March 17, 2019

Srikaanth

Computer Systems Analyst Freshers Interview Questions

Mention What Is The Basic Role Of A Computer System Analyst?

Provide assistance to users solving computer related problems

Test, maintain and monitor systems and computer programs

Co-ordinate and connect the computer systems within an organization to increase compatibility
Modify system to improve work flow

Training and assisting staff and users to work with computer systems

Recommend new equipment or software packages

Determine computer software or hardware required in an organization

Good understanding of company’s database

Publish weekly report which identify progress made towards implementing monitoring by application and by environment.

Computer Systems Analyst Freshers Interview Questions
Computer Systems Analyst Freshers Interview Questions


Mention What Are The Types Of Requirements That A System Analyst Should Gather And Analyze?

System analyst should gather requirements like:

Technical requirements: It includes the detail about what the system is built, including which language it will be programmed in, what standards are to maintained, etc.

Functional requirements: It includes the detail about what needs to be delivered, which is generally read by software engineers, project managers and business analyst.

Explain What Is Spoofed Packet?

Spoofed packet is an internet protocol packet that is created from a fake IP address, but behaves as a legitimate and authenticated sender. It is usually used in denial of service attacks and are used to defeat the security mechanism of the network and bye-pass service which are based on IP authentication.

Mention What Are Some Organization Software Usage Policies That Computer Analyst Can Implement In An Organization?

Disallowing the use of external drives for employees to access organization’s data

Not allowing to download pirated software and electronic files that are copyrighted or unauthenticated

No sharing of confidential material, proprietary information or trade secrets outside the organization

Not allowing them to hack into unauthorized websites or download contents

Not allowing them to post or send information that is offensive to the company or organization

Preventing downloading of any malicious software onto the company network

Not allowing employees to pass off personal views as representing those of the organization.

Mention What Does The Software Audit Includes?

Software audit includes:

Looking into an employee’s computer system for violation of security and company’s policy

Regular audits of all servers and computers to check whether they are updated in streamlined with all software licenses

Adapting audit system that is least bothering to employee and their task

Apart from regular audits, random audit should be done to check whether there is any deletion or addition of software to the system.

Mention What Are The Steps For Record Keeping For Software?

A register should be maintained that includes the detail of software like:

Software’s publisher name and title

Source and date of software acquisition

Location of the software installation as well as the serial number of the hardware on which copy of the software is installed

Location and existence of back-up copies

Serial number of software products

Mention How To Do The Registration Of Software?

When an organization receives purchased software, the designated department must receive the software first to complete registration and inventory requirement before installations
And in the event the software is shrink-wrapped, the software receiving department must complete the registration forms and return it to the software publisher
Software must be registered on the name of the organization and not an individual user.

Mention What The Difference Is Between Ssh And Ssl?

SSL and SSH both are special encryption and protocol technologies used to connect two computers:

SSH: SSH stands for “Secure Shell” which commonly uses port 22 to connect your system on another system via internet. It is often used by network administrators as a remote login or remote control to manage their business servers.

SSL: SSL stands for “Secure Sockets Layer” it commonly uses port 443 to connect your system to a secure system on the Internet. It is often used for transmitting information like tax, banking, credit card, personal information to a business server somewhere.

Mention What Are The Skills Required To Become A Computer Analyst?

Good learning and listening skills

Complex problem-solving abilities

Time management

Troubleshooting

Good knowledge of software application and networking

Quality control analysis

Critical thinking

Mention What Is Dhcp Server?

DHCP server stands for dynamic host configuration protocol; that is designed as the functional extension of the Bootstrap network Protocol. It is a server or client protocol that automatically caters an internet protocol (IP) host with its IP address and other configuration as the subnet mask and default gateway.

Mention Why To Use Dhcp Server?

DHCP server allowed entire process to be auto-mated and managed centrally. DHCP server maintains the IP addresses in bulk and assign an address to any DHCP enabled client when he switch on to the network. As such the addresses are dynamic rather than static, so the addresses which are no more in use are automatically return to the bulk for re-allocation.

Mention What Is Sub-netting?

Sub-netting is the procedure of partitioning a single TCP/IP network into a number of distinct network segments called subnets.

Mention What Computer System Analyst Document?

Computer system analyst can document what is going in current systems, and what can be expected in systems that have not been built yet. Documenting is often done in collaboration with technical writers, system designers and system architects.

List of thing that computer analysts document include:

User Scenarios

Functional activities

Data flows

Classes

Interfaces between Systems.


Subscribe to get more Posts :