Production Support Analyst
40+ Production Support Analyst Interview Questions and Answers


Q. Write a query to find the last string from the emp table.
Query to find last string from emp table
Use the ORDER BY clause with DESC keyword to sort the table in descending order
Use the LIMIT keyword to limit the result to 1 row
Assuming the last string refers to the last row in the table

Asked in CGI Group

Q. What command retrieves the value at the 80th row and 100th column?
To get the value present at 80th row, 100th column, you can use the command 'awk' in Unix/Linux systems.
Use the 'awk' command with the syntax 'awk 'NR==80 {print $100}' filename' to get the value at the specified row and column.
Replace 'filename' with the actual file name where the data is stored.
Ensure that the row and column numbers are adjusted based on the indexing starting from 1 in 'awk'.
Production Support Analyst Interview Questions and Answers for Freshers

Asked in CGI Group

Q. What is the command to search for a file named test.txt in Linux?
The command to search a file like test.txt in Linux is 'grep'.
Use the 'grep' command followed by the search term and the file name to search for a specific text in a file.
For example, to search for the word 'hello' in a file named test.txt, you would use the command 'grep hello test.txt'.
Asked in Releventz

Q. What is the difference between a constructor and a method in Java?
Constructor is a special type of method used to initialize objects, while a method is a block of code that performs a specific task.
Constructor is called when an object is created, while a method is called to perform a specific task.
Constructors do not have a return type, while methods have a return type.
Constructors have the same name as the class, while methods can have any name.
Example: Constructor - public ClassName() { // constructor code } Method - public void methodNam...read more

Asked in Xoriant

Q. How to check if any job failed & steps. Concept of ITIL
To check if any job failed, we can use monitoring tools and logs. ITIL recommends incident management process.
Use monitoring tools like Nagios, Zabbix, etc. to check job status
Check logs for any error messages or exceptions
ITIL recommends following the incident management process to resolve the issue
Incident management process includes identifying, logging, categorizing, prioritizing, diagnosing, resolving, and closing the incident

Asked in Incedo

Q. What is the difference between a HashMap and a ConcurrentHashMap?
HashMap is not thread-safe while ConcurrentHashMap is thread-safe.
HashMap is not thread-safe and can lead to ConcurrentModificationException if modified while iterating.
ConcurrentHashMap allows concurrent modifications without the need for external synchronization.
ConcurrentHashMap achieves thread-safety by dividing the map into segments, allowing multiple threads to operate on different segments concurrently.
ConcurrentHashMap is preferred for multi-threaded environments wher...read more
Production Support Analyst Jobs




Asked in Teleperformance

Q. How did you establish a connection between your information and the server?
I established a connection by configuring network settings, using appropriate protocols, and verifying server accessibility.
Configured network settings such as IP address and subnet mask to ensure proper communication.
Used protocols like TCP/IP to establish a reliable connection.
Verified server accessibility through ping tests to check connectivity.
Utilized tools like SSH or RDP for secure remote access to the server.
Monitored logs for any connection errors and resolved them ...read more

Asked in Teleperformance

Q. What is the code for adding additional information to a table?
Adding information to a table typically involves using SQL INSERT statements.
Use the INSERT INTO statement to add new rows. Example: INSERT INTO table_name (column1, column2) VALUES (value1, value2);
You can insert multiple rows at once. Example: INSERT INTO table_name (column1, column2) VALUES (value1, value2), (value3, value4);
Ensure data types match the table schema to avoid errors.
Use transactions for batch inserts to maintain data integrity.
Share interview questions and help millions of jobseekers 🌟


Q. What is the difference between PL/SQL and SQL?
PL/SQL is a procedural language extension to SQL used for writing complex queries and programs.
SQL is used for querying and manipulating data in a database
PL/SQL is used for writing complex queries and programs
PL/SQL is a procedural language that extends SQL with programming constructs like loops and conditional statements
PL/SQL is used to create stored procedures, functions, and triggers in Oracle databases

Asked in Amdocs

Q. If you are using Linux, tell me about 10 commands you use in your daily work.
10 commonly used Linux commands in daily work
ls - list directory contents
cd - change directory
grep - search for a pattern in a file
tail - display the last part of a file
cat - concatenate and display files
chmod - change file permissions
sudo - execute a command as a superuser
ps - display information about running processes
kill - terminate a process
ssh - connect to a remote server securely

Asked in Cognizant

Q. What factors determine the priority of incidents and outages?
Factors determining incident and outage priority
Impact on business operations
Urgency of the issue
Number of users affected
Potential financial loss
SLA agreements
Reputation damage
Regulatory compliance requirements

Asked in TCS

Q. What is the difference between incident management and problem management?
Incident management focuses on resolving issues quickly to minimize impact, while problem management focuses on identifying and addressing root causes to prevent future incidents.
Incident management is reactive, focusing on restoring services as quickly as possible.
Problem management is proactive, focusing on identifying and addressing the root cause of incidents to prevent them from happening again.
Incident management is typically handled by the support team, while problem m...read more
Asked in Releventz

Q. What is incident management and problem management
Incident management involves resolving incidents to restore normal service operation, while problem management focuses on identifying and addressing the root cause of recurring incidents.
Incident management is the process of managing and resolving incidents to restore normal service operation as quickly as possible.
Problem management involves identifying the root cause of incidents and implementing permanent solutions to prevent them from recurring.
Incident management focuses...read more

Asked in FIS

Q. How do you check which file is taking up the most space in a system?
To check which file is taking up space in the system, you can use commands like du, df, and find.
Use 'du' command to display disk usage of files and directories
Use 'df' command to display disk space usage of file systems
Use 'find' command to search for files based on size

Asked in CGI Group

Q. What is the internal workflow for the BFSI domain?
Internal workflow for BFSI domain involves processes related to banking, financial services, and insurance.
Customer onboarding and account setup
Transaction processing and monitoring
Risk management and compliance checks
Customer support and issue resolution
Data analysis and reporting
Asked in Releventz

Q. What will you do when the application crashes?
I will investigate the root cause of the crash, analyze logs, and work on resolving the issue to restore application functionality.
Check application logs for error messages
Identify the root cause of the crash
Work with development team to troubleshoot and fix the issue
Implement temporary workaround if needed
Test the application thoroughly before restoring it to production

Asked in Sanmina Sci

Q. What are RDBMS, and can you list a few?
RDBMS stands for Relational Database Management System. It is a type of database management system that stores data in a structured format.
Examples of RDBMS include MySQL, Oracle Database, SQL Server, PostgreSQL, and SQLite.
RDBMS use tables to store data and relationships between different tables to organize data.
They support SQL (Structured Query Language) for querying and managing data.
ACID properties (Atomicity, Consistency, Isolation, Durability) are maintained in RDBMS t...read more
Asked in Lycatech Services

Q. What clauses are available in SQL?
SQL clauses are used to perform specific actions in a SQL query.
SELECT: retrieves data from a database
FROM: specifies the table(s) to retrieve data from
WHERE: filters the data based on specified conditions
GROUP BY: groups the data based on specified columns
HAVING: filters the grouped data based on specified conditions
ORDER BY: sorts the data based on specified columns
JOIN: combines rows from multiple tables based on related columns
INSERT INTO: inserts new data into a table
UPD...read more


Q. Write a query to find the maximum salary from the EMP table.
Query to find maximum salary from EMP
Use the MAX() function to find the maximum salary
Specify the column name for salary in the SELECT statement
Specify the table name and column name for salary in the FROM clause

Asked in Capgemini

Q. Can we override the main method in Java?
No, main method in Java cannot be overridden.
Main method is a static method of a class and cannot be overridden.
Subclasses can have their own main method, but it will not be considered as the entry point of the program.
Example: public class SubClass extends MainClass { public static void main(String[] args) { // This is not the entry point of the program }}

Asked in Infosys

Q. Explain the internal workings of a HashMap.
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.
If multiple key-value pairs hash to the same index, they are stored in a linked list at that index.
To retrieve a value, the key is hashed again to find the corresponding index ...read more

Asked in Exela Technologies

Q. How do you schedule a job in Linux using Unix commands?
To schedule a job in Linux, use the 'cron' utility to create a cron job.
Use the 'crontab -e' command to edit the cron table for the current user.
Specify the schedule for the job using the appropriate time and date format.
Add the command or script to be executed at the scheduled time.
Save and exit the cron table to activate the scheduled job.

Asked in Exela Technologies

Q. Write an SQL query to create a table with four parameters.
SQL query to create a table with four parameters
Use CREATE TABLE statement to create a new table
Specify the table name and column names along with their data types
Add any constraints or default values as needed
Example: CREATE TABLE myTable (id INT, name VARCHAR(50), age INT, salary DECIMAL(10,2))

Asked in Capgemini

Q. Write a command to replace a string in Unix.
Use the sed command to replace a string in Unix
Use the following syntax: sed 's/original_string/new_string/g' filename
The 's' flag stands for substitute, 'g' flag stands for global (replace all occurrences)
Example: sed 's/hello/goodbye/g' file.txt

Asked in TELUS Digital

Q. what do you see on the tree and explain it
I see a tree with green leaves, brown trunk, and branches extending outward.
Green leaves
Brown trunk
Branches extending outward

Asked in Capgemini

Q. Write the command to find the hidden files in Unix.
Use the 'ls' command with the '-a' flag to find hidden files in Unix.
Use the command 'ls -a' to list all files, including hidden files.
Hidden files in Unix start with a dot (.) before the file name.
Example: 'ls -a' will display all files, including hidden files.
Asked in Releventz

Q. What is JVM, how it works
JVM stands for Java Virtual Machine, it is a virtual machine that enables a computer to run Java programs.
JVM is an abstract computing machine that enables a computer to run Java programs
It provides a runtime environment in which Java bytecode can be executed
JVM manages memory, provides security, and facilitates garbage collection
It translates Java bytecode into machine code that can be executed by the computer's processor

Asked in CGI Group

Q. What is an asset in the BFSI domain?
In the BFSI domain, an asset refers to any valuable item owned by an individual or organization that can be converted into cash.
Assets can include cash, investments, real estate, equipment, and intellectual property.
In the banking sector, assets can also refer to loans given out to customers.
Assets are important for financial institutions as they represent the value of the organization and its ability to generate revenue.
Asset management is a key function in the BFSI domain t...read more
Asked in Mage Data

Q. What are the types of indexes and their purposes?
Types of indexes include clustered, non-clustered, unique, and composite indexes, each serving a different purpose in optimizing database performance.
Clustered index: Physically reorders the data in the table based on the index key. Only one clustered index per table.
Non-clustered index: Creates a separate structure for the index, containing the key columns and a pointer to the actual data rows.
Unique index: Ensures that the indexed columns do not contain duplicate values.
Com...read more
Asked in Lycatech Services

Q. Differentiate between TRUNCATE, DROP, and DELETE statements.
TRUNCATE, DROP, and DELETE are SQL commands used to remove data from a table, but they differ in their functionality.
TRUNCATE is a DDL command that removes all rows from a table, but keeps the structure intact.
DROP is a DDL command that removes an entire table, including its structure and data.
DELETE is a DML command that removes specific rows from a table based on a condition.
TRUNCATE is faster than DELETE as it doesn't generate any transaction logs.
DROP is irreversible and ...read more
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for Production Support Analyst Related Skills

Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary


Reviews
Interviews
Salaries
Users

