Associate Consultant
900+ Associate Consultant Interview Questions and Answers
Q1. There are 2 cricket teams, A and B, with 11 players each. If every player of team A shakes hands with every player of team B(once), what will be the total number of handshakes?
Calculate the total number of handshakes between 2 cricket teams with 11 players each.
Use the formula n(n-1)/2 to calculate the number of handshakes for each team.
Multiply the result by the number of players in the other team.
Add the two results together to get the total number of handshakes.
Suppose there are N balls. out of which only 1 ball is lighter in weight. You are given a simple balance. Then How many minimum no. of attempts do one take to find out that lighter ball. and how many maxi...read more
Minimum number of attempts to find the lighter ball is ceil(log2(N)) and maximum number of attempts is 3.
Minimum attempts: ceil(log2(N))
Maximum attempts: 3
Condition for maximum attempts: N must be greater than or equal to 9
Associate Consultant Interview Questions and Answers for Freshers
Q3. While working late at night, you figure out that the data available with you has something missing. You've been working on the data for the last 2 weeks. You don't see any senior around in office to help you ou...
read moreAssess the situation, try to find the missing data, and if not possible, inform the client and senior management.
Check if the missing data can be retrieved from any other source or system
If not, assess the impact of missing data on the project and client's requirements
If the impact is significant, inform the client and senior management immediately
If the impact is minimal, complete the project with available data and inform the client about the missing data
Document the incide...read more
Q4. Could you tell me, which tools do you have used in test management and defect tracking?
I have experience using JIRA and HP ALM for test management and defect tracking.
I have used JIRA extensively for managing test cases, test plans, and tracking defects.
I have also worked with HP ALM for test management and defect tracking.
Both tools have robust reporting capabilities that allow for easy tracking of project progress and defect resolution.
In addition, I have experience integrating these tools with other software development tools such as Jenkins and Git for cont...read more
You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.
For example:
If the given string is: STR = "abcde". You h...read more
The task is to reverse a given string that may contain lowercase letters, uppercase letters, digits, and special characters.
Iterate through the string from the last character to the first character and append each character to a new string.
Alternatively, you can use built-in string reversal functions or methods available in your programming language.
To solve the follow-up question with O(1) space complexity, you can use a two-pointer approach. Swap the characters at the start...read more
Given an array/list 'ARR' of βNβ distinct integers, you are supposed to find the third largest element in the given array 'ARR'.
Input Format :
The first line contains a single integer βTβ...read more
The task is to find the third largest element in an array of distinct integers.
Read the number of test cases 'T'
For each test case, read the number of elements 'N' and the array 'ARR'
Sort the array in descending order
Return the element at index 2 as the third largest element
Share interview questions and help millions of jobseekers π
Q7. 1. Scrum Ceremonies 2. Do we include V&V during Sprint planning 3. Scrum and Kanban differentiate 4. Scrum Planning Estimation Techniques or types 5. Product backlog vs sprint backlog 6. sprint review what happ...
read moreQuestions related to Scrum methodology and agile practices.
Scrum ceremonies include daily stand-up, sprint planning, sprint review, and sprint retrospective.
Verification and validation (V&V) should be included in sprint planning.
Scrum and Kanban differ in terms of roles, ceremonies, and visualization techniques.
Scrum planning estimation techniques include planning poker, t-shirt sizing, and affinity mapping.
Product backlog contains all the user stories while sprint backlog co...read more
Q8. If we include all Header Files in a Java Code will it increase the Space complexity of the Program or slow up the Speed if we are not using every method we are importing?
Including all header files in Java code may increase space complexity but not affect speed if unused methods are not called.
Including all header files in Java code may increase the size of the compiled program, but it will not affect the speed of the program if unused methods are not called.
Unused methods will not be loaded into memory, so they will not affect the program's performance.
However, including unnecessary header files can make the code harder to read and maintain.
I...read more
Associate Consultant Jobs
Q9. What are the services you have used in AWS? What are the types of storage in S3? How will you troubleshoot if a web server is not responding? Have you come across DNS hosting, in AWS how can we achieve it? What...
read moreAWS services, S3 storage types, troubleshooting web server, DNS hosting, static hosting, IAM policies, load balancers, NAT gateway
Used EC2, S3, RDS, Lambda, CloudFront, etc.
S3 storage types: Standard, Infrequent Access, Glacier
Check server logs, network connectivity, security groups, etc.
DNS hosting can be achieved using Route 53
Static hosting is used to host static websites using S3 and CloudFront
Roles define permissions for AWS resources, service rules define access to spec...read more
Ninja has to implement an βAVL_TREEβ from scratch.
He is given βNβ values, representing the values of nodes to be inserted. Ninja has to insert these values into the βAVL_TREEβ and return i...read more
The question asks to implement an AVL_TREE from scratch and insert given values into it.
AVL_TREE is a self-balancing binary search tree
The height difference between left and right subtrees of all nodes should not be more than one
Implement the AVL_TREE data structure and insertion algorithm
Return the root of the AVL_TREE after inserting all the nodes
Q11. Your client is Tata Sons and their hierarchy is such that all their other businesses are present below the CEO. In 2012, Mistry was appointed as the chairman of Tata Sons. In addition, he is also chairman of al...
read moreTo manage Tata's businesses, Mistry should conduct a thorough analysis of each business unit's performance and potential, identify areas for improvement, and develop a strategic plan.
Conduct a SWOT analysis of each business unit
Identify areas for improvement and develop a strategic plan
Consider market trends and competition
Evaluate the financial performance of each business unit
Assess the potential for growth and expansion
Consider mergers and acquisitions as a means of enteri...read more
Q12. There is a cricket team with 11 players. If every player in the team shakes hands with the other players once, what will be the total number of handshakes?
11 players in a cricket team shake hands with each other once. Find the total number of handshakes.
Each player shakes hands with 10 other players.
Total number of handshakes = 11C2 = 55
Formula for nC2 = n*(n-1)/2
Q13. What do you mean by Git stash? what are the different ways of git merge? Can you differentiate between git pull and git fetch? what is the branching strategy in Git and how will you create a new branch and swit...
read moreGit stash is a feature that allows you to temporarily save changes without committing them.
Different ways of git merge: fast-forward, recursive, octopus
Git pull: fetches and merges changes from a remote branch, Git fetch: only fetches changes
Branching strategy in Git: Gitflow, trunk-based development, feature branching
To create a new branch: git branch
, to switch to it: git checkout Secrets should not be stored in Git repo, use a secure key management system
Staging area in G...read more
Q14. 1. Write a program to remove duplicate elements from String and mention the count of duplication.
Program to remove duplicate elements from String and count their occurrences.
Create a HashSet to store unique characters from the String.
Iterate through the String and add each character to the HashSet.
While adding, check if the character already exists in the HashSet and increment its count.
Print the count of each character that has duplicates.
Return the modified String with duplicates removed.
You have been given an integer array/list 'ARR' of size 'N'. Your task is to return the total number of those subsequences of the array in which all the elements are equal.
A subsequence of a ...read more
Q16. If a room has 1 bulb and there are 3 switches outside the room. Which is the right key? Condition- You can enter once, while any 1 switch is turned on
The right key is the switch that is turned on.
The bulb will only turn on if the switch that controls it is turned on.
Since you can only enter the room once, you need to determine which switch is turned on without entering the room.
You can try each switch one by one and observe if the bulb turns on or not.
Q17. What are the different types of Jobs in Jenkins, name at least 2, and their usage? How will you restrict access in Jenkins to someone, what is the plugin name? In what language Jenkins is written? What are the ...
read moreJenkins is a popular CI/CD tool with various job types, access control, build triggers, and master-slave architecture.
Job types: Freestyle project, Pipeline project
Access control: Role-based Authorization Strategy plugin
Jenkins is written in Java
Build triggers: Manual, Scheduled, SCM, Remote Trigger, etc.
Build failure: Email notification, Console output, Build log
Master-slave: Distributes workload across multiple nodes for faster builds
Q18. Why Ansible is called agentless? How will you run an ansible-playbook, tell me the command used for it? What are variables in ansible? What are the roles in ansible and what is the benefit of using it? How does...
read moreAnsible is called agentless because it does not require any agent to be installed on the target host.
Ansible uses SSH to connect to the target host and execute commands remotely.
The command to run an ansible-playbook is 'ansible-playbook
'. Variables in Ansible are used to store values that can be used across multiple tasks and playbooks.
Roles in Ansible are a way to organize tasks, handlers, and variables into reusable units.
Ansible maintains inventory data in the inventory f...read more
Q19. Without the help of internet help me calculate the no. of white cars sold in Mumbai every year. Not the method as to how you calculate the figure.
It is not possible to calculate the number of white cars sold in Mumbai every year without the help of internet.
Without internet, it is impossible to access the necessary data and statistics.
The number of white cars sold in Mumbai can vary greatly from year to year.
Data on car sales is typically collected and analyzed using online platforms and databases.
Without internet, it is difficult to gather information from car dealerships, manufacturers, and government agencies.
Estima...read more
Q20. 1). How pricing procedure is determine in SAP SD. 2). ASAP Methodology steps and your role as a SD Consultant. 3). GAPS during Implementation Project. 4). Condition technique for determining pricing procedure. ...
read moreQuestions related to SAP SD implementation and processes.
Pricing procedure is determined based on condition technique and can be customized as per business requirements.
ASAP methodology involves various phases like project preparation, business blueprint, realization, final preparation, and go-live and support.
GAPS during implementation project can arise due to differences between business requirements and system capabilities.
Condition technique involves defining access seque...read more
Q21. What is agile fundamentals and theirs importance and waterfall model?
Agile fundamentals are a set of principles and values that prioritize flexibility, collaboration, and continuous improvement in software development. Waterfall model is a traditional linear approach to software development.
Agile emphasizes iterative development and customer collaboration
Agile values individuals and interactions over processes and tools
Agile promotes responding to change over following a plan
Waterfall model follows a sequential approach to software development...read more
Q22. What is the command used for CPU usage in Linux? which Linux you have used? How will you see free memory in Linux in GB? Do you know NFS and what are the steps to create it?
Command for CPU usage in Linux, checking free memory in GB, and creating NFS.
Command for CPU usage: top or htop
Checking free memory in GB: free -g
Creating NFS: install nfs-utils, configure /etc/exports, start nfs-server and nfs-lock services
Linux used not specified
Q23. What type of testing you have done in your career and how many test cases written of the day?
I have experience in functional, regression, integration, and acceptance testing. On average, I write 20-30 test cases per day.
Functional testing to ensure the software meets the requirements
Regression testing to ensure new changes do not break existing functionality
Integration testing to ensure different components work together
Acceptance testing to ensure the software meets the user's needs
On average, I write 20-30 test cases per day
Examples include testing a new feature on...read more
You are given a string EXP which is a valid infix expression. Convert the given infix expression to postfix expression.
Infix expression is of the form a op b. Where operator is is between the ...read more
Q25. Case: A toothpaste company is seeing decline in its revenues and margin. What would you do?
Toothpaste company facing revenue and margin decline. What to do?
Conduct market research to identify reasons for decline
Analyze competitors' strategies and pricing
Revamp marketing and advertising campaigns
Introduce new product variants or improve existing ones
Consider cost-cutting measures to improve margins
Explore new distribution channels
Collaborate with dentists or dental clinics for endorsements
Offer promotions or discounts to attract customers
Invest in digital marketing ...read more
Q26. Case: Our client is a leading cement manufacturing firm in India looking to enter the international markets. How will you formulate a plan of action to prioritize which geography should they enter?
To prioritize international markets for a leading cement manufacturing firm in India, a plan of action can be formulated based on market research and analysis.
Conduct market research to identify potential markets based on factors such as demand, competition, and regulatory environment
Analyze the economic and political stability of each potential market
Consider the logistics and transportation costs of exporting cement to each market
Evaluate the cultural and language barriers ...read more
Q27. 4. What is marker interface? Example of marker interface. Why it is used.
Marker interface is an interface with no methods. It is used to mark a class for special treatment.
Marker interface is used to provide metadata to the JVM.
It is used to indicate that a class has some special behavior or characteristics.
Example: Serializable interface in Java.
Marker interfaces are used for reflection and serialization.
They are also used in frameworks like Spring and Hibernate.
Marker interfaces are also known as tagging interfaces.
They are used to group classes...read more
Q28. 2. Write a program to capitalise all the first letter of a word in a sentence.
A program to capitalize the first letter of each word in a sentence.
Split the sentence into words
Loop through each word and capitalize the first letter
Join the words back into a sentence
Q29. What is Dockerfile? Can you tell me some fields used in the Docker file? What is the difference between Dockerfile and Docker compose? Which is better Docker compose or Kubernetes, explain some differences? IN ...
read moreExplanation of Dockerfile, Docker Compose, and differences between them and Kubernetes.
Dockerfile is a script that contains instructions to build a Docker image.
Fields in Dockerfile include FROM, RUN, COPY, ADD, CMD, and more.
Docker Compose is a tool for defining and running multi-container Docker applications.
Docker Compose uses a YAML file to define services, networks, and volumes.
Kubernetes is a container orchestration platform that automates deployment, scaling, and manag...read more
Q30. Our client is a gear manufacturer who has expanded his fatherβs business from 1000 cr to 4000 cr however his profitability has dropped from 10% to 5%. Probe why has this happened?
The client's gear manufacturing business has expanded from 1000 cr to 4000 cr, but profitability has dropped from 10% to 5%. Find out why.
Possible increase in production costs
Increased competition leading to lower prices
Investment in new technology or equipment
Changes in market demand or consumer preferences
Inefficient management or operations
Economic factors such as inflation or recession
Q31. Do you know what an ERP is, And why would an organisation need an ERP?
ERP is an enterprise resource planning system that integrates business processes and data into a single system.
ERP helps organizations streamline their operations and improve efficiency
It provides a centralized database for all business processes
ERP can automate tasks such as accounting, inventory management, and human resources
Examples of ERP systems include SAP, Oracle, and Microsoft Dynamics
Q32. Mathematical puzzle : Two friends agree to meet up in a bar between midnight and 1 am. Each forgets the exact time they are supposed to meet, so each shows up at a random time. Suppose that after arriving rando...
read moreThe probability that two friends will meet at a bar between midnight and 1 am, given that each arrives randomly and waits 10 minutes for the other person before leaving.
Assume a continuous uniform distribution for the arrival time of each friend.
The probability of meeting is the area of overlap between the arrival time distributions.
Calculate the probability using geometric probability or integration.
The probability can be calculated as 1 minus the probability of not meeting.
Q33. Roughly how many students in IIT K end up working in non-core sectors? Do you think it is a problem for the society that a lot of students donβt contribute to their core areas of engineering?
A significant number of IIT K students work in non-core sectors. It may not be a problem for society as they contribute to the economy.
Around 50% of IIT K graduates work in non-core sectors such as consulting, finance, and IT.
These sectors contribute significantly to the economy and provide employment opportunities.
Many students also pursue higher education or entrepreneurship, which can also benefit society.
It is important to have a diverse range of career paths for engineer...read more
Q34. What are the different kinds of terraform variables? What do you mean by terraform resource? Have you used terraform in your project?
Terraform variables can be of different types. Terraform resource is a declarative representation of infrastructure.
Terraform variables can be of type string, number, bool, list, map, object, set.
Terraform resource is a block of code that defines a piece of infrastructure.
Examples of resources are AWS EC2 instance, Azure Virtual Machine, Google Cloud Storage bucket.
Yes, I have used Terraform in my project.
Q35. 6. Consider an array of String, remove those string from array whose length is less than 3.
Remove strings from an array whose length is less than 3.
Loop through the array and check the length of each string.
If the length is less than 3, remove that string from the array.
Use a for loop or filter method to remove the strings.
Example: ['cat', 'dog', 'bird', 'elephant'] -> ['cat', 'dog', 'bird', 'elephant']
Example: ['a', 'to', 'the', 'in'] -> ['the', 'in']
Q36. How would you develop an algorithm for an app like Splitwise with the objective of minimizing the number of transactions among a group of 5?
Develop an algorithm to minimize transactions in a group of 5 for an app like Splitwise.
Create a matrix to represent the debts between individuals
Find the maximum and minimum debts in the matrix
Settle the maximum debt by transferring money from the debtor to the creditor
Repeat the process until all debts are settled or minimized
Q37. 4. When to use list and when to use linked list.
Lists are used for small collections, linked lists for large or frequently modified collections.
Use lists for small collections that don't require frequent modifications.
Use linked lists for large collections or collections that require frequent modifications.
Linked lists are better for inserting or deleting elements in the middle of the collection.
Lists are better for accessing elements by index.
Example: Use a list to store a small list of names, use a linked list to impleme...read more
Q38. Tell me how many Reynolds pen are sold in Gurgaon every year.
It is not possible to accurately determine the number of Reynolds pens sold in Gurgaon every year without specific sales data.
The sales data of Reynolds pens in Gurgaon is not publicly available.
The number of Reynolds pens sold can vary each year due to factors such as market demand and competition.
To determine the exact number, one would need access to sales records or conduct a market research study.
Without specific data, it is only possible to make an estimate or provide a...read more
Fetch data from given two tables with a common column without using where keyword.
Fetch data from two tables with a common column without using WHERE keyword.
Use JOIN keyword to combine the two tables based on the common column.
Specify the common column in the ON clause of the JOIN statement.
This will retrieve all the rows where the common column values match in both tables.
Q40. What is the difference between a micro controller and a micro processor?
Microcontroller is a self-contained system with memory, peripherals and processor, while microprocessor only has a processor.
Microcontroller has on-chip memory and peripherals, while microprocessor requires external memory and peripherals.
Microcontroller is used in embedded systems, while microprocessor is used in general-purpose computing.
Examples of microcontrollers include Arduino, PIC, and AVR, while examples of microprocessors include Intel Pentium, AMD Ryzen, and ARM Co...read more
Q41. What firewalls are you worked on? What are UTM firewalls? What is stateless and stateful inspection?
Firewalls are network security devices that monitor and control incoming and outgoing network traffic. UTM firewalls provide additional security features such as antivirus, intrusion prevention, and content filtering. Stateless inspection examines each packet individually, while stateful inspection tracks the state of connections between packets.
Firewalls monitor and control network traffic
UTM firewalls provide additional security features
Stateless inspection examines each pa...read more
Q42. How to manipulate traffic in OSPF? How to link indirectly connected areas to backbone area? What are OSPF LSAs?
OSPF traffic manipulation and linking indirectly connected areas to backbone area using LSAs.
OSPF traffic can be manipulated using various methods such as adjusting the cost metric or using route redistribution.
To link indirectly connected areas to the backbone area, a virtual link can be created through a transit area.
OSPF LSAs (Link State Advertisements) are packets that contain information about the network topology and are used by OSPF routers to build a complete map of t...read more
Q43. 10. Write a program to separate even and odd numbers using Java 8.
Program to separate even and odd numbers using Java 8.
Use Java 8 Stream API to filter even and odd numbers
Create two separate lists for even and odd numbers
Use lambda expressions to filter the numbers
Example: List
evenNumbers = numbers.stream().filter(n -> n % 2 == 0).collect(Collectors.toList()); Example: List
oddNumbers = numbers.stream().filter(n -> n % 2 != 0).collect(Collectors.toList());
Q44. 3. How to remove sensitive information from serializable interface.
Sensitive information can be removed from serializable interface by implementing custom serialization.
Create a custom serialization method that excludes sensitive information.
Use the transient keyword to mark sensitive fields as non-serializable.
Consider using encryption or hashing to protect sensitive data.
Test serialization and deserialization to ensure sensitive information is not included.
Examples: exclude passwords, credit card numbers, and personal identification inform...read more
Q45. which is the best sorting algorithm and why?
The best sorting algorithm depends on the specific use case and the characteristics of the data.
The best sorting algorithm for small arrays is often insertion sort due to its simplicity and efficiency.
For larger arrays, merge sort or quicksort are commonly used due to their average-case time complexity of O(n log n).
If the data is nearly sorted, algorithms like bubble sort or insertion sort can perform well.
If the data contains many duplicate elements, counting sort or radix ...read more
Q46. Can an array have elements of different data types?
Yes, an array can have elements of different data types.
An array can have elements of different data types, but it's not recommended.
It can make the code harder to read and maintain.
For example, an array can have both strings and numbers: ['apple', 5, 'banana']
Q47. How much you give the star out of 5?
I cannot give a star rating without knowing the specific context or criteria being evaluated.
I would need more information about what is being rated to give an accurate star rating.
It would be helpful to know the specific criteria or standards being used to evaluate the subject.
Without context, a star rating would be arbitrary and meaningless.
For example, if we are discussing a restaurant, I would need to know about the quality of the food, service, atmosphere, etc. before gi...read more
Which is the correct SQL query to select the top 5 numbers from the given data?
The correct SQL query to select the top 5 numbers from the given data is 'SELECT TOP 5 number FROM table_name ORDER BY number DESC'.
Use the 'SELECT' statement to specify the columns you want to retrieve.
Use the 'TOP' keyword followed by the number of rows you want to select.
Specify the column name in the 'ORDER BY' clause to sort the data in descending order.
Q49. What is financial modelling and why do you require it?
Financial modelling is the process of creating a mathematical representation of a financial situation or decision.
It involves using various financial tools and techniques to analyze and forecast financial performance.
It helps in making informed decisions about investments, budgeting, and financial planning.
Examples include creating a cash flow statement, calculating return on investment, and building a financial model for a new business venture.
Q50. Estimate the no. of affordable homes (according to New govt. project) that will be needed to be constructed in Andhra Pradesh?
The estimated number of affordable homes needed in Andhra Pradesh according to the new government project.
Analyze the current housing situation in Andhra Pradesh
Consider the population growth rate and demographic trends
Assess the income levels and affordability of the target population
Evaluate the government's budget and resources for the project
Collaborate with local stakeholders and experts for insights and recommendations
Interview Questions of Similar Designations
Top Interview Questions for Associate Consultant Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month