Senior Associate Technology L1

20+ Senior Associate Technology L1 Interview Questions and Answers

Updated 2 Jul 2025
search-icon
1d ago

Q. • What is Data Extensions? How it is different from Lists? • What is A/B testing and how to perform A/B Testing? • How do you filter data in Date extension? • What are Automation Studio Activities? • Can you ex...

read more
Ans.

Questions related to Salesforce Marketing Cloud features and functionalities.

  • Data Extensions are tables that store data in Marketing Cloud, while Lists are simple collections of subscribers.

  • A/B testing is a method of comparing two versions of a campaign to determine which one performs better.

  • Data in Data Extensions can be filtered using SQL queries or Filter Activities in Automation Studio.

  • Automation Studio Activities are pre-built actions that can be used to automate marketi...read more

5d ago

Q. How does the garbage collector identify which objects to collect?

Ans.

Garbage collector identifies objects to pick based on their reachability.

  • Garbage collector starts from a set of root objects and identifies all objects that are reachable from them.

  • Objects that are not reachable are considered garbage and are eligible for collection.

  • Reachability is determined by following object references from root objects.

  • Objects that are referenced by other reachable objects are also considered reachable.

  • Objects that are not referenced by any reachable obj...read more

Senior Associate Technology L1 Interview Questions and Answers for Freshers

illustration image

Asked in PwC

2d ago

Q. What are the different stages of project implementation?

Ans.

The different stages of project implementation include initiation, planning, execution, monitoring and control, and closure.

  • Initiation: Defining the project's objectives, scope, and stakeholders.

  • Planning: Developing a detailed project plan, including tasks, resources, and timelines.

  • Execution: Carrying out the project plan, completing tasks, and managing resources.

  • Monitoring and Control: Tracking project progress, identifying and addressing issues, and ensuring adherence to th...read more

2d ago

Q. How would you sort a list of strings based on the count of their occurrences?

Ans.

Sorting a list of strings based on their occurrence count.

  • Create a dictionary to store the count of each string.

  • Use the dictionary to sort the list based on the count of occurrences.

  • If two strings have the same count, sort them alphabetically.

  • Return the sorted list.

Are these interview questions helpful?
2d ago

Q. Given an array containing n distinct numbers taken from 0, 1, 2, ..., n, find the one that is missing from the array. Choose the best algorithm to solve this problem.

Ans.

Algorithm to find missing number in a sequence

  • Use mathematical formula for arithmetic or geometric sequence

  • For random sequence, use sorting and iteration

  • Consider edge cases like empty sequence or multiple missing numbers

Asked in PwC

5d ago

Q. How is the intercompany process configured in the system?

Ans.

Intercompany process is configured into the system through various steps and settings.

  • Intercompany process involves transactions between different entities within the same organization

  • The system should be configured to handle intercompany transactions and ensure proper accounting and reporting

  • This can be achieved through setting up intercompany accounts, defining intercompany relationships, and configuring intercompany billing and invoicing

  • Examples of intercompany transaction...read more

Senior Associate Technology L1 Jobs

Publicis Sapient logo
PS|Senior Associate Technology L1|PEGA 3-6 years
Publicis Sapient
3.5
₹ 19 L/yr - ₹ 27 L/yr
(AmbitionBox estimate)
Pune
Epsilon Asia Group Of Companies logo
PS|Senior Associate Technology L1|PEGA 5-7 years
Epsilon Asia Group Of Companies
3.8
Pune
Publics Sapient logo
Adobe AEM Senior Associate Technology L1 1-6 years
Publics Sapient
3.5
Kolkata

Asked in Synechron

3d ago

Q. Write a method to display the number of objects created for a given class.

Ans.

Method to display number of objects created for a given class

  • Create a static variable to keep track of the number of objects created

  • Increment the variable in the class constructor

  • Create a static method to return the number of objects created

  • Call the static method to display the number of objects created

Asked in Synechron

3d ago

Q. Write a program that takes an employee's name and date of birth as input and returns a tuple containing the name and age.

Ans.

Create a program to return a tuple of an employee's name and calculated age from their date of birth.

  • Use Python's datetime module to handle date calculations.

  • Get the current date using datetime.datetime.now().

  • Calculate age by subtracting the birth year from the current year.

  • Consider whether the birthday has occurred this year to adjust the age.

  • Example: For DOB '1990-05-15', if today is '2023-10-01', age is 33.

Share interview questions and help millions of jobseekers 🌟

man-with-laptop
5d ago

Q. Design Patterns? Types which all worked on

Ans.

Design patterns are reusable solutions to common problems in software design. Some types include Singleton, Factory, Observer, and Strategy patterns.

  • Singleton pattern ensures a class has only one instance and provides a global point of access to it.

  • Factory pattern creates objects without specifying the exact class of object that will be created.

  • Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notif...read more

2d ago

Q. Describe your understanding of basic JavaScript concepts.

Ans.

JavaScript rounding methods help manipulate numbers for precision in calculations and display.

  • Math.round(): Rounds a number to the nearest integer. Example: Math.round(4.5) returns 5.

  • Math.ceil(): Rounds a number up to the nearest integer. Example: Math.ceil(4.1) returns 5.

  • Math.floor(): Rounds a number down to the nearest integer. Example: Math.floor(4.9) returns 4.

  • toFixed(): Formats a number using fixed-point notation. Example: (2.345).toFixed(2) returns '2.35'.

  • parseInt(): Co...read more

Asked in PwC

5d ago

Q. What is meant by cutover activity?

Ans.

Cutover activity refers to the process of transitioning from an old system to a new one.

  • It involves planning and executing the switch from the old system to the new one

  • It may involve data migration, testing, and training

  • Examples include upgrading software, implementing a new system, or moving to a cloud-based platform

1d ago

Q. Write a Lambda expression for Sorting and PartitionBy in Java 8.

Ans.

Lambda expressions in Java 8 for Sorting and PartitionBy

  • Use Comparator interface with lambda expression for sorting

  • Use Collectors.partitioningBy() method with lambda expression for PartitionBy

Asked in Synechron

2d ago

Q. Publisher consumer using blocking queue Java 8 filters DSA beginner level

Ans.

Implementing publisher consumer using blocking queue in Java 8 with beginner level DSA knowledge

  • BlockingQueue interface in Java provides a thread-safe way to implement producer-consumer pattern

  • Java 8 filters can be used to filter elements from a collection based on a predicate

  • Beginner level DSA knowledge can be used to implement basic data structures like queues

Asked in Cognizant

6d ago

Q. What is a closure, and can you provide an example?

Ans.

Closure is a function that has access to variables in its outer scope, even after the outer function has returned.

  • Closure allows a function to access variables from an outer function even after the outer function has returned.

  • It is created when a function returns another function that references variables from the outer function.

  • Example: function outer() { let x = 10; return function inner() { console.log(x); } }

  • In the above example, inner function has access to x even after ...read more

2d ago

Q. How do you prevent memory leaks?

Ans.

Prevent memory leaks by properly managing memory allocation and deallocation.

  • Use smart pointers instead of raw pointers.

  • Avoid circular references.

  • Free memory when it is no longer needed.

  • Use tools like valgrind to detect memory leaks.

  • Avoid global variables.

  • Use RAII (Resource Acquisition Is Initialization) technique.

  • Avoid using malloc and free directly.

  • Use a garbage collector if appropriate.

1d ago

Q. Where are SQL Indexes stored?

Ans.

SQL indexes are stored in the database's file system.

  • Indexes are stored in the same filegroup as the table or in a separate filegroup.

  • They can be stored in the same physical file as the table or in a separate file.

  • Indexes can also be stored in memory, such as in the buffer pool.

  • The location of the index storage can affect performance.

  • Examples of index storage options include clustered, nonclustered, and full-text indexes.

Asked in PwC

5d ago

Q. How is cutover carried out?

Ans.

Cutover is the process of transitioning from an old system to a new one.

  • Cutover plan is created to ensure a smooth transition

  • Testing is done to ensure the new system is working properly

  • Data is migrated from the old system to the new one

  • Users are trained on the new system

  • The cutover is executed during a scheduled downtime

  • Post-cutover support is provided to address any issues

2d ago

Q. Why is bundling needed in MVC?

Ans.

Bundling in MVC is needed to improve performance by reducing the number of HTTP requests.

  • Bundling combines multiple files into a single file to reduce the number of HTTP requests.

  • This improves performance by reducing the time it takes to load a page.

  • Bundling also allows for minification, which reduces the size of the files being sent to the client.

  • Examples of files that can be bundled include CSS, JavaScript, and images.

Asked in TCS

1d ago

Q. What is memory management?

Ans.

Memory management is the process of managing computer memory to allocate and deallocate memory resources.

  • Memory management involves allocating memory to processes that need it and deallocating memory that is no longer needed.

  • It also involves managing memory fragmentation and ensuring efficient use of memory.

  • Examples of memory management techniques include paging, segmentation, and virtual memory.

  • Memory leaks can occur when memory is not properly managed, leading to performanc...read more

Asked in Synechron

2d ago

Q. Explain OOP concepts using Python.

Ans.

OOP in Python involves creating classes and objects, encapsulation, inheritance, and polymorphism.

  • Classes are used to define objects and their properties

  • Encapsulation ensures that data is hidden and can only be accessed through methods

  • Inheritance allows for the creation of subclasses that inherit properties and methods from a parent class

  • Polymorphism allows for the use of a single method or function to handle different types of objects

  • Python supports multiple inheritance and ...read more

6d ago

Q. solid principles where do they apply

Ans.

Solid principles are a set of design principles for writing maintainable and scalable code.

  • Solid principles apply to object-oriented programming.

  • They help in writing code that is easy to maintain, extend and test.

  • Examples of solid principles are Single Responsibility Principle, Open-Closed Principle, Liskov Substitution Principle, Interface Segregation Principle, and Dependency Inversion Principle.

3d ago

Q. How does .NET manage memory?

Ans.

Memory management in .NET

  • Garbage Collector manages memory by freeing up unused objects

  • Memory is allocated on the heap and managed by the CLR

  • Finalizers are used to release unmanaged resources

  • Memory leaks can occur if objects are not properly disposed

  • Value types are stored on the stack and are automatically managed

4d ago

Q. How does a Dictionary store data?

Ans.

A dictionary stores data in key-value pairs.

  • Each key is unique and maps to a specific value.

  • Keys are used to retrieve values from the dictionary.

  • Data can be added, removed, or updated in the dictionary.

  • Examples include Python's dict and Java's HashMap.

Asked in Synechron

3d ago

Q. Write DB Queries with having groupby and join.

Ans.

Understanding DB queries with GROUP BY and JOIN is essential for data aggregation and relational data retrieval.

  • GROUP BY is used to aggregate data across specified columns, e.g., SELECT department, COUNT(*) FROM employees GROUP BY department;

  • JOIN combines rows from two or more tables based on a related column, e.g., SELECT employees.name, departments.name FROM employees JOIN departments ON employees.dept_id = departments.id;

  • HAVING is used to filter results after aggregation, ...read more

3d ago

Q. Software development lifecycles

Ans.

Software development lifecycles are a set of processes used to design, develop, and maintain software.

  • There are several software development lifecycles, including Waterfall, Agile, and DevOps.

  • Each lifecycle has its own set of phases, such as planning, design, development, testing, and deployment.

  • The choice of lifecycle depends on the project requirements, team size, and other factors.

  • Agile methodologies are becoming increasingly popular due to their flexibility and ability to...read more

Asked in Synechron

5d ago

Q. What is Method Resolution Order (MRO) in Python?

Ans.

MRO in Python refers to Method Resolution Order, which determines the order in which methods are called in a class hierarchy.

  • MRO is important in multiple inheritance in Python

  • It is determined by the C3 linearization algorithm

  • You can view the MRO of a class using the __mro__ attribute

  • MRO can be affected by method overriding and super() calls

2d ago

Q. Securing a REST API

Ans.

Securing a REST API involves implementing authentication, authorization, encryption, and rate limiting.

  • Implement authentication using tokens or API keys

  • Use HTTPS to encrypt data transmitted over the network

  • Implement authorization to control access to resources

  • Implement rate limiting to prevent abuse or DoS attacks

Interview Experiences of Popular Companies

Cognizant Logo
3.7
 • 5.9k Interviews
PwC Logo
3.4
 • 1.4k Interviews
Nagarro Logo
4.0
 • 793 Interviews
Synechron Logo
3.5
 • 377 Interviews
View all
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Senior Associate Technology L1 Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits