Wipro
20+ Amazon Interview Questions and Answers
Q1. What is an APM, why do we do sync of DC to Dr and how?
APM stands for Application Performance Management. Sync of DC to DR is done for disaster recovery purposes.
APM is the monitoring and management of performance and availability of software applications.
Sync of DC to DR is done to ensure that in case of a disaster, the secondary data center has the most up-to-date data.
This is typically done through replication technologies such as synchronous or asynchronous replication.
Disaster recovery is important to ensure business continu...read more
Q2. How doesn't an NGF work. Describe via internal block diagram of each part.?
NGF does not work when there is a disruption in the signaling pathway or when the receptor is not present.
NGF binds to its receptor TrkA and activates the signaling pathway.
If the receptor is not present, NGF cannot bind and activate the pathway.
Disruption in the signaling pathway can also prevent NGF from working.
This can occur due to mutations in the pathway components or interference from other molecules.
Internal block diagram of each part is not applicable as NGF is a pro...read more
Q3. What is a routing algorithm? Give some example? How does it work
A routing algorithm is a process of determining the best path for data to travel from one network to another.
Routing algorithms are used in computer networks to determine the most efficient path for data to travel.
Examples of routing algorithms include OSPF, BGP, and RIP.
Routing algorithms work by analyzing network topology and selecting the best path based on factors such as distance, bandwidth, and cost.
Some routing algorithms are dynamic, meaning they can adapt to changes ...read more
Q4. How to do effort estimation for any software module development.
Effort estimation for software module development
Break down the module into smaller tasks
Estimate time required for each task
Consider dependencies and risks
Use historical data and expert judgment
Adjust estimates based on complexity and team experience
Use tools like PERT, COCOMO, or function points
Regularly review and update estimates
Q5. What are different type of unibasic files?
Unibasic files are used in Unidata database management system and can be of different types.
Unibasic program files (.BASIC)
Compiled Unibasic program files (.UV)
Data files (.DAT)
Index files (.IDX)
Dictionary files (.DICT)
Accounting files (.ACCT)
Report files (.RPT)
Temporary files (.TMP)
Q6. what is SIEM, two factor authentication , SSL, etc
SIEM is a security tool that collects and analyzes security events. Two factor authentication adds an extra layer of security. SSL is a protocol for secure communication.
SIEM stands for Security Information and Event Management
SIEM collects and analyzes security events from various sources
Two factor authentication requires two forms of identification to access a system
SSL stands for Secure Sockets Layer
SSL is a protocol for secure communication over the internet
SSL uses encry...read more
Q7. Do a data center basic data flow design
A data center basic data flow design involves the movement of data between servers, storage devices, and networks.
Data is received from external sources and processed by servers
Processed data is stored in storage devices
Data is retrieved from storage devices and sent to networks for distribution
Networks transmit data to end-users or other systems
Data is constantly monitored and managed for security and efficiency
Q8. What are the available files for application
Various files such as resumes, cover letters, references, and certifications are typically required for job applications.
Resumes
Cover letters
References
Certifications
Q9. what and why is a DMZ created
A DMZ is a network segment that separates an organization's internal network from an untrusted network.
DMZ stands for Demilitarized Zone
It is created to provide an additional layer of security to an organization's network
It is typically used to host publicly accessible servers such as web servers, email servers, etc.
Traffic to and from the DMZ is heavily monitored and restricted to prevent unauthorized access to the internal network
It is also known as a perimeter network
Q10. Lifecycle of policy & claim in P&C Insurance
Policy & claim lifecycle in P&C insurance involves stages like underwriting, policy issuance, premium payment, claim filing, investigation, settlement, and closure.
Underwriting: Assessing risk and determining policy terms.
Policy Issuance: Providing the policy to the insured.
Premium Payment: Insured pays the premium to maintain coverage.
Claim Filing: Insured reports a loss or damage.
Investigation: Insurer assesses the claim's validity.
Settlement: Insurer pays out the claim amo...read more
Q11. Different business processes in SAP ?
SAP offers various business processes such as procurement, sales, production planning, and financial accounting.
Procurement process involves purchasing goods and services from external vendors.
Sales process includes activities related to selling products or services to customers.
Production planning process focuses on planning and scheduling production activities.
Financial accounting process involves managing financial transactions and generating financial reports.
Q12. What is sand boxing
Sandboxing is a security mechanism used to isolate programs or processes from the rest of the system.
It creates a virtual environment for testing and running untrusted code
It prevents malicious code from accessing sensitive data or resources
It is commonly used in web browsers to prevent malware from infecting the system
Examples include Docker containers, virtual machines, and chroot jails
Q13. How to create Dictionary items?
Dictionary items can be created using the key-value pair syntax in Python.
Use curly braces {} to create an empty dictionary.
Use square brackets [] to access or add items to the dictionary.
Example: my_dict = {'key1': 'value1', 'key2': 'value2'}
Example: my_dict['key3'] = 'value3'
Q14. S4 implementation methodology and features
S4 implementation methodology and features involve a structured approach to implementing SAP S/4HANA with key features like simplification, innovation, and integration.
S4 implementation methodology follows a structured approach to ensure successful deployment of SAP S/4HANA.
Key features of S4 implementation methodology include simplification of processes, innovation through new technologies, and integration with other systems.
Examples of S4 implementation methodology features...read more
Q15. Different methodologies of data warehousing
Data warehousing methodologies include Kimball, Inmon, and Data Vault.
Kimball methodology focuses on building data marts first and then integrating them into a data warehouse
Inmon methodology involves building a centralized data warehouse first and then creating data marts
Data Vault methodology focuses on flexibility and scalability by using hubs, links, and satellites
Q16. Difference between getMapping and RequestMapping
GetMapping is a specialized form of RequestMapping used for GET requests in Spring MVC.
GetMapping is a shortcut for @RequestMapping(method = RequestMethod.GET)
RequestMapping can be used for any HTTP method, while GetMapping is specifically for GET requests
GetMapping is more concise and easier to read compared to RequestMapping
Q17. What is Risk management
Risk management is the process of identifying, assessing, and prioritizing risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and impact of unfortunate events.
Identifying potential risks that could impact the organization
Assessing the likelihood and impact of each risk
Prioritizing risks based on their potential impact
Developing strategies to mitigate or manage risks
Monitoring and reviewing risks regularly to...read more
Q18. How will you manage clients
I will manage clients by building strong relationships, understanding their needs, providing excellent service, and consistently communicating with them.
Build strong relationships with clients by being responsive and attentive to their needs
Understand the unique needs and goals of each client to tailor solutions accordingly
Provide excellent service by delivering on promises and exceeding expectations
Consistently communicate with clients to keep them informed and engaged
Addres...read more
Q19. Maximum on capital markets
Maximum on capital markets refers to the highest point of a financial market's performance.
The maximum on capital markets is often referred to as the market peak.
It is the point at which the market reaches its highest level before experiencing a decline.
Investors often try to predict when the market will reach its maximum in order to maximize their profits.
The maximum on capital markets can vary depending on the specific market and economic conditions.
For example, the maximum...read more
Q20. What's the oracle
Oracle is a relational database management system (RDBMS) developed by Oracle Corporation.
Oracle is used to store and manage data in a structured manner.
It is widely used in enterprise applications for its scalability and reliability.
Oracle supports SQL and PL/SQL programming languages.
It offers features like data security, backup and recovery, and performance tuning.
Examples of applications that use Oracle include banking systems, e-commerce websites, and healthcare systems.
Top HR Questions asked in Amazon
Interview Process at Amazon
Top Senior Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month