Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

IBM Interview Questions
Questions Answers Views Company eMail

Tell me about yourself?

229 489032

What are your short-range and long-range goals and how do you expect to achieve them?

17 59009

Where you would like to be in 5 years?

23 50929

Difference between QA and Testing?

13 40619

What is your career goal and career plans ?

55 374943

What are Storage Classes in C ?

32 115829

Difference between Overloading and Overriding?

35 194850

What is the difference between Class and Structure?

40 217387

How to communicate between difference process?

2 8819

What are counting semaphores?

4 13449

What are the differences between public, private, and protected access?

12 71369

what usually indicates that ur virtual user script has dynamic data that is dependent on u parameterized fields?

2 9204

What is Regression Testing?

22 23289

what is debugging and whitebox testing and what is the diff?

10 27148

List 5 words that best Describe your strengths?

29 245314

Post New IBM Interview Questions


IBM Interview Questions


Un-Answered Questions

How do I merge folders in windows 10?

447


Where do you use Classic deployment scenario in SRM?

585


What is cache in asp net?

529


During given week a programmer spend 1/4 of his time preparing charts,3/8 of his time for coding,rest of his time for debugging the programs.if he had 48 hrs during the week how many hours did he spend debugging the program?

535


Your hardware vendor left you voicemail saying that a potential snowstorm in the Midwest might prevent your equipment from arriving on time. She wanted to give you a heads-up and asked that you return the call. Which of the following is true? A. This is a secondary risk, which is an output of Risk Response Planning. B. This is a contingency plan, which is an output of Risk Response Planning. C. This is a risk, which is an output of Risk Identification. D. This is a trigger, which is an output of Risk Identification.

670






What is an anti csrf token?

498


“int a[] = new int[3]{1, 2, 3}” – This a legal way of defining the arrays?

703


What are packages in python which are commonly used explain one ?

442


What are the steps in fashion forecasting?

5


can u please mail me the syllabus for GET exam for damodar valley corporation?

1599


What is the @functionalinterface annotation?

538


What do you understand by the term string pool?

561


What is the difference between PIC 9.99 and PIC9v99?

771


What is fused?

555


At the time of depreciation run we selected actual dep key is 5% but we taken 7% so the depreciation was posted wrongly how to rectify it?

1928