be included in financial statements.
It ensures that only relevant and significant information is disclosed to users of financial statements.
Materiality level helps in avoiding unnecessary clutter and presenting concise financial information.
It assists in making informed decisions by focusing on material information t...read more
Q227. Attributes to check in a review control
Attributes to check in a review control include accuracy, completeness, timeliness, relevance, and compliance.
Accuracy - Ensure that the information provided is correct and free from errors.
Completeness - Verify that all necessary information is included and nothing is missing.
Timeliness - Confirm that the review is conducted in a timely manner to meet deadlines.
Relevance - Check if the review addresses the relevant aspects and meets the objectives.
Compliance - Ensure that th...read more
Q228. What is tax jurisdiction in SAP?
Tax jurisdiction in SAP determines the tax laws and regulations applicable to a particular business transaction.
It is used to determine the tax codes and rates for a transaction
It is based on the location of the company code and the customer/vendor
It can be set up at various levels such as country, state, city, etc.
It is important for compliance with tax laws and regulations
Example: A company based in the US selling to a customer in Canada would have different tax jurisdictio...read more
Q229. Q-1 What is materiality?
Materiality refers to the significance or importance of information in relation to a decision or financial statement.
Materiality is a concept used in accounting and auditing.
It helps determine what information is important enough to be included in financial statements.
Materiality is subjective and depends on the context and audience.
For example, a $1,000 error in a company with millions in revenue may not be material, but the same error in a small business could be significan...read more
Q230. What are the ratios in manufacturing sector?
There are various ratios used in the manufacturing sector to measure performance and efficiency.
Some common ratios include inventory turnover ratio, asset turnover ratio, debt-to-equity ratio, and gross margin ratio.
Inventory turnover ratio measures how quickly a company sells its inventory and is calculated by dividing the cost of goods sold by average inventory.
Asset turnover ratio measures how efficiently a company uses its assets to generate revenue and is calculated by d...read more
Q231. How would you reduce the SGA of a company?
Reducing SGA can be achieved through various measures such as optimizing processes, reducing headcount, and outsourcing non-core functions.
Identify non-core functions that can be outsourced to reduce overhead costs
Optimize processes to reduce waste and increase efficiency
Reduce headcount by eliminating redundant positions or automating tasks
Implement cost-saving measures such as energy-efficient equipment or telecommuting
Negotiate better deals with suppliers to reduce procure...read more
Q232. What is prorate convention ?
Prorate convention is a method used to calculate interest or fees for a partial period of time.
Prorate convention is commonly used in finance and accounting to determine the amount of interest or fees that should be charged for a partial period.
It involves dividing the total interest or fees by the number of days in the period and then multiplying by the number of days in the partial period.
For example, if a loan has an annual interest rate of 10% and a prorate convention of ...read more
Q233. Current ctc, expected to relocate
Current CTC and willingness to relocate
My current CTC is [current CTC].
I am open to relocating for the right opportunity.
I believe that relocating can provide new experiences and growth opportunities.
I am flexible and adaptable to new environments.
Q234. When the pole meets the hole, it produces a new soul
The question is a metaphorical way of asking about the process of creation or transformation.
The 'pole' can represent a source of energy or potential, while the 'hole' can represent a receptacle or container.
When the two meet, they combine to create something new, symbolized by the 'soul'.
This can be interpreted as the process of creation, transformation, or synergy between different elements.
For example, in a manufacturing context, raw materials (pole) are processed and comb...read more
Q235. Options and their pricing models
Options are financial instruments that give the holder the right, but not the obligation, to buy or sell an underlying asset at a specified price within a specific time period.
Options can be classified into two types: call options and put options.
The pricing models for options include the Black-Scholes model and the binomial options pricing model.
The Black-Scholes model takes into account factors such as the current stock price, the option's strike price, the time until expir...read more
Q236. Assumptions of linear regression
Assumptions of linear regression include linearity, independence, homoscedasticity, and normality.
Linearity: The relationship between the independent and dependent variables is linear.
Independence: The residuals are independent of each other.
Homoscedasticity: The variance of the residuals is constant across all levels of the independent variables.
Normality: The residuals are normally distributed.
Example: If we are predicting house prices based on square footage, we assume a l...read more
Q237. How is intercompany process configured into the system?
Intercompany process is configured into the system through various steps and settings.
Intercompany process involves transactions between different entities within the same organization
The system should be configured to handle intercompany transactions and ensure proper accounting and reporting
This can be achieved through setting up intercompany accounts, defining intercompany relationships, and configuring intercompany billing and invoicing
Examples of intercompany transaction...read more
Q238. What is the content of an Audit Report
An audit report contains a summary of the audit findings and recommendations.
Introduction and scope of the audit
Audit objectives and methodology
Summary of audit findings
Recommendations for improvement
Management's response to the recommendations
Conclusion and opinion of the auditor
Signature and date of the auditor
Q239. can we publish our own cusotom blockchain if yes what are the steps for that??
Yes, you can publish your own custom blockchain by following these steps.
Define the purpose and requirements of your custom blockchain
Choose a consensus mechanism (e.g. Proof of Work, Proof of Stake)
Select a suitable blockchain platform (e.g. Ethereum, Hyperledger)
Develop and deploy the custom blockchain network
Test the network for functionality and security
Launch and promote your custom blockchain to attract users and developers
Q240. Any analytics project that I have done, method, data gathering and all
I have worked on a project analyzing customer behavior using web analytics data.
Used Google Analytics to collect website data
Analyzed user behavior patterns to identify areas for improvement
Implemented A/B testing to measure the impact of website changes
Generated reports and visualizations to communicate insights to stakeholders
Q241. What are the challenges you faced during migrating any data from one system to other?
Challenges faced during data migration include data loss, compatibility issues, downtime, and security concerns.
Data loss: Ensuring all data is successfully transferred without any loss or corruption.
Compatibility issues: Ensuring data formats, structures, and systems are compatible for seamless migration.
Downtime: Minimizing downtime during migration to avoid disruption to operations.
Security concerns: Ensuring data security and privacy are maintained throughout the migratio...read more
Q242. Is nested for each possible in ADF?
Yes, nested for each is possible in ADF.
Nested for each can be used to iterate through nested arrays or objects.
It can be used in mapping data flows and pipelines.
Example: For each customer, for each order, for each item in order.
It can improve performance by reducing the number of activities in a pipeline.
Q243. what is middleware and how is it configured.
Middleware is software that connects different applications or systems together.
Middleware acts as a bridge between different applications or systems
It can be configured to handle communication protocols, data transformation, and security
Examples of middleware include message queues, API gateways, and ESBs
Configuration can involve setting up connections, defining message formats, and configuring security policies
Q244. Consequence of non deducting TDS
Non deduction of TDS can lead to penalties and legal consequences.
Non deduction of TDS can result in penalties and interest charges.
The taxpayer may also face legal consequences and prosecution.
The deductee may face difficulties in claiming credit for the tax deducted at source.
Non deduction of TDS can also lead to increased scrutiny from tax authorities.
For example, if an employer fails to deduct TDS on salary payments, the employee may face difficulties in filing their tax ...read more
Q245. What's the difference between a corporate and a Partnership firm.
A corporate firm is a legal entity separate from its owners, while a partnership firm is owned and operated by two or more individuals.
Corporate firms have limited liability, while partnership firms have unlimited liability.
Corporate firms issue shares to raise capital, while partnership firms rely on the personal funds of the partners.
Corporate firms are subject to more complex legal and regulatory requirements, while partnership firms have fewer formalities.
Corporate firms ...read more
Q246. 5) How to perform workload analysis ?
Workload analysis can be performed by monitoring system performance, identifying bottlenecks, and analyzing usage patterns.
Monitor system performance using tools like SAP Solution Manager or third-party tools
Identify bottlenecks by analyzing system logs and performance metrics
Analyze usage patterns by reviewing user behavior and system usage statistics
Use workload analysis to optimize system performance and improve user experience
Q247. 6) How will u do if hana system crash?
I would follow the standard procedure for system recovery and restore the system from backup.
Identify the cause of the crash
Check system logs for any errors or warnings
Restore the system from the latest backup
Apply any necessary patches or updates
Perform system testing to ensure stability
Q248. How you create baseline
Creating a baseline involves establishing a starting point or reference for comparison.
Identify the key metrics or variables to be measured
Collect data or information on these metrics
Analyze the data to determine the average or typical values
Use the average values as the baseline for comparison
Q249. Risk Assessment Process
Risk assessment process involves identifying, analyzing and evaluating potential risks to minimize their impact.
Identify potential risks and their likelihood of occurrence
Analyze the impact of the risks on the project or organization
Evaluate the risks based on their severity and prioritize them
Develop a plan to mitigate or manage the risks
Monitor and review the risks regularly
Examples: SWOT analysis, FMEA, HAZOP, etc.
Q250. Management Reviews for RIsks
Management reviews are crucial for identifying and mitigating risks.
Management reviews should be conducted regularly to ensure risks are identified and addressed.
Risk assessments should be performed to determine the likelihood and impact of potential risks.
Risk mitigation strategies should be developed and implemented.
Examples of risks that may be identified include financial, operational, and reputational risks.
Management reviews should involve all relevant stakeholders, inc...read more
Q251. what is VDOM? what is use of useMemo?
VDOM stands for Virtual Document Object Model. useMemo is a React hook used for memoizing expensive calculations.
VDOM is a virtual representation of the actual DOM in memory, used for efficient rendering in React
useMemo is used to memoize expensive calculations in React components to avoid unnecessary re-renders
Example: useMemo(() => calculateExpensiveValue(a, b), [a, b])
Q252. What is Audit metholodogy,
Audit methodology is a systematic process used by auditors to plan, perform, and report on audits.
Audit methodology involves understanding the client's business and risks, planning the audit approach, performing audit procedures, and reporting findings.
It includes assessing internal controls, gathering evidence, and evaluating financial statements for accuracy and compliance.
Examples of audit methodologies include risk-based auditing, compliance auditing, and performance audi...read more
Q253. What are assertions in FS
Assertions in FS are statements that are used to validate the expected behavior of the code.
Assertions are used to check if a certain condition is true during the execution of the code.
They are typically used for debugging purposes to catch unexpected behavior.
An example of an assertion in FS is 'assert.equal(actual, expected, message)' which checks if 'actual' is equal to 'expected'.
Q254. what is oops concepts
Oops concepts refer to Object-Oriented Programming concepts which include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q255. Expectations from budget
Expectations from budget
Increased funding for education and healthcare
Tax relief for small businesses
Investment in infrastructure projects
Support for research and development
Measures to address income inequality
Q256. what is materiality level
Materiality level is the threshold at which financial information becomes significant enough to influence the decision-making of users.
Materiality level is determined by the size and nature of the item or error being evaluated.
It is used to determine what information needs to be disclosed in financial statements.
If an item is below the materiality level, it may not need to be disclosed.
Materiality level can vary depending on the context and the user of the financial informati...read more
Q257. What is difference between dynamic data frame and spark data frame in aws glue job? can we change dynamic dataframe to spark datafrmae?
Dynamic data frame in AWS Glue job is a dynamically generated data frame, while Spark data frame is specifically created using Spark APIs.
Dynamic data frame is generated dynamically at runtime based on the data source and schema, while Spark data frame is explicitly created using Spark APIs.
Dynamic data frame is more flexible but may have performance implications compared to Spark data frame.
You can convert a dynamic data frame to a Spark data frame by explicitly defining the...read more
Q258. How to value investment
Investment can be valued using various methods such as discounted cash flow, comparable company analysis, and precedent transactions.
Discounted cash flow (DCF) method calculates the present value of expected future cash flows.
Comparable company analysis compares the target company to similar publicly traded companies.
Precedent transactions method looks at the prices paid for similar companies in the past.
Other methods include net asset value (NAV) and earnings multiples.
The c...read more
Q259. What do you think constitutes IT of a company?
IT of a company includes all hardware, software, and network systems used to manage and process data.
Hardware such as servers, computers, and mobile devices
Software such as operating systems, productivity tools, and custom applications
Network systems such as routers, switches, and firewalls
Data storage and backup solutions
IT support and maintenance services
Examples: Microsoft Office Suite, Salesforce CRM, Cisco networking equipment
Q260. What is cloud?
Cloud refers to the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence, over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
Cloud services are typically provided by third-party companies, such as Amazon Web Services, Microsoft Azure, and Google Cloud.
Cloud computing can be used for a variety of purposes, including data storage, application...read more
Q261. What are containers in virtual machines?
Containers in virtual machines are lightweight, portable, and isolated environments that allow applications to run independently.
Containers are a form of virtualization that package an application and its dependencies together.
They share the host OS kernel, making them more lightweight than traditional virtual machines.
Containers provide isolation for applications, ensuring they do not interfere with each other.
Popular containerization platforms include Docker and Kubernetes.
Q262. What is ip, can u explain bsod error, and what troubleshoot when printer issue
IP stands for Internet Protocol, BSOD is Blue Screen of Death error in Windows, troubleshoot printer issues by checking connections, drivers, and restarting.
IP stands for Internet Protocol, a unique address assigned to each device connected to a network.
BSOD (Blue Screen of Death) is a Windows error screen displayed when a system encounters a critical error.
To troubleshoot printer issues, check connections, ensure drivers are up to date, restart the printer and computer, and ...read more
Q263. 2. major findings you observed during audit of client
During the audit of the client, major findings were identified related to financial reporting and internal controls.
Identified weaknesses in the client's internal control system
Discovered errors in financial reporting
Found instances of non-compliance with accounting standards
Recommended improvements to the client's accounting processes
Provided suggestions for strengthening the client's internal controls
Q264. Number of hotel rooms in a typical middle east capital city with the oil wells.
The number of hotel rooms in a typical Middle East capital city with oil wells varies depending on the city.
The number of hotel rooms can be influenced by factors such as tourism demand, business travel, and the size of the city.
Cities with a high number of oil wells may attract more business travelers, leading to a higher demand for hotel rooms.
Some Middle East capital cities known for their oil industry, like Dubai and Abu Dhabi, have a large number of luxury hotels to acco...read more
Q265. Applicability of ICFR for companies
ICFR is applicable for all companies to ensure accurate financial reporting and prevent fraud.
ICFR stands for Internal Control over Financial Reporting
Required by Sarbanes-Oxley Act for publicly traded companies
Helps prevent financial misstatements and fraud
Involves processes, controls, and monitoring to ensure accuracy of financial statements
Q266. What is statutory audit
Statutory audit is a legally required external audit of a company's financial statements to ensure accuracy and compliance with laws and regulations.
Statutory audit is mandatory for all companies to ensure transparency and accountability.
It is conducted by independent auditors who examine the financial records and statements of a company.
The audit report is submitted to regulatory authorities and shareholders to provide assurance on the accuracy of financial information.
Statu...read more
Q267. 1) How to perform kernal version update?
Performing a kernel version update involves downloading the new kernel, backing up the current kernel, and installing the new kernel.
Download the new kernel from SAP Service Marketplace
Backup the current kernel using tools like BRTools or SAPJup
Install the new kernel using tools like Software Update Manager (SUM) or SAPJup
Verify the new kernel version using transaction SM51
Perform system checks to ensure everything is working properly
Q268. What are promises?
Promises are commitments made by one party to another, to fulfill a certain task or obligation within a specified time frame.
Promises involve a commitment or assurance to do something
They are often made between two parties
There is an expectation of fulfillment within a specified time frame
Failure to fulfill a promise can lead to consequences
Q269. Difference between process and control
Process refers to the series of actions or steps taken to achieve a specific goal, while control refers to the measures put in place to ensure the process is carried out effectively and efficiently.
Process is the set of activities or steps taken to achieve a specific goal.
Control involves monitoring and managing the process to ensure it is carried out effectively and efficiently.
Process focuses on the 'how' of achieving a goal, while control focuses on the 'monitoring and man...read more
Q270. How will you improve yield in any manfacturing company
Improving yield in a manufacturing company involves optimizing processes, reducing waste, and enhancing quality control.
Implementing lean manufacturing principles to streamline production processes
Investing in automation technology to increase efficiency and reduce errors
Conducting regular quality control checks to identify and address issues early
Training employees on best practices and continuous improvement techniques
Analyzing data to identify trends and areas for improvem...read more
Q271. How user on boarding is done
User onboarding is the process of introducing new users to a product or service and helping them get started.
Provide clear instructions and guidance on how to use the product or service
Offer tutorials or walkthroughs to help users understand the features and functionality
Simplify the registration process and make it easy for users to create an account
Provide support and assistance to users who encounter issues or have questions
Collect feedback from users to improve the onboar...read more
Q272. What is the approach to a successful Digital Strategy?
A successful digital strategy involves understanding target audience, setting clear goals, utilizing data analytics, and staying adaptable.
Understand target audience and their digital behavior
Set clear and measurable goals for the digital strategy
Utilize data analytics to track performance and make informed decisions
Stay adaptable and willing to adjust strategy based on results and market trends
Q273. Number of handheld thermal scanners currently available in Mumbai?
The exact number of handheld thermal scanners currently available in Mumbai is not available.
There is no official data available on the exact number of handheld thermal scanners in Mumbai.
The availability of handheld thermal scanners may vary depending on the location and supplier.
Some hospitals and clinics may have handheld thermal scanners for their own use.
The government may have distributed handheld thermal scanners to certain areas or organizations.
The number of handheld...read more
Q274. What is ERP and how this helps a business?
ERP stands for Enterprise Resource Planning. It is a software system that integrates various business processes and functions to streamline operations and improve efficiency.
ERP helps businesses by centralizing and automating processes, such as finance, HR, inventory management, and customer relationship management.
It provides real-time visibility into business data, enabling better decision-making and resource allocation.
ERP improves collaboration and communication across de...read more
Q275. What is your reason for wanting to switch to foreign taxation?
I am interested in foreign taxation due to the opportunity to expand my knowledge and skills in a different tax system.
Seeking new challenges and opportunities for growth
Interested in learning about different tax laws and regulations
Want to broaden my expertise in international taxation
Excited about working with clients from diverse backgrounds
Q276. Brief on SnOP , explain the process, walk thru the demand and supply planning
SnOP is a process that integrates sales and operations planning to align demand and supply.
SnOP involves collaboration between sales, marketing, finance, and operations teams.
The process includes forecasting demand, creating production plans, and managing inventory levels.
SnOP helps to balance supply and demand, reduce costs, and improve customer satisfaction.
For example, a company may use SnOP to plan production of a new product based on sales forecasts and inventory levels....read more
Q277. Idoc configuration and types
IDoc is a SAP document format used for data exchange between systems. There are different types of IDocs for different purposes.
IDoc configuration involves defining the message type, basic type, and segments
Types of IDocs include: ORDERS, INVOIC, DELVRY03, and more
IDocs can be sent and received through various methods such as ALE, EDI, and RFC
IDoc processing involves inbound and outbound processing, error handling, and monitoring
Q278. difference between queue and stack
Queue is a data structure that follows First In First Out (FIFO) principle, while stack follows Last In First Out (LIFO) principle.
Queue: elements are added at the rear and removed from the front.
Stack: elements are added and removed from the top.
Example: In a queue, people waiting in line at a ticket counter are served in the order they arrived. In a stack, plates in a stack are removed from the top.
Q279. Do you think apple store has all apps secured
Apple store has strict guidelines for app developers to follow, but no system is completely foolproof.
Apple store has a review process for all apps before they are made available for download.
Developers must follow strict guidelines and rules to ensure their app is approved.
However, there have been instances of malicious apps slipping through the review process.
Apple does take measures to remove these apps once they are discovered.
Overall, while the Apple store is generally c...read more
Q280. how is https secured, you are from electrical engineering where python is used in electrical
HTTPS is secured using SSL/TLS protocols to encrypt data transmitted between a web server and a browser.
HTTPS uses SSL/TLS protocols to encrypt data, providing secure communication over the internet.
SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are cryptographic protocols that provide secure communication over a computer network.
SSL/TLS certificates are used to verify the identity of a website and establish a secure connection.
Python can be used ...read more
Q281. What is Audit risk and it's types
Audit risk is the risk that an auditor expresses an inappropriate opinion on financial statements. It has two types: inherent and control risk.
Audit risk is the risk that an auditor will not detect material misstatements in the financial statements.
Inherent risk is the risk of material misstatement in the absence of any internal control.
Control risk is the risk that a material misstatement will not be prevented or detected by the entity's internal control.
Audit risk is the pr...read more
Q282. Crèche facility and number of children to be allowed
The number of children allowed in a crèche facility depends on various factors.
The size of the crèche facility and the number of staff available to care for the children are important factors to consider.
The age range of the children also plays a role in determining the number of children allowed.
Local regulations and guidelines should be followed to ensure compliance.
For example, in India, the crèche facility should have at least one caretaker for every four infants and one ...read more
Q283. explai data bricks,how its different from adf
Data bricks is a unified analytics platform for big data and machine learning, while ADF (Azure Data Factory) is a cloud-based data integration service.
Data bricks is a unified analytics platform that provides a collaborative environment for big data and machine learning projects.
ADF is a cloud-based data integration service that allows you to create, schedule, and manage data pipelines.
Data bricks supports multiple programming languages like Python, Scala, and SQL, while ADF...read more
Q284. Explain about different renewal process
Renewal processes vary depending on the type of service or product being renewed.
Renewal process for software subscriptions typically involves receiving a notification to renew, logging into the account, and making a payment.
Renewal process for insurance policies may involve receiving a renewal notice, reviewing the policy details, and contacting the insurance provider to renew.
Renewal process for memberships often includes receiving a renewal reminder, updating payment infor...read more
Q285. What are the Android application components used in previous project? Gi e example
The Android application components used in the previous project include activities, services, broadcast receivers, and content providers.
Activities: Used for the user interface and interaction with the user. Example: MainActivity.java
Services: Used for background tasks or long-running operations. Example: DownloadService.java
Broadcast Receivers: Used for system-wide events or notifications. Example: ConnectivityReceiver.java
Content Providers: Used for data management and shar...read more
Q286. What is Ind AS 109?
Ind AS 109 is a financial reporting standard that deals with the recognition and measurement of financial assets and liabilities.
Ind AS 109 is based on the principles of recognizing financial assets and liabilities at fair value.
It requires entities to classify financial assets based on their business model for managing the assets and their contractual cash flow characteristics.
It also introduces the expected credit loss model for recognizing impairment losses on financial as...read more
Q287. why joins are used in SQL?
Joins are used in SQL to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query.
They are used to combine data based on a related column or key.
There are different types of joins such as inner join, left join, right join, and full outer join.
Joins can be used to filter data based on specific conditions.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id;
Q288. Which version controller tool used and CI/CD ?
We use Git as our version control tool and Jenkins for CI/CD.
We use Git for version control as it is widely used and has a lot of community support.
Jenkins is our preferred CI/CD tool as it is open-source and has a large number of plugins available.
We have also used other version control tools like SVN and Mercurial in the past.
For CI/CD, we have used tools like Travis CI and CircleCI for specific projects.
We follow the GitFlow branching model for our development process.
Q289. How do we do delta load using adf?
Delta load in ADF is achieved by comparing source and target data and only loading the changed data.
Use a Lookup activity to retrieve the latest watermark or timestamp from the target table
Use a Source activity to extract data from the source system based on the watermark or timestamp
Use a Join activity to compare the source and target data and identify the changed records
Use a Sink activity to load only the changed records into the target table
Q290. What is Index in SQL ?
Index in SQL is a database object that improves the speed of data retrieval operations.
Index is created on one or more columns of a table.
It stores a copy of the data in the indexed columns in a separate structure.
This allows for faster search and retrieval of data.
Examples of index types include clustered, non-clustered, and unique indexes.
Q291. Do you have an idea about Cloud Computing?
Cloud computing is the delivery of computing services over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
It eliminates the need for physical servers and hardware, reducing costs and increasing scalability.
Examples of cloud computing services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Q292. What is oData brief?
oData is a protocol for querying and updating data over the web
oData stands for Open Data Protocol
It is a standardized protocol for creating and consuming data APIs
oData uses RESTful principles for data access
It allows for querying and updating data using HTTP methods like GET, POST, PUT, DELETE
Example: oData can be used to query a database for specific records based on filters
Q293. Coding: take your name as input. Print them letter by letter and print if vowels repeat in your name.
The code takes a name as input, prints each letter, and checks if any vowels repeat in the name.
Create a function that takes a string input for the name
Iterate through each letter in the name and print them individually
Check for vowel repetition by keeping track of vowels encountered
Q294. 7.in form 3CD major clauses of tax audit report
The major clauses of tax audit report in Form 3CD
The tax audit report in Form 3CD has 18 major clauses
These clauses cover various aspects of the audit, such as accounting policies, depreciation, loans and advances, etc.
Some of the important clauses include Clause 4 (accounting policies), Clause 13 (loans and advances), and Clause 17 (related party transactions)
Q295. Backend tables of all the frameworks
Backend tables of frameworks store data related to the application's functionality.
Backend tables in frameworks like Django, Ruby on Rails, and Laravel store data such as user information, posts, comments, etc.
These tables are designed based on the application's requirements and relationships between different entities.
Developers can interact with these tables using ORM (Object-Relational Mapping) tools to perform CRUD operations.
Proper indexing and normalization of tables ar...read more
Q296. COSO and COBIT. What is the difference?
COSO is a framework for internal control while COBIT is a framework for IT governance.
COSO focuses on internal control over financial reporting while COBIT focuses on IT governance and management
COSO has five components: control environment, risk assessment, control activities, information and communication, and monitoring activities
COBIT has five focus areas: strategic alignment, value delivery, risk management, resource management, and performance measurement
COSO is widely ...read more
Q297. Define a hashmap with String as key and Integer as value and initialise the hashmap. Print the key that represents second highest value.
Define a hashmap with String as key and Integer as value, find second highest value key.
Create a HashMap
and initialize it with key-value pairs Iterate through the values to find the second highest value
Retrieve the key corresponding to the second highest value
Q298. Explain Pub-sub mechanism.How you implemented in your project.
Pub-sub mechanism is a messaging pattern where senders (publishers) of messages are decoupled from receivers (subscribers).
Pub-sub stands for publish-subscribe.
Publishers send messages to a topic, and subscribers receive messages from that topic.
Google Cloud Pub/Sub is a fully-managed real-time messaging service that allows you to send and receive messages between independent applications.
In my project, we used Google Cloud Pub/Sub to decouple various components of our data p...read more
Q299. What is sdlc and what are the types of models followed during the project
SDLC stands for Software Development Life Cycle. There are various models followed during a project like Waterfall, Agile, Iterative, etc.
SDLC is a process used by software development teams to design, develop, and test high-quality software.
Waterfall model follows a linear and sequential approach, where each phase must be completed before moving on to the next.
Agile model emphasizes flexibility and customer collaboration, with iterative development and frequent deliveries.
It...read more
Q300. What is the difference between Blob and adls
Blob is a storage service for unstructured data, while ADLS is optimized for big data analytics workloads.
Blob is a general-purpose object storage service for unstructured data, while ADLS is optimized for big data analytics workloads.
ADLS offers features like file system semantics, file-level security, and scalability for big data analytics, while Blob storage is simpler and more cost-effective for general storage needs.
ADLS is designed for big data processing frameworks lik...read more
More about working at PwC
Top HR Questions asked in Rajni Devi Global Village School
Interview Process at Rajni Devi Global Village School
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month