Technical Architect
100+ Technical Architect Interview Questions and Answers
Q51. What is the difference between synchronous and asynchronous?
Synchronous and asynchronous are two different ways of executing tasks in a system.
Synchronous execution blocks the program until a task is completed.
Asynchronous execution allows the program to continue running while a task is being processed.
Synchronous tasks are executed one after another in a sequential manner.
Asynchronous tasks can be executed concurrently or in parallel.
Synchronous communication is like making a phone call and waiting for the other person to respond.
Asy...read more
Q52. Java static uses in class, method and variables level?., can we override static methods?.
Static keyword in Java can be used at class, method, and variable level. Static methods cannot be overridden.
Static variables are shared among all instances of a class
Static methods belong to the class rather than an instance
Static keyword can be used to create utility classes with only static methods
Example: public class Math { public static int add(int a, int b) { return a + b; }}
Q53. What is kafka zookeeper role in the design system?
Kafka Zookeeper plays a crucial role in managing and coordinating Kafka brokers in a distributed system.
Zookeeper manages configuration information, leader election, and synchronization for Kafka brokers.
It helps in maintaining the state of the Kafka cluster and ensures fault tolerance.
Zookeeper stores metadata about Kafka topics, partitions, and replicas.
It also helps in detecting and recovering from network partitions within the Kafka cluster.
Overall, Zookeeper acts as a ce...read more
Q54. What to choose on prime vs cloud and why?
The choice between on-premise and cloud depends on factors like cost, scalability, security, and maintenance.
On-premise: better control over data, higher upfront costs, requires maintenance and upgrades
Cloud: lower upfront costs, scalability, flexibility, automatic updates and maintenance
Consider factors like data sensitivity, compliance requirements, and budget constraints
Hybrid approach can be used for a combination of on-premise and cloud solutions
Q55. How to migrate DB2 to other RDBMS
Migrating DB2 to other RDBMS involves selecting target RDBMS, exporting data, converting schema, and importing data.
Select the target RDBMS and ensure compatibility with DB2 data types and features
Export data from DB2 using tools like IBM Data Movement Tool or IBM InfoSphere Data Replication
Convert schema to target RDBMS using tools like IBM SQL Compatibility Tool or manual scripting
Import data into target RDBMS using tools like IBM Data Movement Tool or IBM InfoSphere Data R...read more
Q56. How do you approach customer when there is a problem
I approach the customer with empathy, active listening, and a problem-solving mindset.
Listen actively to understand the customer's problem
Show empathy and understanding towards the customer's concerns
Ask clarifying questions to gather more information
Offer potential solutions or workarounds
Collaborate with the customer to find the best resolution
Follow up to ensure the problem is fully resolved
Share interview questions and help millions of jobseekers 🌟
Q57. Have you experienc on CI/CD Pipelines?
Yes, I have experience with CI/CD pipelines.
I have worked with Jenkins, GitLab CI/CD, and CircleCI.
I have created and maintained pipelines for multiple projects.
I have experience with automated testing and deployment.
I have implemented continuous integration and delivery for both web and mobile applications.
Q58. Design a solution for system monitoring application like Heartbeat in ELK.
Design a system monitoring application like Heartbeat in ELK
Utilize Elasticsearch for storing monitoring data
Use Logstash for collecting and parsing logs
Implement Kibana for visualization and monitoring
Set up Beats for lightweight data shippers
Technical Architect Jobs
Q59. Write a program to add a node in binary tree with recursive function.
Program to add a node in binary tree using recursive function.
Create a function to recursively traverse the tree to find the appropriate position to add the new node.
Check if the current node is null, if so, create a new node and assign it to the current node.
If the current node is not null, compare the value of the new node with the current node and move left or right accordingly.
Repeat the process until the appropriate position is found and the new node is added.
Q60. why serialization?. diff. b/w JPA and Hibernate?.
Serialization is the process of converting an object into a stream of bytes to store or transmit data. JPA is a specification while Hibernate is an implementation of JPA.
Serialization is used to convert objects into a format that can be easily stored or transmitted, such as in databases or over networks.
JPA (Java Persistence API) is a specification for managing relational data in Java applications.
Hibernate is an implementation of JPA that provides additional features and sim...read more
Q61. Late Binding/Dynamic binding in ASP.Net?
Late binding or dynamic binding is a technique in which the method call is resolved at runtime rather than compile time.
In late binding, the type of the object is determined at runtime.
It allows for more flexibility in code as it can handle different types of objects.
Dynamic keyword is used for late binding in C#.
Example: using reflection to invoke a method on an object whose type is not known until runtime.
Q62. How CICS work in distributed systems
CICS is a transaction processing system that enables communication between applications in a distributed environment.
CICS acts as a middleware between applications and the underlying operating system.
It provides a runtime environment for executing transactions.
CICS supports various programming languages and communication protocols.
It can run on different platforms such as z/OS, Linux, and Windows.
CICS can communicate with other systems using various protocols such as TCP/IP, ...read more
Q63. what are the components of HTTP request?
HTTP request components include method, URL, headers, and body.
Method: GET, POST, PUT, DELETE, etc.
URL: Uniform Resource Locator
Headers: contain additional information about the request
Body: optional data sent with the request
Example: GET http://example.com HTTP/1.1
Example header: Accept-Language: en-US
Example body: {"name": "John", "age": 30}
Q64. How would you optimize the sparse array access.
Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.
Use a hash map to store only non-null values and their corresponding indices.
Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.
Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usage and improve access times.
Q65. Define the architecture of a decoupled system with pain points for security and performance.
Decoupled system architecture focuses on separating components for flexibility, but can introduce security and performance challenges.
Decoupled system architecture involves breaking down a system into smaller, independent components that communicate through APIs or messaging.
Security challenges can arise due to increased attack surface area, potential vulnerabilities in communication channels, and lack of centralized security controls.
Performance issues may occur from increas...read more
Q66. What are SLAs and types of SLA's
SLAs are Service Level Agreements that define the level of service expected by a customer from a provider.
SLAs are contracts between a service provider and a customer that define the level of service expected by the customer.
They typically include metrics such as uptime, response time, and resolution time.
There are different types of SLAs, such as internal SLAs, customer SLAs, and multi-level SLAs.
Internal SLAs are agreements between different departments within an organizati...read more
Q67. Design pattern used and purpose
The design pattern used is the Model-View-Controller (MVC) pattern.
MVC separates the application into three interconnected components: the model, the view, and the controller.
The model represents the data and business logic of the application.
The view displays the data to the user and handles user interactions.
The controller handles the communication between the model and the view, and manages the flow of data and user actions.
MVC promotes separation of concerns, modularity, ...read more
Q68. Do you have knowledge of Spring cloud
Yes, I have knowledge of Spring cloud.
I have experience in developing microservices using Spring Cloud.
I have worked with Spring Cloud Config Server for centralized configuration management.
I have used Spring Cloud Netflix for service discovery and load balancing.
I have implemented circuit breaker patterns using Spring Cloud Netflix Hystrix.
I have also worked with Spring Cloud Sleuth for distributed tracing.
I am familiar with Spring Cloud Gateway for API gateway implementatio...read more
Q69. Best practices to follow in application development for order management process
Best practices for order management process in application development
Use a centralized database to store order information
Implement a robust authentication and authorization system
Ensure data integrity and consistency through proper validation and error handling
Design a scalable and efficient architecture to handle high volumes of orders
Implement automated order processing and notifications
Provide a user-friendly interface for order tracking and management
Regularly monitor a...read more
Q70. Design a system with one liner like I want to transfer money from bank A to bank B
Design a system to transfer money from bank A to bank B
Implement a secure authentication system for both banks
Set up a secure connection between the two banks for data transfer
Create a transaction processing system to handle the transfer of funds
Implement error handling and logging mechanisms for tracking transactions
Ensure compliance with financial regulations and data protection laws
Q71. How register BI reports in ESS job
BI reports can be registered in ESS job by creating a new job and adding the report as a step.
Create a new ESS job
Add the BI report as a step in the job
Configure the step with appropriate parameters
Save and activate the job
Q72. What are phases in Azure Migration
Phases in Azure Migration include discovery, assessment, planning, migration, and optimization.
Discovery phase involves identifying the existing infrastructure and applications
Assessment phase involves analyzing the discovered resources and identifying dependencies
Planning phase involves creating a migration plan and selecting the appropriate migration method
Migration phase involves executing the migration plan and validating the migrated resources
Optimization phase involves ...read more
Q73. Which one is the shortest sorting order?
The shortest sorting order is the one with only one element.
Sorting order with only one element is the shortest.
An array with only one element is already sorted.
Q74. 2. How to do container orchestration
Container orchestration involves managing and automating the deployment, scaling, and operation of containers.
Use a container orchestration tool like Kubernetes, Docker Swarm, or Apache Mesos
Define the desired state of your containers in a configuration file
Monitor and manage container health and resource usage
Automate scaling and load balancing
Ensure high availability and fault tolerance
Implement security measures
Use container registries to store and distribute container ima...read more
Q75. How do you implement passwordless system
Implementing passwordless system involves using alternative authentication methods.
Use email or SMS verification codes
Implement biometric authentication
Utilize hardware security keys
Implement OAuth or OpenID Connect for single sign-on
Leverage FIDO2 standards for passwordless authentication
Q76. What to do for a cookieless system
To create a cookieless system, use alternative methods like local storage or URL parameters for tracking user data.
Use local storage to store user data on the client side
Utilize URL parameters to pass data between pages
Implement server-side session management for user authentication
Consider using JSON Web Tokens (JWT) for secure data transmission
Q77. What is new in Angular 8?
Angular 8 introduces new features and improvements for better performance and developer experience.
Ivy renderer for faster compilation and smaller bundle sizes
Improved web worker support for better performance
Lazy loading of components and routes
Support for TypeScript 3.4 and 3.5
New features in Angular Material and CDK
Differential loading for faster startup times
Improved accessibility features
Q78. How would you add a payment group?
To add a payment group, you would need to create a new payment group entity in the system.
Create a new payment group entity with necessary attributes such as group name, payment methods, and associated users.
Define relationships between the payment group entity and other relevant entities such as users and transactions.
Implement functionality to assign users to the payment group and manage payment methods within the group.
Q79. What is Api? How to implement in cloud?
API stands for Application Programming Interface. It is a set of rules and protocols for building and interacting with software applications.
API allows different software applications to communicate with each other
APIs can be implemented in the cloud by hosting the API on a cloud platform such as AWS, Azure, or Google Cloud
Cloud-based APIs provide scalability, flexibility, and accessibility for developers and users
Examples of cloud-based APIs include AWS API Gateway, Azure AP...read more
Q80. What is Circuit Breaker in Microservices
Circuit Breaker is a design pattern used in microservices to prevent cascading failures.
Circuit Breaker monitors the availability of a service and prevents requests from being sent if the service is unavailable.
It helps in improving the resilience of the system by providing a fallback mechanism.
When the Circuit Breaker is open, it redirects calls to a predefined fallback method or returns an error response.
Once the service is back online, the Circuit Breaker can be reset to a...read more
Q81. Identify if a program is design pattern compliance
To identify if a program is design pattern compliant.
Analyze the program's structure and code to identify the presence of common design patterns
Look for patterns such as Singleton, Factory, Observer, etc.
Check if the program follows the principles and guidelines of the identified design patterns
Review the program's documentation and architectural diagrams for design pattern references
Q82. Write program to print binary tree bottom view
Program to print binary tree bottom view
Traverse the tree in level order and store the horizontal distance of each node from the root
Store the nodes in a map with their horizontal distance as key
Print the nodes in the map in ascending order of their horizontal distance
Q83. what is sql,what is join operation
SQL is a programming language used for managing and manipulating relational databases. Join operation combines rows from two or more tables based on a related column.
SQL is a language used to interact with databases
It allows users to create, modify, and retrieve data from databases
Join operation combines data from multiple tables based on a common column
Types of joins include inner join, left join, right join, and full outer join
Example: SELECT * FROM table1 JOIN table2 ON ta...read more
Q84. What are the main phases in mlflow
Main phases in mlflow include tracking, projects, models, and registry.
Tracking: Logging and organizing experiments and results.
Projects: Packaging code into reproducible runs.
Models: Managing and deploying machine learning models.
Registry: Centralized model repository for collaboration and versioning.
Q85. Describe 5 non functional requirements
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Q86. Explain security in microservices
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for centralized security control and enforcement.
Regularly update and...read more
Q87. What is Azure Function
Azure Function is a serverless compute service that enables you to run event-triggered code without managing infrastructure.
It allows developers to create small, single-purpose functions that can be executed in response to events or triggers.
Functions can be written in multiple languages including C#, Java, JavaScript, and Python.
It integrates with other Azure services like Azure Event Grid, Azure Cosmos DB, and Azure Blob Storage.
It offers pay-per-use pricing model, where yo...read more
Q88. What is the uses of streams?
Streams are used in programming to efficiently process large amounts of data in a continuous flow.
Streams allow for processing data piece by piece instead of loading everything into memory at once
They can be used for reading and writing files, network communication, and data transformation
Examples include reading a large log file line by line, downloading a file from the internet in chunks, and transforming data in real-time
Q89. what are class dacorators?
Class decorators are a way to modify the behavior of a class or its methods at runtime.
Class decorators are functions that take a class as input and return a modified class.
They can be used to add new methods or attributes to a class, or to modify existing ones.
They are applied using the @decorator syntax before the class definition.
Examples include @staticmethod, @classmethod, and @property.
Class decorators can also be used to implement design patterns like the Singleton pat...read more
Q90. Architecture of the last project executed
The architecture of the last project executed involved a microservices-based approach with containerization using Docker and orchestration with Kubernetes.
Utilized microservices architecture for better scalability and maintainability
Implemented containerization using Docker for easy deployment and management
Utilized Kubernetes for orchestration and scaling of containers
Used RESTful APIs for communication between microservices
Q91. Prepare a design for the given problem statement.
Design a system for real-time monitoring of temperature and humidity in a warehouse.
Utilize IoT sensors to collect temperature and humidity data
Implement a centralized database to store the data
Develop a web-based dashboard for real-time monitoring
Set up alerts for abnormal temperature or humidity levels
Q92. What are some oops concepts
Oops concepts are fundamental principles of object-oriented programming.
Inheritance - creating new classes from existing ones
Encapsulation - hiding implementation details from users
Polymorphism - ability of objects to take on multiple forms
Abstraction - focusing on essential features while hiding non-essential ones
Q93. What is repository pattern
Repository pattern is a design pattern that separates data access logic from business logic.
It provides a way to access data without exposing the underlying database or data storage technology.
It helps in achieving separation of concerns and makes the code more modular and testable.
It involves creating a repository interface that defines the operations that can be performed on the data and a concrete implementation of the repository that interacts with the data storage techno...read more
Q94. Design a system for ticket booking platform
Design a system for ticket booking platform
Utilize a database to store information about events, venues, and available tickets
Implement a user-friendly interface for customers to search, select, and purchase tickets
Incorporate payment gateway for secure transactions
Include features like seat selection, ticket printing, and email confirmation
Develop an admin panel for managing events, venues, and ticket inventory
Q95. Autocalender, duicate vs refrence in power bi
Autocalender creates a date table automatically, while duplicate creates a copy of a table and reference creates a linked table in Power BI.
Autocalender automatically generates a date table based on the data in your model.
Duplicate creates a copy of a table with the same data and structure.
Reference creates a linked table that shares the same data as the original table.
Autocalender is useful for quickly creating date tables without manual input.
Duplicate is useful for creatin...read more
Q96. In Spring, what Bean's scope?.
In Spring, a Bean's scope determines the lifecycle and visibility of the bean within the Spring container.
Bean scope defines how long a bean lives and how many instances are created
Common scopes include singleton, prototype, request, session, and application
Singleton scope creates a single instance per Spring container
Prototype scope creates a new instance every time the bean is requested
Request scope creates a new instance for each HTTP request
Session scope creates a single ...read more
Q97. what are HTTP methods?
HTTP methods are the actions that can be performed on a resource using HTTP protocol.
HTTP methods include GET, POST, PUT, DELETE, HEAD, OPTIONS, CONNECT, and TRACE.
GET is used to retrieve a resource, POST is used to create a new resource, PUT is used to update an existing resource, and DELETE is used to delete a resource.
HEAD is used to retrieve the headers of a resource without the body, OPTIONS is used to retrieve the supported methods for a resource, CONNECT is used to est...read more
Q98. Deferred execution vs immediate execution
Deferred execution delays execution until needed, while immediate execution executes immediately.
Deferred execution is useful for optimizing performance and memory usage.
Immediate execution is useful for debugging and error handling.
Examples of deferred execution include LINQ queries and lazy loading.
Examples of immediate execution include foreach loops and method calls.
Q99. How to convert files
There are various ways to convert files depending on the file type and desired output format.
Use online file converters such as Zamzar or CloudConvert
Use software specific to the file type such as Adobe Acrobat for PDFs
Use command line tools such as ffmpeg for media files
Use programming languages such as Python to write custom conversion scripts
Q100. What is dead end in escaping
A dead end in escaping refers to a situation where there is no way out or escape.
A dead end in escaping can be a physical barrier such as a wall or a locked door.
It can also refer to a situation where all possible options have been exhausted and there is no solution.
In a maze, reaching a dead end means there is no path forward and you must backtrack.
Dead ends in escaping can be metaphorical, such as being stuck in a difficult situation with no clear way out.
Interview Questions of Similar Designations
Top Interview Questions for Technical Architect Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month