TSYS|Total System Services
40+ Thinkitive Technologies Interview Questions and Answers
Q1. What types of high and critical alerts have you handled, and what steps did you take to resolve them?
I have handled high and critical alerts related to malware infections, data breaches, and phishing attacks.
Identifying the source and scope of the alert
Isolating affected systems to prevent further damage
Implementing security patches and updates
Conducting forensic analysis to determine the extent of the breach
Collaborating with IT teams to strengthen security measures
Q2. Q. How to improve SQL performance
Improving SQL performance involves optimizing queries, indexes, and server resources.
Optimize queries by reducing complexity and avoiding unnecessary joins
Use indexes to speed up data retrieval
Ensure server resources are adequate for the workload
Consider partitioning large tables to improve query performance
Use stored procedures to reduce network traffic and improve security
Q3. What is the architecture of a Security Information and Event Management (SIEM) tool?
SIEM tool architecture includes data collection, normalization, correlation, and reporting components.
Data collection: Gathers security data from various sources like logs, network traffic, and endpoints.
Normalization: Standardizes the collected data into a common format for analysis.
Correlation: Identifies patterns and relationships in the data to detect security incidents.
Reporting: Generates reports and alerts based on the analyzed data for security monitoring and response...read more
Q4. Q.What is Design view,Datasheet view in ms access
Design view is used to create and modify database objects, while Datasheet view is used to view and edit data in tables.
Design view allows users to create and modify tables, queries, forms, reports, and macros.
Datasheet view displays data in a spreadsheet-like format and allows users to edit data directly.
Design view is used to set properties and define relationships between tables.
Datasheet view is used to sort, filter, and search for specific data.
Design view is more suitab...read more
Q5. Q.What is index,Trigger,Stored procedure
Index, trigger, and stored procedure are database objects used to improve performance and automate tasks.
An index is a data structure that improves the speed of data retrieval operations on a database table.
A trigger is a set of instructions that automatically executes in response to certain events, such as an insert, update, or delete operation on a table.
A stored procedure is a precompiled set of SQL statements that can be called by other programs or scripts to perform a sp...read more
Q6. If needed, will you work on the older technology stack?
Yes, I am willing to work on older technology stacks if needed.
I believe in being adaptable and open to learning new technologies.
Working on older technology stacks can provide valuable experience and insights.
It is important to understand the context and requirements before making a decision.
Examples: Java Servlets, JSP, Struts, Hibernate, etc.
Q7. Q. Describe joins and types in sql
Joins are used to combine data from two or more tables in SQL. There are different types of joins.
Inner join returns only the matching rows from both tables
Left join returns all the rows from the left table and matching rows from the right table
Right join returns all the rows from the right table and matching rows from the left table
Full outer join returns all the rows from both tables
Cross join returns the Cartesian product of both tables
Q8. Q.Define relationship in sql
Relationship in SQL refers to the association between two or more tables based on common fields.
Relationships are established using foreign keys
Types of relationships include one-to-one, one-to-many, and many-to-many
Relationships can be visualized using ER diagrams
Joins are used to retrieve data from related tables
Q9. Can you walk me through the background process of credit cards?
The background process of credit cards involves application, approval, issuance, usage, billing, and payment.
Application: Customer applies for a credit card with a financial institution.
Approval: The financial institution reviews the customer's credit history and other factors to approve or deny the application.
Issuance: If approved, the credit card is issued to the customer.
Usage: The customer uses the credit card to make purchases or transactions.
Billing: The financial inst...read more
Q10. Q.Define Class module in vba
Class module is a custom object in VBA that allows you to define your own properties and methods.
Class modules are used to create custom objects in VBA
They allow you to define your own properties and methods
You can create instances of a class module and use them in your code
Class modules are useful for encapsulating complex logic and data
They can be used to create reusable code libraries
Q11. Q.Objects in ms access
Objects in MS Access are used to represent tables, forms, reports, and other database objects.
Objects are used to organize and manage data in MS Access.
Tables are the most basic object and store data in rows and columns.
Forms are used to display and edit data in a user-friendly way.
Reports are used to present data in a formatted and organized way.
Queries are used to retrieve and manipulate data from tables.
Modules are used to write VBA code to automate tasks.
Macros are used t...read more
Q12. What's the name of your collage?
I attended XYZ College.
Attended XYZ College for my undergraduate degree.
Studied computer science and gained a strong foundation in Java programming.
Participated in various coding competitions and hackathons organized by the college.
Collaborated with fellow students on group projects to develop fullstack Java applications.
Q13. Do you have bank statements with you?
NO
No, I do not have bank statements with me.
Bank statements are confidential documents and should not be shared during an interview.
If required, I can provide proof of employment or salary through other means.
Q14. How do you make the communication efficient between modules
Efficient communication between modules can be achieved through clear documentation, regular meetings, use of communication tools, and establishing a communication plan.
Create clear documentation outlining the interfaces and dependencies between modules
Hold regular meetings to discuss progress, issues, and updates on each module
Utilize communication tools such as project management software, messaging apps, and email for quick and effective communication
Establish a communicat...read more
Q15. Why is customer service important, especially with victims of fraud?
Customer service is important with fraud victims to provide support, guidance, and reassurance during a stressful time.
Building trust and rapport with victims can help them feel supported and more likely to cooperate with investigations.
Providing clear and timely communication can help victims understand the situation and next steps.
Offering resources and assistance can help victims navigate the process of reporting fraud and recovering their losses.
Showing empathy and unders...read more
Q16. 1. What is ITSM 2. Incident management 3.what is ITIL 4 life cycle of change request
ITSM is a set of policies, processes, and procedures for managing IT services.
ITSM stands for Information Technology Service Management
It involves managing IT services to meet the needs of the organization and its customers
ITSM includes processes such as incident management, problem management, change management, and service level management
Incident management is the process of restoring normal service operation as quickly as possible after an incident
ITIL (Information Techno...read more
Q17. What will you check if a query is long running?
Q18. Various CI - CD tools that you have used.
I have experience with Jenkins, GitLab CI/CD, and CircleCI.
Jenkins - widely used open-source CI/CD tool with a large plugin ecosystem
GitLab CI/CD - integrated with GitLab for seamless code management and deployment
CircleCI - cloud-based CI/CD platform with easy setup and integration
Q19. What are the different SQL joins
SQL joins are used to combine rows from two or more tables based on a related column between them.
INNER JOIN: Returns rows when there is at least one match in both tables
LEFT JOIN: Returns all rows from the left table and the matched rows from the right table
RIGHT JOIN: Returns all rows from the right table and the matched rows from the left table
FULL JOIN: Returns rows when there is a match in one of the tables
CROSS JOIN: Returns the Cartesian product of the two tables
Q20. How to manage conflicts within team?
Q21. what do you know about TSYS?
TSYS is a global payment solutions provider that offers a range of services including fraud prevention and detection.
TSYS stands for Total System Services, Inc.
It is one of the largest payment processors in the world.
TSYS provides services such as credit card processing, merchant services, and fraud prevention solutions.
The company offers tools and technologies to help businesses detect and prevent fraudulent transactions.
TSYS has a global presence with offices in multiple co...read more
Q22. 1. What is ITSM 2.life cycle of change request
ITSM stands for Information Technology Service Management. It is a set of policies, processes, and procedures for managing IT services.
ITSM is used to align IT services with the needs of the business and ensure the delivery of high-quality services.
It involves various processes such as incident management, problem management, change management, and service level management.
The life cycle of a change request includes stages such as request, assessment, approval, implementation...read more
Q23. What is 4 pillars of OOPS
Encapsulation, Inheritance, Polymorphism, Abstraction
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in OOP
Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Parent class and child class relationship
Polymorphism: Ability to present the same interface for different data types. Example: Method overloading and method overriding
Abstraction: Hiding the complex implementation details a...read more
Q24. How do you review codes
I review codes by conducting code reviews, using tools for static code analysis, and ensuring adherence to coding standards.
Conduct regular code reviews with team members to identify bugs, improve code quality, and share knowledge
Utilize tools like SonarQube or Checkmarx for static code analysis to identify potential issues
Ensure that coding standards and best practices are followed in the codebase
Provide constructive feedback to developers to help them improve their coding s...read more
Q25. How do you balance loads
Balancing loads involves prioritizing tasks, assigning resources efficiently, and adjusting schedules as needed.
Prioritize tasks based on deadlines and importance
Assign resources based on skill sets and availability
Adjust schedules to accommodate changes in workload
Use project management tools to track progress and allocate resources effectively
Q26. Multi threading and its implementation
Multi threading is a programming concept where multiple threads run concurrently within a single process.
Multi threading allows for better utilization of CPU resources by running multiple tasks simultaneously.
Threads share the same memory space, which can lead to synchronization issues if not handled properly.
Examples of multi threading implementations include Java's Thread class, C#'s Task Parallel Library, and Python's threading module.
Q27. Types of inheritance and examples
Types of inheritance include single, multiple, multilevel, hierarchical, hybrid, and multipath inheritance.
Single inheritance: a class inherits from only one base class.
Multiple inheritance: a class inherits from more than one base class.
Multilevel inheritance: a class inherits from a class which in turn inherits from another class.
Hierarchical inheritance: multiple classes inherit from a single base class.
Hybrid inheritance: combination of multiple and multilevel inheritance...read more
Q28. What is Sprint Velocity
Sprint Velocity is the amount of work a team can complete during a sprint.
It is measured in story points or hours.
It helps the team to plan and forecast future sprints.
It is calculated by dividing the total number of story points completed by the number of sprints.
It can be used to identify areas of improvement and adjust team capacity accordingly.
Q29. What is polymorphism?
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables a single interface to represent multiple data types.
Examples include method overloading and method overriding in object-oriented programming.
Q30. Explain Microservices architecture.
Microservices architecture is an approach to software development where a large application is broken down into smaller, independent services.
Each service is responsible for a specific task or function
Services communicate with each other through APIs
Each service can be developed, deployed, and scaled independently
Allows for greater flexibility and agility in development
Examples include Netflix, Amazon, and Uber
Q31. Dml error logging functionality
DML error logging functionality allows for capturing errors during data manipulation language operations.
DML error logging can be enabled at the table level using the LOG ERRORS clause in DML statements.
It helps in identifying and resolving data issues without causing the entire transaction to fail.
Errors are logged in a separate error table, allowing the main operation to continue processing.
Example: INSERT INTO table_name SELECT * FROM source_table LOG ERRORS INTO error_tab...read more
Q32. Your strong points and weak points?
Q33. Find duplicate in array program
Program to find duplicates in an array.
Iterate through the array and compare each element with the rest of the elements.
If a match is found, add it to a separate array or print it.
Use a hash table to keep track of the frequency of each element.
Sort the array and compare adjacent elements to find duplicates.
Q34. Diamond problem in c++
Diamond problem occurs in multiple inheritance when a class inherits from two classes that have a common base class.
Diamond problem can be resolved using virtual inheritance in C++.
Virtual inheritance ensures that only one instance of the common base class is inherited by the derived class.
Example: class A is inherited by classes B and C, then class D inherits from both B and C. Using virtual inheritance for class A resolves the diamond problem.
Q35. What is abstraction?
Abstraction is the concept of hiding complex implementation details and showing only the necessary information to the user.
Abstraction allows developers to focus on the essential features of an object or system without getting bogged down in unnecessary details.
It helps in reducing complexity and improving efficiency by providing a simplified view of the system.
For example, in object-oriented programming, abstract classes and interfaces are used to define a blueprint for othe...read more
Q36. What is DI, IOC
DI stands for Dependency Injection and IOC stands for Inversion of Control.
DI is a design pattern where the dependencies of a class are injected from the outside rather than created within the class itself.
IOC is a design principle where the control of object creation and flow is inverted from the class to an external entity.
DI helps in making classes more modular, testable, and flexible.
IOC helps in decoupling components and promoting reusability.
Example: Using a DI framewor...read more
Q37. What are CODS rule
CODS rule is a troubleshooting method used in technical support to identify and resolve issues.
CODS stands for Cause, Observation, Diagnosis, Solution.
It helps technical support engineers systematically identify the root cause of a problem and provide a solution.
By following the CODS rule, engineers can efficiently troubleshoot and resolve technical issues.
Example: If a customer reports slow internet connection, the engineer would first identify the cause, observe the symptom...read more
Q38. Oops concepts in java
Oops concepts in Java refer to Object-Oriented Programming principles like Inheritance, Polymorphism, Encapsulation, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Allows objects to be treated as instances of their parent class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Abstraction: Hides the implementation details and only shows the necessary features of an object.
Q39. OOPS concepts in c++
OOPS concepts in C++ include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling data and methods that operate on the data into a single unit (class)
Inheritance: creating new classes based on existing classes, allowing for code reuse
Polymorphism: ability for objects of different classes to be treated as objects of a common superclass
Abstraction: hiding complex implementation details and showing only essential features
Q40. Selenium waits , difference
Selenium waits are used to pause the execution of the script, while the difference is in the way they wait for an element.
Implicit wait is used to wait for a certain amount of time before throwing an exception if the element is not found.
Explicit wait is used to wait for a certain condition to occur before proceeding with the execution.
Fluent wait is used to wait for an element with a certain frequency and timeout period.
The difference between them is that implicit wait is ap...read more
Q41. Abstract class vs INterface
Abstract class is a class that can have both abstract and non-abstract methods, while interface is a contract that defines methods that a class must implement.
Abstract class can have constructors, fields, and methods, while interface can only have abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes are used when some common functionality needs to be shared among multiple classes, while interfaces are used to...read more
Top HR Questions asked in Thinkitive Technologies
Interview Process at Thinkitive Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month