Analyst

2000+ Analyst Interview Questions and Answers

Updated 5 Feb 2025

Q601. How is ROTE calculatef. What is Debt Equity ratio

Ans.

ROTE is calculated by dividing net income by average shareholder's equity. Debt Equity ratio is calculated by dividing total debt by shareholder's equity.

  • ROTE stands for Return on Tangible Equity

  • ROTE is a measure of a company's profitability

  • Debt Equity ratio indicates the proportion of debt and equity used to finance a company's assets

  • A high Debt Equity ratio indicates a company is relying more on debt to finance its operations

  • ROTE and Debt Equity ratio are important financia...read more

Q602. How to add images in html

Ans.

Images can be added in HTML using the <img> tag with the src attribute specifying the image file path.

  • Use the <img> tag to add images in HTML

  • Specify the image file path in the src attribute

  • Add alt text in the alt attribute for accessibility

  • Set the width and height attributes for image dimensions

Q603. How would you audit the operating expenses?

Ans.

To audit operating expenses, review financial records, analyze expense categories, compare actual expenses to budgeted amounts, and identify any discrepancies or inefficiencies.

  • Review financial records, such as income statements and general ledger accounts, to identify all operating expenses.

  • Analyze expense categories to ensure proper classification and allocation of expenses.

  • Compare actual expenses to budgeted amounts to identify any significant variances.

  • Investigate any dis...read more

Q604. Maximim number of slices that can be cut in cake

Ans.

The maximum number of slices that can be cut in a cake depends on the number of cuts made and the shape of the cake.

  • The maximum number of slices is equal to the number of cuts plus one.

  • The shape of the cake also affects the maximum number of slices that can be cut.

  • For a round cake, the maximum number of slices is equal to the number of cuts made along the diameter plus one.

  • For a rectangular cake, the maximum number of slices is equal to the number of cuts made along the lengt...read more

Are these interview questions helpful?

Q605. How would you identify outliers in a dataset?

Ans.

Identifying outliers in a dataset involves using statistical methods to detect data points that significantly differ from the rest.

  • Calculate the mean and standard deviation of the dataset, then identify data points that fall outside a certain number of standard deviations from the mean.

  • Use box plots to visually identify outliers based on their position outside the whiskers of the plot.

  • Consider using Z-scores to determine how many standard deviations a data point is from the m...read more

Q606. How would you check that the conversation action is accurate?

Ans.

To check the accuracy of conversation action, analyze user inputs, review system responses, and conduct user testing.

  • Analyze user inputs to ensure they are correctly interpreted by the system.

  • Review system responses to verify they align with the intended actions.

  • Conduct user testing to gather feedback on the accuracy and effectiveness of the conversation action.

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q607. What is the MVC (Model-View-Controller) architectural pattern?

Ans.

MVC is an architectural pattern used in software development to separate the application into three main components: Model, View, and Controller.

  • Model represents the data and business logic of the application.

  • View is responsible for displaying the data to the user.

  • Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly.

  • MVC helps in achieving separation of concerns, making the code more organized and easier to maintain....read more

Q608. On tableau - what is row level security ?

Ans.

Row level security in Tableau allows users to restrict access to specific rows of data based on their role or permissions.

  • Row level security is used to control which rows of data a user can access in Tableau.

  • It is typically implemented by creating a security table that defines the relationship between users and the data they can access.

  • Users can be granted access to specific rows based on their role or permissions.

  • Row level security helps ensure that users only see the data t...read more

Analyst Jobs

Analyst/Sr. Analyst - Credit 3-11 years
Maersk Global Service Centres India Pvt. Ltd.
4.2
Pune
Analyst - GBS 1-10 years
BA Continuum India Pvt. Ltd.
4.3
Mumbai
Analyst-GBS 1-3 years
BA Continuum India Pvt. Ltd.
4.3
Mumbai

Q609. tell me about projects you done ,write code on dsa concepts

Ans.

I have worked on various projects implementing Data Structures and Algorithms concepts in code.

  • Implemented a binary search algorithm to search for elements in a sorted array.

  • Developed a priority queue using a heap data structure for efficient insertion and deletion operations.

  • Used a hash table to store key-value pairs for fast retrieval in a dictionary application.

Q610. What are spyware attacks and how to prevent them?

Ans.

Spyware attacks are malicious software that secretly gathers information about a person or organization.

  • Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.

  • To prevent spyware attacks, users should regularly update their operating systems and security software.

  • Avoid clicking on suspicious links or downloading attachments from unknown sources.

  • Use a reputable antivirus program and enable firewall protection on ...read more

Q611. What steps can you take to prevent identity theft?

Ans.

To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.

  • Monitor financial accounts regularly for any suspicious activity

  • Use strong, unique passwords for online accounts

  • Be cautious when sharing personal information online or over the phone

  • Shred sensitive documents before disposing of them

Q612. Window functions and aggregate functions in SQL

Ans.

Window functions and aggregate functions in SQL

  • Window functions perform calculations across a set of table rows related to the current row

  • Aggregate functions perform a calculation on a set of values and return a single value

  • Examples of window functions include ROW_NUMBER(), RANK(), and LAG()

  • Examples of aggregate functions include SUM(), AVG(), and COUNT()

Q613. Can u write a basic programming in Java?

Ans.

Yes, I can write basic programming in Java.

  • I can write a simple 'Hello World' program

  • I can declare variables and assign values to them

  • I can use conditional statements like if-else

  • I can use loops like for and while

  • I can create and use functions

  • I can work with arrays and manipulate their elements

Q614. What do you know much in detail about Finance?

Ans.

I have a strong understanding of financial statements, valuation methods, risk management, and investment strategies.

  • Financial statements: Understanding income statements, balance sheets, and cash flow statements.

  • Valuation methods: Knowledge of discounted cash flow analysis, comparable company analysis, and precedent transactions.

  • Risk management: Familiarity with hedging strategies, diversification, and risk assessment.

  • Investment strategies: Understanding of asset allocation,...read more

Q615. Add/ remove/ columns in spark dataframes

Ans.

Columns can be added or removed from Spark dataframes using select() and drop() functions.

  • To add a column, use withColumn() function and provide a name and expression for the new column.

  • To remove a column, use drop() function and provide the name of the column to be removed.

  • To select specific columns, use select() function and provide the names of the columns to be selected.

  • Example: df.withColumn('new_col', df.col1 + df.col2).drop('col1').select('new_col', 'col2')

Q616. Extract the oyo from domain name in google sheets.

Ans.

Extract 'oyo' from domain name in Google Sheets.

  • Use the formula =REGEXEXTRACT(A1, "oyo") where A1 is the cell containing the domain name.

  • This will extract the first occurrence of 'oyo' in the domain name.

  • If 'oyo' appears multiple times, use =REGEXEXTRACT(A1, "oyo", 2) for the second occurrence, and so on.

Q617. Guesstimate: Estimate the number of windows in a skyscraper

Ans.

Estimate the number of windows in a skyscraper

  • Determine the height and width of the building

  • Estimate the number of floors and windows per floor

  • Consider the type of building and its purpose

  • Take into account any unique architectural features

  • Assume an average window size and spacing

  • Consider any visible windows from the exterior

  • Use online resources for average window-to-floor ratios

  • Adjust estimate based on personal experience or knowledge

  • Finalize estimate with a reasonable range

Q618. Solve Monty Hall problem using Bayesian probability

Ans.

Solving Monty Hall problem using Bayesian probability

  • Assign prior probabilities to each door

  • Update probabilities based on host's action

  • Calculate posterior probabilities and choose the door with highest probability

  • Example: If prior probability of winning behind each door is 1/3, and host opens a door with a goat, the posterior probability of winning behind the remaining door is 2/3

  • Example: Bayes' theorem can be used to calculate the posterior probability

Q619. What is difference between C and gamma in SVM

Ans.

C is the regularization parameter while gamma controls the shape of the decision boundary in SVM.

  • C controls the trade-off between achieving a low training error and a low testing error.

  • A smaller C value creates a wider margin and allows more misclassifications.

  • Gamma controls the shape of the decision boundary and the influence of each training example.

  • A smaller gamma value creates a smoother decision boundary while a larger gamma value creates a more complex decision boundary...read more

Q620. What is Encapsulation and explain with example?

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and only exposing the necessary functionalities.

  • It allows for better control over the data by preventing direct access from outside the class.

  • Encapsulation promotes code reusability and modularity.

  • Example: In a class representing a car, the variables like speed and fuel level can be encapsulated along with methods ...read more

Q621. What is financial derivative

Ans.

A financial derivative is a contract between two parties based on an underlying asset or financial instrument.

  • A derivative derives its value from an underlying asset such as stocks, bonds, commodities, or currencies.

  • It is a financial instrument that allows investors to speculate on the price movements of the underlying asset without owning it.

  • Derivatives can be used for hedging, speculation, or arbitrage.

  • Common types of derivatives include options, futures, forwards, and swap...read more

Q622. What is the ER Model?

Q623. What is warehouse and its uses?

Ans.

A warehouse is a large storage facility used to store goods and products for distribution or sale.

  • Warehouses are used by manufacturers, wholesalers, retailers, and other businesses to store their products.

  • They can be used for short-term or long-term storage, depending on the needs of the business.

  • Warehouses can also be used for cross-docking, where products are quickly transferred from one truck to another for faster distribution.

  • Some warehouses are fully automated, using rob...read more

Q624. why are you interested in analytics?

Ans.

I am interested in analytics because it allows me to uncover insights, make data-driven decisions, and solve complex problems.

  • I enjoy working with data and finding patterns and trends.

  • Analytics helps me understand the underlying factors and drivers behind business performance.

  • It allows me to make informed decisions and recommendations based on data analysis.

  • Analytics can provide valuable insights that lead to improved efficiency and effectiveness.

  • I find satisfaction in solvin...read more

Q625. Why we use stored procedures, trigger ?

Ans.

Stored procedures and triggers are used to improve database performance and maintain data integrity.

  • Stored procedures allow for precompiled SQL statements, reducing processing time.

  • Triggers can automatically enforce business rules and maintain data consistency.

  • Both stored procedures and triggers can improve security by limiting direct access to the database.

  • Examples of triggers include auditing changes to a table or automatically updating related data in another table.

  • Example...read more

Q626. How decrease of 10% depreciation would affect financial statements

Ans.

A 10% decrease in depreciation would result in higher net income and retained earnings on the financial statements.

  • Net income would increase as depreciation expense is lower, leading to higher profits.

  • Retained earnings would also increase as net income contributes to this account.

  • The company's assets would appear higher on the balance sheet due to lower accumulated depreciation.

  • Investors may view the company more favorably with higher net income and retained earnings.

Q627. how is the compliance checks done in internal audit

Ans.

Compliance checks in internal audit are conducted through various methods to ensure adherence to regulations and policies.

  • Compliance checks involve reviewing policies and procedures to ensure they align with regulations

  • Auditors may conduct interviews with employees to verify compliance with policies

  • Testing of transactions and processes may be performed to identify any non-compliance issues

  • Documentation review is also a common method used in compliance checks

Q628. Explain the Architecture of Spark

Ans.

Spark has a master-slave architecture with a cluster manager and worker nodes.

  • Spark has a driver program that communicates with a cluster manager to allocate resources and schedule tasks.

  • Worker nodes execute tasks and return results to the driver program.

  • Spark supports multiple cluster managers like YARN, Mesos, and standalone.

  • Spark also has a DAG (Directed Acyclic Graph) scheduler that optimizes task execution.

  • Spark's architecture allows for in-memory processing and caching ...read more

Q629. how to automate excel function to calculate moving averages

Ans.

Automate excel function for calculating moving averages

  • Use the AVERAGE function with a range of cells that includes the current and previous values

  • Use the OFFSET function to create a dynamic range for the moving average calculation

  • Use the COUNT function to adjust the range for the first few cells

  • Use VBA to create a macro that automates the process

  • Use the Data Analysis Toolpak add-in to calculate moving averages

Q630. How to calculate service level ?

Ans.

Service level is calculated by dividing the number of calls answered within a certain time frame by the total number of calls received.

  • Determine the time frame for which you want to calculate the service level

  • Count the number of calls received during that time frame

  • Count the number of calls answered within the specified time frame

  • Divide the number of calls answered by the total number of calls received and multiply by 100 to get the service level percentage

  • For example, if you...read more

Q631. Join 3 tables using SQL

Ans.

Joining three tables using SQL

  • Use the JOIN keyword to combine the tables based on a common column

  • Specify the columns to select from each table

  • Use the ON keyword to define the join condition

Q632. tell me the difference between having and group by sql

Ans.

GROUP BY is used to group rows that have the same values into summary rows, while HAVING is used to filter groups based on a specified condition.

  • GROUP BY is used with aggregate functions to group the result-set by one or more columns.

  • HAVING is used to filter groups based on a specified condition after the GROUP BY clause.

  • HAVING is used with aggregate functions to filter the result-set based on a condition.

  • Example: SELECT department, COUNT(*) FROM employees GROUP BY department...read more

Q633. What are ways through which credit card companies earn revenue?

Ans.

Credit card companies earn revenue through interest charges, annual fees, interchange fees, and late payment fees.

  • Interest charges on balances carried over from month to month

  • Annual fees charged for card membership

  • Interchange fees paid by merchants for processing transactions

  • Late payment fees for missed or delayed payments

Q634. what happens when you type google.com on browser addressbar

Ans.

Typing google.com in the browser address bar will take you to the Google search engine website.

  • Typing google.com in the address bar sends a request to the DNS server to resolve the domain name to an IP address.

  • The browser then sends a request to the IP address associated with google.com.

  • The server hosting Google's website responds with the necessary files to display the webpage.

  • The browser renders the webpage and displays the Google search engine interface.

Q635. What is capital markets

Ans.

Capital markets are financial markets where long-term securities such as stocks and bonds are traded.

  • Capital markets are where companies and governments raise funds by issuing securities.

  • These markets are typically for long-term investments and have a lower liquidity than other financial markets.

  • Examples of capital markets include the New York Stock Exchange and the bond market.

  • Investors in capital markets are typically institutional investors such as pension funds and insura...read more

Q636. What is difference between calculated column and measure

Ans.

Calculated columns are pre-defined while measures are dynamic calculations based on user input.

  • Calculated columns are computed during data modeling and added to the table

  • Measures are computed on the fly based on user input and can be changed dynamically

  • Calculated columns are used for static analysis while measures are used for dynamic analysis

  • Examples of calculated columns include concatenation of columns, while measures include sum, average, etc.

Q637. What's is process of Ariba What's is P20 explain about S2P Terms and conditions in P2P Approval flow What's are difficulties found in Ariba Exaplain about MDM

Ans.

Ariba is a cloud-based procurement platform used for sourcing, procurement, and supplier management.

  • Ariba is a procurement platform that helps streamline the procurement process by connecting buyers and suppliers.

  • P20 is a procurement process within Ariba that focuses on strategic sourcing and supplier management.

  • S2P stands for Source-to-Pay, which is the end-to-end procurement process that includes sourcing, procurement, and payment.

  • Terms and conditions in P2P refer to the ag...read more

Q638. Determination of dithiocarbomates in agricultural sample

Ans.

Determination of dithiocarbomates in agricultural sample

  • Use liquid chromatography-mass spectrometry (LC-MS) for analysis

  • Sample preparation involves extraction with organic solvents

  • Derivatization with a reagent like 2-mercaptobenzothiazole may be necessary

  • Quantification can be done using external or internal standards

  • Dithiocarbomates are commonly used as fungicides and pesticides in agriculture

Q639. How do you denote different generations of GDG.

Ans.

Different generations of GDG can be denoted by adding a suffix to the GDG base name.

  • Add a suffix to the GDG base name to denote different generations.

  • For example, GDG.BASE(+1) denotes the first generation, GDG.BASE(+2) denotes the second generation, and so on.

  • The maximum number of generations that can be denoted depends on the system.

  • The suffix can also be a date or time stamp to denote when the generation was created.

Q640. How many types of money laundering, effects of money laundering

Ans.

Money laundering involves various types and has significant effects on economies and society.

  • There are three main types of money laundering: placement, layering, and integration.

  • Placement involves introducing illicit funds into the financial system, often through cash deposits or purchases.

  • Layering involves complex transactions to obscure the origin of funds, such as multiple transfers between accounts or countries.

  • Integration is the final stage where laundered funds are inte...read more

Q641. What is hedge fund and its type of structure

Ans.

A hedge fund is an investment fund that pools capital from accredited individuals or institutional investors and invests in a variety of assets.

  • Hedge funds are typically only available to accredited investors due to their high-risk nature.

  • They use a variety of investment strategies, including long and short positions, leverage, and derivatives.

  • Hedge funds are structured as limited partnerships, with the fund manager as the general partner and the investors as limited partners...read more

Q642. can you describe the purpose of polymorphism in OOPs?

Ans.

Polymorphism in OOP allows objects of different classes to be treated as objects of a common superclass.

  • Polymorphism allows for flexibility and reusability in code.

  • It enables a single interface to be used for different data types.

  • Examples include method overriding and method overloading.

  • Polymorphism is achieved through inheritance and interfaces in OOP.

Q643. What is the difference between blockchain and network fees?

Ans.

Blockchain is a decentralized digital ledger, while network fees are charges for using a network.

  • Blockchain is a technology that enables the secure and transparent recording of transactions.

  • It is a decentralized system where multiple computers, known as nodes, maintain a copy of the blockchain.

  • Blockchain eliminates the need for intermediaries and provides immutability and transparency.

  • Network fees, on the other hand, are charges associated with using a network or platform.

  • The...read more

Q644. Parameters methods? How they are performed ?mrl of parameters

Ans.

Parameter methods are used to estimate unknown parameters in a statistical model.

  • Parameter methods involve using statistical techniques to estimate unknown parameters in a model.

  • These methods can include maximum likelihood estimation, Bayesian estimation, and method of moments.

  • The choice of method depends on the specific model and data being analyzed.

  • For example, maximum likelihood estimation is commonly used in logistic regression models.

  • The MRL (minimum required level) of p...read more

Q645. What is Alpha in financial markets?

Ans.

Alpha in financial markets is a measure of an investment's performance compared to a benchmark index.

  • Alpha is used to assess the skill of a portfolio manager in generating returns above the market return.

  • A positive alpha indicates outperformance, while a negative alpha indicates underperformance.

  • Alpha is often used in conjunction with beta, which measures the volatility of an investment compared to the market.

Q646. Do you know about PI planning

Ans.

PI planning stands for Program Increment planning, a key event in Agile development where teams plan and coordinate their work for the upcoming program increment.

  • PI planning involves multiple Agile teams coming together to align on priorities, dependencies, and objectives for the upcoming program increment.

  • It typically lasts for 2 days and includes activities such as backlog refinement, estimating, and dependency mapping.

  • The output of PI planning is a plan that outlines the f...read more

Q647. What are the technical websites you follow

Ans.

I follow several technical websites to stay updated with the latest trends and developments.

  • I follow TechCrunch for news on startups and emerging technologies

  • I read Wired for in-depth analysis on tech trends and their impact on society

  • I visit GitHub for open-source projects and code repositories

  • I check out Stack Overflow for technical Q&A and problem-solving

  • I follow Ars Technica for news and reviews on science and technology

  • I read The Verge for coverage on consumer technology...read more

Q648. What is a pricing procedure

Ans.

A pricing procedure is a set of instructions that determines the price of a product or service based on various factors.

  • It is used in SAP to calculate the price of a product or service

  • It considers various factors such as discounts, taxes, surcharges, etc.

  • It consists of condition types, access sequences, and calculation schema

  • Example: A pricing procedure for a product may consider the quantity ordered, customer type, and any applicable discounts

Q649. What is CLT theorem and what are its uses

Ans.

CLT theorem states that the distribution of sample means approaches a normal distribution as sample size increases.

  • Central Limit Theorem (CLT) is a fundamental concept in statistics that states that the distribution of sample means approaches a normal distribution as the sample size increases.

  • It is used in hypothesis testing, confidence intervals, and in estimating population parameters.

  • CLT is essential in making inferences about a population based on sample data.

  • For example,...read more

Q650. How do you print page numbers in a report

Ans.

To print page numbers in a report, use the page number feature in your word processing software.

  • Insert page numbers in the header or footer section of the document

  • Choose the format and position of the page numbers

  • Update the page numbers automatically as you add or remove pages

  • Preview the document to ensure the page numbers appear correctly

Previous
10
11
12
13
14
15
16
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.8
 • 8.2k Interviews
3.7
 • 5.6k Interviews
3.7
 • 4.8k Interviews
3.5
 • 3.8k Interviews
3.8
 • 2.9k Interviews
3.5
 • 799 Interviews
3.3
 • 505 Interviews
3.5
 • 408 Interviews
3.9
 • 365 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Analyst Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter