Add office photos
Engaged Employer

IBMVerified

4.0
based on 23.3k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

700+ Zee Learn Interview Questions and Answers

Updated 27 Apr 2025
Popular Designations

Q1. Given a string or sentence, reverse it and replace the vowels with numbers from 1 to 9. In the reversed string, the replaced numbers should appear in descending order from left to right. If there are more than...

read more
Ans.

Reverse a string and replace vowels with numbers in descending order. Restart numbering if more than 9 vowels.

  • Reverse the given string using built-in functions or loops

  • Create a dictionary to map vowels to numbers from 1-9

  • Iterate through the reversed string and replace vowels with numbers from the dictionary

  • If there are more than 9 vowels, restart numbering from 1

  • Sort the replaced numbers in descending order from left to right

View 1 answer

Q2. Star Pattern Problem Statement

Display the star pattern for a given positive integer N.

Example:

Input:
N = 4
Output:
 *
***
*****
*******
Explanation:

The dots in the image represent spaces. Align the stars in...read more

Ans.

Display a star pattern in a pyramid shape for a given positive integer N with spaces in between.

  • Start by printing spaces in decreasing order and stars in increasing order for each row

  • Use nested loops to handle spaces and stars accordingly

  • Consider the total number of characters in each row to maintain the pyramid shape

Add your answer

Q3. What is the difference between Comp-1 and Comp-3?

Ans.

COMP and COMP-3 are data types used in COBOL programming language.

  • COMP is a binary data type that stores numeric values as binary integers.

  • COMP-3 is a packed decimal data type that stores numeric values as packed decimal digits.

  • COMP uses less storage space compared to COMP-3.

  • COMP-3 is more suitable for decimal arithmetic operations.

  • COMP-3 values are stored in a packed format, where each digit occupies half a byte.

  • COMP-3 values can represent both positive and negative numbers.

View 12 more answers

Q4. 1. Abstraction vs Inheritance 2. What is Garbage collector? 3. What is class loader? 4. Spring security 5. Scopes of bean 6. Wait , notify and notify all 7. Class level vs object level local 8. Arraylist vs Lin...

read more
Ans.

Java interview questions covering topics like abstraction, inheritance, garbage collector, class loader, Spring security, bean scopes, wait-notify, class vs object level local, ArrayList vs LinkedList, Singleton class, and RestController vs Controller.

  • Abstraction focuses on hiding implementation details while inheritance allows a class to inherit properties and methods from another class.

  • Garbage collector is a program that automatically frees up memory by deleting objects tha...read more

Add your answer
Discover Zee Learn interview dos and don'ts from real experiences

Q5. Given two files, how would you eliminate duplicate entries and output the duplicates to another file?

Ans.

To eliminate duplicates from 2 files and send them to another output file, we can use a combination of file reading, hashing, and file writing.

  • Read the contents of both files and store them in separate arrays or lists.

  • Create a hash table or dictionary to keep track of the unique elements in the arrays.

  • Iterate through the arrays and add each element to the hash table. If the element already exists, skip it.

  • Write the contents of the hash table to the output file.

  • If needed, writ...read more

View 4 more answers

Q6. Tell me how to write ansible playbooks and how would you define a CI/CD pipeline. What tools can you use for pipeline creation and how it works.

Ans.

Ansible playbooks automate configuration management. CI/CD pipeline automates software delivery. Tools include Jenkins, GitLab, and Travis CI.

  • Ansible playbooks are written in YAML format and define tasks to be executed on remote hosts.

  • CI/CD pipeline automates the software delivery process from code commit to production deployment.

  • Tools for pipeline creation include Jenkins, GitLab, Travis CI, and CircleCI.

  • Pipeline creation involves defining stages, jobs, and triggers to autom...read more

View 2 more answers
Are these interview questions helpful?

Q7. How do you check that all ports are connected to your computer and power supply or system configuration?

Ans.

To check all connected ports and power supply, use commands like lsusb, lspci, lshw, and check power cables and system configuration.

  • Use lsusb command to list USB devices connected to the computer

  • Use lspci command to list PCI devices connected to the computer

  • Use lshw command to list detailed hardware information

  • Physically check power cables and connections

  • Verify system configuration settings

View 1 answer

Q8. What is inheritance and what are their types? Explain them.

Ans.

Inheritance is a mechanism in object-oriented programming where a new class is derived from an existing class.

  • It allows the new class to inherit the properties and methods of the existing class.

  • There are two types of inheritance: single and multiple.

  • Single inheritance is when a class inherits from only one parent class.

  • Multiple inheritance is when a class inherits from multiple parent classes.

  • For example, a class 'Car' can inherit from a parent class 'Vehicle' which has prope...read more

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. How do you handle data skewness in Spark?

Ans.

Data skewness in Spark can be handled by partitioning, bucketing, or using salting techniques.

  • Partitioning the data based on a key column can distribute the data evenly across the nodes.

  • Bucketing can group the data into buckets based on a key column, which can improve join performance.

  • Salting involves adding a random prefix to the key column, which can distribute the data evenly.

  • Using broadcast joins for small tables can also help in reducing skewness.

  • Using dynamic allocation...read more

View 4 more answers

Q10. What details would you share with a supplier to get a quote?

Ans.

The details to share with the supplier for a quote

  • Product specifications

  • Quantity required

  • Delivery timeline

  • Quality standards

  • Payment terms

  • Any specific packaging or labeling requirements

  • Any applicable certifications or regulatory compliance

  • Expected pricing or budget constraints

View 1 answer

Q11. What do you know about Ariba, and how does it differ from other Procurement Tools?

Ans.

Ariba is a procurement tool that offers a comprehensive suite of solutions for procurement processes.

  • Ariba provides end-to-end procurement solutions, including sourcing, contract management, supplier management, and procurement analytics.

  • It offers a cloud-based platform that allows for easy collaboration between buyers and suppliers.

  • Ariba's network connects millions of buyers and suppliers globally, enabling efficient procurement processes.

  • The tool provides real-time visibili...read more

View 1 answer

Q12. What do you know about DITA XML, which tags have you used in your documents, what are keywords, and what is DITA mapping, have you ever created graphics or illustrations, types of DITA topics, benefits of DITA,...

read more
Ans.

DITA XML is a structured content standard used for creating technical documentation.

  • DITA XML is a structured content standard for technical documentation

  • Commonly used tags include <topic>, <title>, <body>, <section>

  • Keywords are used to categorize content for easy retrieval

  • DITA mapping is the process of linking topics together in a hierarchy

  • Graphics and illustrations can be created and included in DITA documents

  • Types of DITA topics include concept, task, reference

  • Benefits of D...read more

Add your answer
Q13. How do you match the orientations according to the suggested rotation degrees?
Ans.

Matching orientations based on suggested rotation degrees.

  • Calculate the difference between the current orientation and the suggested rotation degrees.

  • Apply the necessary rotation to match the orientations.

  • Consider the direction of rotation (clockwise or counterclockwise).

Add your answer

Q14. How can you check if the Facebook server is up without opening a browser or the app?

Ans.

Use command line tools like ping or curl to check server status.

  • Use ping command to check if server is reachable

  • Use curl command to check if server is responding with HTTP status code 200

  • Use telnet command to check if server is listening on a specific port

  • Use monitoring tools like Nagios or Zabbix to automate server status checks

Add your answer

Q15. What are polymorphism, abstraction, and encapsulation?

Ans.

Polymorphism, abstraction, and encapsulation are three fundamental concepts in object-oriented programming.

  • Polymorphism allows objects of different classes to be treated as if they are objects of the same class.

  • Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.

  • Encapsulation is the practice of keeping the internal workings of an object hidden from the outside world.

  • Examples of polymorphism include method ...read more

Add your answer

Q16. How many ways can data be passed from JCL to a COBOL program?

Ans.

Data can pass from JCL to COBOL program in multiple ways, such as through input files, system symbols, and program parameters.

  • Input files: Data can be passed to a COBOL program through input files specified in the JCL.

  • System symbols: JCL can define system symbols that can be accessed by the COBOL program to retrieve data.

  • Program parameters: JCL can pass parameters to the COBOL program, which can be used to receive data.

  • Environment variables: JCL can set environment variables ...read more

View 3 more answers

Q17. What are the causes of a blue screen error?

Ans.

A blue screen error can be caused by various factors such as hardware issues, driver conflicts, and software errors.

  • Hardware issues like faulty RAM or overheating can cause blue screen errors.

  • Driver conflicts occur when incompatible or outdated drivers are installed.

  • Software errors, such as corrupted system files or incompatible applications, can also lead to blue screen errors.

View 10 more answers

Q18. How can you retrieve distinct data without using the DISTINCT keyword?

Ans.

To get distinct data without using distinct keyword, use GROUP BY clause.

  • Use GROUP BY clause with the column name to group the data by that column.

  • Use aggregate functions like COUNT, SUM, AVG, etc. to get the desired result.

  • Example: SELECT column_name FROM table_name GROUP BY column_name;

  • Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;

Add your answer

Q19. What is debit, credit, inventory, debit note credit note suspense account ect..

Ans.

Debit and credit are accounting terms used to record financial transactions. Inventory is the stock of goods a company has on hand.

  • Debit is an entry on the left side of an account, while credit is an entry on the right side of an account.

  • Inventory is the stock of goods a company has on hand and is recorded as an asset on the balance sheet.

  • A debit note is a document used to inform a vendor of a debit made to their account.

  • A credit note is a document used to inform a vendor of ...read more

Add your answer

Q20. How do you check data set and mount point information in a human-readable format?

Ans.

To check data set & mount point info in human readable format, use the 'df' command.

  • Open the terminal and type 'df -h' to display the information in human-readable format.

  • The 'df' command shows the file system disk space usage, including the mount point and file system type.

  • The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.

  • You can also use the 'mount' command to display the mounted file systems a...read more

Add your answer

Q21. What do you understand about TAT, and how is it useful?

Ans.

TAT stands for Turnaround Time. It refers to the time taken to complete a process or task.

  • TAT is a measure of efficiency and productivity.

  • It helps in setting realistic expectations and deadlines.

  • TAT is crucial in customer service to ensure timely delivery of products or services.

  • For example, in IT operations, TAT can be used to measure the time taken to resolve technical issues.

  • TAT can also be used to track the time taken to process and approve operational requests.

View 1 answer

Q22. How do you identify network errors, and what methods do you use to rectify them?

Ans.

To identify network errors, monitor network performance, analyze logs, use network troubleshooting tools, and rectify them by troubleshooting hardware, software, or configuration issues.

  • Monitor network performance to identify any anomalies or issues

  • Analyze network logs for error messages or patterns

  • Use network troubleshooting tools like ping, traceroute, or network analyzers

  • Troubleshoot hardware issues such as faulty cables, switches, or routers

  • Troubleshoot software issues li...read more

View 2 more answers

Q23. How do you insert or update data in a table?

Ans.

To insert or update data in a table, use SQL statements like INSERT INTO or UPDATE.

  • For inserting data, use the INSERT INTO statement followed by the table name and column names.

  • Specify the values to be inserted using the VALUES keyword.

  • For updating data, use the UPDATE statement followed by the table name.

  • Set the column values to be updated using the SET keyword.

  • Use conditions with the WHERE clause to specify which rows to update.

View 2 more answers

Q24. How do you recover a deleted user file or the /etc/passwd file?

Ans.

To recover a deleted user file or /etc/passwd, restore from backup or use data recovery tools.

  • Check if a backup of the file exists and restore it

  • If no backup is available, use data recovery tools like extundelete or scalpel

  • Stop writing to the disk immediately to prevent overwriting the deleted file

  • Consult with a professional if necessary

View 1 answer

Q25. What is your knowledge on devops tools. Explain me the most challenging use case that you have done.

Ans.

I have knowledge on various devops tools and have worked on challenging use cases such as implementing continuous integration and deployment pipelines using Jenkins and Docker.

  • Proficient in using Jenkins, Docker, Git, Ansible, and Kubernetes

  • Implemented CI/CD pipelines for multiple projects

  • Automated deployment process using Ansible and Kubernetes

  • Implemented containerization using Docker and Kubernetes

  • Implemented infrastructure as code using Terraform

  • Challenging use case: Setti...read more

Add your answer

Q26. How do you create a Kafka topic with a replication factor of 2?

Ans.

To create a Kafka topic with replication factor 2, use the command line tool or Kafka API.

  • Use the command line tool 'kafka-topics.sh' with the '--replication-factor' flag set to 2.

  • Alternatively, use the Kafka API to create a topic with a replication factor of 2.

  • Ensure that the number of brokers in the Kafka cluster is greater than or equal to the replication factor.

  • Consider setting the 'min.insync.replicas' configuration property to 2 to ensure that at least two replicas are ...read more

Add your answer

Q27. Introduction what do you mean SAP mm what is purchase order what is sub contracting vendor what moment type use in sub contracting, what is physical inventory

Ans.

SAP MM is a module that deals with material management. Purchase order is a document used to procure goods or services. Subcontracting vendor is a vendor who provides goods or services to a company. Movement types are used in sub-contracting to track the movement of goods. Physical inventory is a process of counting and verifying the inventory on hand.

  • SAP MM deals with material management

  • Purchase order is a document used to procure goods or services

  • Subcontracting vendor is a ...read more

Add your answer

Q28. How do you check the password status for any user?

Ans.

To check a user password status, use the 'passwd' command with the '-S' option followed by the username.

  • Open the terminal or command prompt.

  • Type 'passwd -S ' and press Enter.

  • The password status will be displayed, indicating if the password is locked, expired, or active.

View 1 answer

Q29. Design a system for railway ticket booking.

Ans.

Design a system for railway ticket booking

  • Create a user-friendly interface for booking tickets

  • Integrate payment gateway for secure transactions

  • Implement seat availability and reservation system

  • Include features for cancellation and refund

  • Develop a database to store user and ticket information

View 2 more answers

Q30. What modernizations have you implemented on Mainframes?

Ans.

Modernizations on Mainframes include migration to cloud, adoption of DevOps practices, and integration with modern technologies.

  • Migration of mainframe applications to cloud platforms like AWS or Azure

  • Adoption of DevOps practices for continuous integration and delivery

  • Integration of mainframe systems with modern technologies like APIs and microservices

  • Replacement of legacy mainframe applications with modern web or mobile applications

  • Implementation of modern security measures a...read more

View 1 answer

Q31. What is design thinking, have you ever communicated with developers, what do you do when you do not have enough information but the deadline is already near?

Ans.

Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.

  • Design thinking involves empathizing with users, defining the problem, ideating solutions, prototyping, and testing.

  • Yes, I have communicated with developers to understand technical aspects and constraints of the project.

  • When lacking information near a deadline, I prioritize the most critical aspects, communicate with stakeholders for clarification, an...read more

Add your answer

Q32. Write a Java program to find the highest odd number between 1 and 100.

Ans.

Program to find the highest odd number from 1-100 in Java

  • Loop through numbers 1-100

  • Check if the number is odd

  • If it is odd, check if it is greater than the current highest odd number

  • If it is, update the current highest odd number

  • Return the highest odd number

Add your answer

Q33. What architectural principles or methodologies do you know?

Ans.

Architectural principles and methodologies are fundamental concepts that guide the design and development of software systems.

  • Service-Oriented Architecture (SOA)

  • Microservices Architecture

  • Event-Driven Architecture (EDA)

  • Domain-Driven Design (DDD)

  • Layered Architecture

  • Component-Based Architecture

  • Model-View-Controller (MVC)

  • RESTful Architecture

  • Big Data Architecture

  • Cloud Computing Architecture

View 1 answer

Q34. How can we check group lists and the users assigned to them?

Ans.

To check group lists and assigned users, we can use the 'getent' command in Linux and Unix systems.

  • Use the 'getent group' command to list all the groups and their details

  • To check the users assigned to a specific group, use 'getent group '

  • The output will display the group name, group ID, and a list of users assigned to the group

View 1 answer

Q35. What is the difference between CDD and EDD?

Ans.

CDD is basic due diligence while EDD is enhanced due diligence.

  • CDD is a standard process of verifying the identity of a customer and assessing the risk associated with them.

  • EDD is a more thorough process that involves gathering additional information about the customer to mitigate higher risks.

  • CDD is typically used for low-risk customers while EDD is used for high-risk customers.

  • Examples of EDD include conducting background checks, reviewing financial statements, and obtainin...read more

View 1 answer

Q36. In C# --&gt; Abstraction, Interface , Abstract Method, Abstract Class, Polymorphisms, Encapsulation ,Inheritance, Serialization,

Ans.

C# concepts including abstraction, interface, abstract method, abstract class, polymorphism, encapsulation, inheritance, and serialization.

  • Abstraction: hiding implementation details

  • Interface: defining a contract for behavior

  • Abstract method: method without implementation

  • Abstract class: class with one or more abstract methods

  • Polymorphism: ability of objects to take on multiple forms

  • Encapsulation: bundling data and behavior together

  • Inheritance: creating new classes from existing...read more

Add your answer

Q37. How do you receive input, what are DDLC and SDLC, what style guides have you used for creating documents, how do you ensure accuracy in your document.

Ans.

I receive input through meetings and emails, DDLC is Document Development Life Cycle, SDLC is Software Development Life Cycle, I use APA and Chicago style guides, I ensure accuracy through thorough research and review.

  • Receive input through meetings with subject matter experts and stakeholders

  • DDLC (Document Development Life Cycle) is the process of creating, editing, and publishing documents

  • SDLC (Software Development Life Cycle) is the process of developing software from plann...read more

Add your answer

Q38. How can we create a mirror pool, and what is required for it?

Ans.

A mirror pool is a storage configuration that duplicates data across multiple drives for redundancy and improved performance.

  • A mirror pool is created using software RAID (Redundant Array of Independent Disks) technology.

  • It requires at least two drives to create a mirror pool.

  • The data written to one drive is automatically duplicated to the other drive in real-time.

  • If one drive fails, the data can still be accessed from the remaining drive.

  • Creating a mirror pool provides data r...read more

View 1 answer

Q39. Which accounts will be debited and credited when discounting?

Ans.

The account to be debited and credited at the time of discounting depends on the specific transaction and the parties involved.

  • In general, the account to be debited is the Discount Allowed account, which represents the expense incurred by the seller for providing the discount.

  • The account to be credited is typically the Accounts Receivable account, which represents the amount owed by the buyer for the discounted goods or services.

  • However, the specific accounts may vary dependi...read more

View 1 answer

Q40. What are the types of clouds?

Ans.

There are three types of clouds: public, private, and hybrid.

  • Public clouds are owned and operated by third-party providers, and the infrastructure is shared among multiple organizations.

  • Private clouds are dedicated to a single organization and can be located on-premises or hosted by a third-party provider.

  • Hybrid clouds combine public and private clouds, allowing organizations to take advantage of the benefits of both.

  • Examples of public clouds include Amazon Web Services (AWS)...read more

Add your answer

Q41. What were the challenges faced while do application migration on hybrid cloud? How to mitigate those things for successful delivery?

Ans.

Challenges in application migration on hybrid cloud and ways to mitigate them

  • Challenges include data security, network latency, and compatibility issues

  • Mitigation strategies include using encryption, optimizing network connectivity, and testing for compatibility

  • Proper planning and communication with stakeholders is crucial for successful delivery

Add your answer

Q42. Can you tell me the difference between a front-end developer and a back-end developer?

Ans.

Front end developers focus on the user interface and user experience, while backend developers handle the server-side logic and database management.

  • Front end developers work on the client-side of web development, creating the visual elements and interactions that users see and interact with.

  • They use languages like HTML, CSS, and JavaScript to build responsive and user-friendly websites.

  • Backend developers work on the server-side of web development, handling the behind-the-scen...read more

Add your answer

Q43. How can we check all information, destroy a pool, and get it back?

Ans.

To check all information destroy pool & get back them, we can use ZFS snapshots and clones.

  • ZFS snapshots and clones can be used to recover data from a destroyed pool.

  • Snapshots capture the state of the pool at a specific point in time.

  • Clones can be created from snapshots and mounted as a separate file system.

  • Data can be copied from the clone to the new pool.

  • It is important to regularly create snapshots to ensure data can be recovered in case of a disaster.

Add your answer

Q44. What is the use of Activity Creator?

Ans.

The activity creator is used to create instances of an activity class in Android development.

  • The activity creator is responsible for instantiating an activity class.

  • It is typically used when starting a new activity from another activity.

  • The activity creator can pass data to the new activity through intent extras.

  • It is commonly used in the onCreate() method of the calling activity.

  • Example: Intent intent = new Intent(this, SecondActivity.class); startActivity(intent);

View 2 more answers

Q45. Your total experience is 6+ in SQL and SSIS, but your relevant experience in Datastage is 3+, and already you are on a higher package as compared with 3 years Datastage developer, we might tak a pause here as y...

read more
Ans.

My experience in SQL and SSIS has prepared me well for Datastage development. I am confident in my ability to quickly learn and excel in this role.

  • My experience in SQL and SSIS has given me a strong foundation in data integration and ETL processes.

  • I have already demonstrated my ability to learn quickly and adapt to new technologies, as evidenced by my success in my current role.

  • I am eager to expand my skillset and take on new challenges in Datastage development.

  • I am open to d...read more

Add your answer

Q46. How do you determine the current working directory in Linux or Unix?

Ans.

To know the current directory in Linux/Unix, use the 'pwd' command.

  • Type 'pwd' in the terminal and press enter.

  • The output will show the full path of the current directory.

  • Alternatively, you can use 'echo $PWD' to display the current directory path.

  • The command 'ls' can also be used to list the contents of the current directory.

Add your answer

Q47. How can we attach and detach a disk from a normal and mirrored pool?

Ans.

To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.

  • To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'

  • To detach a disk from a normal pool, use 'zpool detach poolname device'

  • To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'

  • To detach a disk from a mirror pool, use 'zpool detach poolname mirror_device'

Add your answer

Q48. What performance enhancement practices have you followed when a system has hung or experienced intermittent freezing?

Ans.

To enhance performance during system hang or intermittent freezing, we follow these practices:

  • Analyze system logs to identify the root cause of the issue

  • Check system resources like CPU, memory, disk usage, etc.

  • Optimize database performance by tuning parameters and indexes

  • Implement SAP recommended notes and patches

  • Monitor system performance regularly to identify potential issues

  • Implement load balancing and clustering to distribute workload

  • Use SAP tools like ST12, ST13, ST14, e...read more

Add your answer

Q49. Given a string, how would you replace a specific substring with another string?

Ans.

To replace a sub-string in a string, use the replace() method.

  • Use the replace() method with the old sub-string and new sub-string as arguments.

  • The replace() method only replaces the first occurrence of the sub-string by default.

  • To replace all occurrences, use a regular expression with the global flag.

  • Example: 'hello world'.replace('world', 'universe') returns 'hello universe'.

  • Example: 'hello world'.replace(/world/g, 'universe') returns 'hello universe'.

View 1 answer

Q50. What is the difference between final, finalize, and finally?

Ans.

final, finalize and finally are three different keywords in Java with different meanings.

  • final is a keyword used to declare a constant variable.

  • finalize is a method used for garbage collection.

  • finally is a block used in exception handling to execute code regardless of whether an exception is thrown or not.

  • final and finally are not related in any way.

View 1 answer

Q51. What factors do you consider when determining profit or loss?

Ans.

Profit or loss is created by comparing revenue and expenses.

  • Profit is created when revenue exceeds expenses.

  • Loss is created when expenses exceed revenue.

  • Net income is calculated by subtracting expenses from revenue.

  • Profit and loss statement shows the financial performance of a company.

  • Profitability ratios like gross profit margin and net profit margin are used to analyze profit or loss.

  • Accrual accounting recognizes revenue and expenses when they are earned or incurred, while ...read more

Add your answer

Q52. How do you find and resolve a SOC7 abend error?

Ans.

S0C7 abend is a mainframe error caused by invalid data. It can be resolved by identifying the source of the error and correcting it.

  • S0C7 abend is caused by invalid data in a numeric field

  • To resolve it, identify the source of the error and correct it

  • Common causes include incorrect data types, invalid characters, and overflow

  • Debugging tools like IBM Debug Tool can help identify the source of the error

View 3 more answers

Q53. Name any four situations where we have to create a Bank Reconciliation Statement.

Ans.

Four situations where we have to create a Bank Reconciliation Statement

  • When there is a discrepancy between the bank balance and the company's books

  • When there are outstanding checks or deposits in transit

  • When there are bank errors or fees that need to be reconciled

  • When there are adjustments for interest earned or bank charges

Add your answer

Q54. Describe the entire POC process you followed while migrating your SAP On-Premise System to the Google Cloud Platform, including technical specifications, errors encountered, sizing, and output.

Ans.

Outlined POC process for migrating SAP On-Premise System to Google Cloud Platform

  • Analyzed current system and determined necessary resources for migration

  • Created a test environment to ensure compatibility and identify errors

  • Used Cloud Migration for SAP tool to migrate data and configurations

  • Encountered errors with network connectivity and resolved through troubleshooting

  • Monitored system performance and made necessary adjustments for optimal output

Add your answer

Q55. Big data Hadoop architecture and HDFS commands to copy and list files in hdfs spark architecture and Transformation and Action question what happen when we submit spark program spark dataframe coding question s...

read more
Ans.

Questions on big data, Hadoop, Spark, Scala, Git, project and Agile.

  • Hadoop architecture and HDFS commands for copying and listing files in HDFS

  • Spark architecture and Transformation and Action question

  • What happens when we submit a Spark program

  • Spark DataFrame coding question

  • Scala basic program on List

  • Git and Github

  • Project-related question

  • Agile-related

Add your answer

Q56. Are you willing to work on DevOps, Cloud, or Development tasks?

Ans.

Yes, I am capable of working in various roles such as DevOps, Cloud, and Development.

  • I have experience and skills in DevOps practices such as automation, CI/CD, and infrastructure as code.

  • I am proficient in cloud technologies like AWS, Azure, or Google Cloud Platform.

  • I have a strong background in software development with expertise in languages like Python, Java, or JavaScript.

Add your answer

Q57. If you are using CI/CD, define your stages and issues you faced.

Ans.

CICD stages include build, test, deploy, and monitor. Common issues include integration challenges and pipeline failures.

  • Stages: Build, Test, Deploy, Monitor

  • Issues: Integration challenges, Pipeline failures

  • Example: Integration challenges with third-party tools delaying deployment

Add your answer

Q58. How would you provide security to your credentials while using Terraform?

Ans.

Use encrypted variables, limit access to credentials, and utilize secure storage solutions.

  • Encrypt sensitive variables using tools like Vault or AWS KMS

  • Limit access to credentials by using least privilege principles

  • Store credentials securely in a password manager or key vault

  • Avoid hardcoding credentials in Terraform configuration files

Add your answer

Q59. What information should you expect to see when using the 'show interface type/member/module/number' command?

Ans.

The show interface command displays the status and statistics of a network interface.

  • Displays the interface type, member, module, and number

  • Shows the current status of the interface (up or down)

  • Displays the number of packets transmitted and received

  • Shows the number of errors and discards

  • Displays the speed and duplex settings of the interface

Add your answer

Q60. What will happen if I don't maintain an account modifier?

Ans.

Not maintaining account modifier can lead to incorrect financial reporting and accounting errors.

  • Account modifier is used to differentiate between different types of transactions in financial reporting.

  • If not maintained, it can lead to incorrect financial statements and accounting errors.

  • For example, if a company has multiple revenue streams, not maintaining account modifier can lead to revenue from different streams being reported together, leading to incorrect financial ana...read more

Add your answer

Q61. How do you scan a LUN and check the WWN number?

Ans.

To scan a LUN and check the wwn number, use the 'multipath' command.

  • Run 'multipath -ll' to list all the available LUNs and their wwn numbers.

  • To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).

  • Use 'multipath -v3' for verbose output and troubleshooting.

  • Ensure that the necessary drivers and modules are loaded for the storage device.

  • Check the system logs for any errors or warnings related to the LUN or storage d...read more

Add your answer

Q62. What is the administrative distance value of BGP, and what are the BGP states?

Ans.

BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.

  • BGP is used to exchange routing information between different autonomous systems (AS)

  • It allows for efficient routing decisions based on policies and network conditions

  • BGP states represent the different stages of establishing and maintaining BGP peering sessions

  • Examples of BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Establi...read more

View 2 more answers

Q63. Difference between standard order and rush order? How the delivery is created immediately in rush order, where are the controls?

Ans.

Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.

  • Standard orders have regular delivery times based on the company's standard processing and shipping times.

  • Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.

  • Controls for rush orders are usually set in the system, such as flagging the order as a rush order or assigning it to a specific t...read more

Add your answer

Q64. How do you secure system user management?

Ans.

To secure system security user management, follow best practices such as strong passwords, regular audits, limited privileges, and multi-factor authentication.

  • Enforce strong password policies

  • Regularly audit user accounts and access permissions

  • Implement least privilege principle

  • Enable multi-factor authentication

  • Disable unnecessary user accounts

  • Regularly update and patch the system

  • Implement intrusion detection and prevention systems

  • Encrypt sensitive data

  • Monitor system logs for ...read more

View 1 answer

Q65. What programming languages do you have knowledge of?

Ans.

I have knowledge in multiple programming languages.

  • Java

  • Python

  • C++

  • JavaScript

Add your answer

Q66. How does the process flow in a RESTful service?

Ans.

Restful service process flow involves client sending requests to server, which responds with data in a standardized format.

  • Client sends HTTP request to server

  • Server processes request and sends back HTTP response

  • Response is in a standardized format such as JSON or XML

  • Client can then use the response data as needed

View 2 more answers

Q67. How do you find a dynamic element on a page?

Ans.

Dynamic elements can be found using various methods such as inspecting the page source code, using browser developer tools, or using automation tools.

  • Inspect the page source code to identify dynamic elements that have unique attributes or IDs

  • Use browser developer tools to inspect the page and identify dynamic elements that change based on user interactions

  • Use automation tools such as Selenium to locate dynamic elements by using wait conditions or element locators

  • Examples of d...read more

View 2 more answers

Q68. What is the difference between partitioning and bucketing?

Ans.

Partitioning is dividing data into smaller chunks based on a column value. Bucketing is dividing data into equal-sized buckets based on a hash function.

  • Partitioning is used for organizing data for efficient querying and processing.

  • Bucketing is used for evenly distributing data across nodes in a cluster.

  • Partitioning is done based on a column value, such as date or region.

  • Bucketing is done based on a hash function, such as MD5 or SHA-1.

  • Partitioning can improve query performance...read more

View 1 answer

Q69. What is the role of a support engineer?

Ans.

A support engineer is responsible for providing technical assistance and resolving issues related to software or hardware systems.

  • Providing technical support to customers or end-users

  • Troubleshooting and resolving software or hardware issues

  • Installing, configuring, and maintaining systems

  • Monitoring system performance and identifying potential problems

  • Collaborating with development teams to address bugs or enhancements

  • Documenting support processes and creating knowledge base ar...read more

View 1 answer

Q70. In what scenarios can you identify that a HANA Database issue is caused by memory problems?

Ans.

HANA Database memory issue identification scenario

  • High memory consumption by HANA processes

  • Frequent garbage collection

  • Slow query performance

  • Out of memory errors in HANA logs

  • Memory-related alerts in HANA monitoring tools

Add your answer

Q71. Which methodologies have you worked on, such as Agile, Waterfall, or both?

Ans.

I have worked on both Agile and Waterfall methodologies.

  • I have experience in Agile methodologies such as Scrum and Kanban.

  • I have also worked on Waterfall methodology in projects that require a more structured approach.

  • I understand the strengths and weaknesses of both methodologies and can adapt to the project's needs.

  • For example, I used Agile methodology in a project that required frequent changes and iterations, while I used Waterfall methodology in a project that had a clea...read more

Add your answer

Q72. waterfall model in software development life cycle

Ans.

Waterfall model is a linear sequential approach to software development.

  • It follows a sequential flow from requirements gathering to testing and maintenance.

  • Each phase must be completed before moving on to the next.

  • Changes are difficult to implement once a phase is completed.

  • Suitable for projects with well-defined requirements and stable technology.

  • Examples include building a bridge or a physical product.

View 1 answer

Q73. How would you handle changing a storage bin if it is damaged?

Ans.

To change a damaged storage bin, follow these steps:

  • Remove any items stored in the bin

  • Inspect the bin for damage and determine if it can be repaired or needs to be replaced

  • If the bin can be repaired, fix the damage using appropriate tools and materials

  • If the bin needs to be replaced, remove it from its current location and dispose of it properly

  • Install the new bin in the same location and transfer the items back into it

Add your answer

Q74. Can we modify a user's password and username?

Ans.

Yes, as a Linux and Unix System Administrator, you can modify user passwords and names.

  • To modify a user's password, you can use the 'passwd' command followed by the username.

  • To modify a user's name, you can use the 'usermod' command followed by the username and the '-l' option to change the login name.

  • Make sure to have the necessary permissions to modify user information.

View 2 more answers

Q75. How do you check if a file is empty using JCL?

Ans.

Checking if a file is empty using JCL

  • Use the IDCAMS utility to check the file's status

  • Check the file's record count using the LISTCAT command

  • Use the SORT utility to check if the file has any records

  • Use the DFSORT utility to check if the file has any records

Add your answer

Q76. Which service is required for time synchronization, and how do you configure it?

Ans.

The service required for time sync is Network Time Protocol (NTP).

  • NTP is a protocol used to synchronize the clocks of computers over a network.

  • It ensures accurate timekeeping and consistency across systems.

  • To configure NTP, the administrator needs to specify NTP servers in the system's configuration file.

  • Examples of NTP servers are time.google.com, pool.ntp.org, etc.

  • The system periodically queries the NTP servers to adjust its clock accordingly.

View 1 answer

Q77. When should NoSQL databases such as Redis, Cassandra, and MongoDB be used, and when should they not be used?

Ans.

NoSQL databases like Redis, Cassandra, and MongoDB should be used when dealing with large amounts of unstructured data.

  • Use NoSQL databases when dealing with large amounts of unstructured data

  • Use NoSQL databases when scalability is a concern

  • Use NoSQL databases when flexibility is needed

  • Do not use NoSQL databases when dealing with structured data

  • Do not use NoSQL databases when ACID compliance is required

Add your answer

Q78. What is the difference between cache and persistent storage?

Ans.

Cache is temporary storage used to speed up access to frequently accessed data. Persistent storage is permanent storage used to store data even after power loss.

  • Cache is faster but smaller than persistent storage

  • Cache is volatile and data is lost when power is lost

  • Persistent storage is non-volatile and data is retained even after power loss

  • Examples of cache include CPU cache, browser cache, and CDN cache

  • Examples of persistent storage include hard disk drives, solid-state driv...read more

View 2 more answers

Q79. What is a network, and how many types are there?

Ans.

A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.

  • A LAN (Local Area Network) is a network that covers a small area, like a home or office.

  • A WAN (Wide Area Network) is a network that covers a large area, like a city or country.

  • A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like a city.

  • Other types of networks include WLAN (Wireless Loc...read more

Add your answer

Q80. What HANA performance improvements have you implemented?

Ans.

Implemented HANA table partitioning and index optimization resulting in 50% faster query performance.

  • Implemented table partitioning based on frequently accessed data

  • Optimized indexes to reduce data retrieval time

  • Tuned HANA parameters for better memory allocation

  • Reduced data footprint by archiving historical data

  • Implemented data compression to reduce storage requirements

View 1 answer

Q81. What optimization techniques did you use in your project?

Ans.

Optimization techniques used in project

  • Caching

  • Parallel processing

  • Compression

  • Indexing

  • Query optimization

Add your answer

Q82. What is the range of private IP addresses?

Ans.

The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.

  • Private IP addresses are used within private networks and are not routable on the internet.

  • The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.

  • Private IP addresses allow organizations to have multiple devices with the same IP addresses within their private ...read more

View 2 more answers

Q83. How do you monitor your application, and what configurations do you use?

Ans.

Application monitoring is done through various tools and configurations.

  • We use tools like Nagios, Zabbix, and Prometheus for monitoring.

  • We configure alerts for critical events and set up dashboards for easy visualization.

  • We also use log aggregation tools like ELK stack to monitor application logs.

  • We monitor system resources like CPU, memory, and disk usage.

  • We perform load testing to identify performance bottlenecks.

  • We use APM tools like New Relic and AppDynamics to monitor ap...read more

Add your answer

Q84. What is a purchase requisition?

Ans.

A purchase requisition is a document used to request goods or services from a supplier.

  • It is a formal request for procurement of goods or services.

  • It includes details such as quantity, description, and estimated cost.

  • It is typically initiated by a department or individual within an organization.

  • It is used to obtain approval for the purchase before it is made.

  • It is an important part of the procurement process.

  • Example: A department within a company needs to purchase new compute...read more

Add your answer

Q85. Describe the patch management process step by step.

Ans.

Patch management process involves identifying, testing, deploying, and verifying patches.

  • Identify vulnerabilities and available patches

  • Test patches in a non-production environment

  • Deploy patches to production systems

  • Verify successful patch installation and functionality

  • Monitor for any issues or new vulnerabilities

  • Repeat the process regularly

  • Use automation tools for efficiency

Add your answer

Q86. What are the different ways to pass data from one view controller to another?

Ans.

Data passing between view controllers can be done using properties, delegates, notifications, segues, or user defaults.

  • Use properties to directly pass data between view controllers

  • Implement delegates to establish communication between view controllers

  • Post notifications to broadcast data to multiple view controllers

  • Pass data through segues when transitioning between view controllers

  • Store data in user defaults for persistent data sharing

Add your answer

Q87. Cyclomatic Complexity in Salesforce

Ans.

Cyclomatic Complexity is a software metric that measures the complexity of a program based on its control flow.

  • Cyclomatic Complexity is calculated by counting the number of decision points in a program.

  • It helps in identifying complex code that may be difficult to understand, test, and maintain.

  • Higher Cyclomatic Complexity indicates higher risk and potential for bugs.

  • Reducing Cyclomatic Complexity can improve code quality and maintainability.

  • Salesforce provides tools like PMD ...read more

View 3 more answers

Q88. Which server and version are being used, and how do you configure the data source in WebLogic server?

Ans.

The server being used is WebLogic and the version is not specified. Data source can be configured through the console or configuration files.

  • WebLogic server is being used

  • Version is not specified

  • Data source can be configured through console or configuration files

Add your answer

Q89. What is a network printer and what are its functions?

Ans.

A network printer is a printer that is connected to a computer network and can be accessed by multiple users.

  • A network printer allows multiple users to print documents from different devices connected to the same network.

  • It eliminates the need for individual printers for each user or device.

  • Network printers can be wired or wireless, depending on the network setup.

  • They often have additional features like scanning, copying, and faxing capabilities.

  • Network printers can be manage...read more

View 2 more answers

Q90. Explain how you solve problems, including real-world examples from your experience.

Ans.

Problem-solving involves identifying, analyzing, and resolving issues to achieve desired outcomes.

  • Define the problem and gather information

  • Brainstorm potential solutions

  • Evaluate and select the best solution

  • Implement the solution and monitor its effectiveness

  • Adjust the solution as needed

  • Real experience story: During a project, we faced a challenge with a vendor who was not meeting our expectations. We defined the problem, gathered data, and brainstormed potential solutions. We...read more

Add your answer

Q91. How do you validate a purchase order?

Ans.

To validate a PO, check for accuracy, completeness, and compliance with procurement policies.

  • Verify that the PO number matches the one in the system

  • Ensure that the vendor information is correct

  • Check that the items ordered match the specifications and quantities requested

  • Confirm that the prices are accurate and in line with the budget

  • Ensure that the PO is authorized and approved by the appropriate personnel

  • Check that the delivery date and location are correct

  • Verify that the te...read more

Add your answer

Q92. What is your key strength that adds value?

Ans.

The main key strength that adds value is problem-solving skills.

  • Ability to analyze complex problems and come up with effective solutions

  • Critical thinking and logical reasoning skills

  • Creativity in finding innovative solutions

  • Adaptability to new technologies and frameworks

  • Strong communication skills to collaborate with team members and stakeholders

Add your answer

Q93. What is optional chaining and optional binding?

Ans.

Optional chaining and optional binding are techniques used in Swift programming language to safely unwrap optional values.

  • Optional chaining allows you to access properties, methods, and subscripts of an optional that might currently be nil.

  • Optional binding is a way to find out if an optional contains a value, and if so, to make that value available as a temporary constant or variable.

  • Optional chaining uses '?' while optional binding uses 'if let' or 'guard let'.

Add your answer

Q94. What is the difference between MVC, MVVM, and VIPER?

Ans.

MVC, MVVM, and VIPER are design patterns used in software development to separate concerns and improve code maintainability.

  • MVC stands for Model-View-Controller and separates an application into three components: Model (data), View (UI), and Controller (logic).

  • MVVM stands for Model-View-ViewModel and adds a ViewModel layer between the View and Model to handle user interactions and update the UI.

  • VIPER is an application architecture pattern that stands for View-Interactor-Prese...read more

Add your answer

Q95. How can Apache Kafka be used across multiple producers and consumers in a Kafka cluster?

Ans.

Apache Kafka can be used to enable communication between multiple producers and consumers across a Kafka cluster.

  • Producers can publish messages to specific topics in the Kafka cluster.

  • Consumers can subscribe to these topics and receive messages in real-time.

  • Kafka ensures fault tolerance and scalability by distributing data partitions across multiple brokers.

  • Producers and consumers can be distributed across different nodes in the Kafka cluster for load balancing.

  • Kafka's distri...read more

Add your answer

Q96. What type of application would you design to prevent online payment fraud?

Ans.

Design a multi-layered application using AI, encryption, and user verification to combat online payment fraud.

  • Implement AI-driven anomaly detection to identify unusual transaction patterns.

  • Use two-factor authentication (2FA) for user verification during transactions.

  • Incorporate end-to-end encryption to secure sensitive payment information.

  • Utilize machine learning algorithms to continuously improve fraud detection.

  • Provide real-time alerts to users for suspicious activities on ...read more

Add your answer

Q97. What is the difference between session method and call transaction?

Ans.

Session method and call transaction are two different ways of executing SAP transactions.

  • Session method executes a transaction in the same session as the calling program.

  • Call transaction executes a transaction in a separate session.

  • Session method is faster and more efficient as it does not require opening a new session.

  • Call transaction is useful when the transaction being executed has its own set of screens and requires user input.

  • Session method is used when the transaction b...read more

Add your answer

Q98. What troubleshooting steps would you take if you were unable to connect to a server?

Ans.

I will check network connectivity, firewall settings, and server status.

  • Check if the server is powered on and running

  • Verify network connectivity between the client and server

  • Check firewall settings to ensure the server is not blocked

  • Check if the server is reachable via ping or telnet

  • Check server logs for any errors or issues

  • Verify DNS settings are correct

Add your answer

Q99. How do you activate a Boot Environment backup?

Ans.

To activate Boot Environment back up, use the beadm command.

  • Use the beadm command with the activate option followed by the name of the Boot Environment.

  • For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.

  • This will make the Boot Environment the default one at the next system reboot.

Add your answer

Q100. What cutting-edge technologies are emerging in the IT industry?

Ans.

Emerging IT technologies include AI, quantum computing, blockchain, and edge computing, transforming industries and enhancing efficiency.

  • Artificial Intelligence (AI) - Enhancing automation and decision-making in sectors like finance and healthcare.

  • Quantum Computing - Promising exponential speedup for complex problem-solving, with companies like IBM and Google leading the charge.

  • Blockchain - Revolutionizing data security and transparency, particularly in finance and supply cha...read more

Add your answer
1
2
3
4
5
6
7

More about working at IBM

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Zee Learn

based on 1.9k interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 404 Interview Questions
3.9
 • 263 Interview Questions
3.6
 • 207 Interview Questions
3.2
 • 122 Interview Questions
3.5
 • 121 Interview Questions
4.0
 • 102 Interview Questions
View all
Top IBM Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter