Technical Analyst

filter-iconFilter interviews by

100+ Technical Analyst Interview Questions and Answers

Updated 22 Jan 2025

Q51. Do you have any experience handling client issue?

Ans.

Yes, I have experience handling client issues in my previous role as a Technical Analyst.

  • Managed and resolved technical issues reported by clients

  • Communicated effectively with clients to understand their concerns and provide solutions

  • Prioritized and escalated urgent client issues to ensure timely resolution

Q52. Difference between Incidence and Service request.

Ans.

Incidence refers to an unexpected event or problem, while a service request is a formal request for assistance or support.

  • Incidence is unplanned and can cause disruption, while service requests are planned and expected.

  • Incidence requires immediate attention, while service requests can be prioritized based on urgency.

  • Examples of incidence include system crashes, security breaches, and natural disasters, while service requests include password resets, software installations, an...read more

Q53. Explain different authentication methods in restasured?

Ans.

Different authentication methods in REST API

  • Basic authentication - uses a username and password for authentication

  • Token-based authentication - uses tokens generated by the server for authentication

  • OAuth - allows third-party services to exchange user's data without exposing passwords

  • API keys - unique identifier used to authenticate requests to the API

Q54. Types of IKM and any customization example

Ans.

IKM stands for Interactive Knowledge Modules. There are two types: Standard and Customized.

  • Standard IKMs are pre-built modules that cover a wide range of topics

  • Customized IKMs are tailored to specific needs and can include company-specific information

  • Examples of customization include adding company branding, modifying content to fit specific workflows, and incorporating company policies and procedures

  • Customized IKMs can also include interactive elements such as quizzes and si...read more

Are these interview questions helpful?

Q55. What are higher order functions in javascript

Ans.

Higher order functions in JavaScript are functions that can take other functions as arguments or return functions as output.

  • Higher order functions can be used to create more flexible and reusable code.

  • Examples include functions like map, filter, and reduce in JavaScript.

  • They allow for functions to be passed as parameters, making code more concise and readable.

Q56. Share all documents even before joining date

Ans.

It is not recommended to share documents before joining date.

  • It is not common practice to share documents before joining date as they may contain sensitive information.

  • Sharing documents before joining date may violate company policies or confidentiality agreements.

  • Wait until your official start date to share any necessary documents with your new employer.

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. what do you know about ION

Ans.

ION is a financial technology company that provides trading and risk management solutions for capital markets.

  • ION offers a range of software products for trading, treasury, and risk management.

  • ION's solutions are used by financial institutions, corporates, and governments worldwide.

  • ION's products include Wall Street Systems, Openlink, and Fidessa, among others.

Q58. Real time Oops concepts implementation in your project

Ans.

In my project, I implemented real-time Oops concepts by using inheritance, encapsulation, and polymorphism to create modular and reusable code.

  • Used inheritance to create a base class with common properties and methods, then derived classes with specific functionalities.

  • Implemented encapsulation by restricting access to certain data and methods within classes, ensuring data integrity and security.

  • Leveraged polymorphism to allow objects of different classes to be treated as obj...read more

Technical Analyst Jobs

Kronos Technical Analyst 3-5 years
Schneider Electric India Pvt. Ltd.
4.1
Bangalore / Bengaluru
Technical Analyst 1-Support 1-2 years
Oracle India Pvt. Ltd.
3.7
Kolkata
Technical Analyst 3-Support 6-10 years
Oracle India Pvt. Ltd.
3.7
Bangalore / Bengaluru

Q59. What is referential integrity ?

Ans.

Referential integrity is a database concept that ensures relationships between tables are maintained.

  • It ensures that a foreign key in one table references a primary key in another table.

  • It prevents orphaned records in child tables when a parent record is deleted.

  • It maintains consistency and accuracy of data in the database.

  • It can be enforced through constraints such as foreign key constraints.

  • Violation of referential integrity can lead to data inconsistencies and errors.

Q60. What are the python Class lifestyle method

Ans.

Python class lifestyle methods are special methods that are automatically called at different points in the life cycle of a class object.

  • Constructor method (__init__): Called when a new instance of the class is created.

  • Destructor method (__del__): Called when an instance of the class is about to be destroyed.

  • String representation method (__str__): Called when the object needs to be represented as a string.

  • Getter and setter methods: Used to get and set the values of class attr...read more

Q61. What is SCCM ?

Ans.

SCCM stands for System Center Configuration Manager. It is a software management tool used for deploying, managing and monitoring software and devices in an enterprise environment.

  • SCCM is used for automating software deployment and updates across a network

  • It can manage devices running on different operating systems such as Windows, macOS, and Linux

  • SCCM provides inventory management, software metering, and reporting capabilities

  • It can also be used for patch management and secu...read more

Q62. Given employee class find 10th Max. Salary

Ans.

To find the 10th highest salary for a given employee class.

  • Sort the salaries in descending order for the specific employee class.

  • Skip duplicates and find the 10th unique salary.

  • Return the 10th salary as the 10th Max. Salary.

Q63. explain to me the flow of the Springboot Application.

Ans.

The flow of a Springboot Application involves the initialization of the application context, handling HTTP requests, processing business logic, and returning responses.

  • Initialization of the application context using annotations like @SpringBootApplication

  • Handling HTTP requests through controllers annotated with @RestController

  • Processing business logic in service classes annotated with @Service

  • Interacting with databases using repositories annotated with @Repository

  • Returning re...read more

Q64. Why do we need an alternative hypothesis

Ans.

Alternative hypothesis is needed to test the validity of the null hypothesis and to provide an explanation for the observed results.

  • Alternative hypothesis helps to determine if the observed results are due to chance or a real effect

  • It provides an explanation for the observed results

  • It helps to identify the direction of the effect

  • It allows for the possibility of rejecting the null hypothesis

  • Example: Null hypothesis - there is no difference in test scores between two groups. Al...read more

Q65. What is react and virtual DOM

Ans.

React is a JavaScript library for building user interfaces. Virtual DOM is a lightweight copy of the actual DOM.

  • React allows developers to create reusable UI components

  • Virtual DOM is a faster way to update the UI compared to traditional DOM manipulation

  • React uses the virtual DOM to efficiently update the actual DOM

  • Virtual DOM is a tree-like structure that represents the UI components

  • React compares the previous and current virtual DOM to determine the changes and updates the a...read more

Q66. DBMS: Difference ebtween primary and unique key

Ans.

Primary key uniquely identifies each record in a table, while unique key ensures each value in a column is unique.

  • Primary key does not allow NULL values, while unique key allows one NULL value.

  • A table can have only one primary key, but multiple unique keys.

  • Primary key is automatically indexed, while unique key is not.

  • Primary key can be a combination of multiple columns, while unique key is for a single column.

Q67. Difference between Application and package

Ans.

Application is a software program designed to perform a specific task, while a package is a collection of software components.

  • An application is a standalone program that can be installed and run on a computer or mobile device.

  • A package is a collection of software components that are bundled together for easy installation and management.

  • Applications are designed to perform specific tasks, such as word processing, gaming, or browsing the internet.

  • Packages can include multiple a...read more

Q68. Why string is immutable?

Ans.

String is immutable because it cannot be modified once created.

  • Immutable objects are safer to use in multi-threaded environments.

  • String pool in Java is possible because of immutability.

  • StringBuffer and StringBuilder classes are used for mutable strings.

  • Example: String s = "hello"; s.concat(" world"); // returns a new string, s remains unchanged.

Frequently asked in,

Q69. Handle installation of patch and upgrade in msi

Ans.

To handle installation of patch and upgrade in msi, use Windows Installer technology and follow specific steps.

  • Use Windows Installer technology to create and apply patches

  • Ensure the patch is compatible with the existing MSI package

  • Test the patch in a controlled environment before deployment

  • Upgrade the MSI package by creating a new version with updated features

  • Follow best practices for patch and upgrade management

Q70. Explain the working on hash map

Ans.

Hash map is a data structure that maps keys to values using a hash function.

  • Hash map uses a hash function to compute an index into an array of buckets or slots.

  • The key is hashed and the resulting hash code is used to locate the value in the hash table.

  • Collisions occur when two keys hash to the same index, which is resolved using separate chaining or open addressing.

  • Hash maps have O(1) average time complexity for insertion, deletion, and retrieval.

  • Examples of hash maps include...read more

Q71. Explain about IP and IP Addresses

Ans.

IP stands for Internet Protocol. IP addresses are unique numerical identifiers assigned to devices connected to the internet.

  • IP is a protocol used for communication between devices on the internet

  • IP addresses are 32-bit or 128-bit numbers that identify devices on a network

  • IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers

  • IP addresses are divided into network and host portions

  • Examples of IP addresses are 192.168.1.1 and 2001:0db8:85a3:0000:0000:8a2e:0370:...read more

Q72. What do you think about sales

Ans.

Sales are crucial for the success of any business as they drive revenue and growth.

  • Sales are essential for generating revenue and driving business growth

  • Understanding customer needs and providing solutions is key in sales

  • Effective communication and negotiation skills are important in sales

  • Sales strategies and techniques vary depending on the industry and target market

Q73. What are OOPS Concepts ?

Ans.

OOPS Concepts are the fundamental principles of Object-Oriented Programming.

  • Encapsulation - bundling of data and methods that operate on that data

  • Inheritance - ability of a class to inherit properties and methods from a parent class

  • Polymorphism - ability of objects to take on many forms

  • Abstraction - hiding of complex implementation details from the user

  • Example: A car object can have properties like color, model, and methods like start, stop, accelerate

  • Example: A child class c...read more

Frequently asked in, ,

Q74. Lazy loading of beans in spring boot

Ans.

Lazy loading of beans in Spring Boot allows beans to be loaded only when they are needed, improving performance.

  • Lazy loading can be achieved by using @Lazy annotation on bean definitions

  • Lazy loading can also be configured in application.properties using spring.main.lazy-initialization=true

  • Lazy loading is useful for optimizing application startup time and memory usage

Q75. What are mutating tables?

Ans.

Mutating tables refer to tables that are being modified by an ongoing transaction.

  • Mutating tables occur when a trigger or a stored procedure tries to read or modify a table that is already being modified by the same transaction.

  • This can lead to errors like ORA-04091: table is mutating, trigger/function may not see it.

  • To avoid mutating table errors, you can use autonomous transactions, compound triggers, or row-level triggers.

  • For example, if a trigger tries to update a table t...read more

Q76. Make a component for utilizing data from an API

Ans.

Create a component to fetch and display data from an API

  • Use a library like Axios or Fetch to make API requests

  • Parse the JSON data received from the API

  • Display the data in a user-friendly format on the front end

Q77. Create Custom hook to fetch data

Ans.

Custom hook to fetch data in React

  • Create a custom hook using the 'useEffect' and 'useState' hooks

  • Use 'fetch' or any other method to fetch data from an API

  • Return the fetched data from the custom hook

Q78. Difference between string and central inverter

Ans.

String inverters convert DC power from multiple solar panels in series, while central inverters convert DC power from multiple strings of panels in parallel.

  • String inverters are typically smaller and installed close to the panels, while central inverters are larger and installed in a central location.

  • String inverters are more modular and allow for individual panel monitoring, while central inverters have higher efficiency and lower installation costs for large systems.

  • Example...read more

Q79. Difference between tuple and list?

Ans.

Tuple is immutable and ordered while list is mutable and ordered.

  • Tuple uses () while list uses [] for declaration.

  • Tuple cannot be modified once created while list can be modified.

  • Tuple is faster than list for accessing elements.

  • Tuple is used for heterogeneous data while list is used for homogeneous data.

  • Example of tuple: my_tuple = (1, 'hello', 3.14)

  • Example of list: my_list = [1, 2, 3, 4]

Frequently asked in,

Q80. What is a Azure function?

Ans.

Azure function is a serverless compute service that allows you to run code without managing infrastructure.

  • Azure function is event-driven and can be triggered by various events like HTTP requests, timers, or messages from other Azure services.

  • It supports multiple programming languages like C#, Java, Python, and Node.js.

  • Azure functions can be used for tasks like data processing, file manipulation, or integrating with other services.

  • They are cost-effective as you only pay for t...read more

Q81. Explain a real time transactional scenario

Ans.

A real time transactional scenario involves a customer making a purchase online and the payment being processed instantly.

  • Customer adds items to their online shopping cart

  • Customer enters payment information and confirms purchase

  • Payment gateway processes the transaction in real time

  • Customer receives confirmation of the purchase and the order is fulfilled

Q82. how spring works internally?

Ans.

Spring works by storing potential energy when compressed or stretched and releasing it when allowed to return to its original shape.

  • Springs are made of elastic materials such as metal or rubber.

  • When a force is applied to a spring, it compresses or stretches, storing potential energy.

  • The amount of potential energy stored in a spring is proportional to the amount of deformation.

  • When the force is removed, the spring returns to its original shape, releasing the stored energy.

  • Spri...read more

Q83. What is .net core

Ans.

.NET Core is a free, open-source, cross-platform framework for building modern applications.

  • Developed by Microsoft

  • Supports multiple programming languages

  • Can be used to build web, desktop, and mobile applications

  • Provides high performance and scalability

  • Compatible with Windows, Linux, and macOS

Q84. What and why BDD framework?

Ans.

BDD framework is a behavior-driven development framework used for testing software applications.

  • BDD focuses on the behavior of the system from the end user's perspective.

  • It uses natural language specifications to define the expected behavior of the system.

  • BDD frameworks like Cucumber and SpecFlow help in creating executable specifications.

  • BDD promotes collaboration between developers, testers, and business stakeholders.

Q85. What is ITIL process

Ans.

ITIL (Information Technology Infrastructure Library) is a framework of best practices for IT service management.

  • ITIL provides guidelines for IT service management processes such as incident management, problem management, change management, and service level management.

  • It aims to align IT services with the needs of the business and improve efficiency and effectiveness.

  • ITIL is widely adopted by organizations worldwide and is considered a standard for IT service management.

  • ITIL...read more

Q86. What is virtualization?

Ans.

Virtualization is the process of creating a virtual version of a device or resource, such as a server, storage device, network or operating system.

  • Virtualization allows multiple virtual instances to run on a single physical machine.

  • It helps in optimizing resources, increasing efficiency, and reducing costs.

  • Examples include VMware for server virtualization, VirtualBox for desktop virtualization, and Docker for container virtualization.

Q87. Javascript splice and slice difference

Ans.

splice is used to add/remove elements from an array, while slice is used to create a new array from a portion of an existing array.

  • splice modifies the original array, while slice does not

  • splice can add elements to an array at a specific index

  • slice can extract a portion of an array without modifying the original array

  • splice returns the removed elements, while slice returns the extracted elements

Q88. data structure for elevator

Ans.

Use a queue data structure to manage requests and prioritize based on current direction and proximity.

  • Use a queue to store requests in the order they are received.

  • Prioritize requests based on the current direction of the elevator and proximity to the current location.

  • Update the queue as new requests come in or as the elevator reaches a new floor.

  • Example: If the elevator is going up and receives a request to go down from a lower floor, prioritize that request after serving all...read more

Q89. what is abc?

Ans.

ABC is a term that can have different meanings depending on the context.

  • ABC can refer to the alphabet's first three letters.

  • In business, ABC can stand for Activity-Based Costing.

  • In medicine, ABC can be an acronym for Airway, Breathing, and Circulation.

  • ABC can also be a popular children's song and TV show.

Q90. What is ADDLOCAL property

Ans.

ADDLOCAL property is used in Windows Installer to specify which features should be installed locally.

  • ADDLOCAL property is used in Windows Installer to specify which features should be installed locally.

  • It allows users to customize the installation by selecting specific features to be installed on their system.

  • For example, if a software package has multiple features like 'Application', 'Documentation', and 'Help Files', the ADDLOCAL property can be used to specify which featur...read more

Q91. What is trap in powershell

Ans.

In PowerShell, a trap is used to catch and handle errors or exceptions in a script.

  • Traps are used to intercept specific types of errors or exceptions in PowerShell scripts.

  • They can be used to perform custom error handling or logging.

  • Traps are defined using the 'trap' keyword followed by the error type and the action to take.

  • For example, 'trap { Write-Host 'Error occurred: $_' }' will catch any error and display a custom message.

Q92. .net core middleware example

Ans.

An example of .NET Core middleware

  • Middleware is software that sits between the application and the server

  • In .NET Core, middleware can be used to handle requests and responses

  • An example of .NET Core middleware is the UseRouting method, which sets up routing for the application

Q93. 3 ways of reversing a string.

Ans.

Three ways to reverse a string.

  • Using built-in functions like reverse()

  • Using a loop to iterate through the string and append each character to a new string in reverse order

  • Using recursion to reverse the string

Q94. explain NF in sql & ACID concepts

Ans.

NF in SQL refers to Normal Form which is used to eliminate redundancy in database design. ACID concepts ensure data integrity in transactions.

  • NF in SQL stands for Normal Form and is used to organize data in a database to eliminate redundancy and dependency.

  • There are different levels of NF such as 1NF, 2NF, 3NF, and BCNF, each with specific rules to follow.

  • ACID concepts (Atomicity, Consistency, Isolation, Durability) ensure data integrity in database transactions by guaranteei...read more

Q95. What is active directory

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • Centralized database for managing network resources

  • Stores information about users, computers, and other network objects

  • Allows administrators to control access and permissions

  • Facilitates single sign-on for users across different applications and services

Frequently asked in, ,

Q96. DHCP where it is used

Ans.

DHCP is used to automatically assign IP addresses to devices on a network.

  • DHCP is used in both small and large networks.

  • It is commonly used in home networks to assign IP addresses to devices like computers, smartphones, and smart TVs.

  • DHCP is also used in enterprise networks to manage IP address allocation for a large number of devices.

  • It simplifies network administration by eliminating the need for manual IP address configuration.

  • DHCP is used in various environments such as o...read more

Q97. Explain the DDL,DML?

Ans.

DDL and DML are two types of SQL commands used to manipulate databases.

  • DDL stands for Data Definition Language and is used to create, modify, and delete database objects like tables, indexes, and views.

  • DML stands for Data Manipulation Language and is used to insert, update, and delete data in a database.

  • Examples of DDL commands include CREATE TABLE, ALTER TABLE, and DROP TABLE.

  • Examples of DML commands include INSERT INTO, UPDATE, and DELETE FROM.

  • DDL commands are used to defin...read more

Q98. Find a swing trading stock now

Ans.

Swing trading stock: AAPL

  • Look for stocks with high volatility and strong trends

  • Consider technical indicators such as moving averages and MACD

  • AAPL has shown consistent swings in price over the past year

Q99. Networking layers functionalities

Ans.

Networking layers provide different functionalities to ensure communication between devices.

  • Physical layer - transmits raw data bits over a physical medium

  • Data link layer - controls the flow of data, error detection and correction

  • Network layer - routes data packets between different networks

  • Transport layer - ensures end-to-end communication, error recovery

  • Session layer - establishes, maintains, and terminates connections

  • Presentation layer - translates data into a format that ...read more

Q100. what is default keyword

Ans.

The default keyword is used in programming languages to specify a default value or behavior.

  • In switch statements, default is used as a catch-all case when no other case matches

  • In function parameters, default values can be specified using the default keyword

  • In object destructuring, default values can be assigned using the default keyword

Previous
1
2
3
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.6
 • 7.5k Interviews
3.7
 • 5.6k Interviews
3.3
 • 519 Interviews
3.7
 • 157 Interviews
3.5
 • 101 Interviews
3.0
 • 38 Interviews
4.0
 • 38 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Recently Viewed
DESIGNATION
DESIGNATION
DESIGNATION
DESIGNATION
INTERVIEWS
BirchStreet Systems
No Interviews
DESIGNATION
DESIGNATION
INTERVIEWS
AlgoSec
No Interviews
INTERVIEWS
Liferay
No Interviews
DESIGNATION
Technical Analyst Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter