i
IBM
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
Use encrypted variables, limit access to credentials, and utilize secure storage solutions.
Encrypt sensitive variables using tools like Vault or AWS KMS
Limit access to credentials by using least privilege principles
Store credentials securely in a password manager or key vault
Avoid hardcoding credentials in Terraform configuration files
To check if a pod in ReplicaSet went down or failed, monitor the pod status, logs, and events.
Monitor the pod status using kubectl get pods command
Check the pod logs for any error messages using kubectl logs command
Review the events related to the pod using kubectl describe pod command
Set up alerts or notifications for pod failures using monitoring tools like Prometheus or Grafana
Use variables or data sources in Terraform to dynamically manage AMI IDs without hard coding.
Define a variable for the AMI ID in your Terraform configuration: `variable "ami_id" {}`.
Use a data source to fetch the latest AMI ID dynamically: `data "aws_ami" "latest" {}`.
Reference the variable or data source in your resource block: `ami = var.ami_id` or `ami = data.aws_ami.latest.id`.
Utilize Terraform workspaces or e...
Difficult customers can be managed by actively listening, remaining calm, setting boundaries, and finding solutions.
Listen actively to understand their concerns
Remain calm and composed, avoiding escalation
Set clear boundaries for acceptable behavior
Find mutually beneficial solutions to address their issues
What people are saying about IBM
T&M projects are based on hourly rates and actual hours worked, while Fixed Price projects have a set price for the entire project regardless of hours worked.
T&M projects involve billing based on actual hours worked and hourly rates
Fixed Price projects have a set price agreed upon at the beginning of the project
T&M projects offer more flexibility in terms of scope changes and timelines
Fixed Price projects provide ...
Protocol is a set of rules used in digital communication to connect network devices and exchange information.
Protocols define the format, timing, sequencing, and error checking of data transmission.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Protocols ensure that devices can communicate effectively and understand each other's data.
Different protocols serve different purposes, such as routing data, se...
A gateway is a hardware device that connects two dissimilar types of networks, allowing data to be sent and received through the internet even if it is a LAN network.
Gateway acts as an entry and exit point for data traffic between networks
It translates data between different network protocols
Examples include routers and firewalls that connect a local network to the internet
KYC stands for Know Your Customer, a process used by financial institutions to verify the identity of their clients.
KYC is a regulatory requirement to prevent money laundering, terrorist financing, and other financial crimes.
It involves collecting personal information and verifying the identity of customers before providing services.
Examples of KYC documents include government-issued IDs, proof of address, and fin...
There are multiple ways to invoke a servlet in AEM, including using Sling Servlets, ResourceType-based Servlets, and ServletResolver.
Using Sling Servlets by registering the servlet with a specific path
Using ResourceType-based Servlets by associating the servlet with a specific resource type
Using ServletResolver to dynamically resolve servlets based on request paths
P2P process stands for Procure to Pay process, which involves all steps from requisition to payment for goods or services.
Requisition: Request for goods or services
Purchase Order: Formal order placed with supplier
Goods Receipt: Receiving the goods or services
Invoice Verification: Checking and approving supplier invoice
Payment: Settling the invoice
WAN (Wide Area Network) connects multiple local networks over large distances, enabling communication and data sharing.
WANs cover large geographical areas, such as cities, countries, or even continents.
They use various transmission technologies, including leased lines, satellite links, and VPNs.
Examples of WANs include the Internet, corporate networks connecting multiple offices, and telecommunications networks.
LAN (Local Area Network) connects computers and devices in a limited area for resource sharing.
LAN typically covers a small geographic area, like a home, office, or campus.
Common technologies include Ethernet and Wi-Fi.
Devices on a LAN can share resources like printers and files.
LANs can be wired (using cables) or wireless (using Wi-Fi).
Example: A home network connecting computers, smartphones, and smart TVs.
Error 001 typically indicates a generic or unspecified error in a system, often requiring further investigation to diagnose.
Generic Error Code: Error 001 is often used as a placeholder for an unspecified error, indicating that something went wrong without specific details.
Troubleshooting Steps: To resolve Error 001, check system logs, review recent changes, and ensure all dependencies are correctly configured.
Common Co...
System32 is a critical Windows operating system directory containing essential system files and drivers.
Contains core system files necessary for Windows to operate.
Includes drivers for hardware components like printers and graphics cards.
Accessing System32 can lead to system configuration changes.
Deleting or modifying files in System32 can cause system instability.
Commonly referenced in jokes and memes about computer i...
BitLocker is a disk encryption feature in Windows that protects data by encrypting entire volumes.
Provides full disk encryption to protect data from unauthorized access.
Uses AES encryption algorithm to secure data.
Can be managed via Group Policy for enterprise environments.
Supports TPM (Trusted Platform Module) for enhanced security.
Allows recovery options through recovery keys or passwords.
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
High level item category is used at document level to group similar items together for easier tracking and reporting.
High level item category can be used to classify items based on their type, purpose, or department.
It helps in organizing and grouping items for better visibility and analysis.
For example, in a procurement document, high level item category can be used to group all office supplies together for easier tra...
The 17th step in pricing procedure is determining the final price based on all previous calculations and adjustments.
The 17th step involves taking into account all previous steps in the pricing procedure
It may involve applying discounts, taxes, and any other adjustments to arrive at the final price
This step is crucial in ensuring that the final price is accurate and competitive
Output determination involves configuring condition records, access sequences, and output types in SAP ERP system.
Define condition tables for output determination
Create access sequences to determine the sequence of condition tables
Assign condition records to access sequences
Configure output types and assign them to access sequences
Test output determination by creating sales orders or invoices
Master data tables for customer and material master are essential for storing detailed information about customers and materials.
Customer master table stores information about customers such as name, address, contact details, etc.
Material master table stores information about materials such as description, unit of measure, price, etc.
These tables are crucial for efficient data management and retrieval in a business sys...
Item categories for return orders, consignment processes, and their schedule lines
Return orders typically fall under categories like damaged goods, wrong item received, or change of mind
Consignment processes may involve categories such as delivery scheduling, inventory management, and payment terms
Schedule lines for return orders and consignment processes help track timelines for actions and deliveries
The golden rule of access sequence determines the order in which system accesses condition records in SAP.
Access sequences are used in SAP to determine the order in which condition records are accessed during pricing determination
The golden rule states that the system will access condition records in the order they are defined in the access sequence
If a condition record is found in an earlier step of the access sequenc...
Tax configuration should be placed at the end of the pricing procedure to ensure accurate calculations.
Tax configuration should be placed after all other conditions and calculations in the pricing procedure.
This ensures that taxes are calculated on the final price after all discounts and surcharges have been applied.
Placing tax configuration at the end helps in avoiding any discrepancies in tax calculations.
Example: Co...
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging...
Basic coding and advanced topics of handling scenario
The SAP T code for vendors creation is XK01.
Use transaction code XK01 in SAP to create a new vendor
Enter the necessary details such as vendor name, address, payment terms, etc.
Save the vendor information once all details are entered
Case studies will be provided
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I have three questions: 1. How to handle null values? 2. What are ranking functions? 3. Can you explain self joins?
I primarily use tools such as Microsoft Excel, PowerPoint, and Tableau for data analysis and visualization.
Microsoft Excel for data manipulation and analysis
PowerPoint for creating presentations
Tableau for data visualization
I can join within two weeks of receiving an offer.
I can start within two weeks of receiving an offer.
I need to give notice at my current job before starting.
I have some personal commitments that I need to wrap up before joining.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There was 1 interview round.
Using sliding window technique to find subarray with sum equal to k.
Initialize two pointers at the start of the array.
Move the right pointer to expand the window until the sum is greater than or equal to k.
Move the left pointer to shrink the window if the sum exceeds k.
Repeat until the end of the array is reached.
Example: Input array [1, 4, 20, 3, 10, 5], k=33. Output: [20, 3, 10].
I applied via Naukri.com and was interviewed in Aug 2024. There were 4 interview rounds.
Kindly arrange the aptitude test is Online mode
Currently managing multiple projects with varying deadlines and priorities.
Balancing workload by prioritizing tasks based on deadlines and importance
Utilizing project management tools to track progress and allocate resources efficiently
Communicating with team members and stakeholders to ensure alignment on project goals and timelines
Metting with top management
Some of the top questions asked at the IBM interview for experienced candidates -
The duration of IBM interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 480 interview experiences
Difficulty level
Duration
based on 23.6k reviews
Rating in categories
Application Developer
12.6k
salaries
| ₹5.2 L/yr - ₹26.5 L/yr |
Software Engineer
5.9k
salaries
| ₹8.2 L/yr - ₹24.8 L/yr |
Software Developer
5.7k
salaries
| ₹13.3 L/yr - ₹39.6 L/yr |
Senior Software Engineer
5.3k
salaries
| ₹14.2 L/yr - ₹30 L/yr |
Advisory System Analyst
4.5k
salaries
| ₹13.6 L/yr - ₹23 L/yr |
Oracle
TCS
Cognizant
Accenture