Deloitte Technical Interview Questions

Deloitte Technical Interview Questions and Answers 2023

On this page, find the most recent Deloitte Technical Interview Questions asked in the Deloitte Interview 2023.

Page Highlights:

  • Deloitte Test Pattern
  • Top 20 Technical Interview Questions for Deloitte
Deloitte Technical Interview Questions

Deloitte Test Pattern

SectionNumber of questions
Quants and Logical20 Ques
English10 Ques
Computer Fundamentals20 Ques
Coding Section2 Ques

Top 20 Deloitte Technical Interview Questions

Question 1: What are the differences between the trigger and stored procedure?

KeyTriggersStored procedures
BasicA trigger is a stored process that is executed automatically when certain events occur (eg update, insert, delete).Stored procedures are pieces of code written in PL/SQL that perform a specified task.
Running MethodologyIt can run automatically based on occurrences.The user can explicitly invoke it.
ParameterIt cannot accept input as a parameter.It accepts input as a parameter.
Transaction statementsTransaction statements are not permitted within a trigger.Within a stored procedure, we can use transaction statements such as begin transaction, commit the transaction, and rollback.
ReturnTriggers are unable to return values.Values can be returned by stored procedures.

Question 2:- What is backpropagation?


Backpropagation is a technique used in artificial intelligence (AI) to fine-tune mathematical weight functions and increase the accuracy of an artificial neural network’s outputs.

Question 3: What are the differences between Echo and Print in PHP?

Echo Statement Print Statement

Multiple arguments separated by commas can be passed to Echo.

Multiple parameters cannot be passed in Print.
We can display the outputs of one or more strings separated by commas in Echo. We can only display the strings using the Print statement.
With or without parenthesis, echo can be used.

Printing can be done with or without parenthesis.

It never returns anything. It always returns the integer number one.
This statement is faster than the print statement. It is slower than the echo statement.

Questions 4: What are the features of cloud computing?


Features of Cloud Computing:

  • On-demand self-service:

The Cloud computing services do not require any human administrators; users can provide, monitor, and manage computing resources as needed.

  • Broad network access:

Computing services are typically delivered using regular networks and heterogeneous devices.

  • Rapid elasticity:

Computing services should have IT resources that can expand out and in on an as-needed basis. When a user requests a service, it is delivered to him, and it is scaled down as soon as its demand is met.

  • Resource pooling:

The IT resources (e.g., networks, servers, storage, apps, and services) available are uncommitted and shared across numerous applications and occupants. Multiple clients are served by the same physical resource.

  • Measured service:

The resource use is tracked for each application and tenant, providing an account of what has been consumed to both the user and the resource provider. This is done for a variety of reasons, including billing monitoring and resource utilization.

Question 5: What is the function of IEEE in computer networking?


The IEEE, or Institute of Electrical and Electronics Engineers, is a group of engineers who create and administer standards for electrical and electronic devices. Networking equipment, network interfaces, cabling, and connectors are all included.

Question 6: What are access specifiers in C++?


There are three types of access specifiers in C++:

Public: Members can be accessed (or viewed) from outside the class if they are public. 

Private: Members cannot be accessed (or viewed) from outside the class if they are private.

Protected: Members that are protected cannot be accessible from outside the class, although they can be accessed in inherited classes.

Question 7: Write a program to check whether a number can be expressed as a sum of two prime numbers using JAVA.

//Java program to check whether a number can be expressed as a sum of two prime numbers
import java.util.Scanner;
public class Main
	public static void main(String[] args)
		//scanner class declaration
		Scanner sc = new Scanner(;
		//input from user
		System.out.print("Enter a number : ");				
		int number = sc.nextInt();
		int x = 0;
		for(int i = 2 ; i <= number/2 ; i++)
			if(prime_or_not(i) == 1)
				if(prime_or_not(number-i) == 1)
					System.out.println(number+ " = "+i+" + "+(number-i));
					x = 1;
		if(x == 0)
			System.out.println(+number+" cannot be expressed as a sum of two prime numbers");
        //function for checking number is prime or not
	public static int prime_or_not(int n)
		int c = 1;
		for(int i = 2 ; i < n ; i++)
			if(n % i == 0)
				c = 0;
		return c;

Question 8: Define Hash join, merge join, and nested loop joins in DBMS.


Hash Join: 

When you need to join several huge tables, you use the hash join.

Merge Join:

When the projections of the connected tables are sorted on the join columns, a merge join is employed.

Nested loop join:

The mechanism of Nested Loops Join is quite simple. The table with the least records is chosen, and the program will loop through the second table until matches are found. As you can see, this is a poor choice for large tables. As a result, this is mostly employed when there is a table with fewer records and the joining field is indexed in the second table.

Questions 9:How can JavaScript be used?


Javascript is a programming language used by programmers all over the world to develop dynamic and interactive web content such as programs and browsers.

Question 10: What are the differences between a straight-through and crossover cable?

Straight throughCrossover

Straight-through cable is a form of CAT5 cable that contains RJ-45 connections at both ends with the same pin out.

A crossover cable is a form of CAT that has one end that is T568A and the other end that is T568B.
It is one of the most widely used network cable formats.It is only used in a few instances.
You can also connect it from the router’s LAN port to the uplink port of a switch/hub.You can connect it to the LAN port of a router or the normal port of a switch or hub.
A straight-through cable links a computer to the LAN port of a cable or DSL modem.A crossover cable connects a router’s LAN port to a switch’s or hub’s regular port.
When connecting two devices of different sorts, you should utilize a straight-through cable.When connecting two devices of the same type, you should utilize a crossover cable.

Question 11: Write a program to check whether a number is a perfect number or not.


int main ()
    int num = 28, sum = 0;
    // iteratively check for all numbers in range [1, 27]
    for(int i = 1; i < num; i++){
        // check if i is a divisor, if yes then add to sum
        if(num % i == 0)
            sum = sum + i;
    if(sum == num)
        printf("%d is a perfect number",num);
        printf("%d is not a perfect number",num);

// Time complexity: O(N)
// Space complexity: O(1)
using namespace std;

int main ()
    int n = 28, sum = 0;
    for(int i = 1; i < n; i++){
        if(n % i == 0)
            sum = sum + i;
    if(sum == n)
        cout << n << " is a perfect number";
        cout << n << " is not a perfect number";

// Time complexity: O(N)
// Space complexity: O(1)
public class Main
   public static void main (String[]args)

     int n = 28, sum = 0;

     for (int i = 1; i < n; i++)
     	if (n % i == 0)
 	        sum = sum + i;

     if (sum == n)
       System.out.println (n + " Is a perfect number");
       System.out.println (n + " Is not a perfect number");


Question 12: Define database normalization.


The practice of arranging a relational database in line with a set of so-called normal forms in order to eliminate data redundancy and increase data integrity is known as database normalization.

Question 13: What are the differences between array list and vector?



ArrayList has no synchronization.Vector has been synced.
SizeIf an element is added that exceeds the capacity of the ArrayList, it is increased by 50% of its existing size.If an element is added that exceeds the vector’s capacity, it grows by 100% of its existing size.
LegacyArrayList is not a legacy technology.A legacy class is Vector.
SpeedNon-synchronization makes ArrayList quicker.The sync process for LinkedList is slower.
IterationTo iterate through elements, an array list utilizes an iterator interface.To iterate through elements, Vector can use either the iterator or the enumerator interface.

Question 14: Define DDL(Data Definition Language), DML(Data Manipulation Language), and DCL( Data Control Language).


DDL: The SQL statements that can be used to build the database schema make up the actual Data Definition Language. It is used to create and modify the structure of database objects in the database and only works with descriptions of the database schema. Although data cannot be created, modified, or deleted with DDL, database structures can. An ordinary user should access the database through a program, not these commands, thus they are typically not used by them.

DCL: When it comes to the rights, permissions, and other controls of the database system, DCL contains commands like GRANT and REVOKE.

DML: The majority of SQL statements are part of the DML, or Data Manipulation Language, which is the name given to the SQL instructions that deal with manipulating the data that is contained in the database. The part of the SQL statement that regulates access to data and the database is this one. DML statements are essentially grouped with DCL statements.

Question 15: What do you mean by Inheritance?


Programmers can reuse code and independently modify original software via public classes and interfaces by building new classes on top of pre-existing classes, specifying a new implementation while preserving the same behaviors and using inheritance.

Question 16: What are the pros and cons of star topology in Computer Networks?


Advantages of Star Topology

  • simple to wire and install
  • There are no network hiccups when adding or uninstalling devices.
  • Simple fault finding and component removal.

Disadvantages of Star Topology

  • more cable length is needed than with a linear bus topology.
  • Attached nodes become disabled and unable to communicate on a computer network if the connecting network device (network switch) malfunctions.
  • More expensive due to the cost of the connecting devices than linear bus topology (network switches).

Question 17: What do you understand by the term clustering support?


The objective of clustering is to divide the population or set of data points into a number of groups so that the data points within each group are more similar to one another and different from the data points within the other groups. It is essentially a grouping of objects based on how similar and unlike they are to one another.

Question 18: How is the CSMA/CD different from the CSMA/CA?

EffectivenessBefore a collision, CSMA/CA is effective. After a collision, CSMA/CD works.
Network TypeIn wireless networks, CSMA/CA is frequently utilized.In wired networks, CSMA/CD is frequently utilized.
Recovery TimeCollision risk is reduced by CSMA/CA. Recovery time is sped up by CSMA/CD.
Conflict ManagementWhen an acknowledgment is received, the sender transfers the data after first transmitting the intent to do so via CSMA/CA. If a disagreement arises during transmission, CSMA/CD resends the data frame.
IEEE StandardsThe IEEE 802.11 standard includes CSMA/CA.The IEEE 802.3 standard includes CSMA/CD.


Efficiency-wise, CSMA/CA and CSMA are comparable. CSMA is less effective than CSMA/CD.

Question 19: Define SMTP.


The Simple Mail Transfer Protocol is a widely used internet protocol for sending electronic mail. SMTP is a protocol that allows mail servers and other message transfer agents to send and receive mail messages.

Question 20: Define tunnel mode.


A method of delivering data over the Internet known as “tunnel mode” encrypts both the material being sent and the original IP address information. Both transport mode and tunnel mode are used by the encapsulating security payload (ESP). ESP encrypts the IP header information and the data when in Tunnel Mode.