AT&T
30+ Sykes Business Services Of India Interview Questions and Answers
Q1. Informatica - Difference between router and filter transformation
Router and filter transformations are used in Informatica for data filtering, but they have different functionalities.
Router transformation is used to route data based on specified conditions to multiple output groups.
Filter transformation is used to filter rows based on specified conditions and pass only the matching rows to the output.
Router transformation can have multiple output groups, each with its own condition.
Filter transformation has a single output group.
Router tra...read more
Q2. Informatica - How can we handle duplicates in mappings
Duplicates in mappings can be handled using various techniques in Informatica.
Use the Sorter transformation to sort the data and then use the Aggregator transformation to eliminate duplicates.
Use the Expression transformation with the DISTINCT keyword to remove duplicates.
Use the Rank transformation to rank the data and then filter out the duplicates based on the rank.
Use the Lookup transformation to check for duplicates in a reference table and filter them out.
Use the Update...read more
Q3. Informatica - What are lookups and their types? Differences between those types in terms of input and output ports?
Lookups in Informatica are used to retrieve data from a reference table based on a matching condition.
Lookups are used to perform data transformations and enrich the data in a mapping.
There are three types of lookups in Informatica: Connected, Unconnected, and Static.
Connected lookup returns multiple rows and can be used in any transformation.
Unconnected lookup returns a single value and is used in expressions or transformations.
Static lookup is used to retrieve a single row ...read more
Q4. What is difference between phase of site to site vpn?
The phases of site-to-site VPN are the steps involved in establishing and maintaining a secure connection between two networks.
Phase 1: Authentication and key exchange
Phase 2: Data encryption and tunnel establishment
Phase 3: Traffic protection and monitoring
Each phase has its own set of protocols and processes
For example, in Phase 1, the VPN peers authenticate each other using methods like pre-shared keys or digital certificates
Q5. Informatica - How will you select last 10 lines from a file in mapping
To select the last 10 lines from a file in Informatica mapping, use the Source Qualifier transformation with a SQL override.
Add a Source Qualifier transformation to the mapping.
In the Source Qualifier transformation, specify the file as the source and set the appropriate file properties.
Write a SQL override in the Source Qualifier transformation to select the last 10 lines from the file.
Use the ROWNUM pseudocolumn or the ROW_NUMBER() function to order the rows in descending o...read more
Q6. Explain how did you implemented CI CD integration through Jenkins
Implemented CI/CD integration through Jenkins using pipeline as code approach
Created a Jenkins pipeline job and defined stages for build, test, and deploy
Integrated source code management tool like Git with Jenkins
Used Jenkins plugins like Maven, Docker, and Kubernetes for building, packaging, and deploying the application
Configured Jenkins to trigger the pipeline on every code commit or merge to the main branch
Enabled automated testing and code quality checks in the pipeline...read more
Q7. Python - How to check if a string starts with letter 'a' and then has 4-8 'd' after that.
The Python code to check if a string starts with 'a' and has 4-8 'd' after that.
Use the startswith() method to check if the string starts with 'a'.
Use the count() method to count the occurrences of 'd' in the string.
Check if the count of 'd' is between 4 and 8 (inclusive).
Q8. Unix - how to find disk usage of a specific directory
To find disk usage of a specific directory in Unix, use the 'du' command.
Open the terminal and navigate to the desired directory
Run the 'du' command followed by the directory path
The command will display the disk usage in bytes for each file and subdirectory within the specified directory
To get the disk usage in human-readable format, use the '-h' option with 'du'
To sort the output by disk usage, use the '-s' option with 'du'
Q9. Cloud Computing - Why do you think Cloud is a better choice than on-premise datacenters
Cloud computing offers scalability, cost-effectiveness, flexibility, and improved security compared to on-premise datacenters.
Scalability: Cloud allows easy scaling up or down of resources based on demand.
Cost-effectiveness: Cloud eliminates the need for upfront hardware and infrastructure investments.
Flexibility: Cloud enables easy access to data and applications from anywhere, anytime.
Improved security: Cloud providers offer robust security measures and data backup options....read more
Q10. Design an e-commerce app. Design a data structure to search for products and using type ahead field. The interviewer asked me to come-up with end to end diagram representing systems connected ans asked me to sc...
read moreDesign an e-commerce app with type ahead search. Provide end to end diagram and scaling.
Design a user-friendly interface with search bar and type ahead feature
Create a database schema to store product information
Implement a search algorithm to retrieve relevant products based on user input
Use caching and indexing to improve search performance
Scale the system by adding load balancers, increasing server capacity, and optimizing database queries
Q11. What strategy you will follow while addressing customer queries?.
I will follow a customer-centric approach and ensure timely and accurate resolution of their queries.
Listen actively to understand their concerns
Empathize with their situation
Provide clear and concise answers
Offer solutions that meet their needs
Follow up to ensure their satisfaction
Q12. What is Object-Oriented Programming (OOP), and can you explain its fundamental concepts?
OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOP focuses on creating objects that interact with each other to solve complex problems.
Fundamental concepts include classes, objects, inheritance, encapsulation, and polymorphism.
Classes are blueprints for creating objects, while objects are instances of classes.
Inheritance allows classes to inherit attributes and methods from other c...read more
Q13. What is the definition of an array, and what are the different types of arrays?
An array is a data structure that stores a collection of elements of the same type. There are different types of arrays such as one-dimensional, multi-dimensional, and associative arrays.
One-dimensional array: Stores elements in a single row or column.
Multi-dimensional array: Stores elements in multiple rows and columns.
Associative array: Uses key-value pairs to store elements.
Example: ['apple', 'banana', 'orange']
Q14. SQL - Tell me your experience with performance optimization in SQL
I have extensive experience in performance optimization in SQL.
Identifying and optimizing slow queries
Creating and maintaining appropriate indexes
Using query execution plans to identify bottlenecks
Optimizing database schema and table design
Using appropriate data types and constraints
Caching and data caching techniques
Partitioning large tables
Optimizing query parameters and joins
Using stored procedures and views for performance gains
Q15. Authentication / Access rights controls and how they are enforced.
Authentication and access rights controls are enforced to ensure only authorized users can access sensitive information.
Authentication verifies the identity of a user before granting access.
Access rights controls limit the actions a user can perform based on their role or permissions.
Enforcement can be done through various methods such as passwords, biometrics, and multi-factor authentication.
Regular audits and reviews of access rights can help identify and prevent unauthoriz...read more
Q16. Informatica - What is push down optimization?
Push down optimization is a technique used in Informatica to improve performance by pushing data transformation operations to the source or target database.
Push down optimization reduces the amount of data transferred between the source and target systems.
It allows the database engine to perform transformations, aggregations, and filtering, leveraging its processing power.
By pushing down operations, Informatica minimizes network latency and improves overall performance.
Exampl...read more
Q17. SQL - what happens in a left join
In a left join, all the rows from the left table are included in the result set, along with matching rows from the right table.
Left join returns all rows from the left table and the matching rows from the right table
If there is no match, NULL values are returned for the columns of the right table
Left join is used to retrieve data from multiple tables based on a related column
Q18. How to pull the large amount of data in spring data jpa
To pull large amount of data in Spring Data JPA, use pagination, lazy loading, and query optimization techniques.
Use pagination to limit the amount of data retrieved in each query
Implement lazy loading to fetch data only when needed
Optimize queries by using indexes, avoiding N+1 query problem, and fetching only necessary columns
Q19. Are you able to do rotational shifts?
Yes, I am able to do rotational shifts as required for the job.
I am flexible with my work schedule and can adapt to different shifts
I have previous experience working in rotational shifts
I understand the importance of maintaining network operations 24/7, which may require working different shifts
Q20. Explain the garbage collection process in java
Garbage collection is an automatic process of freeing up memory by removing unused objects.
Java uses a mark-and-sweep algorithm for garbage collection
Objects that are no longer referenced are marked for deletion
The garbage collector runs periodically to remove the marked objects
Finalize() method can be used to perform cleanup operations before an object is deleted
Q21. how would you handle angry customer?
I would listen to their concerns, empathize with their situation, apologize for any inconvenience caused, and offer a solution to their problem.
Remain calm and professional
Listen actively to the customer's complaint
Empathize with their situation and apologize for any inconvenience caused
Offer a solution to their problem, and if necessary, escalate the issue to a supervisor
Follow up with the customer to ensure their issue has been resolved
Q22. Describe how Azure hosted AKS works
Azure hosted AKS is a managed Kubernetes service that simplifies deployment and management of containerized applications.
AKS stands for Azure Kubernetes Service
AKS is a fully managed Kubernetes container orchestration service
AKS automates the deployment, scaling, and management of containerized applications
AKS integrates with other Azure services such as Azure Active Directory, Azure Monitor, and Azure Container Registry
AKS supports both Linux and Windows containers
Q23. Implementing Cloud Security controls in an organization.
Implementing cloud security controls involves identifying risks, selecting appropriate controls, and monitoring their effectiveness.
Conduct a risk assessment to identify potential threats and vulnerabilities
Select appropriate security controls based on the identified risks
Implement and configure the selected controls
Regularly monitor and assess the effectiveness of the controls
Examples of cloud security controls include encryption, access controls, and intrusion detection sys...read more
Q24. What is hypothesis Testing? What is p- value? Any Machine Learning algorithm - explanation. Basics of python , Statistics, Machine learning.
Hypothesis testing is a statistical method to make inferences about a population based on sample data.
Hypothesis testing involves formulating a null hypothesis and an alternative hypothesis.
The p-value is the probability of obtaining a test statistic as extreme as the one observed, assuming the null hypothesis is true.
Machine learning algorithms are computational models that learn patterns and make predictions from data.
Python is a popular programming language for data analys...read more
Q25. Unix - Display duplicate lines from a file
Display duplicate lines from a file in Unix.
Use the 'sort' command to sort the lines in the file.
Use the 'uniq' command with the '-d' option to display only the duplicate lines.
Redirect the output to a new file or display it on the console.
Q26. Unix - Display 10th line from a file
Display the 10th line from a file in Unix.
Use the 'head' command to display the first 10 lines of the file.
Then use the 'tail' command to display the last line from the first 10 lines.
Combine both commands using a pipe ('|') to display the 10th line directly.
Q27. What is your expected CTC?
My expected CTC is negotiable based on the job responsibilities, company size, and location.
My expected CTC is based on my experience, skills, and industry standards.
I am open to discussing the compensation package during the interview process.
I am looking for a competitive salary that aligns with my qualifications and the market rate.
Q28. Unix basics - find a word in a set of files
Using Unix command 'grep' to find a word in a set of files
Use 'grep' command followed by the word you want to search for and the file(s) you want to search in
Add the '-r' flag to search recursively in all files in a directory
Use '-i' flag for case-insensitive search
Example: grep 'hello' file.txt
Example: grep -r 'error' /path/to/directory
Example: grep -i 'apple' file1.txt file2.txt
Q29. what is Static keyword in Java do?
Static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.
Static variables are shared among all instances of a class.
Static methods can be called without creating an object of the class.
Static keyword can be used to initialize a variable only once.
Example: public static int count = 0;
Q30. What do you know about AI?
AI stands for artificial intelligence, which is the simulation of human intelligence processes by machines.
AI involves the development of algorithms that can perform tasks typically requiring human intelligence.
Examples of AI applications include virtual assistants like Siri, self-driving cars, and recommendation systems like Netflix.
Machine learning is a subset of AI that focuses on the development of algorithms that allow computers to learn from and make predictions or deci...read more
Q31. What is NAT?
NAT stands for Network Address Translation. It is a technique used to map a public IP address to a private IP address.
NAT is used to conserve public IP addresses.
It allows multiple devices to share a single public IP address.
NAT can be implemented using hardware or software.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).
Q32. What know about BGP?
BGP stands for Border Gateway Protocol, a routing protocol used to exchange routing information between different networks.
BGP is used to connect different autonomous systems (AS) on the internet.
It is a path-vector protocol that selects the best path for data to travel based on various attributes.
BGP is used by internet service providers (ISPs) to exchange routing information with each other.
It is a complex protocol that requires careful configuration to ensure proper routin...read more
Q33. Explain the architecture of Kubernetes
Kubernetes is a container orchestration platform that manages and automates the deployment, scaling, and management of containerized applications.
Kubernetes uses a master-slave architecture with a control plane and worker nodes.
The control plane manages the overall state of the cluster and schedules workloads to the worker nodes.
Worker nodes run the containers and communicate with the control plane to receive instructions.
Kubernetes uses declarative configuration files to def...read more
Q34. difference between streams and parallel streams
Streams process elements sequentially, while parallel streams process elements concurrently.
Streams process elements one by one in a sequential manner.
Parallel streams process elements concurrently, potentially utilizing multiple threads for faster processing.
Streams are suitable for smaller datasets or when order matters.
Parallel streams are more efficient for larger datasets or when order is not important.
Example: Stream processing a list of numbers vs. parallel stream proc...read more
Q35. Information about Networking?
Networking is the practice of connecting devices together to share resources and communicate with each other.
Networking involves the use of protocols and technologies such as TCP/IP, DNS, DHCP, and VLANs.
Networks can be wired or wireless, and can span across local or wide areas.
Networking also includes security measures such as firewalls, VPNs, and encryption.
Examples of network devices include routers, switches, hubs, and access points.
Q36. Cloud Project implementation challenges.
Cloud project implementation challenges include security concerns, integration issues, and lack of expertise.
Security concerns related to data privacy and compliance regulations
Integration issues with existing systems and applications
Lack of expertise in cloud technologies and best practices
Cost management and budget constraints
Data migration and transfer challenges
Vendor lock-in and interoperability issues
Q37. What is the clr
CLR stands for Common Language Runtime, a virtual machine component of the .NET framework responsible for managing code execution.
CLR provides services such as memory management, exception handling, and security.
It compiles code into Intermediate Language (IL) and then translates it into machine code at runtime.
CLR allows for language interoperability within the .NET framework, enabling different languages to work together seamlessly.
Q38. Write singleton class
Singleton class ensures only one instance of a class is created and provides a global point of access to it.
Create a private static instance of the class
Provide a private constructor to prevent instantiation
Create a public static method to access the instance
Q39. Use of Hash Table
Hash tables are data structures that store key-value pairs for efficient retrieval.
Hash tables use a hash function to map keys to indexes in an array.
They have constant time complexity for insertion, deletion, and lookup operations.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
Top HR Questions asked in Sykes Business Services Of India
Interview Process at Sykes Business Services Of India
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month