Add office photos
Engaged Employer

TCS

3.7
based on 85.5k Reviews
Filter interviews by

50+ Elderberry Tech Interview Questions and Answers

Updated 14 Dec 2024
Popular Designations

Q1. 1. Scrum Ceremonies 2. Do we include V&V during Sprint planning 3. Scrum and Kanban differentiate 4. Scrum Planning Estimation Techniques or types 5. Product backlog vs sprint backlog 6. sprint review what happ...

read more
Ans.

Questions related to Scrum methodology and agile practices.

  • Scrum ceremonies include daily stand-up, sprint planning, sprint review, and sprint retrospective.

  • Verification and validation (V&V) should be included in sprint planning.

  • Scrum and Kanban differ in terms of roles, ceremonies, and visualization techniques.

  • Scrum planning estimation techniques include planning poker, t-shirt sizing, and affinity mapping.

  • Product backlog contains all the user stories while sprint backlog co...read more

View 1 answer

Q2. Have i worked on springboot..then annotations ..how to do profiling in spring boot Lamda expression in Java 8 Then in cloud any performance issues where to start looking For running a schedule based on some met...

read more
Ans.

Questions on Spring Boot, Lambda expressions, and performance issues in cloud computing

  • Spring Boot annotations and profiling

  • Lambda expressions in Java 8

  • Performance issues in cloud computing and where to start looking

  • Triggering a schedule based on metrics

  • Comparing cost of EC2 and Lambda

  • When to choose Lambda

Add your answer

Q3. Tell us about a situation when you have delivered a result with minimal resources?

Ans.

Developed a marketing campaign with limited budget

  • Conducted market research to identify target audience and their preferences

  • Utilized social media platforms to reach a wider audience

  • Collaborated with local businesses to cross-promote the campaign

  • Created visually appealing content in-house to save on outsourcing costs

  • Measured success through analytics and adjusted strategy accordingly

Add your answer

Q4. Difference between display none, visibility hidden and opacity 0 in CSS

Ans.

display none hides the element completely, visibility hidden hides the element but still takes up space, opacity 0 makes the element transparent.

  • display none removes the element from the layout

  • visibility hidden hides the element but it still occupies space

  • opacity 0 makes the element transparent but still occupies space

  • Example: display: none; visibility: hidden; opacity: 0;

Add your answer
Discover Elderberry Tech interview dos and don'ts from real experiences

Q5. What is Microservices and how we communicate between two services

Ans.

Microservices are small, independent services that work together to form a larger application. Communication between services is typically done through APIs.

  • Microservices are designed to be modular and scalable

  • Each service has its own database and can be developed and deployed independently

  • Communication between services can be synchronous or asynchronous

  • APIs are commonly used to facilitate communication between services

  • Service discovery and load balancing are important consid...read more

View 1 answer

Q6. How to migrate legacy environment to Cloud or virtualisation.

Ans.

Legacy environment can be migrated to Cloud or virtualisation by following a few steps.

  • Assess the current environment and identify the applications and data that need to be migrated

  • Choose the appropriate Cloud or virtualisation platform based on the requirements

  • Create a migration plan and test it thoroughly before executing it

  • Migrate the applications and data in phases to minimize downtime and ensure smooth transition

  • Monitor and optimize the new environment to ensure optimal ...read more

Add your answer
Are these interview questions helpful?

Q7. Explain how you will deliver projects if not near systems?

Ans.

I will use remote collaboration tools and effective communication to ensure project delivery.

  • Utilize video conferencing and screen sharing to facilitate remote meetings

  • Use project management software to track progress and assign tasks

  • Maintain open and frequent communication with team members and stakeholders

  • Establish clear expectations and deadlines for deliverables

  • Leverage cloud-based storage and file sharing for easy access to project documents

  • Ensure all team members have n...read more

Add your answer

Q8. Internal working of ArrayList and the time complexity for each operation, like add Element, remove element etc

Ans.

ArrayList is a dynamic array in Java with O(1) time complexity for adding elements at the end and O(n) for removing elements.

  • ArrayList internally uses an array to store elements.

  • Adding an element at the end has O(1) time complexity on average.

  • Removing an element has O(n) time complexity as all elements after the removed element need to be shifted.

  • Inserting or removing elements in the middle requires shifting elements and has O(n) time complexity.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is Event Deligation in javascript

Ans.

Event delegation in JavaScript is a technique where a single event listener is attached to a parent element to handle events for multiple child elements.

  • Event delegation helps improve performance by reducing the number of event listeners.

  • It is useful for dynamically created elements or elements with similar behavior.

  • Event delegation works by utilizing event bubbling, where events on child elements bubble up to the parent element.

Add your answer

Q10. Solid design principles and what are design pattern we used in project

Ans.

Solid design principles and design patterns used in project

  • Solid design principles include SOLID (Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, Dependency Inversion), DRY (Don't Repeat Yourself), and KISS (Keep It Simple, Stupid)

  • Design patterns used in projects can include Factory, Singleton, Observer, Strategy, Decorator, and many others

  • Design patterns help in creating reusable, maintainable, and scalable code

  • For example, in a project, the F...read more

Add your answer

Q11. Write a polyfill for javascript method "filter"

Ans.

Polyfill for JavaScript method 'filter'

  • Create a function called 'filter' that takes a callback function as an argument

  • Loop through the array and apply the callback function to each element

  • If the callback function returns true, add the element to a new array and return it

Add your answer

Q12. What are the code Optimization Technique in C++ ?

Ans.

Code optimization techniques in C++ improve efficiency and performance of the code.

  • Use of appropriate data structures and algorithms

  • Avoid unnecessary copying of objects

  • Inline functions for small, frequently called functions

  • Use of const and constexpr where applicable

  • Optimizing loops for better performance

Add your answer

Q13. What are the performance metrics captured by you

Ans.

As an Associate Consultant, I capture performance metrics such as productivity, quality, and customer satisfaction.

  • Productivity metrics include the number of tasks completed within a given time frame

  • Quality metrics include the number of errors or defects found in the work

  • Customer satisfaction metrics include feedback from clients on the services provided

  • Other metrics may include revenue generated, cost savings, and employee engagement

  • Regular reporting and analysis of these me...read more

Add your answer

Q14. Plugin which one you add first? Power automate step?

Ans.

The plugin that should be added first depends on the specific use case and requirements of the project.

  • Consider the purpose of the plugin and how it fits into the overall workflow

  • Evaluate any dependencies or prerequisites for each plugin

  • Test and iterate to determine the optimal order for plugin implementation

Add your answer

Q15. Features of .Net core, Startup class Configure & configure services method Middleware Dependency injection Service lifetime Solid Principle

Ans.

Features of .Net core including Startup class, Configure & configure services method, Middleware, Dependency injection, Service lifetime, and Solid Principle.

  • Startup class is used to configure the application and its services

  • Configure method is used to configure the HTTP request pipeline

  • ConfigureServices method is used to configure the services that the application will use

  • Middleware is software that sits between the application and the server and handles requests and respons...read more

Add your answer

Q16. What different response codes in HTTP stand for

Ans.

HTTP response codes indicate the status of a request made to a server.

  • 200 - OK: Request was successful

  • 404 - Not Found: Requested resource not found

  • 500 - Internal Server Error: Server encountered an error

  • 301 - Moved Permanently: Resource has been moved to a different URL

Add your answer

Q17. What is difference between abstract class and Interface in C#

Ans.

Abstract class can have implementation for some methods while interface cannot. Class can implement multiple interfaces but only inherit from one abstract class.

  • Abstract class can have method implementations while interface cannot.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used to define a contract for classes to implement, while abstract classes are used to provide a common base for subclasses.

Add your answer

Q18. Describe Agile process followed in your organization

Ans.

Our organization follows Scrum framework for Agile process.

  • We have a Product Owner who prioritizes the backlog

  • Sprint planning meetings are held to decide on sprint goals and tasks

  • Daily stand-up meetings are conducted to discuss progress and issues

  • Sprint review meetings are held to demonstrate completed work

  • Retrospective meetings are held to discuss what went well and what needs improvement

  • We use tools like Jira and Trello to manage our Agile process

Add your answer

Q19. How ospf works and how it chooses best path

Ans.

OSPF is a routing protocol that uses link-state algorithm to determine the best path based on cost.

  • OSPF routers exchange link-state advertisements (LSAs) to build a topological database of the network.

  • Each router calculates the shortest path tree to all destinations using Dijkstra's algorithm.

  • The best path is chosen based on the lowest cost, which is determined by the bandwidth of the link.

  • OSPF supports multiple paths to the same destination, allowing for load balancing.

  • Admin...read more

Add your answer

Q20. When we can use Thread and Process ?

Ans.

Threads are used for lightweight processes within a single process, while processes are used for independent execution of tasks.

  • Threads are used for multitasking within a single process, sharing memory space and resources.

  • Processes are used for independent execution of tasks, each having its own memory space and resources.

  • Threads are faster to create and switch between, while processes have more overhead.

  • Threads are suitable for tasks that require frequent communication and d...read more

Add your answer

Q21. How to do debug the plugin? Business process flow?

Ans.

To debug a plugin, use the Plugin Registration Tool and Visual Studio Debugger.

  • Use the Plugin Registration Tool to enable tracing and view logs.

  • Use the Visual Studio Debugger to step through code and identify errors.

  • Check the event log for any errors or exceptions.

  • Use the XrmToolBox to analyze and troubleshoot plugins.

  • For business process flows, use the Process Debugger in the Power Platform.

  • Enable tracing and view logs to identify errors in the business process flow.

  • Use the ...read more

Add your answer

Q22. Determination of item category, pricing procedure, schedule line category

Ans.

Item category, pricing procedure, and schedule line category are determined based on various factors such as material type, sales organization, and customer group.

  • Item category is determined based on material type and item usage (e.g. finished goods, raw materials)

  • Pricing procedure is determined based on sales organization, distribution channel, and division

  • Schedule line category is determined based on item category, shipping point, and delivery priority

Add your answer

Q23. What is bgp and it's attributes

Ans.

BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems on the internet.

  • BGP is used to make routing decisions based on network policies, rules, and attributes.

  • BGP attributes include AS_PATH, NEXT_HOP, LOCAL_PREF, and MED.

  • AS_PATH attribute shows the path the route has taken through different autonomous systems.

  • NEXT_HOP attribute specifies the next router to reach a particular destination.

  • LOCAL_PREF attribute...read more

Add your answer

Q24. Difference between ArrayList and Linked List

Ans.

ArrayList is a resizable array while Linked List is a collection of nodes linked by pointers.

  • ArrayList is faster for accessing elements by index, but slower for inserting or deleting elements.

  • Linked List is slower for accessing elements by index, but faster for inserting or deleting elements.

  • ArrayList uses contiguous memory while Linked List uses non-contiguous memory.

  • Example: ArrayList can be used for implementing a stack while Linked List can be used for implementing a queu...read more

Add your answer

Q25. What is item catagory determination?

Ans.

Item category determination is the process of assigning a specific category to a product or item based on certain criteria.

  • It involves analyzing the characteristics and attributes of the item to determine the most appropriate category.

  • The category assigned can impact pricing, marketing, and distribution strategies.

  • Examples include categorizing clothing items by type (e.g. shirts, pants, dresses) or electronic devices by function (e.g. smartphones, laptops, tablets).

Add your answer

Q26. Explain DevOps process followed

Ans.

DevOps process involves continuous integration, delivery, and deployment of software.

  • Developers and operations teams work together to automate the software delivery process

  • Continuous integration ensures that code changes are frequently tested and integrated into the main codebase

  • Continuous delivery ensures that the software is always in a releasable state

  • Continuous deployment automates the release of software to production

  • Tools like Jenkins, Git, Docker, and Kubernetes are co...read more

View 1 answer

Q27. Drop down by using select class

Ans.

Using the select class to create a drop down menu

  • Create a select element in HTML with the class 'select'

  • Add option elements within the select element for the dropdown items

  • Use CSS to style the select element as a dropdown menu

Add your answer

Q28. Explain multithreading in each project ?

Ans.

Utilized multithreading to improve performance and efficiency by allowing multiple threads to run concurrently.

  • Implemented multithreading in project A to handle multiple user requests simultaneously.

  • Utilized multithreading in project B to improve processing speed for large datasets.

  • Used multithreading in project C to enhance responsiveness of the user interface.

Add your answer

Q29. Explain Currying in Javascript

Ans.

Currying is a technique in JavaScript where a function with multiple arguments is transformed into a sequence of functions, each taking a single argument.

  • Currying allows you to create reusable functions with partial application of arguments.

  • It helps in creating more flexible and composable functions.

  • Example: const add = (a) => (b) => a + b; const add5 = add(5); console.log(add5(3)); // Output: 8

Add your answer

Q30. What is STP , Vlan and VTP

Ans.

STP stands for Spanning Tree Protocol, VLAN stands for Virtual Local Area Network, and VTP stands for VLAN Trunking Protocol.

  • STP is a network protocol that ensures a loop-free topology in Ethernet networks.

  • VLAN is a method of segmenting a physical network into multiple virtual networks for better traffic management and security.

  • VTP is a Cisco proprietary protocol that manages the addition, deletion, and renaming of VLANs across a network.

  • STP example: Prevents network loops by...read more

Add your answer

Q31. Explain various phase of R12.2 ADOP cycle?

Ans.

R12.2 ADOP cycle has four phases: prepare, apply, finalize, and cutover.

  • Prepare phase involves creating a new patch edition and preparing the file system for patching.

  • Apply phase applies the patch to the file system and database.

  • Finalize phase completes the patching process and performs post-patching tasks.

  • Cutover phase switches the users to the new edition and makes it the active edition.

  • Example: adop phase=prepare

  • Example: adop phase=apply

  • Example: adop phase=finalize

  • Example:...read more

Add your answer

Q32. Reference used to consume web api

Ans.

Consuming web APIs can be done using various methods such as HTTP requests, SDKs, or libraries.

  • Use HTTP requests like GET, POST, PUT, DELETE to interact with the API

  • Utilize SDKs provided by the API provider for easier integration

  • Use libraries like Axios, Fetch, or Retrofit to handle API requests in code

Add your answer

Q33. Explain ShadowDOM

Ans.

Shadow DOM is a way to encapsulate the styling and structure of a web component, preventing styles from leaking out and clashing with the rest of the page.

  • Shadow DOM allows for creating self-contained components with their own DOM tree and styling.

  • It helps in preventing styles from the main document affecting the component and vice versa.

  • Shadow DOM can be created using the 'attachShadow' method in JavaScript.

  • It is commonly used in web development to create reusable and encaps...read more

Add your answer

Q34. How to handle merge conflicts

Ans.

Merge conflicts can be handled by resolving conflicts manually or using tools like Git merge or rebase.

  • Communicate with team members to understand changes made by each party

  • Use version control tools like Git merge or rebase to resolve conflicts

  • Manually resolve conflicts by editing the conflicting files

  • Test the merged code to ensure functionality is not affected

Add your answer

Q35. New features in Java 8

Ans.

Java 8 introduced new features like lambda expressions, streams, and default methods.

  • Lambda expressions allow functional programming and simplify code.

  • Streams provide a concise way to process collections.

  • Default methods allow interfaces to have implementation.

  • Date and Time API provides a better way to handle date and time.

  • Nashorn JavaScript engine allows Java to interact with JavaScript code.

  • Parallel operations can be performed on collections using parallel streams.

  • Type annot...read more

View 1 answer

Q36. what is cursor in sql

Ans.

A cursor in SQL is a database object that allows for the retrieval and manipulation of data from a result set.

  • A cursor is used to traverse through the rows of a result set one by one.

  • It provides a way to perform operations on each row individually.

  • Cursors are commonly used in stored procedures, triggers, and functions.

  • They can be declared, opened, fetched, and closed.

  • Example: DECLARE cursor_name CURSOR FOR SELECT * FROM table_name;

  • Example: OPEN cursor_name; FETCH NEXT FROM cu...read more

Add your answer

Q37. Explain the automation framework

Ans.

Automation framework is a set of guidelines, best practices, and tools used for automated testing of software applications.

  • Automation framework provides structure and organization to automated tests

  • It includes components like test scripts, libraries, and test data

  • Frameworks can be data-driven, keyword-driven, or hybrid

  • Examples of automation frameworks include Selenium, TestNG, and Robot Framework

Add your answer

Q38. Challenges faced in automation project

Ans.

Challenges in automation projects include tool selection, script maintenance, and handling dynamic elements.

  • Choosing the right automation tool for the project requirements

  • Ensuring scripts are maintained and updated regularly to keep up with application changes

  • Dealing with dynamic elements that may change in the application interface

Add your answer

Q39. What is ref in react js

Ans.

Ref is a way to access the DOM nodes or React elements created in the render method.

  • Ref is short for reference.

  • It is used to access the properties and methods of a DOM node or React element.

  • It is commonly used to manage focus, text selection, or media playback.

  • Refs can be created using the useRef hook or the createRef method.

  • Example:

  • Example: const inputRef = useRef(null);

Add your answer

Q40. Compute Services in Cloud

Ans.

Compute services in cloud refer to the ability to provision and manage virtual machines and containers on demand.

  • Compute services allow users to quickly spin up virtual machines or containers to run their applications.

  • These services can be scaled up or down based on demand, allowing for efficient resource utilization.

  • Examples of compute services include Amazon EC2, Google Compute Engine, and Microsoft Azure Virtual Machines.

Add your answer

Q41. what is synchronization

Ans.

Synchronization is the coordination of events to operate in a timely manner.

  • Synchronization ensures that multiple processes or threads do not interfere with each other when accessing shared resources.

  • It can be achieved using techniques like locks, semaphores, and barriers.

  • For example, in a multi-threaded program, synchronization is used to ensure that threads access shared data in a safe and orderly manner.

Add your answer

Q42. Push down optimisation in informatica

Ans.

Push down optimization in Informatica is a technique used to improve performance by pushing processing tasks to the source or target database.

  • Push down optimization reduces the amount of data transferred between Informatica and the database

  • It can improve performance by leveraging the processing power of the database

  • Examples include using SQL queries in Source Qualifier transformations to push filtering and aggregation operations to the database

Add your answer

Q43. Development and enhancement worked on

Ans.

I have worked on developing and enhancing various software applications for clients in different industries.

  • Developed new features based on client requirements

  • Enhanced existing functionalities to improve user experience

  • Collaborated with team members to troubleshoot and resolve issues

  • Utilized agile methodologies for efficient project management

Add your answer

Q44. Explain special procurement process

Ans.

Special procurement process involves purchasing goods or services that require unique handling or approval.

  • Special procurement can include items like capital equipment, services from a specific vendor, or items with restricted access.

  • It may involve additional documentation, approvals, or negotiations compared to regular procurement processes.

  • Examples include purchasing specialized medical equipment, securing rare materials for research projects, or acquiring services from a s...read more

Add your answer

Q45. Different between merge and rebase

Ans.

Merge combines changes from different branches, while rebase moves the entire branch onto another branch.

  • Merge creates a new commit that combines the changes from two or more branches.

  • Rebase moves the entire branch onto another branch, replaying each commit on top of the new base branch.

  • Merge preserves the commit history of both branches, while rebase creates a linear commit history.

  • Merge is useful for combining independent branches, while rebase is useful for integrating cha...read more

Add your answer

Q46. Internal working of Hash Map

Ans.

Hash Map is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.

  • Hash Map uses an array to store the key-value pairs

  • The key is hashed to generate an index in the array

  • If two keys hash to the same index, a collision occurs

  • To handle collisions, Hash Map uses a linked list at each index

  • To retrieve a value, the key is hashed to find the index and then the linked list is traversed to find the value

Add your answer

Q47. What is eigrp metrip

Ans.

EIGRP metric is a formula used by EIGRP routing protocol to calculate the best path to a destination network.

  • EIGRP metric is based on bandwidth and delay of the path to the destination.

  • The formula for EIGRP metric is: metric = [K1 * bandwidth + (K2 * bandwidth) / (256 - load) + K3 * delay] * [K5 / (reliability + K4)]

  • The default values for K1-K5 are 1, 0, 1, 0, and 0 respectively.

Add your answer

Q48. Garbage collection in java

Ans.

Garbage collection in Java is the process of automatically managing memory by deallocating objects that are no longer needed.

  • Garbage collection is performed by the JVM to reclaim memory occupied by objects that are no longer referenced.

  • It helps in preventing memory leaks and improving performance by freeing up memory.

  • Java provides automatic garbage collection, so developers do not have to manually deallocate memory.

  • Examples of garbage collection algorithms in Java include Mar...read more

Add your answer

Q49. What is selenium

Ans.

Selenium is a popular open-source automation testing tool used for web application testing.

  • Selenium is used to automate browser activities such as clicking buttons, filling forms, and navigating through pages.

  • It supports multiple programming languages like Java, C#, Python, etc.

  • Selenium can run tests on different browsers like Chrome, Firefox, Safari, etc.

  • It provides various features like capturing screenshots, handling pop-ups, and validating web elements.

  • Selenium WebDriver ...read more

Add your answer

Q50. explain the architecure

Ans.

The architecture refers to the overall design and structure of a system or application.

  • Architecture includes components, relationships, and interactions.

  • It defines how the system will be organized and how the components will communicate.

  • Examples of architecture styles include client-server, microservices, and monolithic.

  • Architectural patterns like MVC, MVVM, and layered architecture help in designing systems.

  • Architectural decisions impact scalability, performance, and maintai...read more

Add your answer

Q51. functionality of the tool

Ans.

The tool is designed to provide specific functionality to users for a particular purpose.

  • The tool should have a user-friendly interface for easy navigation.

  • It should have the ability to perform tasks efficiently and accurately.

  • The tool may include features such as data analysis, reporting, and automation.

  • Examples of functionality could include project management, customer relationship management, or data visualization.

Add your answer

Q52. Letest version of selenium

Ans.

The latest version of Selenium is Selenium 4.

  • Selenium 4 is the latest version of the Selenium automation testing framework.

  • It was released in December 2018.

  • Selenium 4 comes with several new features and improvements, including better support for mobile testing, enhanced WebDriver APIs, and improved performance.

  • One of the key features of Selenium 4 is the introduction of the Selenium Grid 4, which allows for parallel execution of tests across multiple machines and browsers.

  • Sel...read more

Add your answer

Q53. Sap security design concept

Ans.

SAP security design concept involves implementing security measures to protect SAP systems and data from unauthorized access.

  • SAP security design concept includes authentication, authorization, and encryption.

  • Authentication ensures that only authorized users can access the system.

  • Authorization defines the level of access granted to each user.

  • Encryption protects data from unauthorized access by encrypting it during transmission and storage.

  • Examples of SAP security design measur...read more

Add your answer

Q54. Memory management in java

Ans.

Memory management in Java involves automatic memory allocation and garbage collection.

  • Java uses automatic memory management through garbage collection to allocate and deallocate memory.

  • Garbage collection in Java helps in reclaiming memory occupied by objects that are no longer in use.

  • Java provides the 'finalize()' method to perform cleanup operations before an object is garbage collected.

Add your answer

Q55. Explain FSMO Roles

Ans.

FSMO roles are specialized domain controller roles in Active Directory that handle specific tasks.

  • There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

  • Schema Master - Manages changes to the schema.

  • Domain Naming Master - Controls the addition or removal of domains in the forest.

  • RID Master - Allocates unique relative identifiers (RID) to each domain controller.

  • PDC Emulator - Handles backward compatibility for older sys...read more

Add your answer

Q56. Architecture of PKI

Ans.

PKI architecture involves components like certificate authority, registration authority, and digital certificates.

  • PKI includes a certificate authority (CA) responsible for issuing and managing digital certificates.

  • There is also a registration authority (RA) that verifies the identity of certificate holders before issuing certificates.

  • Digital certificates contain public keys, identity information, and digital signatures.

  • PKI architecture also involves key management, certificat...read more

Add your answer

Q57. Reason for switching

Ans.

Seeking new challenges and growth opportunities in a different environment.

  • Desire for professional growth

  • Interest in exploring new industries or sectors

  • Seeking a change in work culture or environment

Add your answer

Q58. Sap tables and uses

Ans.

SAP tables store data in a structured format for various modules like finance, HR, sales, etc.

  • SAP tables are used to store data in a structured format for different modules within SAP system.

  • Each table is designed to store specific types of data related to a particular module or function.

  • Tables are linked together through relationships to provide a comprehensive view of the data.

  • Examples of SAP tables include MARA (Material Master), VBAK (Sales Document Header), and PA0001 (H...read more

Add your answer

Q59. Explain STO process

Ans.

STO process involves transferring materials from one plant to another within the same company.

  • STO stands for Stock Transport Order.

  • It is used to transfer materials between different storage locations or plants within the same company.

  • The process involves creating a purchase order for the receiving plant, picking the materials, and transferring them to the destination plant.

  • It helps in maintaining accurate inventory levels and tracking material movements within the company.

  • STO...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Elderberry Tech

based on 38 interviews in the last 1 year
3 Interview rounds
Technical Round
HR Round 1
HR Round 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Associate Consultant Interview Questions from Similar Companies

3.7
 • 35 Interview Questions
3.9
 • 28 Interview Questions
3.7
 • 26 Interview Questions
3.7
 • 23 Interview Questions
3.9
 • 12 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter