IT Analyst

200+ IT Analyst Interview Questions and Answers

Updated 12 Dec 2024

Popular Companies

search-icon

Q1. 1. What is interface how to use? 2. Tell me a small example for interface? 3. How to managing the Error Logging system at your application 4. How you implement Security at your application 5. What are the Joins...

read more
Ans.

Answering questions related to IT Analyst position

  • An interface is a contract between two objects that defines the communication between them

  • An example of an interface is the Java interface, which defines a set of methods that a class must implement

  • Error logging can be managed by setting up a system to capture and store error messages, and regularly reviewing and addressing them

  • Security can be implemented through measures such as authentication, authorization, encryption, and ...read more

Q2. How to load data from tab delimiter file instead of csv

Ans.

To load data from a tab delimiter file instead of csv, change the delimiter setting in the data loading process.

  • Change the delimiter setting in the data loading process to ' ' for tab delimiter

  • Specify the delimiter parameter as ' ' when using functions like read_csv in Python pandas library

  • Ensure that the file is saved with tab delimiters before attempting to load it

IT Analyst Interview Questions and Answers for Freshers

illustration image

Q3. Writing NO DATA FOUND after WHEN OTHERS is allowed in plsql block

Ans.

Yes, it is allowed to write NO DATA FOUND after WHEN OTHERS in PL/SQL block.

  • It is allowed to handle exceptions using WHEN OTHERS in PL/SQL block.

  • You can customize the error message to display 'NO DATA FOUND' after handling the exception.

  • It is a good practice to provide informative error messages for better debugging.

Q4. How would you insert contacts to newly created contacts using trigger

Ans.

Use a trigger to insert contacts to newly created contacts

  • Create a trigger on the Contact object

  • Use the 'after insert' trigger event

  • Loop through the newly created contacts

  • Create a new contact for each one and set the necessary fields

  • Insert the new contacts

Are these interview questions helpful?

Q5. What is Organizational unit? What is the difference between shared mailbox and distribution list.

Ans.

Organizational unit is a container for objects in Active Directory. Shared mailbox is a mailbox that multiple users can access. Distribution list is a group of email addresses.

  • Organizational unit is used to organize objects in Active Directory

  • Shared mailbox allows multiple users to access a single mailbox

  • Distribution list is a group of email addresses used to send emails to multiple recipients

  • Shared mailbox is accessed through a single email address while distribution list is...read more

Q6. What are the joins in Oracle and How it's Works If we Perform Outer Join?

Ans.

Joins in Oracle and how outer join works

  • Joins are used to combine data from two or more tables in Oracle

  • Inner join returns only matching rows from both tables

  • Outer join returns all rows from one table and matching rows from the other table

  • Left outer join returns all rows from the left table and matching rows from the right table

  • Right outer join returns all rows from the right table and matching rows from the left table

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. If Base table is deleted ,whether the view is exist or not?

Ans.

No, the view will not exist if the base table is deleted.

  • Views are dependent on the base table.

  • Deleting the base table will also delete the view.

  • Views are virtual tables that depend on the existence of the base table.

Q8. How can we achieve multiple inheritance in SAP ABAP

Ans.

Multiple inheritance in SAP ABAP can be achieved using interfaces.

  • In SAP ABAP, multiple inheritance can be achieved through interfaces.

  • Create multiple interfaces with the desired methods and attributes.

  • Implement these interfaces in the class where multiple inheritance is needed.

IT Analyst Jobs

Senior IT Analyst Applications(Senior Data Quality Analyst) 5-8 years
CATERPILLAR INDIA PRIVATE LTD
4.3
Bangalore / Bengaluru
GN - SC&O - SCM Planning - Kinaxis Analyst 4-9 years
Accenture Solutions Pvt Ltd
3.9
Chennai
Financial Plan & Analysis Analyst 3-5 years
Accenture Solutions Pvt Ltd
3.9
Chennai

Q9. What is VPN? How do you solve Vpn issues? Explain with scenarios?

Ans.

VPN stands for Virtual Private Network. It is a secure connection between two or more devices over the internet.

  • VPN allows remote access to a private network over the internet

  • Common VPN issues include connection failures, slow speeds, and authentication problems

  • To solve VPN issues, troubleshoot the connection, check for software updates, and verify login credentials

  • For example, if a user is unable to connect to the VPN, check if the VPN server is up and running, and if the us...read more

Q10. Which programming languages do you use regularly in your work?

Ans.

I regularly use Java, Python, and SQL in my work as an IT Analyst.

  • Java is used for developing enterprise applications and Android apps.

  • Python is used for data analysis, scripting, and automation.

  • SQL is used for managing and querying databases.

Q11. . What is power bi desktop. . What is power bi service. What is difference between Reporting and Dashboard. . What is Difference between Dats ware housing and Data mart. . What is Difference between where claus...

read more
Ans.

Answers to common questions related to Power BI and data analysis.

  • Power BI Desktop is a Windows application used to create data visualizations and reports.

  • Power BI Service is a cloud-based platform used to share and collaborate on reports and dashboards.

  • Reporting is a way to present data in a structured format, while dashboards provide a real-time overview of key metrics.

  • Data warehousing involves storing large amounts of data from various sources, while data marts are smaller...read more

Q12. Threading in general and how to implement in python.

Ans.

Threading is a way to execute multiple threads simultaneously. Python has a threading module to implement it.

  • Threading allows for concurrent execution of multiple threads.

  • Python's threading module provides a way to create and manage threads.

  • Threads can be created by subclassing the Thread class or by passing a callable to the constructor.

  • The GIL (Global Interpreter Lock) in Python limits true parallelism, but threading can still be useful for I/O-bound tasks.

  • Thread synchroniz...read more

Q13. How to pass values from one component to another

Ans.

Values can be passed between components using props, state, context, or Redux.

  • Props are used to pass data from parent to child components

  • State is used to manage data within a component and can be passed down as props

  • Context allows data to be passed down to nested components without having to pass props through every level

  • Redux is a state management library that allows data to be shared between components

Q14. What EMC networker tool?

Ans.

EMC Networker is a backup and recovery software tool used for data protection.

  • EMC Networker provides centralized management of backup and recovery operations.

  • It supports a wide range of platforms and applications.

  • It offers features like data deduplication, replication, and snapshot management.

  • EMC Networker also has integration with cloud storage providers like AWS and Azure.

  • Examples of supported applications include Oracle, SAP, and Microsoft Exchange.

Q15. What are the different types of enhancements in abap

Ans.

Different types of enhancements in ABAP include user exits, BAdIs, enhancement spots, and enhancement frameworks.

  • User exits: Custom code added to standard SAP programs to meet specific business requirements.

  • BAdIs (Business Add-Ins): Points in the standard SAP system where custom enhancements can be added without modifying the original code.

  • Enhancement spots: Points in the standard SAP system where custom code can be inserted using Enhancement Framework.

  • Enhancement frameworks:...read more

Q16. Webdriver code to access Gmail dashboard menu from google page.

Ans.

Webdriver code to access Gmail dashboard menu from google page.

  • Locate the 'Gmail' button on the Google page using CSS selector or XPath

  • Click on the 'Gmail' button to open the Gmail login page

  • Enter valid login credentials and click on the 'Sign in' button

  • Locate the dashboard menu using CSS selector or XPath

  • Click on the dashboard menu to access it

Q17. What is pragma_autonomus transaction and where we can use?

Ans.

Pragma_autonomous transaction is used to execute a transaction independently within a larger transaction.

  • It allows a subtransaction to be committed or rolled back independently of the larger transaction.

  • It is useful in situations where a subtransaction needs to be executed without affecting the larger transaction.

  • It can be used in error handling, logging, or auditing.

  • Example: A stored procedure that inserts data into multiple tables can use pragma_autonomous transaction to en...read more

Q18. How to do trouble shooting in Odata/ Fiori application

Ans.

Troubleshooting in Odata/Fiori applications involves identifying and resolving issues with data retrieval and display.

  • Check network connectivity to ensure data can be retrieved from the Odata service

  • Verify Odata service is running and accessible

  • Review Fiori application code for any errors or misconfigurations

  • Check backend system for any issues with data availability or consistency

Q19. what are the different components in hadoop ? What is the difference between hive and SQL?

Ans.

Hadoop components include HDFS, YARN, MapReduce, and Hive. Hive is a data warehouse tool that uses SQL-like queries to analyze data stored in Hadoop.

  • Hadoop components: HDFS (Hadoop Distributed File System), YARN (Yet Another Resource Negotiator), MapReduce, Hive

  • Hive vs SQL: Hive is a data warehouse tool that allows users to write SQL-like queries to analyze data stored in Hadoop, while SQL is a standard query language used to manage and manipulate relational databases

  • Hive que...read more

Q20. Describe the transaction codes which were using in working

Ans.

Transaction codes are used in IT systems to execute specific functions or tasks.

  • Transaction codes are alphanumeric codes used in SAP systems to access specific functions or programs.

  • They are typically entered in the command field of the SAP Easy Access screen.

  • Transaction codes can be used to perform tasks such as creating purchase orders (ME21N), displaying material master data (MM03), or executing payroll (PC00_M99_CIPE).

  • Each transaction code corresponds to a specific progra...read more

Q21. What is BIOS, OS, What connects 1st VPN or Wifi?

Ans.

BIOS is firmware that initializes hardware. OS is software that manages computer hardware and software resources. VPN connects first.

  • BIOS stands for Basic Input/Output System and is responsible for initializing hardware components during boot-up.

  • OS stands for Operating System and is responsible for managing computer hardware and software resources.

  • VPN (Virtual Private Network) connects first as it establishes a secure connection before connecting to the internet.

  • Wifi is a wir...read more

Q22. How do you resolve vdi login and vdi slowness issues?

Ans.

VDI login and slowness issues can be resolved by identifying the root cause and implementing appropriate solutions.

  • Check network connectivity and bandwidth

  • Ensure VDI infrastructure is properly configured and optimized

  • Monitor resource usage and adjust allocation as needed

  • Update VDI software and drivers

  • Implement caching and compression technologies

  • Consider implementing load balancing

  • Provide end-user training and support

  • Perform regular maintenance and updates

Q23. Spring Annotation and difference b/w spring mvc and spring boot.

Ans.

Spring Annotation and difference b/w spring mvc and spring boot.

  • Spring Annotation is used to simplify the configuration process in Spring Framework.

  • Spring MVC is a web framework that is used to build web applications.

  • Spring Boot is a framework that is used to build standalone applications.

  • Spring Boot provides an opinionated approach to configuration and reduces the amount of boilerplate code required.

  • Spring Boot includes an embedded web server, which makes it easy to deploy w...read more

Q24. What are the block available in newly created files in unix.

Ans.

Blocks available in newly created files in Unix.

  • Unix uses a file system that is divided into blocks.

  • The size of the block is determined by the file system.

  • The default block size for most file systems is 4096 bytes.

  • The number of blocks allocated to a file depends on its size.

  • The blocks are allocated in a contiguous manner.

  • The blocks are used to store the data of the file.

Q25. What are the backup tools you used in your previous project?

Ans.

I used a variety of backup tools in my previous project, including Veeam Backup & Replication, Commvault, and Acronis Backup.

  • Veeam Backup & Replication

  • Commvault

  • Acronis Backup

Q26. 1) what is collections have you used anywhere? 2) how function can return more than one value? 3) what is is materialised view 4) what is pragma autonomous transaction

Ans.

Answers to IT Analyst interview questions

  • 1) Used collections like arrays, lists, and maps in Java and Python for storing and manipulating data

  • 2) A function can return multiple values using tuples, arrays, or objects in programming languages like Python, Java, and C++

  • 3) Materialized view is a database object that stores the result of a query and acts as a table, improving query performance by reducing the need for expensive joins and aggregations

  • 4) Pragma autonomous transactio...read more

Q27. Explain the life cycle of service cloud using servicemax

Ans.

Service cloud life cycle using ServiceMax

  • The life cycle starts with service request creation

  • The request is then assigned to a technician

  • Technician uses ServiceMax to access customer information and service history

  • Technician completes the service and updates the status in ServiceMax

  • Customer receives notification and can provide feedback

  • Service data is analyzed for insights and improvements

Q28. Difference between entity types, entity sets, DPC and MPC in Odata

Ans.

Entity types are templates for entities, entity sets are collections of entities, DPC is Data Provider Collection, and MPC is Metadata Provider Collection in OData.

  • Entity types define the structure of an entity, like a class in object-oriented programming.

  • Entity sets are collections of entities of the same type, like a database table.

  • DPC is a collection of entity sets that expose data for read and write operations.

  • MPC is a collection of entity sets that provide metadata about...read more

Q29. Do you know php coding. Can you work as an individual contributor.

Ans.

Yes, I have experience in PHP coding and can work as an individual contributor.

  • I have worked on multiple PHP projects and have a good understanding of the language.

  • I am comfortable working independently and have experience delivering projects on my own.

  • I am also familiar with collaborating with teams and can adapt to different work environments.

  • Examples of my PHP projects include building a custom CMS and developing e-commerce websites.

Q30. What are the 4 different types of inheritance?

Ans.

There are 4 types of inheritance in object-oriented programming: single, multiple, multilevel, and hierarchical.

  • Single inheritance: a subclass inherits from a single superclass.

  • Multiple inheritance: a subclass inherits from multiple superclasses.

  • Multilevel inheritance: a subclass inherits from a superclass, which in turn inherits from another superclass.

  • Hierarchical inheritance: multiple subclasses inherit from a single superclass.

Q31. what will you do will reduce Performace issue?

Ans.

To reduce performance issues, I will analyze the system, identify bottlenecks, optimize code, and implement caching.

  • Analyze system to identify bottlenecks

  • Optimize code to improve efficiency

  • Implement caching to reduce load times

  • Use profiling tools to identify performance issues

  • Reduce database queries by optimizing queries and using caching

  • Use a content delivery network (CDN) to reduce server load

  • Implement load balancing to distribute traffic evenly

  • Upgrade hardware or infrastru...read more

Q32. How you have implemented oops concept in your framework

Ans.

Implemented OOPs concepts in framework

  • Used inheritance to create base classes for common functionalities

  • Implemented encapsulation to hide implementation details

  • Used polymorphism to allow different implementations for same method

  • Implemented abstraction to define interfaces for modules

  • Used SOLID principles to ensure maintainability and extensibility

Q33. What are Switching and Routing Technologies do you know?

Ans.

Switching and routing are technologies used in computer networking to direct data traffic.

  • Switching involves forwarding data packets between devices on a network.

  • Routing involves determining the best path for data packets to travel between networks.

  • Examples of switching technologies include Ethernet and ATM.

  • Examples of routing protocols include OSPF and BGP.

Q34. Difference between session method and call transaction

Ans.

Session method is used to maintain user session data, while call transaction is used to call a transaction code directly.

  • Session method is used to store and retrieve user-specific data during a session.

  • Call transaction is used to directly execute a transaction code without user interaction.

  • Session method is commonly used in web applications to maintain user login information.

  • Call transaction is often used in SAP systems to automate repetitive tasks.

  • Session method can be acces...read more

Q35. Data flow from AR Invoice table GL Tables

Ans.

Data flows from AR Invoice table to GL Tables through integration processes.

  • AR Invoice table data is typically integrated into GL Tables through automated processes

  • Integration processes may involve mapping fields from AR Invoice table to GL Tables

  • Data may flow through APIs, ETL processes, or direct database connections

Q36. Explain the customer non technical issues and make it easy for them to browse softwares and technical files.

Ans.

To address customer non-technical issues in browsing software and technical files, provide user-friendly interfaces, clear instructions, and accessible support.

  • Create user-friendly interfaces with intuitive navigation

  • Provide clear instructions on how to browse and access software and technical files

  • Offer accessible support options such as live chat, FAQs, and tutorials

  • Ensure compatibility with various devices and browsers for seamless browsing experience

Q37. What is the difficult development task I have worked on?

Ans.

One of the most difficult development tasks I have worked on was implementing a complex algorithm for real-time data processing.

  • Developing a custom algorithm to handle large volumes of data in real-time

  • Optimizing the algorithm for performance and efficiency

  • Testing and debugging the algorithm to ensure accuracy and reliability

Q38. What is the ping command to check latency in vdi?

Ans.

The ping command to check latency in VDI is 'ping -t '.

  • Open Command Prompt or Terminal

  • Type 'ping -t '

  • Press Enter

  • Observe the latency results

Q39. How will you code a snake and ladder program

Ans.

A snake and ladder program can be coded using loops, arrays, and conditional statements.

  • Create a board with 100 squares using an array

  • Assign snakes and ladders to specific squares

  • Use a loop to simulate dice rolls and move the player accordingly

  • Use conditional statements to check for snakes and ladders

  • Display the final position of the player and whether they won or lost

Q40. What is the difference between diff and cmp commands

Ans.

diff and cmp are commands used to compare files in Unix/Linux systems.

  • diff shows the differences between two files line by line

  • cmp compares two files byte by byte and shows the first byte that differs

  • diff is more commonly used for comparing text files while cmp is used for binary files

  • diff can also be used to compare directories

  • cmp returns an exit status of 0 if the files are identical, 1 if they differ, and 2 if an error occurs

  • Examples: diff file1.txt file2.txt, cmp file1.bi...read more

Q41. What is the difference between list and tuple.

Ans.

List and tuple are both data structures in Python, but list is mutable while tuple is immutable.

  • List is defined using square brackets [], while tuple is defined using parentheses ().

  • Elements in a list can be added, removed, or modified, while elements in a tuple cannot be modified.

  • Lists are used for collections of data that may change over time, while tuples are used for fixed collections of data.

  • Lists are generally faster for iteration and appending, while tuples are faster ...read more

Frequently asked in,

Q42. How Deployment Process Done ?

Ans.

Deployment process involves planning, testing, and executing the release of software into production.

  • Identify the target environment and prepare it for deployment

  • Create a deployment package that includes all necessary files and configurations

  • Test the deployment package in a staging environment

  • Execute the deployment process, which may involve automated or manual steps

  • Monitor the deployment to ensure it is successful and address any issues that arise

Q43. Anything you know about azure and end point manager?

Ans.

Azure is a cloud computing platform and Endpoint Manager is a device management solution by Microsoft.

  • Azure provides a wide range of cloud services including virtual machines, storage, and databases.

  • Endpoint Manager is a unified endpoint management solution that allows IT admins to manage and secure devices across multiple platforms.

  • Endpoint Manager includes features such as device configuration, application management, and security policies.

  • Azure and Endpoint Manager can be ...read more

Q44. Difference between store procedure and function ?

Ans.

Stored procedures are used to perform an action, while functions return a value.

  • Stored procedures are precompiled and stored in the database for repeated use.

  • Functions can be used in SQL statements to return a value.

  • Stored procedures can have input and output parameters.

  • Functions can be used in expressions and calculations.

  • Examples: A stored procedure to insert data into a table, a function to calculate the average of a set of numbers.

Q45. Difference between incident and service request?

Ans.

An incident is an unplanned interruption while a service request is a planned request for assistance or information.

  • Incidents are unexpected and can cause disruption to normal operations.

  • Service requests are planned and can be initiated by the user or the service provider.

  • Incidents require immediate attention and resolution while service requests can be prioritized based on their urgency and impact.

  • Examples of incidents include system crashes, network outages, and security br...read more

Q46. Junit and what is mockito

Ans.

Junit is a testing framework for Java. Mockito is a mocking framework used for unit testing.

  • Junit is used for writing and running unit tests in Java

  • Mockito is used for creating mock objects to simulate dependencies in unit tests

  • Mockito can be used with Junit to create comprehensive unit tests

  • Example: Mockito.when(mockObject.method()).thenReturn(expectedResult)

Q47. End User computing support experience added advantage

Ans.

Yes, I have extensive experience in providing end user computing support.

  • Provided technical support to end users for hardware and software issues

  • Assisted in the deployment and maintenance of desktops, laptops, and mobile devices

  • Managed user accounts and permissions in Active Directory

  • Resolved issues related to network connectivity and printing

  • Trained end users on software applications and best practices

  • Implemented security measures to protect end user devices and data

Q48. What is the use of private constructor ?

Ans.

Private constructor restricts the creation of objects outside the class.

  • Private constructor is used to prevent the creation of objects outside the class.

  • It is often used in singleton design pattern to ensure only one instance of the class is created.

  • Private constructor can also be used in utility classes where all methods are static.

  • Private constructor can be used to prevent inheritance of a class.

  • Example: java.lang.Math class has a private constructor and all methods are sta...read more

Q49. What are SQL versions worked upon,automations

Ans.

SQL versions worked upon and automations

  • Worked on SQL Server 2008, 2012, 2014, and 2016

  • Automated SQL Server tasks using PowerShell scripts

  • Created SQL Server Agent jobs for automating backups and maintenance tasks

Q50. What is dhcp What is router What is switch What is computer network How to Connectivity

Ans.

DHCP is a network protocol that assigns IP addresses automatically. A router connects multiple networks. A switch connects devices within a network. A computer network is a group of interconnected devices. Connectivity is establishing a connection between devices.

  • DHCP assigns IP addresses automatically

  • Router connects multiple networks

  • Switch connects devices within a network

  • Computer network is a group of interconnected devices

  • Connectivity involves establishing a connection bet...read more

1
2
3
4
5
6
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10k Interviews
3.9
 • 7.8k Interviews
3.7
 • 7.3k Interviews
3.8
 • 5.4k Interviews
3.7
 • 5.2k Interviews
3.8
 • 4.6k Interviews
3.6
 • 3.6k Interviews
3.9
 • 348 Interviews
3.7
 • 273 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

IT Analyst Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter