Technology Analyst
300+ Technology Analyst Interview Questions and Answers

Asked in upGrad

Q. Sort 0 and 1 Problem Statement
Given an integer array ARR
of size N
containing only integers 0 and 1, implement a function to sort this array. The solution should scan the array only once without using any addi...read more
Implement a function to sort an array of 0s and 1s in linear time complexity without using additional arrays.
Iterate through the array and maintain two pointers, one for 0s and one for 1s.
Swap elements at the two pointers to sort the array in place.
Time complexity should be O(N) where N is the size of the array.

Asked in Morgan Stanley

Q. Minimum Number of Vertices to Reach All Nodes Problem Statement
In a directed acyclic graph with 'N' nodes, given a matrix 'edges' of size M x 2 representing 'M' edges where each edge is directed from node edge...read more
The problem involves finding the smallest set of vertices from which all nodes in a directed acyclic graph are reachable.
Create a directed graph using the given edges.
Perform a topological sort to find the vertices that can reach all other nodes.
Output the smallest set of vertices in sorted order.
Technology Analyst Interview Questions and Answers for Freshers

Asked in Infosys

Q. An atomic Spark job runs for 15 minutes every day. One day, it runs for more than an hour. What might be the issue?
Possible reasons for an atomic spark job running for more than an hour.
Data size may have increased beyond the capacity of the cluster
Issues with network connectivity or hardware failure
Inefficient code or poorly optimized queries
Resource contention with other jobs running on the cluster
Data skew or data imbalance
Incorrect configuration settings

Asked in Morgan Stanley

Q. Flatten a Multilevel Sorted Linked List
You are given a linked list with 'N' nodes, where each node contains two pointers: one is 'NEXT' pointing to the next node in the list, and the other is 'CHILD', pointing...read more
Flatten a multilevel sorted linked list while maintaining sorted order.
Iterate through the linked list nodes and maintain a stack to keep track of child nodes.
Merge the child nodes with the parent node in sorted order.
Update the pointers to create a single level flattened linked list.

Asked in Morgan Stanley

Q. Box Stacking Problem Statement
Consider you are provided with 'n' different types of rectangular 3D boxes. For each type of box, you have three separate arrays: height
, width
, and length
that define the dimensi...read more
The task is to stack different types of rectangular 3D boxes to achieve the maximum possible height by following certain constraints.
Sort the boxes based on their base dimensions in non-increasing order.
Use dynamic programming to find the maximum height achievable by stacking the boxes.
Consider all possible rotations of each box to maximize the height.
Ensure that the base dimensions of the boxes below are strictly larger than the ones above.
Handle multiple copies of the same ...read more

Asked in MAQ Software

Q. Sum of Digits Problem Statement
Given an integer 'N', continue summing its digits until the result is a single-digit number. Your task is to determine the final value of 'N' after applying this operation iterat...read more
Given an integer, sum its digits until a single-digit number is obtained. Determine the final single-digit integer.
Iteratively sum the digits of the integer until a single-digit number is obtained
Output the final single-digit integer for each test case
Handle multiple test cases efficiently
Ensure the final value is less than 10
Technology Analyst Jobs

Asked in Amazon

Q. Implementing a Priority Queue Using Heap
Ninja has been tasked with implementing a priority queue using a heap data structure. However, he is currently busy preparing for a tournament and has requested your ass...read more
Implement a priority queue using a heap data structure by completing the provided class functions.
Implement push(), pop(), getMaxElement(), and isEmpty() functions in the given class structure.
Use a heap data structure to maintain the priority queue.
Handle different types of queries (push, pop, getMaxElement, isEmpty) as per the given instructions.
Ensure the functions return the correct values based on the type of query.
Test the implementation with sample input and output pro...read more

Asked in Infosys

Q. What is a dataframe and how does it differ from a dataset?
A dataframe is a two-dimensional tabular data structure in which data is organized in rows and columns. It differs from a dataset in terms of structure and functionality.
A dataframe is a data structure in which data is organized in a tabular format with rows and columns.
It is commonly used in data analysis and manipulation tasks.
Dataframes can handle both structured and semi-structured data.
They provide a convenient way to store and manipulate large datasets.
Dataframes offer ...read more
Share interview questions and help millions of jobseekers 🌟

Asked in Infosys

Q. 4.How to communicate between two rest API and how to implement security for rest API?
To communicate between two REST APIs, use HTTP requests and implement security measures such as authentication and encryption.
Use HTTP requests such as GET, POST, PUT, and DELETE to communicate between two REST APIs
Implement authentication measures such as OAuth or API keys to ensure secure communication
Use encryption techniques such as SSL or TLS to protect sensitive data during transmission
Consider using a message broker such as RabbitMQ or Kafka for asynchronous communicat...read more

Asked in Morgan Stanley

Design a system for users to subscribe to topics and receive notifications for new messages.
Create a user profile where they can select topics of interest to subscribe to.
Implement a messaging system that sends notifications to users when new messages are posted related to their subscribed topics.
Allow users to manage their subscriptions and preferences easily.
Utilize a database to store user subscriptions and messages for efficient retrieval.
Consider implementing push notifi...read more

Asked in Infosys

Q. How would you create a Spring Boot application from scratch for web and database operations? Please provide the steps.
Creating a Spring Boot application for web and database operations
Create a new Spring Boot project using Spring Initializr
Add necessary dependencies for web and database operations in pom.xml
Create a database schema and configure database connection in application.properties
Create entity classes and corresponding repositories
Create REST controllers for web operations
Test the application using Postman or any other REST client

Asked in Infosys

Q. What is VLAN, VTP, which VTP mode is normally used in switches, STP, OSPF states, Ip classes and range, importance of subnetting, NAT, classification of cisco routers and few troubleshooting questions. f5 load...
read moreAnswering questions related to VLAN, VTP, STP, OSPF, IP classes and range, subnetting, NAT, Cisco routers, and F5 load balancer.
VLAN is a virtual LAN that allows network administrators to group devices together based on their function or team.
VTP is VLAN Trunking Protocol that manages VLAN configuration consistency across a network.
Server mode is normally used in switches for VTP.
STP is Spanning Tree Protocol that prevents network loops by blocking redundant paths.
OSPF states...read more

Asked in JPMorgan Chase & Co.

Q. Write an algorithm to find the square root of a number and determine if the number is a perfect square. Do not use built-in square root functions.
Implement logic to find the square root of a number and check if it's a perfect square without using built-in functions.
Use a loop to iterate from 1 to the number to find the square root.
Check if the square of the current number equals the input number.
If found, the number is a perfect square; otherwise, it's not.
Example: For input 16, output is 4 (perfect square). For input 20, output is 4.47 (not a perfect square).

Asked in Infosys

Q. 1.What is WebAPI? 2.How to use PostMan tool. 3.How to delete duplicate record using SQL 4.AJAX 5.What is LINQ , EF? 6.Difference between MVC and WebAPI 7.Difference between WCF and WebAPI 8.Difference between S...
read moreInterview questions for Technology Analyst role
WebAPI is a framework for building HTTP services that can be consumed by a wide range of clients
Postman is a tool used for testing APIs by sending HTTP requests and receiving responses
To delete duplicate records in SQL, use the DELETE statement with a subquery that identifies the duplicates
AJAX is a technique for creating asynchronous web applications that update parts of a page without reloading the entire page
LINQ is a language...read more

Asked in Infosys

Q. 5 Spring boot annotations and what are the uses and application of each annotations
5 Spring boot annotations and their uses
1. @SpringBootApplication - used to mark the main class of a Spring Boot application
2. @RestController - used to mark a class as a RESTful controller
3. @Autowired - used to inject dependencies into a class
4. @RequestMapping - used to map HTTP requests to methods in a controller
5. @EnableAutoConfiguration - used to enable Spring Boot's auto-configuration feature

Asked in Infosys

Q. How do you write a REST API for updating and creating a new resource?
To write a REST API for updating and creating a new resource, follow these pointers.
Define the API endpoint and HTTP method for creating and updating resources
Validate the input data and handle errors appropriately
Update or create the resource in the database
Return a response with the updated or created resource and a status code indicating success

Asked in Infosys

Q. How would you find the top 3 highest student records from a class of students?
To find the first 3 highest student records from a class of students.
Sort the student records in descending order based on their scores.
Select the top 3 records from the sorted list.
If there are ties, include all students with the same score in the top 3.
Consider edge cases such as empty records or less than 3 records.

Asked in Infosys

Q. Diff between authentication and authorisation?Kind of authorisation used in spring boot application
Authentication verifies identity, authorization verifies access. Spring Boot uses role-based authorization.
Authentication confirms the user's identity, authorization determines what the user can access
Spring Boot uses role-based authorization, where users are assigned roles and permissions are granted to those roles
Examples of authorization include file permissions, access control lists, and role-based access control

Asked in Infosys

Q. Design a database for a parking lot. How would you create relationships between the tables?
Designing a database for a parking lot and creating relationships between tables.
Create a table for parking spots with a unique ID
Create a table for vehicles with a unique ID
Create a table for parking transactions with a unique ID, parking spot ID, and vehicle ID
Establish a one-to-many relationship between parking spots and parking transactions
Establish a one-to-many relationship between vehicles and parking transactions

Asked in Goldman Sachs

Q. How can you refine your graph traversal solution?
Refine graph traversing solution by optimizing algorithms and data structures.
Use efficient algorithms like Dijkstra's or A* for shortest path traversal.
Implement data structures like priority queues or heaps for faster traversal.
Consider using parallel processing or distributed computing for large graphs.
Optimize memory usage by using compressed data structures like succinct graphs.
Use caching to avoid redundant computations and improve performance.

Asked in Morgan Stanley

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructors, fields, and methods, while interface cannot have any implementation.
A class can only extend one abstract class, but can implement multiple interfaces.
Abstract classes are used to define common characteristics of subclasses, while interfaces are used to define a contract for classes to implement.
Example: Abstract class 'Shape' wit...read more

Asked in Cognizant

Q. What are the processes involved in the creation, deployment, management, and deletion of HSD (High-Speed Data)?
HSD processes encompass creation, deployment, management, and deletion for efficient data handling.
Creation: Involves data acquisition and processing, e.g., collecting data from IoT devices.
Deployment: Involves setting up data infrastructure, e.g., cloud storage solutions like AWS or Azure.
Management: Involves monitoring and optimizing data usage, e.g., using analytics tools to track performance.
Deletion: Involves secure data removal processes, e.g., using data wiping softwar...read more

Asked in Infosys

Q. What kind of JPA repository would you prefer and why?
I would prefer Spring Data JPA repository as it provides easy implementation of CRUD operations and supports multiple databases.
Spring Data JPA provides a simple and efficient way to implement CRUD operations.
It supports multiple databases such as MySQL, PostgreSQL, Oracle, etc.
It also provides features like pagination, sorting, and querying.
Spring Data JPA reduces boilerplate code and increases productivity.
Example: JpaRepository interface in Spring Data JPA provides default...read more

Asked in Morgan Stanley

Binary Search halves the search space in each iteration, leading to a time complexity of O(Log n).
Binary Search divides the array into two halves and compares the target value with the middle element.
If the target value is less than the middle element, it searches in the left half; otherwise, it searches in the right half.
This process continues until the target value is found or the subarray size becomes 0.
Since each comparison reduces the search space by half, the time compl...read more

Asked in Infosys

Q. Why can caching all dataframes sometimes slow down the entire execution?
Caching all dataframe can slow execution due to memory constraints and increased I/O operations.
Caching all dataframes can lead to memory constraints as all data is stored in memory.
Increased I/O operations can also slow down execution as data is constantly being read and written to disk.
Caching should be used judiciously and only for frequently accessed data.
Partitioning data can also help in reducing memory constraints and improving performance.

Asked in JPMorgan Chase & Co.

Q. Can you draw and explain the different phases of SDLC (Software Development Life Cycle)?
SDLC consists of several phases including planning, analysis, design, implementation, testing, deployment, and maintenance.
Planning: Defining project goals, scope, and requirements.
Analysis: Gathering and analyzing user requirements.
Design: Creating a detailed blueprint of the software solution.
Implementation: Writing code and developing the software.
Testing: Conducting various tests to ensure software quality.
Deployment: Releasing the software for users.
Maintenance: Providin...read more

Asked in Morgan Stanley

HashMap is a collection of key-value pairs, while HashSet is a collection of unique elements.
HashMap allows duplicate values but keys must be unique
HashSet does not allow duplicate elements
HashMap uses key-value pairs for storing data, while HashSet only stores individual elements
Example: HashMap<String, Integer> map = new HashMap<>(); HashSet<String> set = new HashSet<>();

Asked in Infosys

Q. How can you get an input value from HTML without using document.getElementById and $(#id).val() using Javascript?
You can retrieve input values using alternative methods like querySelector or event listeners in JavaScript.
Use document.querySelector('input[name="inputName"]') to select an input by its name attribute.
Use event listeners to capture input values dynamically, e.g., inputElement.addEventListener('input', function() { console.log(this.value); });
Access form elements directly via the form object, e.g., const value = document.forms['formName'].elements['inputName'].value;

Asked in Techknomatic Services

Q. What is the difference between Parameters and Filters?
Parameters are used to define values in a report, while filters are used to limit the data displayed in a report.
Parameters are used to make a report more dynamic by allowing users to input values such as dates or names.
Filters are used to limit the data displayed in a report based on specific criteria such as date range or product type.
Parameters are set before a report is run, while filters can be applied during or after a report is run.
Examples of parameters include start ...read more

Asked in Infosys

Q. How do you create relationships between tables in JPA using entities?
Creating relationships between tables in JPA using entities
Use annotations such as @ManyToOne, @OneToMany, @OneToOne, and @ManyToMany to define relationships
Specify the target entity and the mapping column using @JoinColumn
Use the mappedBy attribute to specify the inverse side of the relationship
Example: @ManyToOne(targetEntity = Author.class) @JoinColumn(name = "author_id") private Author author;
Example: @OneToMany(mappedBy = "author") private List
books;
Interview Questions of Similar Designations
Interview Experiences of Popular Companies
Top Interview Questions for Technology Analyst Related Skills
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users