IBM
700+ Zee Learn Interview Questions and Answers
Q1. Given a string or sentence, reverse it and replace the vowels with numbers from 1 to 9. In the reversed string, the replaced numbers should appear in descending order from left to right. If there are more than...
read moreReverse a string and replace vowels with numbers in descending order. Restart numbering if more than 9 vowels.
Reverse the given string using built-in functions or loops
Create a dictionary to map vowels to numbers from 1-9
Iterate through the reversed string and replace vowels with numbers from the dictionary
If there are more than 9 vowels, restart numbering from 1
Sort the replaced numbers in descending order from left to right
Q2. Star Pattern Problem Statement
Display the star pattern for a given positive integer N.
Example:
Input:
N = 4
Output:
*
***
*****
*******
Explanation:
The dots in the image represent spaces. Align the stars in...read more
Display a star pattern in a pyramid shape for a given positive integer N with spaces in between.
Start by printing spaces in decreasing order and stars in increasing order for each row
Use nested loops to handle spaces and stars accordingly
Consider the total number of characters in each row to maintain the pyramid shape
Q3. What is the difference between Comp-1 and Comp-3?
COMP and COMP-3 are data types used in COBOL programming language.
COMP is a binary data type that stores numeric values as binary integers.
COMP-3 is a packed decimal data type that stores numeric values as packed decimal digits.
COMP uses less storage space compared to COMP-3.
COMP-3 is more suitable for decimal arithmetic operations.
COMP-3 values are stored in a packed format, where each digit occupies half a byte.
COMP-3 values can represent both positive and negative numbers.
Q4. 1. Abstraction vs Inheritance 2. What is Garbage collector? 3. What is class loader? 4. Spring security 5. Scopes of bean 6. Wait , notify and notify all 7. Class level vs object level local 8. Arraylist vs Lin...
read moreJava interview questions covering topics like abstraction, inheritance, garbage collector, class loader, Spring security, bean scopes, wait-notify, class vs object level local, ArrayList vs LinkedList, Singleton class, and RestController vs Controller.
Abstraction focuses on hiding implementation details while inheritance allows a class to inherit properties and methods from another class.
Garbage collector is a program that automatically frees up memory by deleting objects tha...read more
Q5. Given two files, how would you eliminate duplicate entries and output the duplicates to another file?
To eliminate duplicates from 2 files and send them to another output file, we can use a combination of file reading, hashing, and file writing.
Read the contents of both files and store them in separate arrays or lists.
Create a hash table or dictionary to keep track of the unique elements in the arrays.
Iterate through the arrays and add each element to the hash table. If the element already exists, skip it.
Write the contents of the hash table to the output file.
If needed, writ...read more
Q6. Tell me how to write ansible playbooks and how would you define a CI/CD pipeline. What tools can you use for pipeline creation and how it works.
Ansible playbooks automate configuration management. CI/CD pipeline automates software delivery. Tools include Jenkins, GitLab, and Travis CI.
Ansible playbooks are written in YAML format and define tasks to be executed on remote hosts.
CI/CD pipeline automates the software delivery process from code commit to production deployment.
Tools for pipeline creation include Jenkins, GitLab, Travis CI, and CircleCI.
Pipeline creation involves defining stages, jobs, and triggers to autom...read more
Q7. How do you check that all ports are connected to your computer and power supply or system configuration?
To check all connected ports and power supply, use commands like lsusb, lspci, lshw, and check power cables and system configuration.
Use lsusb command to list USB devices connected to the computer
Use lspci command to list PCI devices connected to the computer
Use lshw command to list detailed hardware information
Physically check power cables and connections
Verify system configuration settings
Q8. What is inheritance and what are their types? Explain them.
Inheritance is a mechanism in object-oriented programming where a new class is derived from an existing class.
It allows the new class to inherit the properties and methods of the existing class.
There are two types of inheritance: single and multiple.
Single inheritance is when a class inherits from only one parent class.
Multiple inheritance is when a class inherits from multiple parent classes.
For example, a class 'Car' can inherit from a parent class 'Vehicle' which has prope...read more
Q9. How do you handle data skewness in Spark?
Data skewness in Spark can be handled by partitioning, bucketing, or using salting techniques.
Partitioning the data based on a key column can distribute the data evenly across the nodes.
Bucketing can group the data into buckets based on a key column, which can improve join performance.
Salting involves adding a random prefix to the key column, which can distribute the data evenly.
Using broadcast joins for small tables can also help in reducing skewness.
Using dynamic allocation...read more
Q10. What details would you share with a supplier to get a quote?
The details to share with the supplier for a quote
Product specifications
Quantity required
Delivery timeline
Quality standards
Payment terms
Any specific packaging or labeling requirements
Any applicable certifications or regulatory compliance
Expected pricing or budget constraints
Q11. What do you know about Ariba, and how does it differ from other Procurement Tools?
Ariba is a procurement tool that offers a comprehensive suite of solutions for procurement processes.
Ariba provides end-to-end procurement solutions, including sourcing, contract management, supplier management, and procurement analytics.
It offers a cloud-based platform that allows for easy collaboration between buyers and suppliers.
Ariba's network connects millions of buyers and suppliers globally, enabling efficient procurement processes.
The tool provides real-time visibili...read more
Q12. What do you know about DITA XML, which tags have you used in your documents, what are keywords, and what is DITA mapping, have you ever created graphics or illustrations, types of DITA topics, benefits of DITA,...
read moreDITA XML is a structured content standard used for creating technical documentation.
DITA XML is a structured content standard for technical documentation
Commonly used tags include <topic>, <title>, <body>, <section>
Keywords are used to categorize content for easy retrieval
DITA mapping is the process of linking topics together in a hierarchy
Graphics and illustrations can be created and included in DITA documents
Types of DITA topics include concept, task, reference
Benefits of D...read more
Matching orientations based on suggested rotation degrees.
Calculate the difference between the current orientation and the suggested rotation degrees.
Apply the necessary rotation to match the orientations.
Consider the direction of rotation (clockwise or counterclockwise).
Q14. How can you check if the Facebook server is up without opening a browser or the app?
Use command line tools like ping or curl to check server status.
Use ping command to check if server is reachable
Use curl command to check if server is responding with HTTP status code 200
Use telnet command to check if server is listening on a specific port
Use monitoring tools like Nagios or Zabbix to automate server status checks
Q15. What are polymorphism, abstraction, and encapsulation?
Polymorphism, abstraction, and encapsulation are three fundamental concepts in object-oriented programming.
Polymorphism allows objects of different classes to be treated as if they are objects of the same class.
Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.
Encapsulation is the practice of keeping the internal workings of an object hidden from the outside world.
Examples of polymorphism include method ...read more
Q16. How many ways can data be passed from JCL to a COBOL program?
Data can pass from JCL to COBOL program in multiple ways, such as through input files, system symbols, and program parameters.
Input files: Data can be passed to a COBOL program through input files specified in the JCL.
System symbols: JCL can define system symbols that can be accessed by the COBOL program to retrieve data.
Program parameters: JCL can pass parameters to the COBOL program, which can be used to receive data.
Environment variables: JCL can set environment variables ...read more
Q17. What are the causes of a blue screen error?
A blue screen error can be caused by various factors such as hardware issues, driver conflicts, and software errors.
Hardware issues like faulty RAM or overheating can cause blue screen errors.
Driver conflicts occur when incompatible or outdated drivers are installed.
Software errors, such as corrupted system files or incompatible applications, can also lead to blue screen errors.
Q18. How can you retrieve distinct data without using the DISTINCT keyword?
To get distinct data without using distinct keyword, use GROUP BY clause.
Use GROUP BY clause with the column name to group the data by that column.
Use aggregate functions like COUNT, SUM, AVG, etc. to get the desired result.
Example: SELECT column_name FROM table_name GROUP BY column_name;
Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;
Q19. What is debit, credit, inventory, debit note credit note suspense account ect..
Debit and credit are accounting terms used to record financial transactions. Inventory is the stock of goods a company has on hand.
Debit is an entry on the left side of an account, while credit is an entry on the right side of an account.
Inventory is the stock of goods a company has on hand and is recorded as an asset on the balance sheet.
A debit note is a document used to inform a vendor of a debit made to their account.
A credit note is a document used to inform a vendor of ...read more
Q20. How do you check data set and mount point information in a human-readable format?
To check data set & mount point info in human readable format, use the 'df' command.
Open the terminal and type 'df -h' to display the information in human-readable format.
The 'df' command shows the file system disk space usage, including the mount point and file system type.
The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.
You can also use the 'mount' command to display the mounted file systems a...read more
Q21. What do you understand about TAT, and how is it useful?
TAT stands for Turnaround Time. It refers to the time taken to complete a process or task.
TAT is a measure of efficiency and productivity.
It helps in setting realistic expectations and deadlines.
TAT is crucial in customer service to ensure timely delivery of products or services.
For example, in IT operations, TAT can be used to measure the time taken to resolve technical issues.
TAT can also be used to track the time taken to process and approve operational requests.
Q22. How do you identify network errors, and what methods do you use to rectify them?
To identify network errors, monitor network performance, analyze logs, use network troubleshooting tools, and rectify them by troubleshooting hardware, software, or configuration issues.
Monitor network performance to identify any anomalies or issues
Analyze network logs for error messages or patterns
Use network troubleshooting tools like ping, traceroute, or network analyzers
Troubleshoot hardware issues such as faulty cables, switches, or routers
Troubleshoot software issues li...read more
Q23. How do you insert or update data in a table?
To insert or update data in a table, use SQL statements like INSERT INTO or UPDATE.
For inserting data, use the INSERT INTO statement followed by the table name and column names.
Specify the values to be inserted using the VALUES keyword.
For updating data, use the UPDATE statement followed by the table name.
Set the column values to be updated using the SET keyword.
Use conditions with the WHERE clause to specify which rows to update.
Q24. How do you recover a deleted user file or the /etc/passwd file?
To recover a deleted user file or /etc/passwd, restore from backup or use data recovery tools.
Check if a backup of the file exists and restore it
If no backup is available, use data recovery tools like extundelete or scalpel
Stop writing to the disk immediately to prevent overwriting the deleted file
Consult with a professional if necessary
Q25. What is your knowledge on devops tools. Explain me the most challenging use case that you have done.
I have knowledge on various devops tools and have worked on challenging use cases such as implementing continuous integration and deployment pipelines using Jenkins and Docker.
Proficient in using Jenkins, Docker, Git, Ansible, and Kubernetes
Implemented CI/CD pipelines for multiple projects
Automated deployment process using Ansible and Kubernetes
Implemented containerization using Docker and Kubernetes
Implemented infrastructure as code using Terraform
Challenging use case: Setti...read more
Q26. How do you create a Kafka topic with a replication factor of 2?
To create a Kafka topic with replication factor 2, use the command line tool or Kafka API.
Use the command line tool 'kafka-topics.sh' with the '--replication-factor' flag set to 2.
Alternatively, use the Kafka API to create a topic with a replication factor of 2.
Ensure that the number of brokers in the Kafka cluster is greater than or equal to the replication factor.
Consider setting the 'min.insync.replicas' configuration property to 2 to ensure that at least two replicas are ...read more
Q27. Introduction what do you mean SAP mm what is purchase order what is sub contracting vendor what moment type use in sub contracting, what is physical inventory
SAP MM is a module that deals with material management. Purchase order is a document used to procure goods or services. Subcontracting vendor is a vendor who provides goods or services to a company. Movement types are used in sub-contracting to track the movement of goods. Physical inventory is a process of counting and verifying the inventory on hand.
SAP MM deals with material management
Purchase order is a document used to procure goods or services
Subcontracting vendor is a ...read more
Q28. How do you check the password status for any user?
To check a user password status, use the 'passwd' command with the '-S' option followed by the username.
Open the terminal or command prompt.
Type 'passwd -S
' and press Enter. The password status will be displayed, indicating if the password is locked, expired, or active.
Q29. Design a system for railway ticket booking.
Design a system for railway ticket booking
Create a user-friendly interface for booking tickets
Integrate payment gateway for secure transactions
Implement seat availability and reservation system
Include features for cancellation and refund
Develop a database to store user and ticket information
Q30. What modernizations have you implemented on Mainframes?
Modernizations on Mainframes include migration to cloud, adoption of DevOps practices, and integration with modern technologies.
Migration of mainframe applications to cloud platforms like AWS or Azure
Adoption of DevOps practices for continuous integration and delivery
Integration of mainframe systems with modern technologies like APIs and microservices
Replacement of legacy mainframe applications with modern web or mobile applications
Implementation of modern security measures a...read more
Q31. What is design thinking, have you ever communicated with developers, what do you do when you do not have enough information but the deadline is already near?
Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.
Design thinking involves empathizing with users, defining the problem, ideating solutions, prototyping, and testing.
Yes, I have communicated with developers to understand technical aspects and constraints of the project.
When lacking information near a deadline, I prioritize the most critical aspects, communicate with stakeholders for clarification, an...read more
Q32. Write a Java program to find the highest odd number between 1 and 100.
Program to find the highest odd number from 1-100 in Java
Loop through numbers 1-100
Check if the number is odd
If it is odd, check if it is greater than the current highest odd number
If it is, update the current highest odd number
Return the highest odd number
Q33. What architectural principles or methodologies do you know?
Architectural principles and methodologies are fundamental concepts that guide the design and development of software systems.
Service-Oriented Architecture (SOA)
Microservices Architecture
Event-Driven Architecture (EDA)
Domain-Driven Design (DDD)
Layered Architecture
Component-Based Architecture
Model-View-Controller (MVC)
RESTful Architecture
Big Data Architecture
Cloud Computing Architecture
Q34. How can we check group lists and the users assigned to them?
To check group lists and assigned users, we can use the 'getent' command in Linux and Unix systems.
Use the 'getent group' command to list all the groups and their details
To check the users assigned to a specific group, use 'getent group
' The output will display the group name, group ID, and a list of users assigned to the group
Q35. What is the difference between CDD and EDD?
CDD is basic due diligence while EDD is enhanced due diligence.
CDD is a standard process of verifying the identity of a customer and assessing the risk associated with them.
EDD is a more thorough process that involves gathering additional information about the customer to mitigate higher risks.
CDD is typically used for low-risk customers while EDD is used for high-risk customers.
Examples of EDD include conducting background checks, reviewing financial statements, and obtainin...read more
Q36. In C# --> Abstraction, Interface , Abstract Method, Abstract Class, Polymorphisms, Encapsulation ,Inheritance, Serialization,
C# concepts including abstraction, interface, abstract method, abstract class, polymorphism, encapsulation, inheritance, and serialization.
Abstraction: hiding implementation details
Interface: defining a contract for behavior
Abstract method: method without implementation
Abstract class: class with one or more abstract methods
Polymorphism: ability of objects to take on multiple forms
Encapsulation: bundling data and behavior together
Inheritance: creating new classes from existing...read more
Q37. How do you receive input, what are DDLC and SDLC, what style guides have you used for creating documents, how do you ensure accuracy in your document.
I receive input through meetings and emails, DDLC is Document Development Life Cycle, SDLC is Software Development Life Cycle, I use APA and Chicago style guides, I ensure accuracy through thorough research and review.
Receive input through meetings with subject matter experts and stakeholders
DDLC (Document Development Life Cycle) is the process of creating, editing, and publishing documents
SDLC (Software Development Life Cycle) is the process of developing software from plann...read more
Q38. How can we create a mirror pool, and what is required for it?
A mirror pool is a storage configuration that duplicates data across multiple drives for redundancy and improved performance.
A mirror pool is created using software RAID (Redundant Array of Independent Disks) technology.
It requires at least two drives to create a mirror pool.
The data written to one drive is automatically duplicated to the other drive in real-time.
If one drive fails, the data can still be accessed from the remaining drive.
Creating a mirror pool provides data r...read more
Q39. Which accounts will be debited and credited when discounting?
The account to be debited and credited at the time of discounting depends on the specific transaction and the parties involved.
In general, the account to be debited is the Discount Allowed account, which represents the expense incurred by the seller for providing the discount.
The account to be credited is typically the Accounts Receivable account, which represents the amount owed by the buyer for the discounted goods or services.
However, the specific accounts may vary dependi...read more
Q40. What are the types of clouds?
There are three types of clouds: public, private, and hybrid.
Public clouds are owned and operated by third-party providers, and the infrastructure is shared among multiple organizations.
Private clouds are dedicated to a single organization and can be located on-premises or hosted by a third-party provider.
Hybrid clouds combine public and private clouds, allowing organizations to take advantage of the benefits of both.
Examples of public clouds include Amazon Web Services (AWS)...read more
Q41. What were the challenges faced while do application migration on hybrid cloud? How to mitigate those things for successful delivery?
Challenges in application migration on hybrid cloud and ways to mitigate them
Challenges include data security, network latency, and compatibility issues
Mitigation strategies include using encryption, optimizing network connectivity, and testing for compatibility
Proper planning and communication with stakeholders is crucial for successful delivery
Q42. Can you tell me the difference between a front-end developer and a back-end developer?
Front end developers focus on the user interface and user experience, while backend developers handle the server-side logic and database management.
Front end developers work on the client-side of web development, creating the visual elements and interactions that users see and interact with.
They use languages like HTML, CSS, and JavaScript to build responsive and user-friendly websites.
Backend developers work on the server-side of web development, handling the behind-the-scen...read more
Q43. How can we check all information, destroy a pool, and get it back?
To check all information destroy pool & get back them, we can use ZFS snapshots and clones.
ZFS snapshots and clones can be used to recover data from a destroyed pool.
Snapshots capture the state of the pool at a specific point in time.
Clones can be created from snapshots and mounted as a separate file system.
Data can be copied from the clone to the new pool.
It is important to regularly create snapshots to ensure data can be recovered in case of a disaster.
Q44. What is the use of Activity Creator?
The activity creator is used to create instances of an activity class in Android development.
The activity creator is responsible for instantiating an activity class.
It is typically used when starting a new activity from another activity.
The activity creator can pass data to the new activity through intent extras.
It is commonly used in the onCreate() method of the calling activity.
Example: Intent intent = new Intent(this, SecondActivity.class); startActivity(intent);
Q45. Your total experience is 6+ in SQL and SSIS, but your relevant experience in Datastage is 3+, and already you are on a higher package as compared with 3 years Datastage developer, we might tak a pause here as y...
read moreMy experience in SQL and SSIS has prepared me well for Datastage development. I am confident in my ability to quickly learn and excel in this role.
My experience in SQL and SSIS has given me a strong foundation in data integration and ETL processes.
I have already demonstrated my ability to learn quickly and adapt to new technologies, as evidenced by my success in my current role.
I am eager to expand my skillset and take on new challenges in Datastage development.
I am open to d...read more
Q46. How do you determine the current working directory in Linux or Unix?
To know the current directory in Linux/Unix, use the 'pwd' command.
Type 'pwd' in the terminal and press enter.
The output will show the full path of the current directory.
Alternatively, you can use 'echo $PWD' to display the current directory path.
The command 'ls' can also be used to list the contents of the current directory.
Q47. How can we attach and detach a disk from a normal and mirrored pool?
To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.
To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'
To detach a disk from a normal pool, use 'zpool detach poolname device'
To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'
To detach a disk from a mirror pool, use 'zpool detach poolname mirror_device'
Q48. What performance enhancement practices have you followed when a system has hung or experienced intermittent freezing?
To enhance performance during system hang or intermittent freezing, we follow these practices:
Analyze system logs to identify the root cause of the issue
Check system resources like CPU, memory, disk usage, etc.
Optimize database performance by tuning parameters and indexes
Implement SAP recommended notes and patches
Monitor system performance regularly to identify potential issues
Implement load balancing and clustering to distribute workload
Use SAP tools like ST12, ST13, ST14, e...read more
Q49. Given a string, how would you replace a specific substring with another string?
To replace a sub-string in a string, use the replace() method.
Use the replace() method with the old sub-string and new sub-string as arguments.
The replace() method only replaces the first occurrence of the sub-string by default.
To replace all occurrences, use a regular expression with the global flag.
Example: 'hello world'.replace('world', 'universe') returns 'hello universe'.
Example: 'hello world'.replace(/world/g, 'universe') returns 'hello universe'.
Q50. What is the difference between final, finalize, and finally?
final, finalize and finally are three different keywords in Java with different meanings.
final is a keyword used to declare a constant variable.
finalize is a method used for garbage collection.
finally is a block used in exception handling to execute code regardless of whether an exception is thrown or not.
final and finally are not related in any way.
Q51. What factors do you consider when determining profit or loss?
Profit or loss is created by comparing revenue and expenses.
Profit is created when revenue exceeds expenses.
Loss is created when expenses exceed revenue.
Net income is calculated by subtracting expenses from revenue.
Profit and loss statement shows the financial performance of a company.
Profitability ratios like gross profit margin and net profit margin are used to analyze profit or loss.
Accrual accounting recognizes revenue and expenses when they are earned or incurred, while ...read more
Q52. How do you find and resolve a SOC7 abend error?
S0C7 abend is a mainframe error caused by invalid data. It can be resolved by identifying the source of the error and correcting it.
S0C7 abend is caused by invalid data in a numeric field
To resolve it, identify the source of the error and correct it
Common causes include incorrect data types, invalid characters, and overflow
Debugging tools like IBM Debug Tool can help identify the source of the error
Q53. Name any four situations where we have to create a Bank Reconciliation Statement.
Four situations where we have to create a Bank Reconciliation Statement
When there is a discrepancy between the bank balance and the company's books
When there are outstanding checks or deposits in transit
When there are bank errors or fees that need to be reconciled
When there are adjustments for interest earned or bank charges
Q54. Describe the entire POC process you followed while migrating your SAP On-Premise System to the Google Cloud Platform, including technical specifications, errors encountered, sizing, and output.
Outlined POC process for migrating SAP On-Premise System to Google Cloud Platform
Analyzed current system and determined necessary resources for migration
Created a test environment to ensure compatibility and identify errors
Used Cloud Migration for SAP tool to migrate data and configurations
Encountered errors with network connectivity and resolved through troubleshooting
Monitored system performance and made necessary adjustments for optimal output
Q55. Big data Hadoop architecture and HDFS commands to copy and list files in hdfs spark architecture and Transformation and Action question what happen when we submit spark program spark dataframe coding question s...
read moreQuestions on big data, Hadoop, Spark, Scala, Git, project and Agile.
Hadoop architecture and HDFS commands for copying and listing files in HDFS
Spark architecture and Transformation and Action question
What happens when we submit a Spark program
Spark DataFrame coding question
Scala basic program on List
Git and Github
Project-related question
Agile-related
Q56. Are you willing to work on DevOps, Cloud, or Development tasks?
Yes, I am capable of working in various roles such as DevOps, Cloud, and Development.
I have experience and skills in DevOps practices such as automation, CI/CD, and infrastructure as code.
I am proficient in cloud technologies like AWS, Azure, or Google Cloud Platform.
I have a strong background in software development with expertise in languages like Python, Java, or JavaScript.
Q57. If you are using CI/CD, define your stages and issues you faced.
CICD stages include build, test, deploy, and monitor. Common issues include integration challenges and pipeline failures.
Stages: Build, Test, Deploy, Monitor
Issues: Integration challenges, Pipeline failures
Example: Integration challenges with third-party tools delaying deployment
Q58. How would you provide security to your credentials while using Terraform?
Use encrypted variables, limit access to credentials, and utilize secure storage solutions.
Encrypt sensitive variables using tools like Vault or AWS KMS
Limit access to credentials by using least privilege principles
Store credentials securely in a password manager or key vault
Avoid hardcoding credentials in Terraform configuration files
Q59. What information should you expect to see when using the 'show interface type/member/module/number' command?
The show interface command displays the status and statistics of a network interface.
Displays the interface type, member, module, and number
Shows the current status of the interface (up or down)
Displays the number of packets transmitted and received
Shows the number of errors and discards
Displays the speed and duplex settings of the interface
Q60. What will happen if I don't maintain an account modifier?
Not maintaining account modifier can lead to incorrect financial reporting and accounting errors.
Account modifier is used to differentiate between different types of transactions in financial reporting.
If not maintained, it can lead to incorrect financial statements and accounting errors.
For example, if a company has multiple revenue streams, not maintaining account modifier can lead to revenue from different streams being reported together, leading to incorrect financial ana...read more
Q61. How do you scan a LUN and check the WWN number?
To scan a LUN and check the wwn number, use the 'multipath' command.
Run 'multipath -ll' to list all the available LUNs and their wwn numbers.
To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).
Use 'multipath -v3' for verbose output and troubleshooting.
Ensure that the necessary drivers and modules are loaded for the storage device.
Check the system logs for any errors or warnings related to the LUN or storage d...read more
Q62. What is the administrative distance value of BGP, and what are the BGP states?
BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.
BGP is used to exchange routing information between different autonomous systems (AS)
It allows for efficient routing decisions based on policies and network conditions
BGP states represent the different stages of establishing and maintaining BGP peering sessions
Examples of BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Establi...read more
Q63. Difference between standard order and rush order? How the delivery is created immediately in rush order, where are the controls?
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging the order as a rush order or assigning it to a specific t...read more
Q64. How do you secure system user management?
To secure system security user management, follow best practices such as strong passwords, regular audits, limited privileges, and multi-factor authentication.
Enforce strong password policies
Regularly audit user accounts and access permissions
Implement least privilege principle
Enable multi-factor authentication
Disable unnecessary user accounts
Regularly update and patch the system
Implement intrusion detection and prevention systems
Encrypt sensitive data
Monitor system logs for ...read more
Q65. What programming languages do you have knowledge of?
I have knowledge in multiple programming languages.
Java
Python
C++
JavaScript
Q66. How does the process flow in a RESTful service?
Restful service process flow involves client sending requests to server, which responds with data in a standardized format.
Client sends HTTP request to server
Server processes request and sends back HTTP response
Response is in a standardized format such as JSON or XML
Client can then use the response data as needed
Q67. How do you find a dynamic element on a page?
Dynamic elements can be found using various methods such as inspecting the page source code, using browser developer tools, or using automation tools.
Inspect the page source code to identify dynamic elements that have unique attributes or IDs
Use browser developer tools to inspect the page and identify dynamic elements that change based on user interactions
Use automation tools such as Selenium to locate dynamic elements by using wait conditions or element locators
Examples of d...read more
Q68. What is the difference between partitioning and bucketing?
Partitioning is dividing data into smaller chunks based on a column value. Bucketing is dividing data into equal-sized buckets based on a hash function.
Partitioning is used for organizing data for efficient querying and processing.
Bucketing is used for evenly distributing data across nodes in a cluster.
Partitioning is done based on a column value, such as date or region.
Bucketing is done based on a hash function, such as MD5 or SHA-1.
Partitioning can improve query performance...read more
Q69. What is the role of a support engineer?
A support engineer is responsible for providing technical assistance and resolving issues related to software or hardware systems.
Providing technical support to customers or end-users
Troubleshooting and resolving software or hardware issues
Installing, configuring, and maintaining systems
Monitoring system performance and identifying potential problems
Collaborating with development teams to address bugs or enhancements
Documenting support processes and creating knowledge base ar...read more
Q70. In what scenarios can you identify that a HANA Database issue is caused by memory problems?
HANA Database memory issue identification scenario
High memory consumption by HANA processes
Frequent garbage collection
Slow query performance
Out of memory errors in HANA logs
Memory-related alerts in HANA monitoring tools
Q71. Which methodologies have you worked on, such as Agile, Waterfall, or both?
I have worked on both Agile and Waterfall methodologies.
I have experience in Agile methodologies such as Scrum and Kanban.
I have also worked on Waterfall methodology in projects that require a more structured approach.
I understand the strengths and weaknesses of both methodologies and can adapt to the project's needs.
For example, I used Agile methodology in a project that required frequent changes and iterations, while I used Waterfall methodology in a project that had a clea...read more
Q72. waterfall model in software development life cycle
Waterfall model is a linear sequential approach to software development.
It follows a sequential flow from requirements gathering to testing and maintenance.
Each phase must be completed before moving on to the next.
Changes are difficult to implement once a phase is completed.
Suitable for projects with well-defined requirements and stable technology.
Examples include building a bridge or a physical product.
Q73. How would you handle changing a storage bin if it is damaged?
To change a damaged storage bin, follow these steps:
Remove any items stored in the bin
Inspect the bin for damage and determine if it can be repaired or needs to be replaced
If the bin can be repaired, fix the damage using appropriate tools and materials
If the bin needs to be replaced, remove it from its current location and dispose of it properly
Install the new bin in the same location and transfer the items back into it
Q74. Can we modify a user's password and username?
Yes, as a Linux and Unix System Administrator, you can modify user passwords and names.
To modify a user's password, you can use the 'passwd' command followed by the username.
To modify a user's name, you can use the 'usermod' command followed by the username and the '-l' option to change the login name.
Make sure to have the necessary permissions to modify user information.
Q75. How do you check if a file is empty using JCL?
Checking if a file is empty using JCL
Use the IDCAMS utility to check the file's status
Check the file's record count using the LISTCAT command
Use the SORT utility to check if the file has any records
Use the DFSORT utility to check if the file has any records
Q76. Which service is required for time synchronization, and how do you configure it?
The service required for time sync is Network Time Protocol (NTP).
NTP is a protocol used to synchronize the clocks of computers over a network.
It ensures accurate timekeeping and consistency across systems.
To configure NTP, the administrator needs to specify NTP servers in the system's configuration file.
Examples of NTP servers are time.google.com, pool.ntp.org, etc.
The system periodically queries the NTP servers to adjust its clock accordingly.
Q77. When should NoSQL databases such as Redis, Cassandra, and MongoDB be used, and when should they not be used?
NoSQL databases like Redis, Cassandra, and MongoDB should be used when dealing with large amounts of unstructured data.
Use NoSQL databases when dealing with large amounts of unstructured data
Use NoSQL databases when scalability is a concern
Use NoSQL databases when flexibility is needed
Do not use NoSQL databases when dealing with structured data
Do not use NoSQL databases when ACID compliance is required
Q78. What is the difference between cache and persistent storage?
Cache is temporary storage used to speed up access to frequently accessed data. Persistent storage is permanent storage used to store data even after power loss.
Cache is faster but smaller than persistent storage
Cache is volatile and data is lost when power is lost
Persistent storage is non-volatile and data is retained even after power loss
Examples of cache include CPU cache, browser cache, and CDN cache
Examples of persistent storage include hard disk drives, solid-state driv...read more
Q79. What is a network, and how many types are there?
A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.
A LAN (Local Area Network) is a network that covers a small area, like a home or office.
A WAN (Wide Area Network) is a network that covers a large area, like a city or country.
A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like a city.
Other types of networks include WLAN (Wireless Loc...read more
Q80. What HANA performance improvements have you implemented?
Implemented HANA table partitioning and index optimization resulting in 50% faster query performance.
Implemented table partitioning based on frequently accessed data
Optimized indexes to reduce data retrieval time
Tuned HANA parameters for better memory allocation
Reduced data footprint by archiving historical data
Implemented data compression to reduce storage requirements
Q81. What optimization techniques did you use in your project?
Optimization techniques used in project
Caching
Parallel processing
Compression
Indexing
Query optimization
Q82. What is the range of private IP addresses?
The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
Private IP addresses are used within private networks and are not routable on the internet.
The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.
Private IP addresses allow organizations to have multiple devices with the same IP addresses within their private ...read more
Q83. How do you monitor your application, and what configurations do you use?
Application monitoring is done through various tools and configurations.
We use tools like Nagios, Zabbix, and Prometheus for monitoring.
We configure alerts for critical events and set up dashboards for easy visualization.
We also use log aggregation tools like ELK stack to monitor application logs.
We monitor system resources like CPU, memory, and disk usage.
We perform load testing to identify performance bottlenecks.
We use APM tools like New Relic and AppDynamics to monitor ap...read more
Q84. What is a purchase requisition?
A purchase requisition is a document used to request goods or services from a supplier.
It is a formal request for procurement of goods or services.
It includes details such as quantity, description, and estimated cost.
It is typically initiated by a department or individual within an organization.
It is used to obtain approval for the purchase before it is made.
It is an important part of the procurement process.
Example: A department within a company needs to purchase new compute...read more
Q85. Describe the patch management process step by step.
Patch management process involves identifying, testing, deploying, and verifying patches.
Identify vulnerabilities and available patches
Test patches in a non-production environment
Deploy patches to production systems
Verify successful patch installation and functionality
Monitor for any issues or new vulnerabilities
Repeat the process regularly
Use automation tools for efficiency
Q86. What are the different ways to pass data from one view controller to another?
Data passing between view controllers can be done using properties, delegates, notifications, segues, or user defaults.
Use properties to directly pass data between view controllers
Implement delegates to establish communication between view controllers
Post notifications to broadcast data to multiple view controllers
Pass data through segues when transitioning between view controllers
Store data in user defaults for persistent data sharing
Q87. Cyclomatic Complexity in Salesforce
Cyclomatic Complexity is a software metric that measures the complexity of a program based on its control flow.
Cyclomatic Complexity is calculated by counting the number of decision points in a program.
It helps in identifying complex code that may be difficult to understand, test, and maintain.
Higher Cyclomatic Complexity indicates higher risk and potential for bugs.
Reducing Cyclomatic Complexity can improve code quality and maintainability.
Salesforce provides tools like PMD ...read more
Q88. Which server and version are being used, and how do you configure the data source in WebLogic server?
The server being used is WebLogic and the version is not specified. Data source can be configured through the console or configuration files.
WebLogic server is being used
Version is not specified
Data source can be configured through console or configuration files
Q89. What is a network printer and what are its functions?
A network printer is a printer that is connected to a computer network and can be accessed by multiple users.
A network printer allows multiple users to print documents from different devices connected to the same network.
It eliminates the need for individual printers for each user or device.
Network printers can be wired or wireless, depending on the network setup.
They often have additional features like scanning, copying, and faxing capabilities.
Network printers can be manage...read more
Q90. Explain how you solve problems, including real-world examples from your experience.
Problem-solving involves identifying, analyzing, and resolving issues to achieve desired outcomes.
Define the problem and gather information
Brainstorm potential solutions
Evaluate and select the best solution
Implement the solution and monitor its effectiveness
Adjust the solution as needed
Real experience story: During a project, we faced a challenge with a vendor who was not meeting our expectations. We defined the problem, gathered data, and brainstormed potential solutions. We...read more
Q91. How do you validate a purchase order?
To validate a PO, check for accuracy, completeness, and compliance with procurement policies.
Verify that the PO number matches the one in the system
Ensure that the vendor information is correct
Check that the items ordered match the specifications and quantities requested
Confirm that the prices are accurate and in line with the budget
Ensure that the PO is authorized and approved by the appropriate personnel
Check that the delivery date and location are correct
Verify that the te...read more
Q92. What is your key strength that adds value?
The main key strength that adds value is problem-solving skills.
Ability to analyze complex problems and come up with effective solutions
Critical thinking and logical reasoning skills
Creativity in finding innovative solutions
Adaptability to new technologies and frameworks
Strong communication skills to collaborate with team members and stakeholders
Q93. What is optional chaining and optional binding?
Optional chaining and optional binding are techniques used in Swift programming language to safely unwrap optional values.
Optional chaining allows you to access properties, methods, and subscripts of an optional that might currently be nil.
Optional binding is a way to find out if an optional contains a value, and if so, to make that value available as a temporary constant or variable.
Optional chaining uses '?' while optional binding uses 'if let' or 'guard let'.
Q94. What is the difference between MVC, MVVM, and VIPER?
MVC, MVVM, and VIPER are design patterns used in software development to separate concerns and improve code maintainability.
MVC stands for Model-View-Controller and separates an application into three components: Model (data), View (UI), and Controller (logic).
MVVM stands for Model-View-ViewModel and adds a ViewModel layer between the View and Model to handle user interactions and update the UI.
VIPER is an application architecture pattern that stands for View-Interactor-Prese...read more
Q95. How can Apache Kafka be used across multiple producers and consumers in a Kafka cluster?
Apache Kafka can be used to enable communication between multiple producers and consumers across a Kafka cluster.
Producers can publish messages to specific topics in the Kafka cluster.
Consumers can subscribe to these topics and receive messages in real-time.
Kafka ensures fault tolerance and scalability by distributing data partitions across multiple brokers.
Producers and consumers can be distributed across different nodes in the Kafka cluster for load balancing.
Kafka's distri...read more
Q96. What type of application would you design to prevent online payment fraud?
Design a multi-layered application using AI, encryption, and user verification to combat online payment fraud.
Implement AI-driven anomaly detection to identify unusual transaction patterns.
Use two-factor authentication (2FA) for user verification during transactions.
Incorporate end-to-end encryption to secure sensitive payment information.
Utilize machine learning algorithms to continuously improve fraud detection.
Provide real-time alerts to users for suspicious activities on ...read more
Q97. What is the difference between session method and call transaction?
Session method and call transaction are two different ways of executing SAP transactions.
Session method executes a transaction in the same session as the calling program.
Call transaction executes a transaction in a separate session.
Session method is faster and more efficient as it does not require opening a new session.
Call transaction is useful when the transaction being executed has its own set of screens and requires user input.
Session method is used when the transaction b...read more
Q98. What troubleshooting steps would you take if you were unable to connect to a server?
I will check network connectivity, firewall settings, and server status.
Check if the server is powered on and running
Verify network connectivity between the client and server
Check firewall settings to ensure the server is not blocked
Check if the server is reachable via ping or telnet
Check server logs for any errors or issues
Verify DNS settings are correct
Q99. How do you activate a Boot Environment backup?
To activate Boot Environment back up, use the beadm command.
Use the beadm command with the activate option followed by the name of the Boot Environment.
For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.
This will make the Boot Environment the default one at the next system reboot.
Q100. What cutting-edge technologies are emerging in the IT industry?
Emerging IT technologies include AI, quantum computing, blockchain, and edge computing, transforming industries and enhancing efficiency.
Artificial Intelligence (AI) - Enhancing automation and decision-making in sectors like finance and healthcare.
Quantum Computing - Promising exponential speedup for complex problem-solving, with companies like IBM and Google leading the charge.
Blockchain - Revolutionizing data security and transparency, particularly in finance and supply cha...read more
More about working at IBM
Top HR Questions asked in Zee Learn
Interview Process at Zee Learn
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month