Technical Architect

100+ Technical Architect Interview Questions and Answers

Updated 10 Dec 2024

Q51. What is the difference between synchronous and asynchronous?

Ans.

Synchronous and asynchronous are two different ways of executing tasks in a system.

  • Synchronous execution blocks the program until a task is completed.

  • Asynchronous execution allows the program to continue running while a task is being processed.

  • Synchronous tasks are executed one after another in a sequential manner.

  • Asynchronous tasks can be executed concurrently or in parallel.

  • Synchronous communication is like making a phone call and waiting for the other person to respond.

  • Asy...read more

Q52. Java static uses in class, method and variables level?., can we override static methods?.

Ans.

Static keyword in Java can be used at class, method, and variable level. Static methods cannot be overridden.

  • Static variables are shared among all instances of a class

  • Static methods belong to the class rather than an instance

  • Static keyword can be used to create utility classes with only static methods

  • Example: public class Math { public static int add(int a, int b) { return a + b; }}

Q53. What is kafka zookeeper role in the design system?

Ans.

Kafka Zookeeper plays a crucial role in managing and coordinating Kafka brokers in a distributed system.

  • Zookeeper manages configuration information, leader election, and synchronization for Kafka brokers.

  • It helps in maintaining the state of the Kafka cluster and ensures fault tolerance.

  • Zookeeper stores metadata about Kafka topics, partitions, and replicas.

  • It also helps in detecting and recovering from network partitions within the Kafka cluster.

  • Overall, Zookeeper acts as a ce...read more

Q54. What to choose on prime vs cloud and why?

Ans.

The choice between on-premise and cloud depends on factors like cost, scalability, security, and maintenance.

  • On-premise: better control over data, higher upfront costs, requires maintenance and upgrades

  • Cloud: lower upfront costs, scalability, flexibility, automatic updates and maintenance

  • Consider factors like data sensitivity, compliance requirements, and budget constraints

  • Hybrid approach can be used for a combination of on-premise and cloud solutions

Are these interview questions helpful?

Q55. How to migrate DB2 to other RDBMS

Ans.

Migrating DB2 to other RDBMS involves selecting target RDBMS, exporting data, converting schema, and importing data.

  • Select the target RDBMS and ensure compatibility with DB2 data types and features

  • Export data from DB2 using tools like IBM Data Movement Tool or IBM InfoSphere Data Replication

  • Convert schema to target RDBMS using tools like IBM SQL Compatibility Tool or manual scripting

  • Import data into target RDBMS using tools like IBM Data Movement Tool or IBM InfoSphere Data R...read more

Q56. How do you approach customer when there is a problem

Ans.

I approach the customer with empathy, active listening, and a problem-solving mindset.

  • Listen actively to understand the customer's problem

  • Show empathy and understanding towards the customer's concerns

  • Ask clarifying questions to gather more information

  • Offer potential solutions or workarounds

  • Collaborate with the customer to find the best resolution

  • Follow up to ensure the problem is fully resolved

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. Have you experienc on CI/CD Pipelines?

Ans.

Yes, I have experience with CI/CD pipelines.

  • I have worked with Jenkins, GitLab CI/CD, and CircleCI.

  • I have created and maintained pipelines for multiple projects.

  • I have experience with automated testing and deployment.

  • I have implemented continuous integration and delivery for both web and mobile applications.

Q58. Design a solution for system monitoring application like Heartbeat in ELK.

Ans.

Design a system monitoring application like Heartbeat in ELK

  • Utilize Elasticsearch for storing monitoring data

  • Use Logstash for collecting and parsing logs

  • Implement Kibana for visualization and monitoring

  • Set up Beats for lightweight data shippers

Technical Architect Jobs

SDE3 / Technical Architect - Enable Small Business To go Global 5-10 years
Amazon India Software Dev Centre Pvt Ltd
4.1
Hyderabad / Secunderabad
Technical Architect - Infrastructure 5-10 years
IBM India Pvt. Limited
4.1
Mumbai
Cloud Technical Architect 7-11 years
Accenture Solutions Pvt Ltd
3.9
Bangalore / Bengaluru

Q59. Write a program to add a node in binary tree with recursive function.

Ans.

Program to add a node in binary tree using recursive function.

  • Create a function to recursively traverse the tree to find the appropriate position to add the new node.

  • Check if the current node is null, if so, create a new node and assign it to the current node.

  • If the current node is not null, compare the value of the new node with the current node and move left or right accordingly.

  • Repeat the process until the appropriate position is found and the new node is added.

Q60. why serialization?. diff. b/w JPA and Hibernate?.

Ans.

Serialization is the process of converting an object into a stream of bytes to store or transmit data. JPA is a specification while Hibernate is an implementation of JPA.

  • Serialization is used to convert objects into a format that can be easily stored or transmitted, such as in databases or over networks.

  • JPA (Java Persistence API) is a specification for managing relational data in Java applications.

  • Hibernate is an implementation of JPA that provides additional features and sim...read more

Q61. Late Binding/Dynamic binding in ASP.Net?

Ans.

Late binding or dynamic binding is a technique in which the method call is resolved at runtime rather than compile time.

  • In late binding, the type of the object is determined at runtime.

  • It allows for more flexibility in code as it can handle different types of objects.

  • Dynamic keyword is used for late binding in C#.

  • Example: using reflection to invoke a method on an object whose type is not known until runtime.

Q62. How CICS work in distributed systems

Ans.

CICS is a transaction processing system that enables communication between applications in a distributed environment.

  • CICS acts as a middleware between applications and the underlying operating system.

  • It provides a runtime environment for executing transactions.

  • CICS supports various programming languages and communication protocols.

  • It can run on different platforms such as z/OS, Linux, and Windows.

  • CICS can communicate with other systems using various protocols such as TCP/IP, ...read more

Q63. what are the components of HTTP request?

Ans.

HTTP request components include method, URL, headers, and body.

  • Method: GET, POST, PUT, DELETE, etc.

  • URL: Uniform Resource Locator

  • Headers: contain additional information about the request

  • Body: optional data sent with the request

  • Example: GET http://example.com HTTP/1.1

  • Example header: Accept-Language: en-US

  • Example body: {"name": "John", "age": 30}

Q64. How would you optimize the sparse array access.

Ans.

Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.

  • Use a hash map to store only non-null values and their corresponding indices.

  • Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.

  • Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usage and improve access times.

Q65. Define the architecture of a decoupled system with pain points for security and performance.

Ans.

Decoupled system architecture focuses on separating components for flexibility, but can introduce security and performance challenges.

  • Decoupled system architecture involves breaking down a system into smaller, independent components that communicate through APIs or messaging.

  • Security challenges can arise due to increased attack surface area, potential vulnerabilities in communication channels, and lack of centralized security controls.

  • Performance issues may occur from increas...read more

Q66. What are SLAs and types of SLA's

Ans.

SLAs are Service Level Agreements that define the level of service expected by a customer from a provider.

  • SLAs are contracts between a service provider and a customer that define the level of service expected by the customer.

  • They typically include metrics such as uptime, response time, and resolution time.

  • There are different types of SLAs, such as internal SLAs, customer SLAs, and multi-level SLAs.

  • Internal SLAs are agreements between different departments within an organizati...read more

Q67. Design pattern used and purpose

Ans.

The design pattern used is the Model-View-Controller (MVC) pattern.

  • MVC separates the application into three interconnected components: the model, the view, and the controller.

  • The model represents the data and business logic of the application.

  • The view displays the data to the user and handles user interactions.

  • The controller handles the communication between the model and the view, and manages the flow of data and user actions.

  • MVC promotes separation of concerns, modularity, ...read more

Q68. Do you have knowledge of Spring cloud

Ans.

Yes, I have knowledge of Spring cloud.

  • I have experience in developing microservices using Spring Cloud.

  • I have worked with Spring Cloud Config Server for centralized configuration management.

  • I have used Spring Cloud Netflix for service discovery and load balancing.

  • I have implemented circuit breaker patterns using Spring Cloud Netflix Hystrix.

  • I have also worked with Spring Cloud Sleuth for distributed tracing.

  • I am familiar with Spring Cloud Gateway for API gateway implementatio...read more

Q69. Best practices to follow in application development for order management process

Ans.

Best practices for order management process in application development

  • Use a centralized database to store order information

  • Implement a robust authentication and authorization system

  • Ensure data integrity and consistency through proper validation and error handling

  • Design a scalable and efficient architecture to handle high volumes of orders

  • Implement automated order processing and notifications

  • Provide a user-friendly interface for order tracking and management

  • Regularly monitor a...read more

Q70. Design a system with one liner like I want to transfer money from bank A to bank B

Ans.

Design a system to transfer money from bank A to bank B

  • Implement a secure authentication system for both banks

  • Set up a secure connection between the two banks for data transfer

  • Create a transaction processing system to handle the transfer of funds

  • Implement error handling and logging mechanisms for tracking transactions

  • Ensure compliance with financial regulations and data protection laws

Q71. How register BI reports in ESS job

Ans.

BI reports can be registered in ESS job by creating a new job and adding the report as a step.

  • Create a new ESS job

  • Add the BI report as a step in the job

  • Configure the step with appropriate parameters

  • Save and activate the job

Q72. What are phases in Azure Migration

Ans.

Phases in Azure Migration include discovery, assessment, planning, migration, and optimization.

  • Discovery phase involves identifying the existing infrastructure and applications

  • Assessment phase involves analyzing the discovered resources and identifying dependencies

  • Planning phase involves creating a migration plan and selecting the appropriate migration method

  • Migration phase involves executing the migration plan and validating the migrated resources

  • Optimization phase involves ...read more

Q73. Which one is the shortest sorting order?

Ans.

The shortest sorting order is the one with only one element.

  • Sorting order with only one element is the shortest.

  • An array with only one element is already sorted.

Q74. 2. How to do container orchestration

Ans.

Container orchestration involves managing and automating the deployment, scaling, and operation of containers.

  • Use a container orchestration tool like Kubernetes, Docker Swarm, or Apache Mesos

  • Define the desired state of your containers in a configuration file

  • Monitor and manage container health and resource usage

  • Automate scaling and load balancing

  • Ensure high availability and fault tolerance

  • Implement security measures

  • Use container registries to store and distribute container ima...read more

Q75. How do you implement passwordless system

Ans.

Implementing passwordless system involves using alternative authentication methods.

  • Use email or SMS verification codes

  • Implement biometric authentication

  • Utilize hardware security keys

  • Implement OAuth or OpenID Connect for single sign-on

  • Leverage FIDO2 standards for passwordless authentication

Q76. What to do for a cookieless system

Ans.

To create a cookieless system, use alternative methods like local storage or URL parameters for tracking user data.

  • Use local storage to store user data on the client side

  • Utilize URL parameters to pass data between pages

  • Implement server-side session management for user authentication

  • Consider using JSON Web Tokens (JWT) for secure data transmission

Q77. What is new in Angular 8?

Ans.

Angular 8 introduces new features and improvements for better performance and developer experience.

  • Ivy renderer for faster compilation and smaller bundle sizes

  • Improved web worker support for better performance

  • Lazy loading of components and routes

  • Support for TypeScript 3.4 and 3.5

  • New features in Angular Material and CDK

  • Differential loading for faster startup times

  • Improved accessibility features

Q78. How would you add a payment group?

Ans.

To add a payment group, you would need to create a new payment group entity in the system.

  • Create a new payment group entity with necessary attributes such as group name, payment methods, and associated users.

  • Define relationships between the payment group entity and other relevant entities such as users and transactions.

  • Implement functionality to assign users to the payment group and manage payment methods within the group.

Q79. What is Api? How to implement in cloud?

Ans.

API stands for Application Programming Interface. It is a set of rules and protocols for building and interacting with software applications.

  • API allows different software applications to communicate with each other

  • APIs can be implemented in the cloud by hosting the API on a cloud platform such as AWS, Azure, or Google Cloud

  • Cloud-based APIs provide scalability, flexibility, and accessibility for developers and users

  • Examples of cloud-based APIs include AWS API Gateway, Azure AP...read more

Q80. What is Circuit Breaker in Microservices

Ans.

Circuit Breaker is a design pattern used in microservices to prevent cascading failures.

  • Circuit Breaker monitors the availability of a service and prevents requests from being sent if the service is unavailable.

  • It helps in improving the resilience of the system by providing a fallback mechanism.

  • When the Circuit Breaker is open, it redirects calls to a predefined fallback method or returns an error response.

  • Once the service is back online, the Circuit Breaker can be reset to a...read more

Q81. Identify if a program is design pattern compliance

Ans.

To identify if a program is design pattern compliant.

  • Analyze the program's structure and code to identify the presence of common design patterns

  • Look for patterns such as Singleton, Factory, Observer, etc.

  • Check if the program follows the principles and guidelines of the identified design patterns

  • Review the program's documentation and architectural diagrams for design pattern references

Q82. Write program to print binary tree bottom view

Ans.

Program to print binary tree bottom view

  • Traverse the tree in level order and store the horizontal distance of each node from the root

  • Store the nodes in a map with their horizontal distance as key

  • Print the nodes in the map in ascending order of their horizontal distance

Q83. what is sql,what is join operation

Ans.

SQL is a programming language used for managing and manipulating relational databases. Join operation combines rows from two or more tables based on a related column.

  • SQL is a language used to interact with databases

  • It allows users to create, modify, and retrieve data from databases

  • Join operation combines data from multiple tables based on a common column

  • Types of joins include inner join, left join, right join, and full outer join

  • Example: SELECT * FROM table1 JOIN table2 ON ta...read more

Q84. What are the main phases in mlflow

Ans.

Main phases in mlflow include tracking, projects, models, and registry.

  • Tracking: Logging and organizing experiments and results.

  • Projects: Packaging code into reproducible runs.

  • Models: Managing and deploying machine learning models.

  • Registry: Centralized model repository for collaboration and versioning.

Q85. Describe 5 non functional requirements

Ans.

Non functional requirements are criteria that specify how a system should behave, rather than what it should do.

  • Performance - system should respond within 2 seconds for all user interactions

  • Scalability - system should be able to handle 1000 concurrent users

  • Reliability - system should have a 99.99% uptime

  • Security - system should encrypt all sensitive data

  • Usability - system should have a user-friendly interface

Q86. Explain security in microservices

Ans.

Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.

  • Implement authentication and authorization mechanisms to control access to microservices.

  • Use encryption to secure communication between microservices and external clients.

  • Implement monitoring and logging to detect and respond to security incidents.

  • Consider using API gateways for centralized security control and enforcement.

  • Regularly update and...read more

Q87. What is Azure Function

Ans.

Azure Function is a serverless compute service that enables you to run event-triggered code without managing infrastructure.

  • It allows developers to create small, single-purpose functions that can be executed in response to events or triggers.

  • Functions can be written in multiple languages including C#, Java, JavaScript, and Python.

  • It integrates with other Azure services like Azure Event Grid, Azure Cosmos DB, and Azure Blob Storage.

  • It offers pay-per-use pricing model, where yo...read more

Q88. What is the uses of streams?

Ans.

Streams are used in programming to efficiently process large amounts of data in a continuous flow.

  • Streams allow for processing data piece by piece instead of loading everything into memory at once

  • They can be used for reading and writing files, network communication, and data transformation

  • Examples include reading a large log file line by line, downloading a file from the internet in chunks, and transforming data in real-time

Q89. what are class dacorators?

Ans.

Class decorators are a way to modify the behavior of a class or its methods at runtime.

  • Class decorators are functions that take a class as input and return a modified class.

  • They can be used to add new methods or attributes to a class, or to modify existing ones.

  • They are applied using the @decorator syntax before the class definition.

  • Examples include @staticmethod, @classmethod, and @property.

  • Class decorators can also be used to implement design patterns like the Singleton pat...read more

Q90. Architecture of the last project executed

Ans.

The architecture of the last project executed involved a microservices-based approach with containerization using Docker and orchestration with Kubernetes.

  • Utilized microservices architecture for better scalability and maintainability

  • Implemented containerization using Docker for easy deployment and management

  • Utilized Kubernetes for orchestration and scaling of containers

  • Used RESTful APIs for communication between microservices

Q91. Prepare a design for the given problem statement.

Ans.

Design a system for real-time monitoring of temperature and humidity in a warehouse.

  • Utilize IoT sensors to collect temperature and humidity data

  • Implement a centralized database to store the data

  • Develop a web-based dashboard for real-time monitoring

  • Set up alerts for abnormal temperature or humidity levels

Q92. What are some oops concepts

Ans.

Oops concepts are fundamental principles of object-oriented programming.

  • Inheritance - creating new classes from existing ones

  • Encapsulation - hiding implementation details from users

  • Polymorphism - ability of objects to take on multiple forms

  • Abstraction - focusing on essential features while hiding non-essential ones

Q93. What is repository pattern

Ans.

Repository pattern is a design pattern that separates data access logic from business logic.

  • It provides a way to access data without exposing the underlying database or data storage technology.

  • It helps in achieving separation of concerns and makes the code more modular and testable.

  • It involves creating a repository interface that defines the operations that can be performed on the data and a concrete implementation of the repository that interacts with the data storage techno...read more

Q94. Design a system for ticket booking platform

Ans.

Design a system for ticket booking platform

  • Utilize a database to store information about events, venues, and available tickets

  • Implement a user-friendly interface for customers to search, select, and purchase tickets

  • Incorporate payment gateway for secure transactions

  • Include features like seat selection, ticket printing, and email confirmation

  • Develop an admin panel for managing events, venues, and ticket inventory

Q95. Autocalender, duicate vs refrence in power bi

Ans.

Autocalender creates a date table automatically, while duplicate creates a copy of a table and reference creates a linked table in Power BI.

  • Autocalender automatically generates a date table based on the data in your model.

  • Duplicate creates a copy of a table with the same data and structure.

  • Reference creates a linked table that shares the same data as the original table.

  • Autocalender is useful for quickly creating date tables without manual input.

  • Duplicate is useful for creatin...read more

Q96. In Spring, what Bean's scope?.

Ans.

In Spring, a Bean's scope determines the lifecycle and visibility of the bean within the Spring container.

  • Bean scope defines how long a bean lives and how many instances are created

  • Common scopes include singleton, prototype, request, session, and application

  • Singleton scope creates a single instance per Spring container

  • Prototype scope creates a new instance every time the bean is requested

  • Request scope creates a new instance for each HTTP request

  • Session scope creates a single ...read more

Q97. what are HTTP methods?

Ans.

HTTP methods are the actions that can be performed on a resource using HTTP protocol.

  • HTTP methods include GET, POST, PUT, DELETE, HEAD, OPTIONS, CONNECT, and TRACE.

  • GET is used to retrieve a resource, POST is used to create a new resource, PUT is used to update an existing resource, and DELETE is used to delete a resource.

  • HEAD is used to retrieve the headers of a resource without the body, OPTIONS is used to retrieve the supported methods for a resource, CONNECT is used to est...read more

Q98. Deferred execution vs immediate execution

Ans.

Deferred execution delays execution until needed, while immediate execution executes immediately.

  • Deferred execution is useful for optimizing performance and memory usage.

  • Immediate execution is useful for debugging and error handling.

  • Examples of deferred execution include LINQ queries and lazy loading.

  • Examples of immediate execution include foreach loops and method calls.

Q99. How to convert files

Ans.

There are various ways to convert files depending on the file type and desired output format.

  • Use online file converters such as Zamzar or CloudConvert

  • Use software specific to the file type such as Adobe Acrobat for PDFs

  • Use command line tools such as ffmpeg for media files

  • Use programming languages such as Python to write custom conversion scripts

Q100. What is dead end in escaping

Ans.

A dead end in escaping refers to a situation where there is no way out or escape.

  • A dead end in escaping can be a physical barrier such as a wall or a locked door.

  • It can also refer to a situation where all possible options have been exhausted and there is no solution.

  • In a maze, reaching a dead end means there is no path forward and you must backtrack.

  • Dead ends in escaping can be metaphorical, such as being stuck in a difficult situation with no clear way out.

Previous
1
2
3
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10k Interviews
3.9
 • 7.8k Interviews
3.7
 • 7.3k Interviews
3.8
 • 4.6k Interviews
3.6
 • 3.7k Interviews
3.6
 • 3.6k Interviews
3.6
 • 2.3k Interviews
4.1
 • 2.3k Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Technical Architect Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter