Technology Analyst

filter-iconFilter interviews by

200+ Technology Analyst Interview Questions and Answers

Updated 26 Feb 2025

Q51. What is c# and ddbms. What is oops and design patterns. What is joins. What is unboxing boxing.

Ans.

C# is a programming language and DDBMS is a distributed database management system. OOPs is a programming paradigm and design patterns are reusable solutions to common software problems. Joins are used to combine data from multiple tables. Boxing and unboxing are operations to convert value types to reference types and vice versa.

  • C# is an object-oriented programming language developed by Microsoft.

  • DDBMS is a distributed database management system that allows data to be stored...read more

Q52. How can you divide a cake into 8 parts only 3 cuts allowed

Ans.

To divide a cake into 8 parts with only 3 cuts, make two perpendicular cuts to create 4 equal pieces, then cut each of those pieces in half.

  • Make a horizontal cut across the middle of the cake to create 2 equal halves.

  • Make a vertical cut through the middle of the cake to create 4 equal quarters.

  • Make a diagonal cut through each quarter to create 8 equal parts.

Q53. How to choose between Live and Extract Connection?

Ans.

Choose Live or Extract Connection based on data size, frequency of updates, and performance needs.

  • Use Live Connection for real-time data analysis and Extract Connection for large data sets.

  • Live Connection requires a stable network connection while Extract Connection can work offline.

  • Extract Connection allows for faster performance as data is stored locally.

  • Consider the frequency of data updates and the need for real-time analysis when choosing a connection type.

  • Examples: Use ...read more

Q54. What are Extracts, How to set the refresh time?

Ans.

Extracts are subsets of data from a larger dataset. Refresh time can be set in the data source settings.

  • Extracts are created by selecting a subset of data from a larger dataset.

  • They can be used to improve performance by reducing the amount of data that needs to be processed.

  • Refresh time can be set in the data source settings to ensure the extract is up-to-date.

  • The refresh time can be set to occur at regular intervals or manually triggered.

  • Examples of tools that use extracts i...read more

Are these interview questions helpful?

Q55. 7. Difference between agile and waterfall? Advantages of agile?

Ans.

Agile and waterfall are two project management methodologies. Agile is iterative and flexible, while waterfall is linear and rigid.

  • Agile focuses on delivering working software in short iterations, while waterfall follows a sequential process.

  • Agile encourages collaboration and adaptability, while waterfall relies on detailed planning and documentation.

  • Agile allows for changes and feedback throughout the project, while waterfall requires a complete plan before development begin...read more

Q56. CHECK LIST FISHBONE DIAGRAM PERITO CHART SCALTER DIAGRAM CAUSE /EFFECTIVE DIAGRAM ( with the helf of 7 qc tools )

Ans.

These are some of the tools used in quality control to identify and analyze the root causes of problems.

  • Fishbone diagram is used to identify all possible causes of a problem and categorize them into different groups.

  • Pareto chart is used to identify the most significant causes of a problem based on their frequency or impact.

  • Scatter diagram is used to identify the relationship between two variables and determine if there is a correlation.

  • Cause/effect diagram is used to identify...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. How to write the code in Lambda for EC2 Provisioning.

Ans.

Use AWS Lambda to automate EC2 provisioning by writing code in Python or Node.js.

  • Create a Lambda function in AWS console.

  • Write code in Python or Node.js to describe the EC2 instance to be provisioned.

  • Use AWS SDK to interact with EC2 API for provisioning.

  • Handle error cases and cleanup resources after provisioning.

  • Test the Lambda function to ensure it provisions EC2 instances correctly.

Q58. Will you be able to learn programming/ Technology stack if selected?

Ans.

Yes, I am confident in my ability to learn programming and new technology stacks if selected.

  • I have a strong foundation in computer science and technology concepts.

  • I am a quick learner and have successfully picked up new programming languages and technologies in the past.

  • I am dedicated to continuous learning and improvement in the technology field.

Technology Analyst Jobs

S2RL Technology Analyst 5-8 years
Infosys Limited
3.6
Ahmedabad
S2RL Technology Analyst 5-8 years
Infosys Limited
3.6
Ahmedabad
S2RL Technology Analyst 5-8 years
Infosys Limited
3.6
Ahmedabad

Q59. What are the basic concepts of Object-Oriented Programming (OOP)?

Ans.

OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • Objects: Instances of classes that encapsulate data and behavior.

  • Classes: Blueprint for creating objects, defining their properties and methods.

  • Inheritance: Ability of a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Encapsulation: Bundling of dat...read more

Q60. What is the difference between include and require in php?

Ans.

Include and require are both used to include external files in PHP, but require will cause a fatal error if the file is not found.

  • Include will only produce a warning if the file is not found, while require will stop the script execution.

  • Include is used when the file is not critical for the script to run, while require is used when the file is essential.

  • Example: include 'header.php'; require 'config.php';

Q61. What is the Round Robin Algorithm?
Ans.

Round Robin Algorithm is a CPU scheduling algorithm where each process is assigned a fixed time slice in a cyclic manner.

  • Each process is given a small unit of time to execute, called a time slice or quantum.

  • Once a process's time slice expires, it is moved to the end of the ready queue.

  • The scheduler then moves to the next process in the queue and allocates it the CPU for its time slice.

  • This continues until all processes have had a turn to execute.

  • Example: If time slice is 10ms...read more

Q62. 3 . Explain scd 2 and how can we build in datastage 4. Write sql query which is related to join and sub query.

Ans.

SCD 2 is a type of slowly changing dimension in data warehousing, and can be implemented in DataStage using various techniques.

  • SCD 2 stands for Slowly Changing Dimension Type 2, which tracks historical changes in data over time.

  • In DataStage, SCD 2 can be implemented using the Change Data Capture stage or custom SQL queries.

  • To implement SCD 2 in DataStage, you need to identify the key columns for tracking changes, define the historical tracking columns, and handle inserts, upd...read more

Q63. Implement max heap, basically how priority queue is implemented

Ans.

Max heap is a data structure where the parent node is always greater than or equal to its child nodes.

  • Start by creating an array to store the elements of the max heap.

  • Insert elements into the array and maintain the heap property by swapping elements if necessary.

  • Implement functions like insert, extractMax, and heapify to maintain the max heap structure.

  • Example: If we have elements 10, 7, 15, 3, 8, the max heap would be [15, 8, 10, 3, 7].

Q64. 6. Interface and abstract class with examples (from your current project)?

Ans.

Interface and abstract class examples in current project

  • Interface defines a contract for classes to implement

  • Abstract class provides partial implementation and can't be instantiated

  • Example: Interface - IPaymentGateway with methods like processPayment()

  • Example: Abstract class - Payment with abstract method processPayment() and concrete method logTransaction()

Q65. How good are you in programming on scale 1 to 10

Ans.

I would rate myself as an 8 in programming.

  • I have experience in multiple programming languages such as Java, Python, and C++.

  • I have worked on various projects including web development and data analysis.

  • I am constantly learning and improving my skills through online courses and personal projects.

  • I am comfortable with debugging and troubleshooting code.

  • However, there is always room for improvement and I am open to learning new technologies and techniques.

Q66. How to apply row level security in spotfire?

Ans.

Row level security can be applied in Spotfire using data limiting expressions.

  • Create a data limiting expression that defines the criteria for the rows that should be visible to a specific user or group.

  • Assign the data limiting expression to the data table or view.

  • Create a user or group filter that references the data limiting expression.

  • Assign the user or group filter to the visualization.

  • Test the row level security by logging in as the user or group and verifying that only t...read more

Q67. What is technology it use in day today life

Ans.

Technology is the application of scientific knowledge to solve problems and improve efficiency in our daily lives.

  • Smartphones and mobile apps for communication and information access

  • Internet and social media for networking and sharing information

  • Computers and software for work, education, and entertainment

  • Smart home devices for automation and convenience

  • Online shopping and e-commerce platforms for convenient shopping

  • GPS and navigation systems for finding directions

  • Streaming s...read more

Q68. Collection and collections difference? Collection Interface in depth.

Ans.

Collection is a group of objects while collections is a framework in Java. Collection interface is used to manipulate groups of objects.

  • Collection is a group of objects while collections is a framework in Java

  • Collection interface is used to manipulate groups of objects

  • Collections framework provides classes like ArrayList, LinkedList, HashSet, etc.

  • Collection interface extends Iterable interface and has methods like add(), remove(), contains(), etc.

Q69. 4. Design patterns and singleton design patterns?

Ans.

Design patterns are reusable solutions to common software problems. Singleton is a design pattern that restricts the instantiation of a class to one object.

  • Design patterns are proven solutions to recurring software problems

  • Singleton pattern ensures only one instance of a class is created

  • Singleton pattern is useful in scenarios where only one instance of a class is required

  • Other design patterns include Factory, Observer, and Decorator patterns

Q70. What is primary key and unique key

Ans.

Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column.

  • Primary key cannot have null values, while unique key can have one null value.

  • A table can have only one primary key, but multiple unique keys.

  • Primary key is used as a foreign key in other tables to establish relationships.

  • Example: Employee ID can be a primary key, while email can be a unique key in an employee table.

Q71. Classify tweets as Retweet - Analytics

Ans.

To classify tweets as Retweet - Analytics, we can look for the presence of 'RT' and analyze engagement metrics.

  • Look for the presence of 'RT' in the tweet text

  • Analyze engagement metrics such as number of likes, retweets, and comments

  • Consider the source of the tweet - if it is from a verified account or has a large following, it is more likely to be a retweet

  • Use machine learning algorithms to classify tweets based on patterns and features

Q72. Internal working of ArrayList, HashMap, and LinkedList

Ans.

Explanation of internal working of ArrayList, HashMap, and LinkedList

  • ArrayList: dynamic array that can grow and shrink, stores elements in contiguous memory locations

  • HashMap: stores key-value pairs, uses hashing to store and retrieve elements

  • LinkedList: stores elements in nodes that point to the next node, allows for efficient insertion and deletion

Q73. What are the technologies do you know?

Ans.

I am familiar with a wide range of technologies including programming languages, databases, cloud computing, and cybersecurity.

  • Programming languages (e.g. Java, Python, C++)

  • Databases (e.g. SQL, MongoDB)

  • Cloud computing platforms (e.g. AWS, Azure)

  • Cybersecurity tools and practices

  • Machine learning and AI technologies

Q74. Have you worked on Tableau Server?

Ans.

Yes, I have worked on Tableau Server.

  • I have experience in installing and configuring Tableau Server.

  • I have created and managed user accounts and permissions.

  • I have published workbooks and data sources to Tableau Server.

  • I have monitored server performance and troubleshooted issues.

  • I have worked with Tableau Server APIs to automate tasks.

  • I have provided training and support to end-users.

Q75. Why are virtual destructors needed?
Ans.

Virtual destructors are needed to ensure proper cleanup of resources in derived classes when using polymorphism.

  • Virtual destructors are necessary to ensure that the destructor of the most derived class is called when deleting a base class pointer to a derived class object.

  • Without virtual destructors, only the base class destructor would be called, leading to memory leaks and resource leaks in the derived class.

  • Virtual destructors allow for proper cleanup of resources allocate...read more

Q76. How was agile followed in project?

Ans.

Agile was followed in the project by implementing iterative development, continuous feedback, and collaboration.

  • The project used Scrum framework for agile implementation.

  • Sprints were planned and executed to deliver incremental value.

  • Daily stand-up meetings were held to discuss progress and address any issues.

  • Backlog grooming sessions were conducted to prioritize and refine user stories.

  • Continuous integration and automated testing were used to ensure code quality.

  • Regular retro...read more

Q77. what are functional interface in java8

Ans.

Functional interfaces in Java 8 are interfaces with a single abstract method, used for lambda expressions and method references.

  • Functional interfaces have only one abstract method, but can have multiple default or static methods.

  • They can be used with lambda expressions and method references.

  • Examples include java.lang.Runnable, java.util.Comparator, and java.util.function.Predicate.

Q78. What is a TreeMap and highlights of using it

Ans.

TreeMap is a data structure in Java that stores key-value pairs in a sorted order based on the keys.

  • TreeMap implements the Map interface and uses a Red-Black tree for storage.

  • It provides efficient operations like insertion, deletion, and retrieval of elements.

  • Elements are sorted based on the natural ordering of keys or a custom Comparator.

  • Example: TreeMap treeMap = new TreeMap<>(); treeMap.put("A", 1);

Q79. Write a java code to swap two numbers without using a temporary variable

Ans.

Swapping two numbers without using a temporary variable in Java

  • Use bitwise XOR operation to swap two numbers without using a temporary variable

  • Example: int a = 5, b = 10; a = a ^ b; b = a ^ b; a = a ^ b; // Now a = 10, b = 5

Q80. Technology bad for human society you tell some thing

Ans.

Technology can have negative impacts on human society.

  • Technology can lead to social isolation and decreased face-to-face interaction.

  • Technology addiction can negatively affect mental health and well-being.

  • Technology can contribute to job displacement and unemployment.

  • Technology can lead to privacy concerns and data breaches.

  • Technology can amplify inequality and create a digital divide.

Q81. Technology college was bullied in India tell some thing about

Ans.

Bullying in technology colleges in India is a prevalent issue affecting students' well-being and academic performance.

  • Bullying in technology colleges in India is a serious problem that needs attention.

  • It can take various forms such as physical, verbal, or cyberbullying.

  • Bullying negatively impacts students' mental health, self-esteem, and academic progress.

  • Examples of bullying incidents include harassment, intimidation, exclusion, and spreading rumors.

  • Efforts should be made to...read more

Q82. Given a number, print it in words

Ans.

A program to convert a given number into words.

  • Use a switch statement or if-else conditions to handle different cases

  • Break down the number into its individual digits and convert each digit into words

  • Handle special cases like numbers between 10 and 20

  • Consider adding a function to handle larger numbers with appropriate suffixes

Q83. 3.how to configure Jpa with spring boot

Ans.

Configure JPA with Spring Boot

  • Add the Spring Data JPA dependency in pom.xml

  • Create an entity class with @Entity annotation

  • Create a repository interface extending JpaRepository

  • Add @EnableJpaRepositories annotation to main class

  • Configure database properties in application.properties

  • Use @Transactional annotation for database transactions

Q84. What Technology are working

Ans.

We are currently working on various technologies including AI, Machine Learning, and Blockchain.

  • AI: Developing chatbots and virtual assistants for customer service

  • Machine Learning: Building predictive models for sales forecasting

  • Blockchain: Exploring use cases for supply chain management

Q85. 5. How to improve performance in Datastage

Ans.

To improve performance in Datastage, optimize job design, use efficient coding practices, utilize parallel processing, and monitor job performance.

  • Optimize job design by reducing unnecessary stages and transformations

  • Use efficient coding practices such as avoiding unnecessary data reads and writes

  • Utilize parallel processing to take advantage of multiple CPU cores

  • Monitor job performance using Datastage Director or other monitoring tools

Q86. Describe the differences between using spark in on Prem and cloud

Ans.

Spark usage differs in on Prem and cloud environments.

  • Deployment: On Prem requires setting up and managing infrastructure, while cloud provides pre-configured environments.

  • Scalability: Cloud offers easy scalability by adding or removing resources as needed, while On Prem requires manual scaling.

  • Cost: On Prem involves upfront hardware and maintenance costs, while cloud offers pay-as-you-go pricing.

  • Flexibility: Cloud allows for quick provisioning and experimentation, while On P...read more

Q87. Q1: Java program to filter employee object from the list using streams.

Ans.

Filter employee objects from a list using Java streams.

  • Use stream() method to convert the list to a stream.

  • Use filter() method to specify the condition for filtering employee objects.

  • Use collect() method to collect the filtered employee objects into a new list.

Q88. 5. Difference between finalise and dispose?

Ans.

Finalize is used to perform any necessary cleanup operations before an object is destroyed, while dispose is used to release unmanaged resources.

  • Finalize is a method that is automatically called by the garbage collector when an object is no longer in use.

  • Dispose is a method that must be called explicitly to release unmanaged resources.

  • Finalize is not guaranteed to be called, while Dispose is.

  • Examples of unmanaged resources include file handles, database connections, and netwo...read more

Q89. How I can add value to their organization?

Ans.

I can add value to the organization by leveraging my technical expertise, problem-solving skills, and ability to adapt to new technologies.

  • Utilizing my strong analytical skills to identify and solve complex technical problems

  • Staying up-to-date with the latest technology trends and implementing innovative solutions

  • Collaborating with cross-functional teams to drive successful technology projects

  • Providing strategic insights and recommendations for improving processes and efficie...read more

Q90. What is unique composite key?

Ans.

A unique composite key is a combination of two or more columns that uniquely identifies a record in a table.

  • It is used to ensure data integrity and avoid duplicate records.

  • It is created by combining two or more columns that individually may not be unique.

  • Examples include a combination of first name, last name, and date of birth in a patient database.

  • It is commonly used in database design and normalization.

Q91. Write a template to create the Cloud formation stacks.

Ans.

Template for creating CloudFormation stacks

  • Define the resources to be created in the stack

  • Specify the properties for each resource

  • Set up dependencies between resources

  • Include any parameters or conditions needed for the stack

  • Use AWS CloudFormation Designer or AWS CLI to create the stack

Q92. what is different aspect of using data structures

Ans.

Data structures are different in terms of their implementation, efficiency, and usage in solving specific problems.

  • Different data structures have different ways of organizing and storing data, such as arrays, linked lists, trees, and graphs.

  • Each data structure has its own set of operations that can be performed efficiently, such as searching, inserting, deleting, and sorting.

  • Choosing the right data structure is crucial for optimizing performance and memory usage in different ...read more

Q93. 3. What is static method?

Ans.

A static method is a method that belongs to a class rather than an instance of the class.

  • Static methods can be called without creating an instance of the class.

  • They are often used for utility functions that don't require access to instance variables.

  • Static methods are declared using the 'static' keyword.

  • Example: Math.max() is a static method that returns the maximum of two numbers.

Q94. Tell me some analytic function of sql

Ans.

Analytic functions in SQL are used to perform calculations across a set of rows related to the current row.

  • Common analytic functions include ROW_NUMBER, RANK, DENSE_RANK, LEAD, and LAG.

  • They can be used to calculate running totals, moving averages, and identify duplicates in a dataset.

  • Analytic functions are typically used with the OVER() clause to define the window of rows to be used in the calculation.

Q95. what is linq and why i it used for?

Ans.

LINQ is a feature in C# that allows for querying data from different data sources.

  • LINQ stands for Language Integrated Query

  • It is used to query data from collections, databases, XML, and other data sources

  • LINQ provides a consistent model for working with data regardless of the data source

  • Example: querying a list of objects to filter, sort, or group data

Q96. What are the access modifiers in C#?

Ans.

Access modifiers in C# are keywords used to specify the accessibility of classes, methods, variables, etc.

  • There are five access modifiers in C#: public, private, protected, internal, and protected internal.

  • Public: accessible from any other code in the same assembly or another assembly.

  • Private: accessible only within the same class or struct.

  • Protected: accessible within the same class or by derived classes.

  • Internal: accessible only within the same assembly.

  • Protected internal: ...read more

Q97. Difference between method overloading and overidding with example ?

Ans.

Method overloading is when multiple methods have the same name but different parameters, while method overriding is when a subclass provides a specific implementation of a method in its superclass.

  • Method overloading involves multiple methods with the same name but different parameters.

  • Method overriding involves a subclass providing a specific implementation of a method in its superclass.

  • Method overloading is resolved at compile time, while method overriding is resolved at run...read more

Q98. 1. what is the prerequisite stpes for conversion

Ans.

Prerequisite steps for conversion

  • Identify the data to be converted

  • Choose the appropriate conversion tool

  • Ensure data compatibility with the target system

  • Perform a trial run to identify and fix any issues

  • Backup the original data before conversion

Q99. What is @Controller advice

Ans.

A class in Spring MVC that provides global exception handling and model attributes for all controllers.

  • Used to handle exceptions across multiple controllers

  • Can add common model attributes to all controllers

  • Can be used to customize error responses

  • Can be annotated with @RestControllerAdvice to return JSON responses

Q100. How to Does DOE helps to process

Ans.

DOE (Design of Experiments) helps to optimize processes by systematically varying input variables and analyzing the output.

  • DOE helps in identifying the most influential factors affecting a process

  • It allows for efficient experimentation by reducing the number of trials needed

  • DOE helps in understanding interactions between variables

  • It aids in optimizing process parameters to achieve desired outcomes

  • Example: Using DOE to determine the optimal settings for a manufacturing process

Previous
1
2
3
4
5
6
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.8
 • 8.2k Interviews
3.6
 • 7.6k Interviews
3.8
 • 2.8k Interviews
3.9
 • 565 Interviews
3.4
 • 449 Interviews
3.7
 • 291 Interviews
3.0
 • 172 Interviews
3.7
 • 70 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Recently Viewed
DESIGNATION
JOBS
ServiceNow
No Jobs
REVIEWS
Infosys
No Reviews
INTERVIEWS
Infosys
No Interviews
JOBS
Ernst & Young
No Jobs
LIST OF COMPANIES
Discover companies
Find best workplace
JOBS
Capgemini
No Jobs
JOBS
Netsyscon Consulting
No Jobs
DESIGNATION
INTERVIEWS
Infosys
No Interviews
Technology Analyst Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter