Add office photos
Employer?
Claim Account for FREE

AT&T

4.1
based on 423 Reviews
Filter interviews by

30+ Sykes Business Services Of India Interview Questions and Answers

Updated 17 Jan 2025

Q1. Informatica - Difference between router and filter transformation

Ans.

Router and filter transformations are used in Informatica for data filtering, but they have different functionalities.

  • Router transformation is used to route data based on specified conditions to multiple output groups.

  • Filter transformation is used to filter rows based on specified conditions and pass only the matching rows to the output.

  • Router transformation can have multiple output groups, each with its own condition.

  • Filter transformation has a single output group.

  • Router tra...read more

View 2 more answers

Q2. Informatica - How can we handle duplicates in mappings

Ans.

Duplicates in mappings can be handled using various techniques in Informatica.

  • Use the Sorter transformation to sort the data and then use the Aggregator transformation to eliminate duplicates.

  • Use the Expression transformation with the DISTINCT keyword to remove duplicates.

  • Use the Rank transformation to rank the data and then filter out the duplicates based on the rank.

  • Use the Lookup transformation to check for duplicates in a reference table and filter them out.

  • Use the Update...read more

Add your answer

Q3. Informatica - What are lookups and their types? Differences between those types in terms of input and output ports?

Ans.

Lookups in Informatica are used to retrieve data from a reference table based on a matching condition.

  • Lookups are used to perform data transformations and enrich the data in a mapping.

  • There are three types of lookups in Informatica: Connected, Unconnected, and Static.

  • Connected lookup returns multiple rows and can be used in any transformation.

  • Unconnected lookup returns a single value and is used in expressions or transformations.

  • Static lookup is used to retrieve a single row ...read more

Add your answer

Q4. What is difference between phase of site to site vpn?

Ans.

The phases of site-to-site VPN are the steps involved in establishing and maintaining a secure connection between two networks.

  • Phase 1: Authentication and key exchange

  • Phase 2: Data encryption and tunnel establishment

  • Phase 3: Traffic protection and monitoring

  • Each phase has its own set of protocols and processes

  • For example, in Phase 1, the VPN peers authenticate each other using methods like pre-shared keys or digital certificates

View 1 answer
Discover Sykes Business Services Of India interview dos and don'ts from real experiences

Q5. Informatica - How will you select last 10 lines from a file in mapping

Ans.

To select the last 10 lines from a file in Informatica mapping, use the Source Qualifier transformation with a SQL override.

  • Add a Source Qualifier transformation to the mapping.

  • In the Source Qualifier transformation, specify the file as the source and set the appropriate file properties.

  • Write a SQL override in the Source Qualifier transformation to select the last 10 lines from the file.

  • Use the ROWNUM pseudocolumn or the ROW_NUMBER() function to order the rows in descending o...read more

Add your answer

Q6. Explain how did you implemented CI CD integration through Jenkins

Ans.

Implemented CI/CD integration through Jenkins using pipeline as code approach

  • Created a Jenkins pipeline job and defined stages for build, test, and deploy

  • Integrated source code management tool like Git with Jenkins

  • Used Jenkins plugins like Maven, Docker, and Kubernetes for building, packaging, and deploying the application

  • Configured Jenkins to trigger the pipeline on every code commit or merge to the main branch

  • Enabled automated testing and code quality checks in the pipeline...read more

Add your answer
Are these interview questions helpful?

Q7. Python - How to check if a string starts with letter 'a' and then has 4-8 'd' after that.

Ans.

The Python code to check if a string starts with 'a' and has 4-8 'd' after that.

  • Use the startswith() method to check if the string starts with 'a'.

  • Use the count() method to count the occurrences of 'd' in the string.

  • Check if the count of 'd' is between 4 and 8 (inclusive).

Add your answer

Q8. Unix - how to find disk usage of a specific directory

Ans.

To find disk usage of a specific directory in Unix, use the 'du' command.

  • Open the terminal and navigate to the desired directory

  • Run the 'du' command followed by the directory path

  • The command will display the disk usage in bytes for each file and subdirectory within the specified directory

  • To get the disk usage in human-readable format, use the '-h' option with 'du'

  • To sort the output by disk usage, use the '-s' option with 'du'

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Cloud Computing - Why do you think Cloud is a better choice than on-premise datacenters

Ans.

Cloud computing offers scalability, cost-effectiveness, flexibility, and improved security compared to on-premise datacenters.

  • Scalability: Cloud allows easy scaling up or down of resources based on demand.

  • Cost-effectiveness: Cloud eliminates the need for upfront hardware and infrastructure investments.

  • Flexibility: Cloud enables easy access to data and applications from anywhere, anytime.

  • Improved security: Cloud providers offer robust security measures and data backup options....read more

Add your answer

Q10. Design an e-commerce app. Design a data structure to search for products and using type ahead field. The interviewer asked me to come-up with end to end diagram representing systems connected ans asked me to sc...

read more
Ans.

Design an e-commerce app with type ahead search. Provide end to end diagram and scaling.

  • Design a user-friendly interface with search bar and type ahead feature

  • Create a database schema to store product information

  • Implement a search algorithm to retrieve relevant products based on user input

  • Use caching and indexing to improve search performance

  • Scale the system by adding load balancers, increasing server capacity, and optimizing database queries

Add your answer

Q11. What strategy you will follow while addressing customer queries?.

Ans.

I will follow a customer-centric approach and ensure timely and accurate resolution of their queries.

  • Listen actively to understand their concerns

  • Empathize with their situation

  • Provide clear and concise answers

  • Offer solutions that meet their needs

  • Follow up to ensure their satisfaction

Add your answer

Q12. What is Object-Oriented Programming (OOP), and can you explain its fundamental concepts?

Ans.

OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • OOP focuses on creating objects that interact with each other to solve complex problems.

  • Fundamental concepts include classes, objects, inheritance, encapsulation, and polymorphism.

  • Classes are blueprints for creating objects, while objects are instances of classes.

  • Inheritance allows classes to inherit attributes and methods from other c...read more

Add your answer

Q13. What is the definition of an array, and what are the different types of arrays?

Ans.

An array is a data structure that stores a collection of elements of the same type. There are different types of arrays such as one-dimensional, multi-dimensional, and associative arrays.

  • One-dimensional array: Stores elements in a single row or column.

  • Multi-dimensional array: Stores elements in multiple rows and columns.

  • Associative array: Uses key-value pairs to store elements.

  • Example: ['apple', 'banana', 'orange']

Add your answer

Q14. SQL - Tell me your experience with performance optimization in SQL

Ans.

I have extensive experience in performance optimization in SQL.

  • Identifying and optimizing slow queries

  • Creating and maintaining appropriate indexes

  • Using query execution plans to identify bottlenecks

  • Optimizing database schema and table design

  • Using appropriate data types and constraints

  • Caching and data caching techniques

  • Partitioning large tables

  • Optimizing query parameters and joins

  • Using stored procedures and views for performance gains

Add your answer

Q15. Authentication / Access rights controls and how they are enforced.

Ans.

Authentication and access rights controls are enforced to ensure only authorized users can access sensitive information.

  • Authentication verifies the identity of a user before granting access.

  • Access rights controls limit the actions a user can perform based on their role or permissions.

  • Enforcement can be done through various methods such as passwords, biometrics, and multi-factor authentication.

  • Regular audits and reviews of access rights can help identify and prevent unauthoriz...read more

Add your answer

Q16. Informatica - What is push down optimization?

Ans.

Push down optimization is a technique used in Informatica to improve performance by pushing data transformation operations to the source or target database.

  • Push down optimization reduces the amount of data transferred between the source and target systems.

  • It allows the database engine to perform transformations, aggregations, and filtering, leveraging its processing power.

  • By pushing down operations, Informatica minimizes network latency and improves overall performance.

  • Exampl...read more

Add your answer

Q17. SQL - what happens in a left join

Ans.

In a left join, all the rows from the left table are included in the result set, along with matching rows from the right table.

  • Left join returns all rows from the left table and the matching rows from the right table

  • If there is no match, NULL values are returned for the columns of the right table

  • Left join is used to retrieve data from multiple tables based on a related column

Add your answer

Q18. How to pull the large amount of data in spring data jpa

Ans.

To pull large amount of data in Spring Data JPA, use pagination, lazy loading, and query optimization techniques.

  • Use pagination to limit the amount of data retrieved in each query

  • Implement lazy loading to fetch data only when needed

  • Optimize queries by using indexes, avoiding N+1 query problem, and fetching only necessary columns

Add your answer

Q19. Are you able to do rotational shifts?

Ans.

Yes, I am able to do rotational shifts as required for the job.

  • I am flexible with my work schedule and can adapt to different shifts

  • I have previous experience working in rotational shifts

  • I understand the importance of maintaining network operations 24/7, which may require working different shifts

Add your answer

Q20. Explain the garbage collection process in java

Ans.

Garbage collection is an automatic process of freeing up memory by removing unused objects.

  • Java uses a mark-and-sweep algorithm for garbage collection

  • Objects that are no longer referenced are marked for deletion

  • The garbage collector runs periodically to remove the marked objects

  • Finalize() method can be used to perform cleanup operations before an object is deleted

Add your answer

Q21. how would you handle angry customer?

Ans.

I would listen to their concerns, empathize with their situation, apologize for any inconvenience caused, and offer a solution to their problem.

  • Remain calm and professional

  • Listen actively to the customer's complaint

  • Empathize with their situation and apologize for any inconvenience caused

  • Offer a solution to their problem, and if necessary, escalate the issue to a supervisor

  • Follow up with the customer to ensure their issue has been resolved

Add your answer

Q22. Describe how Azure hosted AKS works

Ans.

Azure hosted AKS is a managed Kubernetes service that simplifies deployment and management of containerized applications.

  • AKS stands for Azure Kubernetes Service

  • AKS is a fully managed Kubernetes container orchestration service

  • AKS automates the deployment, scaling, and management of containerized applications

  • AKS integrates with other Azure services such as Azure Active Directory, Azure Monitor, and Azure Container Registry

  • AKS supports both Linux and Windows containers

Add your answer

Q23. Implementing Cloud Security controls in an organization.

Ans.

Implementing cloud security controls involves identifying risks, selecting appropriate controls, and monitoring their effectiveness.

  • Conduct a risk assessment to identify potential threats and vulnerabilities

  • Select appropriate security controls based on the identified risks

  • Implement and configure the selected controls

  • Regularly monitor and assess the effectiveness of the controls

  • Examples of cloud security controls include encryption, access controls, and intrusion detection sys...read more

Add your answer

Q24. What is hypothesis Testing? What is p- value? Any Machine Learning algorithm - explanation. Basics of python , Statistics, Machine learning.

Ans.

Hypothesis testing is a statistical method to make inferences about a population based on sample data.

  • Hypothesis testing involves formulating a null hypothesis and an alternative hypothesis.

  • The p-value is the probability of obtaining a test statistic as extreme as the one observed, assuming the null hypothesis is true.

  • Machine learning algorithms are computational models that learn patterns and make predictions from data.

  • Python is a popular programming language for data analys...read more

Add your answer

Q25. Unix - Display duplicate lines from a file

Ans.

Display duplicate lines from a file in Unix.

  • Use the 'sort' command to sort the lines in the file.

  • Use the 'uniq' command with the '-d' option to display only the duplicate lines.

  • Redirect the output to a new file or display it on the console.

Add your answer

Q26. Unix - Display 10th line from a file

Ans.

Display the 10th line from a file in Unix.

  • Use the 'head' command to display the first 10 lines of the file.

  • Then use the 'tail' command to display the last line from the first 10 lines.

  • Combine both commands using a pipe ('|') to display the 10th line directly.

Add your answer

Q27. What is your expected CTC?

Ans.

My expected CTC is negotiable based on the job responsibilities, company size, and location.

  • My expected CTC is based on my experience, skills, and industry standards.

  • I am open to discussing the compensation package during the interview process.

  • I am looking for a competitive salary that aligns with my qualifications and the market rate.

Add your answer

Q28. Unix basics - find a word in a set of files

Ans.

Using Unix command 'grep' to find a word in a set of files

  • Use 'grep' command followed by the word you want to search for and the file(s) you want to search in

  • Add the '-r' flag to search recursively in all files in a directory

  • Use '-i' flag for case-insensitive search

  • Example: grep 'hello' file.txt

  • Example: grep -r 'error' /path/to/directory

  • Example: grep -i 'apple' file1.txt file2.txt

Add your answer

Q29. what is Static keyword in Java do?

Ans.

Static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.

  • Static variables are shared among all instances of a class.

  • Static methods can be called without creating an object of the class.

  • Static keyword can be used to initialize a variable only once.

  • Example: public static int count = 0;

Add your answer

Q30. What do you know about AI?

Ans.

AI stands for artificial intelligence, which is the simulation of human intelligence processes by machines.

  • AI involves the development of algorithms that can perform tasks typically requiring human intelligence.

  • Examples of AI applications include virtual assistants like Siri, self-driving cars, and recommendation systems like Netflix.

  • Machine learning is a subset of AI that focuses on the development of algorithms that allow computers to learn from and make predictions or deci...read more

Add your answer

Q31. What is NAT?

Ans.

NAT stands for Network Address Translation. It is a technique used to map a public IP address to a private IP address.

  • NAT is used to conserve public IP addresses.

  • It allows multiple devices to share a single public IP address.

  • NAT can be implemented using hardware or software.

  • There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).

Add your answer

Q32. What know about BGP?

Ans.

BGP stands for Border Gateway Protocol, a routing protocol used to exchange routing information between different networks.

  • BGP is used to connect different autonomous systems (AS) on the internet.

  • It is a path-vector protocol that selects the best path for data to travel based on various attributes.

  • BGP is used by internet service providers (ISPs) to exchange routing information with each other.

  • It is a complex protocol that requires careful configuration to ensure proper routin...read more

Add your answer

Q33. Explain the architecture of Kubernetes

Ans.

Kubernetes is a container orchestration platform that manages and automates the deployment, scaling, and management of containerized applications.

  • Kubernetes uses a master-slave architecture with a control plane and worker nodes.

  • The control plane manages the overall state of the cluster and schedules workloads to the worker nodes.

  • Worker nodes run the containers and communicate with the control plane to receive instructions.

  • Kubernetes uses declarative configuration files to def...read more

Add your answer

Q34. difference between streams and parallel streams

Ans.

Streams process elements sequentially, while parallel streams process elements concurrently.

  • Streams process elements one by one in a sequential manner.

  • Parallel streams process elements concurrently, potentially utilizing multiple threads for faster processing.

  • Streams are suitable for smaller datasets or when order matters.

  • Parallel streams are more efficient for larger datasets or when order is not important.

  • Example: Stream processing a list of numbers vs. parallel stream proc...read more

Add your answer

Q35. Information about Networking?

Ans.

Networking is the practice of connecting devices together to share resources and communicate with each other.

  • Networking involves the use of protocols and technologies such as TCP/IP, DNS, DHCP, and VLANs.

  • Networks can be wired or wireless, and can span across local or wide areas.

  • Networking also includes security measures such as firewalls, VPNs, and encryption.

  • Examples of network devices include routers, switches, hubs, and access points.

Add your answer

Q36. Cloud Project implementation challenges.

Ans.

Cloud project implementation challenges include security concerns, integration issues, and lack of expertise.

  • Security concerns related to data privacy and compliance regulations

  • Integration issues with existing systems and applications

  • Lack of expertise in cloud technologies and best practices

  • Cost management and budget constraints

  • Data migration and transfer challenges

  • Vendor lock-in and interoperability issues

Add your answer

Q37. What is the clr

Ans.

CLR stands for Common Language Runtime, a virtual machine component of the .NET framework responsible for managing code execution.

  • CLR provides services such as memory management, exception handling, and security.

  • It compiles code into Intermediate Language (IL) and then translates it into machine code at runtime.

  • CLR allows for language interoperability within the .NET framework, enabling different languages to work together seamlessly.

Add your answer

Q38. Write singleton class

Ans.

Singleton class ensures only one instance of a class is created and provides a global point of access to it.

  • Create a private static instance of the class

  • Provide a private constructor to prevent instantiation

  • Create a public static method to access the instance

Add your answer

Q39. Use of Hash Table

Ans.

Hash tables are data structures that store key-value pairs for efficient retrieval.

  • Hash tables use a hash function to map keys to indexes in an array.

  • They have constant time complexity for insertion, deletion, and lookup operations.

  • Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.

Add your answer

More about working at AT&T

HQ - Dallas, Texas, United States (USA)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Sykes Business Services Of India

based on 45 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 209 Interview Questions
4.1
 • 205 Interview Questions
3.7
 • 180 Interview Questions
4.0
 • 174 Interview Questions
3.9
 • 152 Interview Questions
View all
Top AT&T Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter