Professional Documents
Culture Documents
Accenture Booklet
Accenture Booklet
Accenture Booklet
Key Highlights :
Website http://www.accenture.com
Industry Information technology & services
Company size 10,001+ employees
Type Public Company
Founded 1989
Specialites Management Consulting, Systems Integration and Technology, Business Process Out-
sourcing, and Application and Infrastructure Outsourcing
Here is the actual recruitment process & pattern for Accenture hiring for 2021 pass-outs.
4 Interview Learning Agility and Communication – Varies for each candi- Approx. 30
Tested by 2 panel members date
A) Here are the official system requirements to participate in the Accenture Recruitment Process.
B) Desktop or a laptop mandatory
C) Webcam and microphone (USB or 3.5 mm jack microphones, NOT Bluetooth headsets/ earphones
or system mic)
D) RAM & Processor: 4GB+ RAM and i3 5th generation 2.2 Ghz equivalent or higher
E) Operating System: Windows 8 or 10, MAC OS X 10.9 Mavericks or Higher
F) Latest Version of the Google Chrome browser
G) Network VPN/ Proxy must be disabled
H) Stable internet connection of 2Mbps+ enabled through broadband connection, do avoid unstable
3G/4G networks
Accenture Cognitive Question :
29. If 2^{x}\times 3^{y} = 18 \text{ and } 3^{y} = 35. Which of phrases given below each sentence
362x×3y=18 and 3y=36, the value of x is : should replace the phrase printed in bold type
tomake the grammatically correct?
A) 1 B) 2
He hesitated to listen to what his brother was
C) 3 D) None of these
saying.
Answer: Option A A)listened to hesitate
B) hesitated listen to
30. The simple interest on a sum of money for 3 C) hesitates to listening
years at 6²/3 % per annum is $ 6750. What will bethe D) is hesitated to listen to
compound interest on the same sum at the same E) No correction required
rate for the same period, compoundedannually?
Answer: Option E
A) 7210 B) 3456
C) 9076 D) 6765 36. Read each sentence to find out whether there is
any grammatical error in it. The error, if any willbe in
Answer: Option A
one part of the sentence
31. The difference between two numbers is A) We discussed about the problem so
1365.When the larger number is divided by the thoroughly
smallerone, the quotient is 6 and the remainder is B) on the eve of the examination
15.The smaller number is: C) that I found it very easy to work it out.
D) No error.
A) 240 B) 260
C) 270 D) 420 Answer: Option A
Answer: Option C
37. Mark the option which is closest to the
meaning of the word given below: ABNEGATE
32. The smallest number which when diminished by
7, is divisible by 12, 16, 18, 21 and 28 is A) renounce B) assert
C) give up D)continue
A) 1012 B) 1088
C) 1015 D) 1032 Answer: Option A
Answer: Option C
38. In the questions below the sentences have
been given in Direct/Indirect speech. From the
33. Two numbers A and B are such that the sum of
givenalternatives, choose the one which best
5% of A and 4% of B is two-third of the sum of 6%of
expresses the given sentence in Indirect/Direct
A and 8% of B. Find the ratio of A : B.
speech.
A) 2: 3 B) 1: 1 My cousin said, “My room-mate had snored
C) 3: 4 D) 4: 3 throughout the night.”
Answer: Option D A) my cousin said that her room-mate snored
throughout the night.
34. A dealer sold two type of car last year X and Y. B) my cousin told me that her room-mate snored
The revenue from the sale of each unit of car X is27 throughout the night.
lacs, and that from the sale of each unit of car Y is C) my cousin complained to me that her room-mate
rupees 51 lacs. If Dealer sold thrice as manyunits of is snoring throughout the night.
D) my cousin felt that her room-mate may be snoring Conclusions:
throughout the night. 1. The population per unit area in rural areas is higher
than in urban areas.
Answer: Option A
2. More persons live in the same household in the
rural areas as compared to those inthe urban areas.
39. I’ve been waiting for __________ long time.
A) Only conclusion I follows
A) the B) a B) Both I and II follow
C) an D) no article C) Either I or II follows
D) Neither I nor II follows
Answer: Option B
E) Only conclusion II follows
40. Read each sentence to find out whether there is
Answer: Option E
any grammatical error in it. The error, if any willbe
in one part of the sentence. The letter of that part is
45. In a certain code ‘MISSIONS’ is written as
the answer. If there is no error, the answer is’D’.
‘MSIISNOS’. How is ‘ONLINE’ written in that code?
A) He persisted B)to do it
A) OLNNIE B) ONILEN
C) in spite of my advice D)No error.
C) NOILEN D) LNOENI
Answer: Option B
Answer: Option A
41. 42.It was true that
46. Arrange the words given below in a meaningful
(P) the pet dogs
sequence.
(Q) would never sleep anywhere
1. Probation 2. Interview 3. Selection
(R) we once had
4.Appointment 5. Advertisement 6. Application
(S) except on the sofa
A) 5, 6, 3, 2, 4, 1 B) 5, 6, 4, 2, 3, 1
A)RPQS B) SPQR
C) 5, 6, 2, 3, 4, 1 D) 6, 5, 4, 2, 3, 1
C) PRQS D)PQSR
Answer: Option C
Answer: Option C
47. The officer received _____ official letter from
42. Which of the following pairs has the first person
_____ Ministry of IT in _____ CentralGovernment.
sitting to the immediate left of the secondperson?
A) A, the, an B) An, the, the
A) QT B) RP
C) A, an, the D) An, an, the
C) VS D) SV
Answer: Option B
Answer: Option D
48. The train had left.
43. 44. Deepak said to Nitin, “That boy playing with
the football is the younger of the two brothers of A) past perfect B) past continuous
thedaughter of my father’s wife.” How is the boy C) past future D) simple present
playing football related to Deepak?
Answer: Option A
A)Son B) Brother
49. According to pirate lore, a terrible ______ would
C) Cousin D) Brother-in-law
follow whoever opened the treasure chest.
Answer: Option D
A) precursor B) precession
C) rendition D) insurgence
44. Statements: The average number of persons per
E) malediction
household is 5 in urban areas whereas it is 7 inrural
areas. The national average is 6. Answer:Option E
Accenture technical questions:
1. What would be the output of the following 6. An algorithm in encryption is called _________
pseudocode?
A) Algorithm B) Procedure
Integer a
C) Cipher D) Module
String str1
Set str1 = “goose” Answer:Option C
a = stringLength(str1)
Print (a ^ 1) 7. We can start MS Word by typing ________ in the
[Note- string-length(): string-length() function counts Run Dialog box.
the number of characters in a given string and
A) winword.exe B) word.exe
return the integer value.^ is the bitwise exclusive OR
C) msword.exe D) docx.exe
operator that compares each bit of its first operand
to the corresponding bit of its equal operand. If one Answer:Option A
bit is 0 and the other bit is 1, the corresponding result
bit is set to 1. Otherwise, the corresponding result bit 8. A digital signature scheme consists of which of
is set to 0] the following typical algorithms?
A)0 B) 4 A) Key Generation, Signing and Signature
C) 5 D) 3 Verifying Algorithm
B) Signature Verifying Algorithm
Answer:Option B
C) Key Generation Algorithm
D) Signing Algorithm
2. Consider an array A = {1, 2, 4, 5, 6, 11, 12} and a key
which is equal to 10. How many comparisonswould Answer:Option A
be done to find the key element in the array using
the binary search? 9. Caesar cipher is represented as?
A) 5 B) 1 A) C=(p+3)mod3 B) C=(p-3)mod26
C) 2 D) 3 C) C=(p+26)mod3 D) C=(p+3)mod26
Answer:Option D Answer:Option D
3. Which of the following was the HTML editor 10. The _________ portion of LAN management
associated with Microsoft Office until 2003? software restricts access, records user activities
andaudit data etc.
A) Front Page B) Explorer
C) Web Pag D) Dream Weaver A) Configuration Management
B) Security management
Answer:Option A
C) Performance management
D) None of these
4. Which of these functions is used to land into a
specific location of a document? Answer:Option B
A) Table of Contents B) Hyper Text
11.The type of encoding in which manipulation of
C) Bookmark D) Macro
bit streams without regard to what the bits meanis
Answer:Option C
A) Destination encoding
B) Entropy encoding
5. Starting with Microsoft Office 2003, Photo Editor
C) Source encoding
was renamed to?
D) Differential encoding
A) Photo Manager B) Picture Manager
Answer: Option B
C) Picture Editor D) Pain Editor
Answer:Option B
12. Choose a shortcut to open dialogue box: C) catastrope
D) All of the above
A) F12 B) Shift+F12
C) Alt+F12 D) Ctrl+F12 Answer: Option D
Answer:Option D
17. what is ransomeware?
13. The protocol used to provide security to A) A nickname for the types of spyware that require
e-mails? a password on boot
B) Software that steals files from your computer and
A) POP B) PGP
is used by blackmailers
C) SNMP D) HTTP
C) A software that hijacks your computer and asks
Answer: Option B you to pay in order for it to be removed
D) viruses that infect files and won’t let you open
14. What will be the output if limit = 6? them unless you known a certain pass code
Read limit
Answer: Option C
n1=0, n2=1, n3=1, count=1;
while count <= limit
18. Code to sort given array in ascending order:
count=count+1
Read size
print n3
Read a[1],a[2],...a[size]
n3 = n1 + n2
i=0
n1 = n2
While(i<size)
n2 = n3
j=i+1
End While
While(j<size)
A) 112358 B) 12358
if a[i] < a[j] then
C) 123581321 D) 12358132
t= a[i];
Answer: Option A a[i] = a[j];
a[j] = t;
15) What will be the value of even_counter if
End if
number = 2630?
j=j+1
Read number
End While
Function divisible(number)
i=i+1
even_counter = 0, num_remainder = number;
End While
while (num_remainder)
i=0
digit = num_remainder % 10;
While(i<size)
if digit != 0 AND number % digit == 0
print a[i]
even_counter = even_counter + 1
i=i+1
End If
End While
num_remainder = num_remainder/10;
End While A) Line 4 B) Line 6
returneven_counter; C) Line 7 D) No Error
A) 3 B) 4 Answer: Option C
C) 2 D) 1
19. Which option will you choose if you want to
Answer: Option D
copy the formatting of a document that is Bold,
Redin colour with Green Background to another
16. Which of the following has network reliability
paragraph in one go?
issues?
A) Format Button B) Format Menu
A) frequency of failures
C) Format Painter D) Format Macro
B) recovery time after failure
Answer: Option C
20. What is the time complexity of searching for an 25. A firewall is installed at a point where the secure
element in a circular linked list? internal network and untrusted externalnetwork
meet which is also known as...
A) O(n) B) O(nlogn)
C) O(1) D) None of the mentioned A) Chock Point B) Meeting Point
C) Firewall Point D) Secure Point
Answer: Option A
Answer: Option A
21. Determine the maximum lengthof cable (in km)
for transmitting data at a rate of Mbps in anEthernet 26. Checksu, M Error control and Length information
LAN with frames of size 10,000 bits. Assume the are main features of
signal speed in cable to be 2,00,000 km/s.
A) SCTP B) IP
A) 1 km B) 2 km C) UDP D) TCP
C) 2.5 km D) 5 km
Answer: Option C
Answer: Option B
27. ALOHA was developed in early
22. Let G(x) be the generator polynomial used for
A) 1970 B) 1980
CRC checking. What is the conditiion that shouldbe
C) 1990 D) 1997
satisfied by G(x) to detect odd number of bits in
erors? Answer: Option A
A) G(x) contains more than two terms
28. Let G be a graph with n vertices and m edges.
B) G(x) does not divide 1+x^k, for any k not
What is the tightest upper bound on the runningtime
exceeding the frame length
on Depth First Search of G? Assume that the graph
C) 1+x is a factor of G(x)
is represented using adjacency matrix.
D) G(x) has an odd number of terms
A) O(n) B) O(m+n)
Answer: Option C
C) O(n2) D) O(mn)
23. A layer-4 firewall (a device that can look at all Answer: Option C
protocol headers up to the transport layer)CANNOT
29. You have an array of n elements. Suppose you
A) block HTTP traffic during 9:00PM and
implement a quick sort by always choosing thecentral
5:00AM
element of array as pivot. Then the tightest upper
B) block all ICMP traffic
bound for the worst case performance is:
C) stop traffic from specific IP address but
allow outgoing traffic for the same IP A) O(n2) B) O(nLogn)
D) block TCP traffic from a specific user on C) O(nLog2) D) O(n3)
a specific IP address on a multi-user system
Answer: Option A
during 9:00PM and 5:00AM
Answer: Option A 30. Let P be a program to sort numbers in ascending
order using the first element as pivot. Let t1 andt2
24. A subnet has been assigned a subnet mask be the number of comparisons made by P for the
255.255.255.192. What is the maximum number inputs {1,2,3,4,5} and {4,1,5,3,2} respectively.Which
ofhosts that can belong to this subnet? one of the following holds?
A) 15 B) 32 A) t1=5 B) t1<t2
C) 62 D) 116 C) t1>t2 D) t1=t2
Answer: Option C Answer: Option C
31. What does the following piece of code do? 35. Which of the following is not correct for DELETE
public void func (Tree root) and TRUNCATE
{
A) TRUNCATE tables can have criteria
func(root.left());
B) DELETE tables can be rolled back
func(root.right());
C) TRUNCATE tables cannot have triggers
System.out.println(root.data());
D) DELETE tables can have criteria
}
Answer: Option A
A) Preorder traversal
B) Inorder traversal 36. ___ is a multiplexing technique that shifts signal
C) Postorder traversal to a different carrier frequency.
D) Level order traversal
A) PDM B) TDM
Answer: Option C C) FDM D) Bothe TDM and FDM
Answer: Option C
32. Traffic in a VPN is NOT___
A) Logically separated from other traffic 37. Tools for importing and exporting data in SQL
B) Restricted to a single protocol in IPsec server
C) Invisible from public networks
A) DTS
D) Accessibleform unauthorized public networks
B) bcp command utility
Answer: Option D C) BULK inserts statement
D) All of the above
33. The tag used to create a new list item and also
Answer: Option D
include a hypperling is
A)<UL> B)<DD> 38. Consider a hash table with 9 slots. the hash
C)<LI> D)<DL> function is h(k)= k mod 9. The collisions are
Answer: Option C resolvedby chaining. The following 9 keys are
inserted in the order:5, 28, 19, 15, 20, 33, 12, 17, 10.
34. Which layer of the OSI reference model does Theminimum, maximum, and average chain lengths
IPsec work at? in the hash table, respectively are:
A) Layer 1 B) Layer 2 A) 3, 0 and 1 B) 3, 3 and 3
C) Layer 3 D) Layer 4 C) 4, 0 and 1 D) 3, 0 and 2
Answer: Option C Answer: Option A
Best of luck !!
Created by