Infosys
10+ Interview Questions and Answers
Q1. What is pass through query and what are it's components?
A pass through query is a SQL statement that is sent directly to a remote database server for processing.
It is used to execute SQL statements on a remote database server.
It is composed of a SQL statement and a connection string.
It is useful for querying large datasets that are stored on a remote server.
It can improve performance by reducing network traffic.
Example: SELECT * FROM [ODBC;Driver={SQL Server};Server=myServerAddress;Database=myDataBase;Uid=myUsername;Pwd=myPassword...read more
Q2. What will happen if there's no run statement?
Without a run statement, the program will not execute any code.
The program will not run any code written in the main function.
If there are any functions called within the main function, they will not be executed.
The program will terminate without any output or error message.
The absence of a run statement may indicate an incomplete or faulty program.
Q3. How will you merge data sets?
Merging data sets involves identifying common variables and combining them into a single dataset.
Identify common variables between the datasets
Ensure data types are consistent across datasets
Use a join operation to combine the datasets
Handle missing or duplicate data appropriately
Perform data cleaning and preprocessing before merging
Example: Merging customer data from two different sources based on customer ID
Q4. Difference between nodup and nodupkey Difference between if and where
nodup vs nodupkey: nodup removes duplicates based on all variables, nodupkey removes duplicates based on key variables. if vs where: if is used for conditional processing, where is used for subsetting data.
nodup removes duplicates based on all variables, while nodupkey removes duplicates based on key variables
if is used for conditional processing within a data step or procedure, while where is used for subsetting data based on a condition
Example: nodup vs nodupkey - nodup wil...read more
Q5. Whate are mode of HCM extracts?
HCM extracts can be obtained through various modes such as BI Publisher, HCM Extracts, and HDL.
BI Publisher is used for creating custom reports
HCM Extracts are used for extracting data from HCM modules
HDL is used for bulk data loading and extraction
Q6. Which methodology you worked on
I have experience working with Agile methodology.
Utilized Agile methodology in previous projects
Participated in daily stand-up meetings
Worked in sprints to deliver incremental value
Q7. Equivalent of SQL joins in SAS
SAS has equivalent functions to SQL joins such as merge, join, and concatenate.
SAS merge function combines two or more datasets based on common variables.
SAS join function combines two or more datasets based on common variables and can specify the type of join (inner, outer, left, right).
SAS concatenate function stacks datasets on top of each other.
Examples: merge dataset1 with dataset2 on variable ID; join dataset1 with dataset2 on variable ID and specify an inner join; conc...read more
Q8. Difference betweenif and where
if is used for conditional statements, where is used for filtering data in SQL queries.
if is used in programming languages for conditional statements, where is used in SQL queries for filtering data
if can be used to execute a block of code based on a condition, where is used to filter rows based on a condition in SQL
if can be used in various programming languages like Java, Python, etc., where is specific to SQL queries
Q9. Depth into ml algo
Understanding the depth of machine learning algorithms and their applications
Explain the different types of machine learning algorithms such as supervised, unsupervised, and reinforcement learning
Discuss the importance of hyperparameters tuning in optimizing the performance of ML algorithms
Provide examples of popular ML algorithms like Random Forest, Support Vector Machines, and Neural Networks
Q10. Proxy define
A proxy is an intermediary server that acts as a gateway between a client and the internet.
A proxy can be used to hide the IP address of the client and provide anonymity.
Proxies can be used to bypass internet censorship and access blocked websites.
Reverse proxies are used to protect servers from direct internet access and distribute traffic.
Examples of popular proxy servers include Squid, Nginx, and Apache.
Proxies can also be used for caching and improving website performance...read more
Interview Process at null
Top Senior Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month