Add office photos
Employer?
Claim Account for FREE

TSYS|Total System Services

4.1
based on 459 Reviews
Filter interviews by

40+ Thinkitive Technologies Interview Questions and Answers

Updated 16 Dec 2024

Q1. What types of high and critical alerts have you handled, and what steps did you take to resolve them?

Ans.

I have handled high and critical alerts related to malware infections, data breaches, and phishing attacks.

  • Identifying the source and scope of the alert

  • Isolating affected systems to prevent further damage

  • Implementing security patches and updates

  • Conducting forensic analysis to determine the extent of the breach

  • Collaborating with IT teams to strengthen security measures

Add your answer

Q2. Q. How to improve SQL performance

Ans.

Improving SQL performance involves optimizing queries, indexes, and server resources.

  • Optimize queries by reducing complexity and avoiding unnecessary joins

  • Use indexes to speed up data retrieval

  • Ensure server resources are adequate for the workload

  • Consider partitioning large tables to improve query performance

  • Use stored procedures to reduce network traffic and improve security

Add your answer

Q3. What is the architecture of a Security Information and Event Management (SIEM) tool?

Ans.

SIEM tool architecture includes data collection, normalization, correlation, and reporting components.

  • Data collection: Gathers security data from various sources like logs, network traffic, and endpoints.

  • Normalization: Standardizes the collected data into a common format for analysis.

  • Correlation: Identifies patterns and relationships in the data to detect security incidents.

  • Reporting: Generates reports and alerts based on the analyzed data for security monitoring and response...read more

Add your answer

Q4. Q.What is Design view,Datasheet view in ms access

Ans.

Design view is used to create and modify database objects, while Datasheet view is used to view and edit data in tables.

  • Design view allows users to create and modify tables, queries, forms, reports, and macros.

  • Datasheet view displays data in a spreadsheet-like format and allows users to edit data directly.

  • Design view is used to set properties and define relationships between tables.

  • Datasheet view is used to sort, filter, and search for specific data.

  • Design view is more suitab...read more

Add your answer
Discover Thinkitive Technologies interview dos and don'ts from real experiences

Q5. Q.What is index,Trigger,Stored procedure

Ans.

Index, trigger, and stored procedure are database objects used to improve performance and automate tasks.

  • An index is a data structure that improves the speed of data retrieval operations on a database table.

  • A trigger is a set of instructions that automatically executes in response to certain events, such as an insert, update, or delete operation on a table.

  • A stored procedure is a precompiled set of SQL statements that can be called by other programs or scripts to perform a sp...read more

Add your answer

Q6. If needed, will you work on the older technology stack?

Ans.

Yes, I am willing to work on older technology stacks if needed.

  • I believe in being adaptable and open to learning new technologies.

  • Working on older technology stacks can provide valuable experience and insights.

  • It is important to understand the context and requirements before making a decision.

  • Examples: Java Servlets, JSP, Struts, Hibernate, etc.

View 1 answer
Are these interview questions helpful?

Q7. Q. Describe joins and types in sql

Ans.

Joins are used to combine data from two or more tables in SQL. There are different types of joins.

  • Inner join returns only the matching rows from both tables

  • Left join returns all the rows from the left table and matching rows from the right table

  • Right join returns all the rows from the right table and matching rows from the left table

  • Full outer join returns all the rows from both tables

  • Cross join returns the Cartesian product of both tables

Add your answer

Q8. Q.Define relationship in sql

Ans.

Relationship in SQL refers to the association between two or more tables based on common fields.

  • Relationships are established using foreign keys

  • Types of relationships include one-to-one, one-to-many, and many-to-many

  • Relationships can be visualized using ER diagrams

  • Joins are used to retrieve data from related tables

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Can you walk me through the background process of credit cards?

Ans.

The background process of credit cards involves application, approval, issuance, usage, billing, and payment.

  • Application: Customer applies for a credit card with a financial institution.

  • Approval: The financial institution reviews the customer's credit history and other factors to approve or deny the application.

  • Issuance: If approved, the credit card is issued to the customer.

  • Usage: The customer uses the credit card to make purchases or transactions.

  • Billing: The financial inst...read more

Add your answer

Q10. Q.Define Class module in vba

Ans.

Class module is a custom object in VBA that allows you to define your own properties and methods.

  • Class modules are used to create custom objects in VBA

  • They allow you to define your own properties and methods

  • You can create instances of a class module and use them in your code

  • Class modules are useful for encapsulating complex logic and data

  • They can be used to create reusable code libraries

Add your answer

Q11. Q.Objects in ms access

Ans.

Objects in MS Access are used to represent tables, forms, reports, and other database objects.

  • Objects are used to organize and manage data in MS Access.

  • Tables are the most basic object and store data in rows and columns.

  • Forms are used to display and edit data in a user-friendly way.

  • Reports are used to present data in a formatted and organized way.

  • Queries are used to retrieve and manipulate data from tables.

  • Modules are used to write VBA code to automate tasks.

  • Macros are used t...read more

Add your answer

Q12. What's the name of your collage?

Ans.

I attended XYZ College.

  • Attended XYZ College for my undergraduate degree.

  • Studied computer science and gained a strong foundation in Java programming.

  • Participated in various coding competitions and hackathons organized by the college.

  • Collaborated with fellow students on group projects to develop fullstack Java applications.

View 1 answer

Q13. Do you have bank statements with you?

Ans.

NO

  • No, I do not have bank statements with me.

  • Bank statements are confidential documents and should not be shared during an interview.

  • If required, I can provide proof of employment or salary through other means.

View 1 answer

Q14. How do you make the communication efficient between modules

Ans.

Efficient communication between modules can be achieved through clear documentation, regular meetings, use of communication tools, and establishing a communication plan.

  • Create clear documentation outlining the interfaces and dependencies between modules

  • Hold regular meetings to discuss progress, issues, and updates on each module

  • Utilize communication tools such as project management software, messaging apps, and email for quick and effective communication

  • Establish a communicat...read more

Add your answer

Q15. Why is customer service important, especially with victims of fraud?

Ans.

Customer service is important with fraud victims to provide support, guidance, and reassurance during a stressful time.

  • Building trust and rapport with victims can help them feel supported and more likely to cooperate with investigations.

  • Providing clear and timely communication can help victims understand the situation and next steps.

  • Offering resources and assistance can help victims navigate the process of reporting fraud and recovering their losses.

  • Showing empathy and unders...read more

Add your answer

Q16. 1. What is ITSM 2. Incident management 3.what is ITIL 4 life cycle of change request

Ans.

ITSM is a set of policies, processes, and procedures for managing IT services.

  • ITSM stands for Information Technology Service Management

  • It involves managing IT services to meet the needs of the organization and its customers

  • ITSM includes processes such as incident management, problem management, change management, and service level management

  • Incident management is the process of restoring normal service operation as quickly as possible after an incident

  • ITIL (Information Techno...read more

Add your answer

Q17. What will you check if a query is long running?

Add your answer

Q18. Various CI - CD tools that you have used.

Ans.

I have experience with Jenkins, GitLab CI/CD, and CircleCI.

  • Jenkins - widely used open-source CI/CD tool with a large plugin ecosystem

  • GitLab CI/CD - integrated with GitLab for seamless code management and deployment

  • CircleCI - cloud-based CI/CD platform with easy setup and integration

Add your answer

Q19. What are the different SQL joins

Ans.

SQL joins are used to combine rows from two or more tables based on a related column between them.

  • INNER JOIN: Returns rows when there is at least one match in both tables

  • LEFT JOIN: Returns all rows from the left table and the matched rows from the right table

  • RIGHT JOIN: Returns all rows from the right table and the matched rows from the left table

  • FULL JOIN: Returns rows when there is a match in one of the tables

  • CROSS JOIN: Returns the Cartesian product of the two tables

Add your answer

Q20. How to manage conflicts within team?

Add your answer

Q21. what do you know about TSYS?

Ans.

TSYS is a global payment solutions provider that offers a range of services including fraud prevention and detection.

  • TSYS stands for Total System Services, Inc.

  • It is one of the largest payment processors in the world.

  • TSYS provides services such as credit card processing, merchant services, and fraud prevention solutions.

  • The company offers tools and technologies to help businesses detect and prevent fraudulent transactions.

  • TSYS has a global presence with offices in multiple co...read more

Add your answer

Q22. 1. What is ITSM 2.life cycle of change request

Ans.

ITSM stands for Information Technology Service Management. It is a set of policies, processes, and procedures for managing IT services.

  • ITSM is used to align IT services with the needs of the business and ensure the delivery of high-quality services.

  • It involves various processes such as incident management, problem management, change management, and service level management.

  • The life cycle of a change request includes stages such as request, assessment, approval, implementation...read more

Add your answer

Q23. What is 4 pillars of OOPS

Ans.

Encapsulation, Inheritance, Polymorphism, Abstraction

  • Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in OOP

  • Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Parent class and child class relationship

  • Polymorphism: Ability to present the same interface for different data types. Example: Method overloading and method overriding

  • Abstraction: Hiding the complex implementation details a...read more

Add your answer

Q24. How do you review codes

Ans.

I review codes by conducting code reviews, using tools for static code analysis, and ensuring adherence to coding standards.

  • Conduct regular code reviews with team members to identify bugs, improve code quality, and share knowledge

  • Utilize tools like SonarQube or Checkmarx for static code analysis to identify potential issues

  • Ensure that coding standards and best practices are followed in the codebase

  • Provide constructive feedback to developers to help them improve their coding s...read more

Add your answer

Q25. How do you balance loads

Ans.

Balancing loads involves prioritizing tasks, assigning resources efficiently, and adjusting schedules as needed.

  • Prioritize tasks based on deadlines and importance

  • Assign resources based on skill sets and availability

  • Adjust schedules to accommodate changes in workload

  • Use project management tools to track progress and allocate resources effectively

Add your answer

Q26. Multi threading and its implementation

Ans.

Multi threading is a programming concept where multiple threads run concurrently within a single process.

  • Multi threading allows for better utilization of CPU resources by running multiple tasks simultaneously.

  • Threads share the same memory space, which can lead to synchronization issues if not handled properly.

  • Examples of multi threading implementations include Java's Thread class, C#'s Task Parallel Library, and Python's threading module.

Add your answer

Q27. Types of inheritance and examples

Ans.

Types of inheritance include single, multiple, multilevel, hierarchical, hybrid, and multipath inheritance.

  • Single inheritance: a class inherits from only one base class.

  • Multiple inheritance: a class inherits from more than one base class.

  • Multilevel inheritance: a class inherits from a class which in turn inherits from another class.

  • Hierarchical inheritance: multiple classes inherit from a single base class.

  • Hybrid inheritance: combination of multiple and multilevel inheritance...read more

Add your answer

Q28. What is Sprint Velocity

Ans.

Sprint Velocity is the amount of work a team can complete during a sprint.

  • It is measured in story points or hours.

  • It helps the team to plan and forecast future sprints.

  • It is calculated by dividing the total number of story points completed by the number of sprints.

  • It can be used to identify areas of improvement and adjust team capacity accordingly.

Add your answer

Q29. What is polymorphism?

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • It enables a single interface to represent multiple data types.

  • Examples include method overloading and method overriding in object-oriented programming.

Add your answer

Q30. Explain Microservices architecture.

Ans.

Microservices architecture is an approach to software development where a large application is broken down into smaller, independent services.

  • Each service is responsible for a specific task or function

  • Services communicate with each other through APIs

  • Each service can be developed, deployed, and scaled independently

  • Allows for greater flexibility and agility in development

  • Examples include Netflix, Amazon, and Uber

Add your answer

Q31. Dml error logging functionality

Ans.

DML error logging functionality allows for capturing errors during data manipulation language operations.

  • DML error logging can be enabled at the table level using the LOG ERRORS clause in DML statements.

  • It helps in identifying and resolving data issues without causing the entire transaction to fail.

  • Errors are logged in a separate error table, allowing the main operation to continue processing.

  • Example: INSERT INTO table_name SELECT * FROM source_table LOG ERRORS INTO error_tab...read more

Add your answer

Q32. Your strong points and weak points?

Add your answer

Q33. Find duplicate in array program

Ans.

Program to find duplicates in an array.

  • Iterate through the array and compare each element with the rest of the elements.

  • If a match is found, add it to a separate array or print it.

  • Use a hash table to keep track of the frequency of each element.

  • Sort the array and compare adjacent elements to find duplicates.

Add your answer

Q34. Diamond problem in c++

Ans.

Diamond problem occurs in multiple inheritance when a class inherits from two classes that have a common base class.

  • Diamond problem can be resolved using virtual inheritance in C++.

  • Virtual inheritance ensures that only one instance of the common base class is inherited by the derived class.

  • Example: class A is inherited by classes B and C, then class D inherits from both B and C. Using virtual inheritance for class A resolves the diamond problem.

Add your answer

Q35. What is abstraction?

Ans.

Abstraction is the concept of hiding complex implementation details and showing only the necessary information to the user.

  • Abstraction allows developers to focus on the essential features of an object or system without getting bogged down in unnecessary details.

  • It helps in reducing complexity and improving efficiency by providing a simplified view of the system.

  • For example, in object-oriented programming, abstract classes and interfaces are used to define a blueprint for othe...read more

Add your answer

Q36. What is DI, IOC

Ans.

DI stands for Dependency Injection and IOC stands for Inversion of Control.

  • DI is a design pattern where the dependencies of a class are injected from the outside rather than created within the class itself.

  • IOC is a design principle where the control of object creation and flow is inverted from the class to an external entity.

  • DI helps in making classes more modular, testable, and flexible.

  • IOC helps in decoupling components and promoting reusability.

  • Example: Using a DI framewor...read more

Add your answer

Q37. What are CODS rule

Ans.

CODS rule is a troubleshooting method used in technical support to identify and resolve issues.

  • CODS stands for Cause, Observation, Diagnosis, Solution.

  • It helps technical support engineers systematically identify the root cause of a problem and provide a solution.

  • By following the CODS rule, engineers can efficiently troubleshoot and resolve technical issues.

  • Example: If a customer reports slow internet connection, the engineer would first identify the cause, observe the symptom...read more

Add your answer

Q38. Oops concepts in java

Ans.

Oops concepts in Java refer to Object-Oriented Programming principles like Inheritance, Polymorphism, Encapsulation, and Abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Polymorphism: Allows objects to be treated as instances of their parent class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Abstraction: Hides the implementation details and only shows the necessary features of an object.

Add your answer

Q39. OOPS concepts in c++

Ans.

OOPS concepts in C++ include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: bundling data and methods that operate on the data into a single unit (class)

  • Inheritance: creating new classes based on existing classes, allowing for code reuse

  • Polymorphism: ability for objects of different classes to be treated as objects of a common superclass

  • Abstraction: hiding complex implementation details and showing only essential features

Add your answer

Q40. Selenium waits , difference

Ans.

Selenium waits are used to pause the execution of the script, while the difference is in the way they wait for an element.

  • Implicit wait is used to wait for a certain amount of time before throwing an exception if the element is not found.

  • Explicit wait is used to wait for a certain condition to occur before proceeding with the execution.

  • Fluent wait is used to wait for an element with a certain frequency and timeout period.

  • The difference between them is that implicit wait is ap...read more

Add your answer

Q41. Abstract class vs INterface

Ans.

Abstract class is a class that can have both abstract and non-abstract methods, while interface is a contract that defines methods that a class must implement.

  • Abstract class can have constructors, fields, and methods, while interface can only have abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Abstract classes are used when some common functionality needs to be shared among multiple classes, while interfaces are used to...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Thinkitive Technologies

based on 30 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 304 Interview Questions
3.8
 • 170 Interview Questions
4.2
 • 164 Interview Questions
4.1
 • 154 Interview Questions
4.2
 • 145 Interview Questions
3.4
 • 138 Interview Questions
View all
Top TSYS|Total System Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter