Analyst
2000+ Analyst Interview Questions and Answers
Q601. How is ROTE calculatef. What is Debt Equity ratio
ROTE is calculated by dividing net income by average shareholder's equity. Debt Equity ratio is calculated by dividing total debt by shareholder's equity.
ROTE stands for Return on Tangible Equity
ROTE is a measure of a company's profitability
Debt Equity ratio indicates the proportion of debt and equity used to finance a company's assets
A high Debt Equity ratio indicates a company is relying more on debt to finance its operations
ROTE and Debt Equity ratio are important financia...read more
Q602. How to add images in html
Images can be added in HTML using the <img> tag with the src attribute specifying the image file path.
Use the <img> tag to add images in HTML
Specify the image file path in the src attribute
Add alt text in the alt attribute for accessibility
Set the width and height attributes for image dimensions
Q603. How would you audit the operating expenses?
To audit operating expenses, review financial records, analyze expense categories, compare actual expenses to budgeted amounts, and identify any discrepancies or inefficiencies.
Review financial records, such as income statements and general ledger accounts, to identify all operating expenses.
Analyze expense categories to ensure proper classification and allocation of expenses.
Compare actual expenses to budgeted amounts to identify any significant variances.
Investigate any dis...read more
Q604. Maximim number of slices that can be cut in cake
The maximum number of slices that can be cut in a cake depends on the number of cuts made and the shape of the cake.
The maximum number of slices is equal to the number of cuts plus one.
The shape of the cake also affects the maximum number of slices that can be cut.
For a round cake, the maximum number of slices is equal to the number of cuts made along the diameter plus one.
For a rectangular cake, the maximum number of slices is equal to the number of cuts made along the lengt...read more
Q605. How would you identify outliers in a dataset?
Identifying outliers in a dataset involves using statistical methods to detect data points that significantly differ from the rest.
Calculate the mean and standard deviation of the dataset, then identify data points that fall outside a certain number of standard deviations from the mean.
Use box plots to visually identify outliers based on their position outside the whiskers of the plot.
Consider using Z-scores to determine how many standard deviations a data point is from the m...read more
Q606. How would you check that the conversation action is accurate?
To check the accuracy of conversation action, analyze user inputs, review system responses, and conduct user testing.
Analyze user inputs to ensure they are correctly interpreted by the system.
Review system responses to verify they align with the intended actions.
Conduct user testing to gather feedback on the accuracy and effectiveness of the conversation action.
Share interview questions and help millions of jobseekers 🌟
Q607. What is the MVC (Model-View-Controller) architectural pattern?
MVC is an architectural pattern used in software development to separate the application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application.
View is responsible for displaying the data to the user.
Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly.
MVC helps in achieving separation of concerns, making the code more organized and easier to maintain....read more
Q608. On tableau - what is row level security ?
Row level security in Tableau allows users to restrict access to specific rows of data based on their role or permissions.
Row level security is used to control which rows of data a user can access in Tableau.
It is typically implemented by creating a security table that defines the relationship between users and the data they can access.
Users can be granted access to specific rows based on their role or permissions.
Row level security helps ensure that users only see the data t...read more
Analyst Jobs
Q609. tell me about projects you done ,write code on dsa concepts
I have worked on various projects implementing Data Structures and Algorithms concepts in code.
Implemented a binary search algorithm to search for elements in a sorted array.
Developed a priority queue using a heap data structure for efficient insertion and deletion operations.
Used a hash table to store key-value pairs for fast retrieval in a dictionary application.
Q610. What are spyware attacks and how to prevent them?
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a reputable antivirus program and enable firewall protection on ...read more
Q611. What steps can you take to prevent identity theft?
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of them
Q612. Window functions and aggregate functions in SQL
Window functions and aggregate functions in SQL
Window functions perform calculations across a set of table rows related to the current row
Aggregate functions perform a calculation on a set of values and return a single value
Examples of window functions include ROW_NUMBER(), RANK(), and LAG()
Examples of aggregate functions include SUM(), AVG(), and COUNT()
Q613. Can u write a basic programming in Java?
Yes, I can write basic programming in Java.
I can write a simple 'Hello World' program
I can declare variables and assign values to them
I can use conditional statements like if-else
I can use loops like for and while
I can create and use functions
I can work with arrays and manipulate their elements
Q614. What do you know much in detail about Finance?
I have a strong understanding of financial statements, valuation methods, risk management, and investment strategies.
Financial statements: Understanding income statements, balance sheets, and cash flow statements.
Valuation methods: Knowledge of discounted cash flow analysis, comparable company analysis, and precedent transactions.
Risk management: Familiarity with hedging strategies, diversification, and risk assessment.
Investment strategies: Understanding of asset allocation,...read more
Q615. Add/ remove/ columns in spark dataframes
Columns can be added or removed from Spark dataframes using select() and drop() functions.
To add a column, use withColumn() function and provide a name and expression for the new column.
To remove a column, use drop() function and provide the name of the column to be removed.
To select specific columns, use select() function and provide the names of the columns to be selected.
Example: df.withColumn('new_col', df.col1 + df.col2).drop('col1').select('new_col', 'col2')
Q616. Extract the oyo from domain name in google sheets.
Extract 'oyo' from domain name in Google Sheets.
Use the formula =REGEXEXTRACT(A1, "oyo") where A1 is the cell containing the domain name.
This will extract the first occurrence of 'oyo' in the domain name.
If 'oyo' appears multiple times, use =REGEXEXTRACT(A1, "oyo", 2) for the second occurrence, and so on.
Q617. Guesstimate: Estimate the number of windows in a skyscraper
Estimate the number of windows in a skyscraper
Determine the height and width of the building
Estimate the number of floors and windows per floor
Consider the type of building and its purpose
Take into account any unique architectural features
Assume an average window size and spacing
Consider any visible windows from the exterior
Use online resources for average window-to-floor ratios
Adjust estimate based on personal experience or knowledge
Finalize estimate with a reasonable range
Q618. Solve Monty Hall problem using Bayesian probability
Solving Monty Hall problem using Bayesian probability
Assign prior probabilities to each door
Update probabilities based on host's action
Calculate posterior probabilities and choose the door with highest probability
Example: If prior probability of winning behind each door is 1/3, and host opens a door with a goat, the posterior probability of winning behind the remaining door is 2/3
Example: Bayes' theorem can be used to calculate the posterior probability
Q619. What is difference between C and gamma in SVM
C is the regularization parameter while gamma controls the shape of the decision boundary in SVM.
C controls the trade-off between achieving a low training error and a low testing error.
A smaller C value creates a wider margin and allows more misclassifications.
Gamma controls the shape of the decision boundary and the influence of each training example.
A smaller gamma value creates a smoother decision boundary while a larger gamma value creates a more complex decision boundary...read more
Q620. What is Encapsulation and explain with example?
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and only exposing the necessary functionalities.
It allows for better control over the data by preventing direct access from outside the class.
Encapsulation promotes code reusability and modularity.
Example: In a class representing a car, the variables like speed and fuel level can be encapsulated along with methods ...read more
Q621. What is financial derivative
A financial derivative is a contract between two parties based on an underlying asset or financial instrument.
A derivative derives its value from an underlying asset such as stocks, bonds, commodities, or currencies.
It is a financial instrument that allows investors to speculate on the price movements of the underlying asset without owning it.
Derivatives can be used for hedging, speculation, or arbitrage.
Common types of derivatives include options, futures, forwards, and swap...read more
Q623. What is warehouse and its uses?
A warehouse is a large storage facility used to store goods and products for distribution or sale.
Warehouses are used by manufacturers, wholesalers, retailers, and other businesses to store their products.
They can be used for short-term or long-term storage, depending on the needs of the business.
Warehouses can also be used for cross-docking, where products are quickly transferred from one truck to another for faster distribution.
Some warehouses are fully automated, using rob...read more
Q624. why are you interested in analytics?
I am interested in analytics because it allows me to uncover insights, make data-driven decisions, and solve complex problems.
I enjoy working with data and finding patterns and trends.
Analytics helps me understand the underlying factors and drivers behind business performance.
It allows me to make informed decisions and recommendations based on data analysis.
Analytics can provide valuable insights that lead to improved efficiency and effectiveness.
I find satisfaction in solvin...read more
Q625. Why we use stored procedures, trigger ?
Stored procedures and triggers are used to improve database performance and maintain data integrity.
Stored procedures allow for precompiled SQL statements, reducing processing time.
Triggers can automatically enforce business rules and maintain data consistency.
Both stored procedures and triggers can improve security by limiting direct access to the database.
Examples of triggers include auditing changes to a table or automatically updating related data in another table.
Example...read more
Q626. How decrease of 10% depreciation would affect financial statements
A 10% decrease in depreciation would result in higher net income and retained earnings on the financial statements.
Net income would increase as depreciation expense is lower, leading to higher profits.
Retained earnings would also increase as net income contributes to this account.
The company's assets would appear higher on the balance sheet due to lower accumulated depreciation.
Investors may view the company more favorably with higher net income and retained earnings.
Q627. how is the compliance checks done in internal audit
Compliance checks in internal audit are conducted through various methods to ensure adherence to regulations and policies.
Compliance checks involve reviewing policies and procedures to ensure they align with regulations
Auditors may conduct interviews with employees to verify compliance with policies
Testing of transactions and processes may be performed to identify any non-compliance issues
Documentation review is also a common method used in compliance checks
Q628. Explain the Architecture of Spark
Spark has a master-slave architecture with a cluster manager and worker nodes.
Spark has a driver program that communicates with a cluster manager to allocate resources and schedule tasks.
Worker nodes execute tasks and return results to the driver program.
Spark supports multiple cluster managers like YARN, Mesos, and standalone.
Spark also has a DAG (Directed Acyclic Graph) scheduler that optimizes task execution.
Spark's architecture allows for in-memory processing and caching ...read more
Q629. how to automate excel function to calculate moving averages
Automate excel function for calculating moving averages
Use the AVERAGE function with a range of cells that includes the current and previous values
Use the OFFSET function to create a dynamic range for the moving average calculation
Use the COUNT function to adjust the range for the first few cells
Use VBA to create a macro that automates the process
Use the Data Analysis Toolpak add-in to calculate moving averages
Q630. How to calculate service level ?
Service level is calculated by dividing the number of calls answered within a certain time frame by the total number of calls received.
Determine the time frame for which you want to calculate the service level
Count the number of calls received during that time frame
Count the number of calls answered within the specified time frame
Divide the number of calls answered by the total number of calls received and multiply by 100 to get the service level percentage
For example, if you...read more
Q631. Join 3 tables using SQL
Joining three tables using SQL
Use the JOIN keyword to combine the tables based on a common column
Specify the columns to select from each table
Use the ON keyword to define the join condition
Q632. tell me the difference between having and group by sql
GROUP BY is used to group rows that have the same values into summary rows, while HAVING is used to filter groups based on a specified condition.
GROUP BY is used with aggregate functions to group the result-set by one or more columns.
HAVING is used to filter groups based on a specified condition after the GROUP BY clause.
HAVING is used with aggregate functions to filter the result-set based on a condition.
Example: SELECT department, COUNT(*) FROM employees GROUP BY department...read more
Q633. What are ways through which credit card companies earn revenue?
Credit card companies earn revenue through interest charges, annual fees, interchange fees, and late payment fees.
Interest charges on balances carried over from month to month
Annual fees charged for card membership
Interchange fees paid by merchants for processing transactions
Late payment fees for missed or delayed payments
Q634. what happens when you type google.com on browser addressbar
Typing google.com in the browser address bar will take you to the Google search engine website.
Typing google.com in the address bar sends a request to the DNS server to resolve the domain name to an IP address.
The browser then sends a request to the IP address associated with google.com.
The server hosting Google's website responds with the necessary files to display the webpage.
The browser renders the webpage and displays the Google search engine interface.
Q635. What is capital markets
Capital markets are financial markets where long-term securities such as stocks and bonds are traded.
Capital markets are where companies and governments raise funds by issuing securities.
These markets are typically for long-term investments and have a lower liquidity than other financial markets.
Examples of capital markets include the New York Stock Exchange and the bond market.
Investors in capital markets are typically institutional investors such as pension funds and insura...read more
Q636. What is difference between calculated column and measure
Calculated columns are pre-defined while measures are dynamic calculations based on user input.
Calculated columns are computed during data modeling and added to the table
Measures are computed on the fly based on user input and can be changed dynamically
Calculated columns are used for static analysis while measures are used for dynamic analysis
Examples of calculated columns include concatenation of columns, while measures include sum, average, etc.
Q637. What's is process of Ariba What's is P20 explain about S2P Terms and conditions in P2P Approval flow What's are difficulties found in Ariba Exaplain about MDM
Ariba is a cloud-based procurement platform used for sourcing, procurement, and supplier management.
Ariba is a procurement platform that helps streamline the procurement process by connecting buyers and suppliers.
P20 is a procurement process within Ariba that focuses on strategic sourcing and supplier management.
S2P stands for Source-to-Pay, which is the end-to-end procurement process that includes sourcing, procurement, and payment.
Terms and conditions in P2P refer to the ag...read more
Q638. Determination of dithiocarbomates in agricultural sample
Determination of dithiocarbomates in agricultural sample
Use liquid chromatography-mass spectrometry (LC-MS) for analysis
Sample preparation involves extraction with organic solvents
Derivatization with a reagent like 2-mercaptobenzothiazole may be necessary
Quantification can be done using external or internal standards
Dithiocarbomates are commonly used as fungicides and pesticides in agriculture
Q639. How do you denote different generations of GDG.
Different generations of GDG can be denoted by adding a suffix to the GDG base name.
Add a suffix to the GDG base name to denote different generations.
For example, GDG.BASE(+1) denotes the first generation, GDG.BASE(+2) denotes the second generation, and so on.
The maximum number of generations that can be denoted depends on the system.
The suffix can also be a date or time stamp to denote when the generation was created.
Q640. How many types of money laundering, effects of money laundering
Money laundering involves various types and has significant effects on economies and society.
There are three main types of money laundering: placement, layering, and integration.
Placement involves introducing illicit funds into the financial system, often through cash deposits or purchases.
Layering involves complex transactions to obscure the origin of funds, such as multiple transfers between accounts or countries.
Integration is the final stage where laundered funds are inte...read more
Q641. What is hedge fund and its type of structure
A hedge fund is an investment fund that pools capital from accredited individuals or institutional investors and invests in a variety of assets.
Hedge funds are typically only available to accredited investors due to their high-risk nature.
They use a variety of investment strategies, including long and short positions, leverage, and derivatives.
Hedge funds are structured as limited partnerships, with the fund manager as the general partner and the investors as limited partners...read more
Q642. can you describe the purpose of polymorphism in OOPs?
Polymorphism in OOP allows objects of different classes to be treated as objects of a common superclass.
Polymorphism allows for flexibility and reusability in code.
It enables a single interface to be used for different data types.
Examples include method overriding and method overloading.
Polymorphism is achieved through inheritance and interfaces in OOP.
Q643. What is the difference between blockchain and network fees?
Blockchain is a decentralized digital ledger, while network fees are charges for using a network.
Blockchain is a technology that enables the secure and transparent recording of transactions.
It is a decentralized system where multiple computers, known as nodes, maintain a copy of the blockchain.
Blockchain eliminates the need for intermediaries and provides immutability and transparency.
Network fees, on the other hand, are charges associated with using a network or platform.
The...read more
Q644. Parameters methods? How they are performed ?mrl of parameters
Parameter methods are used to estimate unknown parameters in a statistical model.
Parameter methods involve using statistical techniques to estimate unknown parameters in a model.
These methods can include maximum likelihood estimation, Bayesian estimation, and method of moments.
The choice of method depends on the specific model and data being analyzed.
For example, maximum likelihood estimation is commonly used in logistic regression models.
The MRL (minimum required level) of p...read more
Q645. What is Alpha in financial markets?
Alpha in financial markets is a measure of an investment's performance compared to a benchmark index.
Alpha is used to assess the skill of a portfolio manager in generating returns above the market return.
A positive alpha indicates outperformance, while a negative alpha indicates underperformance.
Alpha is often used in conjunction with beta, which measures the volatility of an investment compared to the market.
Q646. Do you know about PI planning
PI planning stands for Program Increment planning, a key event in Agile development where teams plan and coordinate their work for the upcoming program increment.
PI planning involves multiple Agile teams coming together to align on priorities, dependencies, and objectives for the upcoming program increment.
It typically lasts for 2 days and includes activities such as backlog refinement, estimating, and dependency mapping.
The output of PI planning is a plan that outlines the f...read more
Q647. What are the technical websites you follow
I follow several technical websites to stay updated with the latest trends and developments.
I follow TechCrunch for news on startups and emerging technologies
I read Wired for in-depth analysis on tech trends and their impact on society
I visit GitHub for open-source projects and code repositories
I check out Stack Overflow for technical Q&A and problem-solving
I follow Ars Technica for news and reviews on science and technology
I read The Verge for coverage on consumer technology...read more
Q648. What is a pricing procedure
A pricing procedure is a set of instructions that determines the price of a product or service based on various factors.
It is used in SAP to calculate the price of a product or service
It considers various factors such as discounts, taxes, surcharges, etc.
It consists of condition types, access sequences, and calculation schema
Example: A pricing procedure for a product may consider the quantity ordered, customer type, and any applicable discounts
Q649. What is CLT theorem and what are its uses
CLT theorem states that the distribution of sample means approaches a normal distribution as sample size increases.
Central Limit Theorem (CLT) is a fundamental concept in statistics that states that the distribution of sample means approaches a normal distribution as the sample size increases.
It is used in hypothesis testing, confidence intervals, and in estimating population parameters.
CLT is essential in making inferences about a population based on sample data.
For example,...read more
Q650. How do you print page numbers in a report
To print page numbers in a report, use the page number feature in your word processing software.
Insert page numbers in the header or footer section of the document
Choose the format and position of the page numbers
Update the page numbers automatically as you add or remove pages
Preview the document to ensure the page numbers appear correctly
Interview Questions of Similar Designations
Top Interview Questions for Analyst Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month