Production Support Analyst
30+ Production Support Analyst Interview Questions and Answers
Q1. Write a query using below data to find out last string from emp table?
Query to find last string from emp table
Use the ORDER BY clause with DESC keyword to sort the table in descending order
Use the LIMIT keyword to limit the result to 1 row
Assuming the last string refers to the last row in the table
Q2. What is the command to get the value present at 80th row , 100th column?
To get the value present at 80th row, 100th column, you can use the command 'awk' in Unix/Linux systems.
Use the 'awk' command with the syntax 'awk 'NR==80 {print $100}' filename' to get the value at the specified row and column.
Replace 'filename' with the actual file name where the data is stored.
Ensure that the row and column numbers are adjusted based on the indexing starting from 1 in 'awk'.
Production Support Analyst Interview Questions and Answers for Freshers
Q3. What is the command to search a file like test.txt in linux?
The command to search a file like test.txt in Linux is 'grep'.
Use the 'grep' command followed by the search term and the file name to search for a specific text in a file.
For example, to search for the word 'hello' in a file named test.txt, you would use the command 'grep hello test.txt'.
Q4. How to check if any job failed & steps. Concept of ITIL
To check if any job failed, we can use monitoring tools and logs. ITIL recommends incident management process.
Use monitoring tools like Nagios, Zabbix, etc. to check job status
Check logs for any error messages or exceptions
ITIL recommends following the incident management process to resolve the issue
Incident management process includes identifying, logging, categorizing, prioritizing, diagnosing, resolving, and closing the incident
Q5. What is difference between hashmap and concurrent hashmap
HashMap is not thread-safe while ConcurrentHashMap is thread-safe.
HashMap is not thread-safe and can lead to ConcurrentModificationException if modified while iterating.
ConcurrentHashMap allows concurrent modifications without the need for external synchronization.
ConcurrentHashMap achieves thread-safety by dividing the map into segments, allowing multiple threads to operate on different segments concurrently.
ConcurrentHashMap is preferred for multi-threaded environments wher...read more
Q6. What is the diff between constructor and method in java
Constructor is a special type of method used to initialize objects, while a method is a block of code that performs a specific task.
Constructor is called when an object is created, while a method is called to perform a specific task.
Constructors do not have a return type, while methods have a return type.
Constructors have the same name as the class, while methods can have any name.
Example: Constructor - public ClassName() { // constructor code } Method - public void methodNam...read more
Share interview questions and help millions of jobseekers 🌟
Q7. What is the difference between PL SQL AND SQL?
PL/SQL is a procedural language extension to SQL used for writing complex queries and programs.
SQL is used for querying and manipulating data in a database
PL/SQL is used for writing complex queries and programs
PL/SQL is a procedural language that extends SQL with programming constructs like loops and conditional statements
PL/SQL is used to create stored procedures, functions, and triggers in Oracle databases
Q8. If you are using linux then tell me 10 commands in your daily work
10 commonly used Linux commands in daily work
ls - list directory contents
cd - change directory
grep - search for a pattern in a file
tail - display the last part of a file
cat - concatenate and display files
chmod - change file permissions
sudo - execute a command as a superuser
ps - display information about running processes
kill - terminate a process
ssh - connect to a remote server securely
Production Support Analyst Jobs
Q9. What is incident management and problem management
Incident management involves resolving incidents to restore normal service operation, while problem management focuses on identifying and addressing the root cause of recurring incidents.
Incident management is the process of managing and resolving incidents to restore normal service operation as quickly as possible.
Problem management involves identifying the root cause of incidents and implementing permanent solutions to prevent them from recurring.
Incident management focuses...read more
Q10. How to check which file is taking in space in system
To check which file is taking up space in the system, you can use commands like du, df, and find.
Use 'du' command to display disk usage of files and directories
Use 'df' command to display disk space usage of file systems
Use 'find' command to search for files based on size
Q11. what is internal workflow for the BFSI domain?
Internal workflow for BFSI domain involves processes related to banking, financial services, and insurance.
Customer onboarding and account setup
Transaction processing and monitoring
Risk management and compliance checks
Customer support and issue resolution
Data analysis and reporting
Q12. What will you do when application gets crashed
I will investigate the root cause of the crash, analyze logs, and work on resolving the issue to restore application functionality.
Check application logs for error messages
Identify the root cause of the crash
Work with development team to troubleshoot and fix the issue
Implement temporary workaround if needed
Test the application thoroughly before restoring it to production
Q13. what are all the clauses available in sql
SQL clauses are used to perform specific actions in a SQL query.
SELECT: retrieves data from a database
FROM: specifies the table(s) to retrieve data from
WHERE: filters the data based on specified conditions
GROUP BY: groups the data based on specified columns
HAVING: filters the grouped data based on specified conditions
ORDER BY: sorts the data based on specified columns
JOIN: combines rows from multiple tables based on related columns
INSERT INTO: inserts new data into a table
UPD...read more
Q14. What are the RDBMS and list few
RDBMS stands for Relational Database Management System. It is a type of database management system that stores data in a structured format.
Examples of RDBMS include MySQL, Oracle Database, SQL Server, PostgreSQL, and SQLite.
RDBMS use tables to store data and relationships between different tables to organize data.
They support SQL (Structured Query Language) for querying and managing data.
ACID properties (Atomicity, Consistency, Isolation, Durability) are maintained in RDBMS t...read more
Q15. Write s query to find maximum salary from EMP?
Query to find maximum salary from EMP
Use the MAX() function to find the maximum salary
Specify the column name for salary in the SELECT statement
Specify the table name and column name for salary in the FROM clause
Q16. Can we override main method in java
No, main method in Java cannot be overridden.
Main method is a static method of a class and cannot be overridden.
Subclasses can have their own main method, but it will not be considered as the entry point of the program.
Example: public class SubClass extends MainClass { public static void main(String[] args) { // This is not the entry point of the program }}
Q17. What is internal working of hashmap
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.
If multiple key-value pairs hash to the same index, they are stored in a linked list at that index.
To retrieve a value, the key is hashed again to find the corresponding index ...read more
Q18. Write a command to replace a string in unix
Use the sed command to replace a string in Unix
Use the following syntax: sed 's/original_string/new_string/g' filename
The 's' flag stands for substitute, 'g' flag stands for global (replace all occurrences)
Example: sed 's/hello/goodbye/g' file.txt
Q19. Write the command to find the hidden files in unix
Use the 'ls' command with the '-a' flag to find hidden files in Unix.
Use the command 'ls -a' to list all files, including hidden files.
Hidden files in Unix start with a dot (.) before the file name.
Example: 'ls -a' will display all files, including hidden files.
Q20. what do you see on the tree and explain it
I see a tree with green leaves, brown trunk, and branches extending outward.
Green leaves
Brown trunk
Branches extending outward
Q21. What is JVM, how it works
JVM stands for Java Virtual Machine, it is a virtual machine that enables a computer to run Java programs.
JVM is an abstract computing machine that enables a computer to run Java programs
It provides a runtime environment in which Java bytecode can be executed
JVM manages memory, provides security, and facilitates garbage collection
It translates Java bytecode into machine code that can be executed by the computer's processor
Q22. what is Asset in BFSI domain?
In the BFSI domain, an asset refers to any valuable item owned by an individual or organization that can be converted into cash.
Assets can include cash, investments, real estate, equipment, and intellectual property.
In the banking sector, assets can also refer to loans given out to customers.
Assets are important for financial institutions as they represent the value of the organization and its ability to generate revenue.
Asset management is a key function in the BFSI domain t...read more
Q23. what are the types of index and purpose
Types of indexes include clustered, non-clustered, unique, and composite indexes, each serving a different purpose in optimizing database performance.
Clustered index: Physically reorders the data in the table based on the index key. Only one clustered index per table.
Non-clustered index: Creates a separate structure for the index, containing the key columns and a pointer to the actual data rows.
Unique index: Ensures that the indexed columns do not contain duplicate values.
Com...read more
Q24. differentiate TRUNCATE , DROP , DELETE
TRUNCATE, DROP, and DELETE are SQL commands used to remove data from a table, but they differ in their functionality.
TRUNCATE is a DDL command that removes all rows from a table, but keeps the structure intact.
DROP is a DDL command that removes an entire table, including its structure and data.
DELETE is a DML command that removes specific rows from a table based on a condition.
TRUNCATE is faster than DELETE as it doesn't generate any transaction logs.
DROP is irreversible and ...read more
Q25. Diff between static and non-static
Static variables belong to the class itself, while non-static variables belong to instances of the class.
Static variables are shared among all instances of a class
Non-static variables are unique to each instance of a class
Static variables can be accessed without creating an instance of the class
Non-static variables can only be accessed through an instance of the class
Q26. what is stored procedure
A stored procedure is a precompiled set of SQL statements that can be executed on demand.
Stored procedures are stored in a database and can be called by applications or other stored procedures.
They are used to encapsulate and execute complex logic or tasks.
Stored procedures can accept input parameters and return output parameters or result sets.
They improve performance by reducing network traffic and optimizing query execution.
Examples of stored procedures include creating a ...read more
Q27. What is JDK JRE JVM
JDK is Java Development Kit, JRE is Java Runtime Environment, and JVM is Java Virtual Machine.
JDK includes tools for developing Java applications.
JRE provides the libraries and components required to run Java applications.
JVM is the runtime environment in which Java bytecode is executed.
Example: JDK includes javac compiler, JRE includes Java libraries, JVM interprets bytecode.
Q28. Query in sql for joins
SQL query for joins
Use JOIN keyword to combine rows from two or more tables based on a related column between them
Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q29. what is constraints?
Constraints are limitations or restrictions that affect the design, implementation, or operation of a system.
Constraints can be related to time, budget, resources, technology, or regulations.
They can impact the functionality, performance, scalability, or security of a system.
Examples include budget constraints limiting the purchase of new hardware, time constraints for project deadlines, or regulatory constraints for data privacy.
Identifying and managing constraints is import...read more
Q30. what is view in sql?
A view in SQL is a virtual table based on the result-set of a SELECT statement.
Views are used to simplify complex queries by storing them as virtual tables
Views do not store data themselves, but display data from underlying tables
Views can be used to restrict access to certain columns or rows of a table
Views can be used to join multiple tables and present the data in a single table-like structure
Q31. what are data types
Data types are classifications of data that determine the type of values that can be stored and manipulated.
Data types define the characteristics of data such as size, range, and operations that can be performed on them.
Common data types include integers, floating-point numbers, strings, booleans, and arrays.
Examples: int age = 25, float salary = 5000.50, string name = 'John Doe', bool isEmployed = true, int[] numbers = {1, 2, 3}
Q32. what is primary key
A primary key is a unique identifier for a record in a database table.
Primary key ensures each record in a table is unique.
It is used to establish relationships between tables.
Primary key can be a single column or a combination of columns.
It enforces data integrity and allows efficient data retrieval.
Examples of primary keys include social security numbers, email addresses, etc.
Q33. what is ur strength
My strength lies in my ability to troubleshoot complex technical issues efficiently and effectively.
Strong problem-solving skills
Excellent communication skills to work with cross-functional teams
Ability to prioritize and manage multiple tasks simultaneously
Experience in analyzing logs and identifying root causes
Q34. Basic understaing of Java
Java is a popular programming language used for developing applications and software.
Java is an object-oriented programming language.
It is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).
Java is used for developing web applications, mobile apps, and enterprise software.
Key concepts in Java include classes, objects, inheritance, and polymorphism.
Q35. Troubleshooting techniques
Troubleshooting techniques involve identifying, isolating, and resolving issues in a systematic manner.
Gather information about the issue from users or logs
Identify the root cause of the problem
Isolate the issue to determine the scope of impact
Develop a plan to resolve the issue
Implement the solution and test to ensure it is fixed
Document the troubleshooting process for future reference
Q36. How to list files
To list files, use command line tools like ls or dir.
Use 'ls' command in Unix/Linux systems to list files in a directory
Use 'dir' command in Windows systems to list files in a directory
Add options like -l for detailed listing or -a to show hidden files
Use wildcards like * to filter files based on patterns
Q37. How to check logs
To check logs, use command line tools like tail, grep, and less to view and search through log files.
Use 'tail' command to view the last few lines of a log file
Use 'grep' command to search for specific keywords or patterns in a log file
Use 'less' command to view log files page by page and search for specific content
Q38. Diff between grep and egrep
grep is a basic pattern matching tool, while egrep is an extended version with more advanced pattern matching capabilities.
grep is a basic command-line utility for searching plain-text data sets for lines that match a regular expression pattern.
egrep is an extended version of grep that supports more advanced regular expression patterns.
egrep is equivalent to grep -E, which enables extended regular expressions.
egrep is more powerful and flexible compared to grep for pattern ma...read more
Q39. Sql query for condition
Use SQL query to filter data based on a condition
Use WHERE clause to specify the condition
Example: SELECT * FROM table_name WHERE column_name = 'value'
You can use logical operators like AND, OR, NOT to combine conditions
Interview Questions of Similar Designations
Top Interview Questions for Production Support Analyst Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month