Technical Analyst
100+ Technical Analyst Interview Questions and Answers
Q51. Do you have any experience handling client issue?
Yes, I have experience handling client issues in my previous role as a Technical Analyst.
Managed and resolved technical issues reported by clients
Communicated effectively with clients to understand their concerns and provide solutions
Prioritized and escalated urgent client issues to ensure timely resolution
Q52. Difference between Incidence and Service request.
Incidence refers to an unexpected event or problem, while a service request is a formal request for assistance or support.
Incidence is unplanned and can cause disruption, while service requests are planned and expected.
Incidence requires immediate attention, while service requests can be prioritized based on urgency.
Examples of incidence include system crashes, security breaches, and natural disasters, while service requests include password resets, software installations, an...read more
Q53. Explain different authentication methods in restasured?
Different authentication methods in REST API
Basic authentication - uses a username and password for authentication
Token-based authentication - uses tokens generated by the server for authentication
OAuth - allows third-party services to exchange user's data without exposing passwords
API keys - unique identifier used to authenticate requests to the API
Q54. Types of IKM and any customization example
IKM stands for Interactive Knowledge Modules. There are two types: Standard and Customized.
Standard IKMs are pre-built modules that cover a wide range of topics
Customized IKMs are tailored to specific needs and can include company-specific information
Examples of customization include adding company branding, modifying content to fit specific workflows, and incorporating company policies and procedures
Customized IKMs can also include interactive elements such as quizzes and si...read more
Q55. What are higher order functions in javascript
Higher order functions in JavaScript are functions that can take other functions as arguments or return functions as output.
Higher order functions can be used to create more flexible and reusable code.
Examples include functions like map, filter, and reduce in JavaScript.
They allow for functions to be passed as parameters, making code more concise and readable.
Q56. Share all documents even before joining date
It is not recommended to share documents before joining date.
It is not common practice to share documents before joining date as they may contain sensitive information.
Sharing documents before joining date may violate company policies or confidentiality agreements.
Wait until your official start date to share any necessary documents with your new employer.
Share interview questions and help millions of jobseekers 🌟
Q57. what do you know about ION
ION is a financial technology company that provides trading and risk management solutions for capital markets.
ION offers a range of software products for trading, treasury, and risk management.
ION's solutions are used by financial institutions, corporates, and governments worldwide.
ION's products include Wall Street Systems, Openlink, and Fidessa, among others.
Q58. Real time Oops concepts implementation in your project
In my project, I implemented real-time Oops concepts by using inheritance, encapsulation, and polymorphism to create modular and reusable code.
Used inheritance to create a base class with common properties and methods, then derived classes with specific functionalities.
Implemented encapsulation by restricting access to certain data and methods within classes, ensuring data integrity and security.
Leveraged polymorphism to allow objects of different classes to be treated as obj...read more
Technical Analyst Jobs
Q59. What is referential integrity ?
Referential integrity is a database concept that ensures relationships between tables are maintained.
It ensures that a foreign key in one table references a primary key in another table.
It prevents orphaned records in child tables when a parent record is deleted.
It maintains consistency and accuracy of data in the database.
It can be enforced through constraints such as foreign key constraints.
Violation of referential integrity can lead to data inconsistencies and errors.
Q60. What are the python Class lifestyle method
Python class lifestyle methods are special methods that are automatically called at different points in the life cycle of a class object.
Constructor method (__init__): Called when a new instance of the class is created.
Destructor method (__del__): Called when an instance of the class is about to be destroyed.
String representation method (__str__): Called when the object needs to be represented as a string.
Getter and setter methods: Used to get and set the values of class attr...read more
Q61. What is SCCM ?
SCCM stands for System Center Configuration Manager. It is a software management tool used for deploying, managing and monitoring software and devices in an enterprise environment.
SCCM is used for automating software deployment and updates across a network
It can manage devices running on different operating systems such as Windows, macOS, and Linux
SCCM provides inventory management, software metering, and reporting capabilities
It can also be used for patch management and secu...read more
Q62. Given employee class find 10th Max. Salary
To find the 10th highest salary for a given employee class.
Sort the salaries in descending order for the specific employee class.
Skip duplicates and find the 10th unique salary.
Return the 10th salary as the 10th Max. Salary.
Q63. explain to me the flow of the Springboot Application.
The flow of a Springboot Application involves the initialization of the application context, handling HTTP requests, processing business logic, and returning responses.
Initialization of the application context using annotations like @SpringBootApplication
Handling HTTP requests through controllers annotated with @RestController
Processing business logic in service classes annotated with @Service
Interacting with databases using repositories annotated with @Repository
Returning re...read more
Q64. Why do we need an alternative hypothesis
Alternative hypothesis is needed to test the validity of the null hypothesis and to provide an explanation for the observed results.
Alternative hypothesis helps to determine if the observed results are due to chance or a real effect
It provides an explanation for the observed results
It helps to identify the direction of the effect
It allows for the possibility of rejecting the null hypothesis
Example: Null hypothesis - there is no difference in test scores between two groups. Al...read more
Q65. What is react and virtual DOM
React is a JavaScript library for building user interfaces. Virtual DOM is a lightweight copy of the actual DOM.
React allows developers to create reusable UI components
Virtual DOM is a faster way to update the UI compared to traditional DOM manipulation
React uses the virtual DOM to efficiently update the actual DOM
Virtual DOM is a tree-like structure that represents the UI components
React compares the previous and current virtual DOM to determine the changes and updates the a...read more
Q66. DBMS: Difference ebtween primary and unique key
Primary key uniquely identifies each record in a table, while unique key ensures each value in a column is unique.
Primary key does not allow NULL values, while unique key allows one NULL value.
A table can have only one primary key, but multiple unique keys.
Primary key is automatically indexed, while unique key is not.
Primary key can be a combination of multiple columns, while unique key is for a single column.
Q67. Difference between Application and package
Application is a software program designed to perform a specific task, while a package is a collection of software components.
An application is a standalone program that can be installed and run on a computer or mobile device.
A package is a collection of software components that are bundled together for easy installation and management.
Applications are designed to perform specific tasks, such as word processing, gaming, or browsing the internet.
Packages can include multiple a...read more
Q68. Why string is immutable?
String is immutable because it cannot be modified once created.
Immutable objects are safer to use in multi-threaded environments.
String pool in Java is possible because of immutability.
StringBuffer and StringBuilder classes are used for mutable strings.
Example: String s = "hello"; s.concat(" world"); // returns a new string, s remains unchanged.
Q69. Handle installation of patch and upgrade in msi
To handle installation of patch and upgrade in msi, use Windows Installer technology and follow specific steps.
Use Windows Installer technology to create and apply patches
Ensure the patch is compatible with the existing MSI package
Test the patch in a controlled environment before deployment
Upgrade the MSI package by creating a new version with updated features
Follow best practices for patch and upgrade management
Q70. Explain the working on hash map
Hash map is a data structure that maps keys to values using a hash function.
Hash map uses a hash function to compute an index into an array of buckets or slots.
The key is hashed and the resulting hash code is used to locate the value in the hash table.
Collisions occur when two keys hash to the same index, which is resolved using separate chaining or open addressing.
Hash maps have O(1) average time complexity for insertion, deletion, and retrieval.
Examples of hash maps include...read more
Q71. Explain about IP and IP Addresses
IP stands for Internet Protocol. IP addresses are unique numerical identifiers assigned to devices connected to the internet.
IP is a protocol used for communication between devices on the internet
IP addresses are 32-bit or 128-bit numbers that identify devices on a network
IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers
IP addresses are divided into network and host portions
Examples of IP addresses are 192.168.1.1 and 2001:0db8:85a3:0000:0000:8a2e:0370:...read more
Q72. What do you think about sales
Sales are crucial for the success of any business as they drive revenue and growth.
Sales are essential for generating revenue and driving business growth
Understanding customer needs and providing solutions is key in sales
Effective communication and negotiation skills are important in sales
Sales strategies and techniques vary depending on the industry and target market
Q73. What are OOPS Concepts ?
OOPS Concepts are the fundamental principles of Object-Oriented Programming.
Encapsulation - bundling of data and methods that operate on that data
Inheritance - ability of a class to inherit properties and methods from a parent class
Polymorphism - ability of objects to take on many forms
Abstraction - hiding of complex implementation details from the user
Example: A car object can have properties like color, model, and methods like start, stop, accelerate
Example: A child class c...read more
Q74. Lazy loading of beans in spring boot
Lazy loading of beans in Spring Boot allows beans to be loaded only when they are needed, improving performance.
Lazy loading can be achieved by using @Lazy annotation on bean definitions
Lazy loading can also be configured in application.properties using spring.main.lazy-initialization=true
Lazy loading is useful for optimizing application startup time and memory usage
Q75. What are mutating tables?
Mutating tables refer to tables that are being modified by an ongoing transaction.
Mutating tables occur when a trigger or a stored procedure tries to read or modify a table that is already being modified by the same transaction.
This can lead to errors like ORA-04091: table is mutating, trigger/function may not see it.
To avoid mutating table errors, you can use autonomous transactions, compound triggers, or row-level triggers.
For example, if a trigger tries to update a table t...read more
Q76. Make a component for utilizing data from an API
Create a component to fetch and display data from an API
Use a library like Axios or Fetch to make API requests
Parse the JSON data received from the API
Display the data in a user-friendly format on the front end
Q77. Create Custom hook to fetch data
Custom hook to fetch data in React
Create a custom hook using the 'useEffect' and 'useState' hooks
Use 'fetch' or any other method to fetch data from an API
Return the fetched data from the custom hook
Q78. Difference between string and central inverter
String inverters convert DC power from multiple solar panels in series, while central inverters convert DC power from multiple strings of panels in parallel.
String inverters are typically smaller and installed close to the panels, while central inverters are larger and installed in a central location.
String inverters are more modular and allow for individual panel monitoring, while central inverters have higher efficiency and lower installation costs for large systems.
Example...read more
Q79. Difference between tuple and list?
Tuple is immutable and ordered while list is mutable and ordered.
Tuple uses () while list uses [] for declaration.
Tuple cannot be modified once created while list can be modified.
Tuple is faster than list for accessing elements.
Tuple is used for heterogeneous data while list is used for homogeneous data.
Example of tuple: my_tuple = (1, 'hello', 3.14)
Example of list: my_list = [1, 2, 3, 4]
Q80. What is a Azure function?
Azure function is a serverless compute service that allows you to run code without managing infrastructure.
Azure function is event-driven and can be triggered by various events like HTTP requests, timers, or messages from other Azure services.
It supports multiple programming languages like C#, Java, Python, and Node.js.
Azure functions can be used for tasks like data processing, file manipulation, or integrating with other services.
They are cost-effective as you only pay for t...read more
Q81. Explain a real time transactional scenario
A real time transactional scenario involves a customer making a purchase online and the payment being processed instantly.
Customer adds items to their online shopping cart
Customer enters payment information and confirms purchase
Payment gateway processes the transaction in real time
Customer receives confirmation of the purchase and the order is fulfilled
Q82. how spring works internally?
Spring works by storing potential energy when compressed or stretched and releasing it when allowed to return to its original shape.
Springs are made of elastic materials such as metal or rubber.
When a force is applied to a spring, it compresses or stretches, storing potential energy.
The amount of potential energy stored in a spring is proportional to the amount of deformation.
When the force is removed, the spring returns to its original shape, releasing the stored energy.
Spri...read more
Q83. What is .net core
.NET Core is a free, open-source, cross-platform framework for building modern applications.
Developed by Microsoft
Supports multiple programming languages
Can be used to build web, desktop, and mobile applications
Provides high performance and scalability
Compatible with Windows, Linux, and macOS
Q84. What and why BDD framework?
BDD framework is a behavior-driven development framework used for testing software applications.
BDD focuses on the behavior of the system from the end user's perspective.
It uses natural language specifications to define the expected behavior of the system.
BDD frameworks like Cucumber and SpecFlow help in creating executable specifications.
BDD promotes collaboration between developers, testers, and business stakeholders.
Q85. What is ITIL process
ITIL (Information Technology Infrastructure Library) is a framework of best practices for IT service management.
ITIL provides guidelines for IT service management processes such as incident management, problem management, change management, and service level management.
It aims to align IT services with the needs of the business and improve efficiency and effectiveness.
ITIL is widely adopted by organizations worldwide and is considered a standard for IT service management.
ITIL...read more
Q86. What is virtualization?
Virtualization is the process of creating a virtual version of a device or resource, such as a server, storage device, network or operating system.
Virtualization allows multiple virtual instances to run on a single physical machine.
It helps in optimizing resources, increasing efficiency, and reducing costs.
Examples include VMware for server virtualization, VirtualBox for desktop virtualization, and Docker for container virtualization.
Q87. Javascript splice and slice difference
splice is used to add/remove elements from an array, while slice is used to create a new array from a portion of an existing array.
splice modifies the original array, while slice does not
splice can add elements to an array at a specific index
slice can extract a portion of an array without modifying the original array
splice returns the removed elements, while slice returns the extracted elements
Q88. data structure for elevator
Use a queue data structure to manage requests and prioritize based on current direction and proximity.
Use a queue to store requests in the order they are received.
Prioritize requests based on the current direction of the elevator and proximity to the current location.
Update the queue as new requests come in or as the elevator reaches a new floor.
Example: If the elevator is going up and receives a request to go down from a lower floor, prioritize that request after serving all...read more
Q89. what is abc?
ABC is a term that can have different meanings depending on the context.
ABC can refer to the alphabet's first three letters.
In business, ABC can stand for Activity-Based Costing.
In medicine, ABC can be an acronym for Airway, Breathing, and Circulation.
ABC can also be a popular children's song and TV show.
Q90. What is ADDLOCAL property
ADDLOCAL property is used in Windows Installer to specify which features should be installed locally.
ADDLOCAL property is used in Windows Installer to specify which features should be installed locally.
It allows users to customize the installation by selecting specific features to be installed on their system.
For example, if a software package has multiple features like 'Application', 'Documentation', and 'Help Files', the ADDLOCAL property can be used to specify which featur...read more
Q91. What is trap in powershell
In PowerShell, a trap is used to catch and handle errors or exceptions in a script.
Traps are used to intercept specific types of errors or exceptions in PowerShell scripts.
They can be used to perform custom error handling or logging.
Traps are defined using the 'trap' keyword followed by the error type and the action to take.
For example, 'trap { Write-Host 'Error occurred: $_' }' will catch any error and display a custom message.
Q92. .net core middleware example
An example of .NET Core middleware
Middleware is software that sits between the application and the server
In .NET Core, middleware can be used to handle requests and responses
An example of .NET Core middleware is the UseRouting method, which sets up routing for the application
Q93. 3 ways of reversing a string.
Three ways to reverse a string.
Using built-in functions like reverse()
Using a loop to iterate through the string and append each character to a new string in reverse order
Using recursion to reverse the string
Q94. explain NF in sql & ACID concepts
NF in SQL refers to Normal Form which is used to eliminate redundancy in database design. ACID concepts ensure data integrity in transactions.
NF in SQL stands for Normal Form and is used to organize data in a database to eliminate redundancy and dependency.
There are different levels of NF such as 1NF, 2NF, 3NF, and BCNF, each with specific rules to follow.
ACID concepts (Atomicity, Consistency, Isolation, Durability) ensure data integrity in database transactions by guaranteei...read more
Q95. What is active directory
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows administrators to control access and permissions
Facilitates single sign-on for users across different applications and services
Q96. DHCP where it is used
DHCP is used to automatically assign IP addresses to devices on a network.
DHCP is used in both small and large networks.
It is commonly used in home networks to assign IP addresses to devices like computers, smartphones, and smart TVs.
DHCP is also used in enterprise networks to manage IP address allocation for a large number of devices.
It simplifies network administration by eliminating the need for manual IP address configuration.
DHCP is used in various environments such as o...read more
Q97. Explain the DDL,DML?
DDL and DML are two types of SQL commands used to manipulate databases.
DDL stands for Data Definition Language and is used to create, modify, and delete database objects like tables, indexes, and views.
DML stands for Data Manipulation Language and is used to insert, update, and delete data in a database.
Examples of DDL commands include CREATE TABLE, ALTER TABLE, and DROP TABLE.
Examples of DML commands include INSERT INTO, UPDATE, and DELETE FROM.
DDL commands are used to defin...read more
Q98. Find a swing trading stock now
Swing trading stock: AAPL
Look for stocks with high volatility and strong trends
Consider technical indicators such as moving averages and MACD
AAPL has shown consistent swings in price over the past year
Q99. Networking layers functionalities
Networking layers provide different functionalities to ensure communication between devices.
Physical layer - transmits raw data bits over a physical medium
Data link layer - controls the flow of data, error detection and correction
Network layer - routes data packets between different networks
Transport layer - ensures end-to-end communication, error recovery
Session layer - establishes, maintains, and terminates connections
Presentation layer - translates data into a format that ...read more
Q100. what is default keyword
The default keyword is used in programming languages to specify a default value or behavior.
In switch statements, default is used as a catch-all case when no other case matches
In function parameters, default values can be specified using the default keyword
In object destructuring, default values can be assigned using the default keyword
Interview Questions of Similar Designations
Top Interview Questions for Technical Analyst Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month