Associate/Senior Associate -(Technical)

50+ Associate/Senior Associate -(Technical) Interview Questions and Answers

Updated 10 Aug 2021
search-icon

Q1. What are the different types of Database management systems. What are the Database languages ? What is the difference between drop, delete and truncate?

Ans.

Different types of DBMS, DB languages & difference between drop, delete & truncate.

  • Types of DBMS: Relational, NoSQL, Object-oriented, Hierarchical, Network, etc.

  • Database languages: SQL, PL/SQL, T-SQL, etc.

  • DROP: Deletes a table and its data, cannot be rolled back.

  • DELETE: Deletes rows from a table, can be rolled back.

  • TRUNCATE: Deletes all rows from a table, cannot be rolled back.

Q2. 1.Difference between role and profile, 2. For what level of owd the share object will be available fo an object in apex sharing. 3.How to check fls in apex class.4. With sharing also consider fls in apex class?...

read more
Ans.

Technical interview questions on Apex, Aura and Webservices

  • Role defines the responsibilities and expectations of a position, while profile defines the access and permissions of a user

  • Share object is available for the same OWD level or higher

  • FLS can be checked using the Schema.DescribeFieldResult class in Apex

  • FLS is considered even with sharing in Apex class

  • Webservices callout can be done using the fetch() method in LWC or using the HttpRequest class in Apex

  • Application events ...read more

Associate/Senior Associate -(Technical) Interview Questions and Answers for Freshers

illustration image

Q3. Tell me all chemicals name with their use and proper dilution

Ans.

It is not possible to list all chemicals with their use and proper dilution in a single answer.

  • Chemicals have various uses and dilutions depending on the industry and application.

  • Some common chemicals and their uses include bleach for disinfecting, ammonia for cleaning, and hydrogen peroxide for wound care.

  • Proper dilution depends on the specific chemical and its intended use, and should be followed according to the manufacturer's instructions.

  • It is important to handle chemica...read more

Q4. Give a real time example of Inheritance, Polymorphism, Abstraction and Encapsulation.

Ans.

Real-time examples of OOP concepts

  • Inheritance: A car is a vehicle, inheriting properties of a vehicle

  • Polymorphism: A shape can be a square or a circle, both implementing the same area method

  • Abstraction: A TV remote has buttons to perform actions, but the user doesn't need to know how it works internally

  • Encapsulation: A bank account has private data like balance, which can only be accessed through public methods

Are these interview questions helpful?

Q5. Write a SQL query to to print all the rows in a table that has no match in a second table.

Ans.

SQL query to print rows with no match in a second table

  • Use LEFT JOIN to join the two tables

  • Filter the rows where the second table's primary key is NULL

  • SELECT the columns from the first table

Q6. What is the difference between final, finally and finalise?

Ans.

Final, finally and finalise are related to completion or conclusion, but have different meanings and usage.

  • Final is an adjective used to describe the last or ultimate stage of something.

  • Finally is an adverb used to indicate the end of a process or event after a long wait or delay.

  • Finalise is a verb used to complete or finish something, often with a formal or official process.

  • Examples: The final exam, finally finished the project, finalise the contract.

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. Given an array of unsorted values, search a value in the array and provide its space and time complexity? Is this the best way to search the value, why?

Ans.

Searching an unsorted array for a value and determining its space and time complexity.

  • The time complexity of linear search is O(n), where n is the size of the array.

  • Binary search has a time complexity of O(log n), but requires a sorted array.

  • Hash tables can provide constant time complexity for search, but require additional space.

  • The best search method depends on the specific use case and constraints.

  • Example: Searching for a name in a list of names.

Q8. What is the difference between customer service and customer support

Ans.

Customer service focuses on providing assistance and guidance to customers, while customer support deals with resolving technical issues and providing solutions.

  • Customer service involves addressing customer inquiries and concerns, providing information about products or services, and ensuring customer satisfaction.

  • Customer support involves troubleshooting technical issues, providing solutions to problems, and resolving customer complaints.

  • Customer service is more focused on b...read more

Associate/Senior Associate -(Technical) Jobs

0

Q9. If you could bring any law into force what would it be and why?

Ans.

I would bring a law to ensure equal pay for equal work regardless of gender.

  • The law would prohibit gender-based pay discrimination in all industries.

  • It would require employers to provide equal pay for employees who perform the same job with the same level of skill, effort, and responsibility.

  • This law would help to close the gender pay gap and promote gender equality in the workplace.

  • For example, in the United States, women earn only 82 cents for every dollar earned by men, an...read more

Q10. Space and time complexity of Sorting and Searching algos. Which algo is the best and why?

Ans.

Sorting and searching algos have different space and time complexities. The best algo depends on the use case.

  • Sorting algos: Bubble sort, Insertion sort, Selection sort, Merge sort, Quick sort

  • Searching algos: Linear search, Binary search

  • Space complexity of sorting algos varies from O(1) to O(n), while time complexity varies from O(n^2) to O(nlogn)

  • Space complexity of searching algos is O(1), while time complexity is O(logn)

  • The best algo depends on the size of the data set, the...read more

Q11. Tell me about certificates authentication mechanism and encryption / Decryption mechanism in CPI?

Ans.

Certificates authentication and encryption/decryption mechanisms are used in CPI for secure data transfer.

  • Certificates are used to authenticate the sender and receiver of data in CPI.

  • Encryption/decryption mechanisms are used to secure the data during transfer.

  • CPI supports various encryption algorithms such as AES, RSA, and SHA.

  • Certificates can be uploaded to CPI and used in communication channels for secure data transfer.

Q12. Given an array of unsorted values, write a program to replace each array index element with the next highest element.

Ans.

Program to replace each array index element with the next highest element.

  • Sort the array in descending order

  • Loop through the array and replace each element with the next highest element

  • Handle edge cases like duplicates and last element

Q13. What is IP address and Mac address?

Ans.

IP address is a unique identifier assigned to devices on a network. MAC address is a unique identifier assigned to network interfaces.

  • IP address stands for Internet Protocol address and is used to identify devices on a network

  • MAC address stands for Media Access Control address and is used to identify network interfaces

  • IP address is a 32-bit number, usually represented in dotted decimal notation (e.g. 192.168.0.1)

  • MAC address is a 48-bit number, usually represented in hexadecim...read more

Q14. What CPI related things have you worked on?

Ans.

I have worked on CPI optimization and analysis for various software projects.

  • Implemented CPI reduction techniques like loop unrolling, pipelining, and cache optimization.

  • Analyzed CPI using performance profiling tools like perf and Intel VTune.

  • Worked on CPI optimization for a video encoding software, resulting in a 20% performance improvement.

  • Collaborated with hardware engineers to optimize CPI for a new processor architecture.

  • Developed a CPI benchmarking tool to compare the p...read more

Q15. What is a basic structure of our home internet?

Ans.

The basic structure of home internet includes a modem, router, and devices connected to the network.

  • The modem connects to the internet service provider's network and converts the signal to one that can be used by the router.

  • The router creates a local network and allows multiple devices to connect to the internet.

  • Devices such as computers, smartphones, and smart home devices connect to the router via Wi-Fi or Ethernet cables.

  • The router manages the traffic between the devices a...read more

Q16. Do you have an idea about Cloud Computing?

Ans.

Cloud computing is the delivery of computing services over the internet.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection.

  • It eliminates the need for physical servers and hardware, reducing costs and increasing scalability.

  • Examples of cloud computing services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Q17. 2-3 design rounds eg- designing a food delivery app

Ans.

Designing a food delivery app

  • Identify target audience and their needs

  • Create user-friendly interface for ordering food

  • Integrate payment gateway for easy transactions

  • Develop a tracking system for delivery status

  • Ensure timely delivery and quality of food

  • Implement customer feedback system for improvement

  • Partner with local restaurants for wider menu options

Q18. How to connect S4 HANA ECC system to CPI system?

Ans.

To connect S4 HANA ECC system to CPI system, use SAP Cloud Connector and configure the connection in CPI.

  • Install and configure SAP Cloud Connector on the server where the S4 HANA ECC system is installed.

  • Create a destination in SAP Cloud Connector for the CPI system.

  • Configure the destination in CPI using the Cloud Connector details.

  • Test the connection to ensure successful integration.

Q19. Steps to be taken if you are in charge of improving working capital crunch

Ans.

Steps to improve working capital crunch

  • Analyze cash flow and identify areas of improvement

  • Negotiate better payment terms with suppliers

  • Reduce inventory levels and optimize procurement process

  • Implement efficient billing and collection process

  • Explore financing options such as factoring or asset-based lending

Q20. Use Bit manipulation to check if integer is a power of 2

Ans.

Use bitwise AND operator to check if integer is a power of 2.

  • A power of 2 has only one bit set in its binary representation.

  • Using bitwise AND operator with (n-1) will give 0 for powers of 2.

  • Example: 8 (1000) & 7 (0111) = 0, but 6 (0110) & 5 (0101) != 0.

Q21. What is difference between LED and LCD

Ans.

LEDs are light emitting diodes that emit light when a current is passed through them, while LCDs are liquid crystal displays that use liquid crystals to display images.

  • LEDs are more energy-efficient than LCDs

  • LEDs have a longer lifespan than LCDs

  • LCDs have better color accuracy than LEDs

  • LEDs are commonly used in lighting while LCDs are used in displays

  • LEDs emit light in a specific direction while LCDs require a backlight to illuminate the display

Q22. Audit aspects to consider for confirming bank balance

Ans.

Audit aspects to consider for confirming bank balance

  • Verify bank statements against accounting records

  • Confirm balances with the bank directly

  • Check for outstanding checks or deposits in transit

  • Reconcile any discrepancies

  • Review internal controls for cash handling and recording

  • Consider any fraud risks or red flags

  • Document all audit procedures and findings

Q23. How can we configure bios to DHCP

Ans.

To configure BIOS to DHCP, access BIOS settings and enable DHCP option.

  • Enter BIOS settings by pressing the designated key during boot-up

  • Navigate to the Network or Ethernet settings

  • Enable the DHCP option

  • Save and exit BIOS settings

Q24. Code for a pattern he gave on spot

Ans.

Code for a given pattern

  • Create an array of strings

  • Use loops to iterate over the rows and columns of the pattern

  • Fill the array with the appropriate characters based on the pattern

  • Return the array as the result

Q25. What is a HashMap?

Ans.

HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.

  • HashMap is part of the Java Collections Framework.

  • It uses hashing to store and retrieve elements.

  • It allows null values and null keys.

  • It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.

  • Example: HashMap map = new HashMap<>(); map.put("apple", 1); map.put("banana", 2); int value = map.get("banana"); // returns 2

Q26. What technologies have you worked with

Ans.

I have worked with a variety of technologies including Java, Python, SQL, and AWS.

  • Java

  • Python

  • SQL

  • AWS

Q27. What's server rack name, model, definition. Etc

Ans.

A server rack is a framework used to hold and organize computer servers and other equipment.

  • Server racks come in various sizes and configurations.

  • They are designed to optimize space and airflow for efficient cooling.

  • Racks are often named after their height in rack units (U), such as a 42U rack.

  • Models can vary based on features such as cable management and power distribution.

  • Common brands include APC, Tripp Lite, and Dell.

  • Racks can also be customized for specific needs, such a...read more

Q28. Keys and areas of strength based on the application

Ans.

Keys and areas of strength based on the application

  • Key areas of strength depend on the specific application

  • For a web application, key areas of strength may include scalability, security, and user experience

  • For a mobile application, key areas of strength may include performance, compatibility, and user interface

  • Other key areas of strength may include reliability, maintainability, and ease of use

  • Strengths should be aligned with the goals and requirements of the application

Q29. What is ip address and types

Ans.

An IP address is a unique numerical identifier assigned to devices connected to a network.

  • IP stands for Internet Protocol

  • There are two types of IP addresses: IPv4 and IPv6

  • IPv4 addresses are 32-bit and IPv6 addresses are 128-bit

  • IPv4 addresses are written in decimal format, while IPv6 addresses are written in hexadecimal format

  • Examples of IPv4 addresses: 192.168.0.1, 172.16.254.1

  • Examples of IPv6 addresses: 2001:0db8:85a3:0000:0000:8a2e:0370:7334, fe80::1

Q30. Code for recurring numbers

Ans.

Code for recurring numbers

  • Create an array to store the numbers

  • Loop through the array and check if a number is already present

  • If a number is found, add it to the recurring numbers array

  • Return the recurring numbers array

Q31. 1. How to debug spfx in SharePoint

Ans.

Debugging SPFx in SharePoint involves using browser developer tools and Visual Studio Code.

  • Use browser developer tools to inspect and debug client-side code

  • Use Visual Studio Code to debug server-side code

  • Set breakpoints in code to pause execution and inspect variables

  • Use console.log() statements to output information to the console

  • Use the SharePoint Workbench to test and debug web parts

  • Use the gulp serve command to run the local development server

  • Check for errors in the conso...read more

Q32. Tell me about OOPS concepts

Ans.

OOPS concepts are the fundamental principles of Object-Oriented Programming.

  • Encapsulation: bundling of data and methods that manipulate the data

  • Inheritance: creating new classes from existing ones

  • Polymorphism: ability of objects to take on multiple forms

  • Abstraction: hiding implementation details from the user

  • Example: A car class can have properties like color, model, and methods like start, stop, accelerate

  • Example: A child class can inherit properties and methods from a paren...read more

Frequently asked in,

Q33. A clear idea of abstract class and interfaces

Ans.

Abstract classes are classes that cannot be instantiated and can have both abstract and non-abstract methods. Interfaces are contracts that define a set of methods that a class must implement.

  • Abstract classes can have constructors, while interfaces cannot.

  • A class can implement multiple interfaces, but can only inherit from one abstract class.

  • Abstract classes can have instance variables, while interfaces cannot.

  • An example of an abstract class is the Shape class, with abstract ...read more

Q34. Explain event loop phases and one code snippet for the.

Ans.

Event loop phases and code snippet explanation.

  • Event loop is a mechanism that allows JavaScript to perform non-blocking I/O operations.

  • It has six phases: Timers, I/O callbacks, idle, prepare, poll, and check.

  • Code snippet example: setInterval(() => console.log('Hello'), 1000);

Q35. What are the network topologies?

Ans.

Network topologies refer to the arrangement of various elements in a network.

  • There are several types of network topologies, including bus, star, ring, mesh, and hybrid.

  • Bus topology involves connecting all devices to a single cable.

  • Star topology involves connecting all devices to a central hub or switch.

  • Ring topology involves connecting devices in a circular manner.

  • Mesh topology involves connecting devices to each other in a network.

  • Hybrid topology is a combination of two or m...read more

Q36. How to configure SFTP adapter?

Ans.

To configure SFTP adapter, follow these steps:

  • Create a communication channel with SFTP adapter type

  • Provide the SFTP server details like hostname, port, username, password, and remote directory

  • Configure the sender/receiver agreement with the communication channel

  • Test the connection and transfer files

Q37. Difference between Work flow and Process builder

Ans.

Workflow and Process Builder are automation tools in Salesforce. Workflow is a simple automation tool while Process Builder is more advanced.

  • Workflow is a simple automation tool that allows you to automate standard internal procedures and processes to save time across your org.

  • Process Builder is a more advanced automation tool that allows you to automate complex business processes and create custom logic.

  • Workflow can only perform a limited set of actions, such as updating fie...read more

Q38. What is a DSL?

Ans.

DSL stands for Digital Subscriber Line, a technology that provides high-speed internet access over traditional copper telephone lines.

  • DSL uses existing telephone lines to transmit digital data

  • It provides faster internet speeds than dial-up connections

  • There are different types of DSL, such as ADSL, VDSL, and SDSL

  • DSL requires a DSL modem to connect to the internet

  • DSL is widely available in urban and suburban areas

  • Examples of DSL providers include AT&T, Verizon, and CenturyLink

Q39. What is protrat charges

Ans.

Protrat charges are charges that are levied on a customer's account for exceeding the credit limit or for late payments.

  • Protrat charges are fees charged by financial institutions for late payments or exceeding credit limits.

  • These charges can vary depending on the institution and the type of account.

  • For example, a credit card may charge a higher protrat fee than a personal loan.

  • Protrat charges can add up quickly and can have a negative impact on a customer's credit score.

  • It is...read more

Q40. What is a Router?

Ans.

A router is a networking device that forwards data packets between computer networks.

  • Routers operate at the network layer of the OSI model.

  • They use routing tables to determine the best path for data to travel.

  • Routers can connect different types of networks, such as LANs and WANs.

  • Examples of routers include Cisco, Netgear, and TP-Link.

  • Routers can also provide security features such as firewalls and VPNs.

Q41. difference between string and stringbuilder

Ans.

String is immutable while StringBuilder is mutable.

  • String is a final class and cannot be modified once created.

  • StringBuilder is a mutable class and can be modified without creating a new object.

  • String concatenation creates a new String object each time, while StringBuilder can append to the same object.

  • String is thread-safe while StringBuilder is not.

  • Use String for small strings that won't change, and StringBuilder for large or frequently modified strings.

Q42. Do you know Java

Ans.

Yes, I know Java.

  • Proficient in Java programming language

  • Experience in developing Java applications

  • Familiarity with Java frameworks such as Spring and Hibernate

Q43. What is up selling

Ans.

Up selling is the practice of encouraging customers to purchase a more expensive or upgraded version of a product or service.

  • It involves suggesting additional features or add-ons to the customer

  • It can increase revenue and profit for the company

  • Examples include offering a larger size or better quality product, or suggesting a service package with more benefits

  • It should be done in a helpful and informative manner, not pushy or aggressive

Q44. Difference between SIP and H323

Ans.

SIP and H323 are both protocols used for multimedia communication over IP networks.

  • SIP is a newer protocol and is more widely used for VoIP and video conferencing.

  • H323 is an older protocol and is mainly used for video conferencing.

  • SIP is simpler and more flexible than H323.

  • SIP uses HTTP-like messages while H323 uses binary messages.

  • SIP is easier to configure and troubleshoot than H323.

  • Examples of SIP-based applications include Skype, WhatsApp, and Google Voice.

  • Examples of H32...read more

Q45. Trade cycle in capital markets

Ans.

Trade cycle in capital markets refers to the process of buying and selling securities.

  • The trade cycle starts with the issuance of securities by companies or governments.

  • Investors then buy these securities through primary markets.

  • These securities are then traded among investors in secondary markets.

  • The trade cycle ends when the securities are redeemed or mature.

  • Examples of securities include stocks, bonds, and derivatives.

Q46. What is open loop

Ans.

Open loop is a control system where the output is not fed back to the input for correction or adjustment.

  • Open loop control does not rely on feedback to make adjustments.

  • It is a one-way communication system.

  • Examples include a toaster, where the heating element operates for a fixed duration regardless of the toast's actual temperature.

  • Another example is a washing machine with a timer that runs for a predetermined time without considering the clothes' cleanliness.

Q47. SOLID design principle

Ans.

SOLID is a set of design principles for object-oriented programming.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: A class should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.

  • I - Interface Segregation Principle: A client should not be forced to depend on methods it does not use.

  • D - Dependency Inversion Principle: High-lev...read more

Q48. Even and odd using two Thraeds

Ans.

Using two threads, write a program to print even and odd numbers alternatively.

  • Create two threads, one for printing even numbers and the other for odd numbers

  • Use a shared variable to keep track of the current number to be printed

  • Use a loop to print the numbers alternatively

  • Use synchronization mechanisms like mutex or semaphore to avoid race conditions

Q49. Types of Audit opinions

Ans.

Types of audit opinions include unqualified, qualified, adverse, and disclaimer.

  • Unqualified opinion: no material misstatements found

  • Qualified opinion: some issues found but not significant enough to affect overall opinion

  • Adverse opinion: significant issues found that affect overall opinion

  • Disclaimer: auditor unable to form an opinion due to lack of information or restrictions on scope

  • Examples: unqualified - clean audit report, adverse - going concern issues

Q50. Mainframe - Joinkeys in sort

Ans.

Joinkeys is a utility in Mainframe SORT that allows merging of two or more files based on a common key.

  • Joinkeys is used to merge two or more files based on a common key.

  • It is used in Mainframe SORT utility.

  • Joinkeys can be used to merge files with different record formats.

  • It can also be used to merge files with different record lengths.

  • Joinkeys can be used to merge files with different sort orders.

  • Joinkeys can be used to merge files with different block sizes.

1
2
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions for Associate/Senior Associate -(Technical) Related Skills

Interview experiences of popular companies

3.9
 • 8k Interviews
3.7
 • 7.5k Interviews
3.8
 • 5.5k Interviews
3.8
 • 4.8k Interviews
3.6
 • 3.8k Interviews
3.9
 • 3k Interviews
3.4
 • 1.4k Interviews
3.9
 • 596 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Associate/Senior Associate -(Technical) Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter