business analyst interview questions
Most common interview questions for Business Analysts

Preparing for a Business Analyst Job Interview? Here are a few tips and the most useful and common business analyst interview questions that you might face. 
Before attending an interview for a business analyst position, one should be through about their previous experience in the projects handled and results achieved. The types of questions asked generally revolve around situational and behavioural acumen. The interviewer would judge both knowledge and listening skills from the answers one presents. Checkout the list of frequently asked important business analyst interview questions for freshers as well as experienced candidates that one could face during job interviews.

Top10 Business Analyst Interview Questions and Answers

1. What is the role of a business analyst?

Business analysts essentially work as a bridge between different stakeholders in any organisation. They clarify and finalize organisational requirements, assist in project planning, designing and validate developed components. They possess professional domain knowledge and help sort business needs amongst stakeholders of different domains. Ideally, Business Analysts also engage with business leaders to understand obtain data-driven solutions to improve efficiency. These changes are applied to processes, products and services. Altogether, they execute and implement ideas that are both technologically and financially feasible.

2. What is SRS? What are its key elements?

A System Requirements Specification (SRS) or a Software Requirements Specification can be defined as a document or set of documents that describe the features of a system or software application. SRS aims at providing a high-level idea of the system, its behaviour, business processes, and the performance parameters required for the system. 

Some key elements of an SRS are:

  • Scope of Work
  • Functional Requirements
  • Non-Functional Requirements
  • Dependency
  • Data Models
  • Assumptions
  • Constraints
  • Acceptance Criteria

3. What is a Requirement?

A Requirement is essentially a targeted solution created to achieve specific business goals and objectives. It acts as an input to various stages of SDLC, which is a  project validated by the stakeholders and business users before implementation. It is vital that every requirement is properly documented for future reference purposes.

4. How do you categorize a requirement to be a good requirement?

business analyst interview questions

A good requirement is the one that clears the SMART criteria, i.e., 
Specific – A perfect description of the requirement, specific enough to be easily understandable
Measurable – The requirement’s success is measurable using a set of parameters
Attainable – Resources are present to achieve requirement success
Relevant – States the results that are realistic and achievable
Timely – The requirement should be revealed in time 

5. What is Use Case?

A Use Case is a diagrammatic representation of a system describing the process of how a user uses a system to accomplish a set of goals. It is an integral part of software engineering and software modelling techniques, considering it targets the features and the resolution of any possible errors which a user may encounter.

6. What are the steps required to design a Use Case?

The steps involved in designing a Use Case are:

  • Identification of the system users
  • Creation of a user profile for each category of users. 
  • Identification of objectives associated with each user, and their significant roles.
  • Creation of use cases for every goal – with a use case template. 
  • Structuring the use cases
  • Review and validation of the users

7. What are the different types of actors in an use case diagram?

There are two main types of actors that are depicted in an Use case, they are:

  • Primary actors, that start the process
  • Secondary actors, that assist the primary actor

The actors can also be categorised into four types, they are:

  • Human
  • System
  • Hardware
  • Timer

8. List out the documents used by a Business Analyst in a project?

The various documents used by a Business Analyst are:
a. FSD – Functional Specification Document
b. Technical Specification Document
c. Business Requirement Document 
d. Use Case Diagram
e. Requirement Traceability Matrix, etc.

9. What is Scope creep? What are its causes? How can it be avoided?

Scope creep, or also known as a requirement creep is a term that is associated with uncontrolled changes or deviation in a project’s scope within the same resource range.  

Some possible causes of scope creep include:

  • Poor communication
  • Improper documentation 

Scope creep can be avoided by:

  • Proper documentation 
  • Organised change management
  • Prior intimation of changes to the associated parties
  • Refrain from Gold Plating, i.e. additions of extra features to existing functionalities

10. What is the difference between BRD and SRS?

business analyst interview questions

SRS (Software Requirements Specifications) – is an exhaustive description of a system that needs to be developed and describes the software – user interactions. While a BRD (Business Requirements Document) is a formal agreement for a product between the organization and the client. 
The difference between the two are:

11. Name and briefly explain the various diagrams used by a Business Analyst.

  • Activity Diagram: It is a flow diagram representing the transition from one activity to another. Here activity is referred to the specific operation of the system.
  • Data Flow Diagram: It is a graphical representation of the data flowing in and out of the system. The diagram depicts how data is shared between organizations.
  • Use Case Diagram: Also known as Behavioural diagram, the use case diagram depicts the set of actions performed by the system with one or more actors (users).
  • Class Diagram: This diagram depicts the structure of the system by highlighting classes, objects, methods, operations, attributes, etc. It is the building block for detailed modelling used for programming the software.
  • Entity Relationship Diagram: It is a data modelling technique and a graphical representation of the entities and their relationships.
  • Sequence Diagram: It describes the interaction between the objects.
  • Collaboration Diagram: It represents the communication flow between objects by displaying the message flow among them.

12. Name different actors in a use case diagram?

Broadly, there are two types of actors in a use-case:
a. Primary Actors – Start the process
b. Secondary Actors – assist the primary actor
They can further be categorized as:
i. Human
ii. System
iii. Hardware
iv. Timer

13. Describe ‘INVEST’.

The full form of INVEST is Independent, Negotiable, Valuable, Estimable, Sized Appropriately, Testable. With this process, the technical teams and project managers to deliver quality products or services.

14. What is Pareto Analysis

Also known as the 80/20 rule, Pareto Analysis is an effective decision-making technique for quality control. As per this analysis, it is inferred that 80% effects in a system are a result of 20% causes, hence the name 80/20 rule.

15. Describe the Gap Analysis.

It is utilized to analyze gaps between the existing system and its functionalities against the targeted system. The gap is inferred to the number of changes and tasks that need to be brought in to attain the targeted system. It compares performance between the present and the targeted functionalities.

16. Name different types of gaps that could be encountered while Gap Analysis

There are mainly four types of gaps:
a. Performance Gap – Gap between expected and actual performance
b. Product/ Market Gap – Gap between budgeted and actual sales numbers
c. Profit Gap – Variance between targeted and actual profit
d. Manpower Gap – Gap between required and actual strength and quality of the workforce in the organization

17. What are the various techniques used in requirement prioritization?

Requirement prioritization, as the name suggests, is a process of assigning priorities to the requirements based on business urgency in different schedules, phases, and cost among others.
The techniques for requirement prioritization are:
a. Requirements Ranking Method
b. Kano Analysis
c. 100 Dollar Method
d. MoSCoW Technique
e. Five Whys

18. What is BPMN? What are its basic elements?

BPMN is the abbreviation to Business Process Model and Notation. It is essentially a graphical representation of business processes. There are five basic elements of BPMN –

  • Data
  • Artifacts
  • Flow Objects
  • Swimlanes
  • Connecting Objects

19. What is Benchmarking?

Benchmarking is the process of measuring the performance of an organisation in order to compete in the industry. This process involves the measure of its policies, performance, rules and other such parameters.

20. What are some issues faced by business analysts?

Right from the initiation to post implementation of a project, a business analyst may face the following problems:

  • Employees related problems
  • Technology related problems
  • Access related issues
  • Business policies related issues
  • Business model errors

Stay tuned to this page for more such information on interview questions and career assistance. If you are not confident enough yet and want to prepare more to grab your dream job as a Business Analyst, upskill with Great Learning’s PG program in Business Analytics and Business Intelligence, and learn all about Business Analytics along with great career support.

21.  Differentiate between a Risk and an Issue?

Risk is nothing but a problem or something that can be predicted earlier so that some improvement plans are used to handle them. Whereas, an ‘Issue’ means the risk that had happened or occurred.

Example: On some roads, few caution boards are stating that “Road under repair, take diversion”. This is called Risk.

22. What are the various diagrams that a BA should know about?

Few important diagrams among them are,

a) Activity Diagram: This represents the flow from one activity to the other activity. Activity refers to the operation of the system.

b) Data Flow Diagram – Graphical representation of the flow of data into and out of the system. This diagram represents how data is shared between organizations.

c) Use case Diagram: This diagram describes the set of actions that systems perform with one or more actors (users) of the systems. Use Case diagram is also called as a Behavioral diagram.

d) Class Diagram: This is the structural diagram that represents the structure of the system by showing its classes, objects, methods or operations, attributes, etc. A class diagram is the main building block for detailed modeling which is used for programming.

e) Entity Relationship Diagram – ER Diagram is the graphical representation of entities and the relationships between them. This is a data modeling technique.

f) Sequence Diagram: Sequence diagram describes the interaction between the objects like how they operate and in what time sequence the messages flow from one object to the other.

g) Collaboration Diagram – Collaboration diagram represents the communication that occurs between the objects by showing the messages flow among them.

23. Define Pareto Analysis?

Pareto Analysis is a proper technique used in decision-making for quality control activities and also used in tracing out the resolutions for defects. It is categorized as a decision-making technique based on its statistics that, with a limited number of selected inputs we can have a great impact on the outcome.

24. Can you brief Kano Analysis?

Kano analysis is a powerful technique used in classifying the various types of customer requirements for new products. This Kano Analysis deals with the needs of the end-users of the product.

The main attributes of this Kano Analysis are

  • Threshold Attributes: These are the properties that a customer wants to be available in the product.
  • Performance Attributes: These represent some extra properties that are not necessary for a product but can be added for customer’s enjoyment.
  • Excitement Attributes: These are the properties that the customers are not aware of but are excited when they found such properties in their product.

25. Differentiate between Fish Model and V Model?

Fish ModelV model
Fish model is comparatively very costly and time-consumingV model requires less time and cost
Fish model is used when there were no ambiguities in the customer’s requirementsOtherwise, V model is preferred.

26.  Explain Black Box Testing

Black box testing is a kind of testing where the entire unit is tested as a whole without considering the contents or how the inner components and units are tested. This testing method only focuses on the known input signal and check whether the output behavior is according to expectation or not.

27. What are the important skills that a business analyst must have

  • Problem-solving skills,
  • Management and Communication skills
  • Elicitation skills
  • knowledge of IT skills

28. How can you avoid scope creep?

Scope creep can be avoided in the following method:

  • Documenting the scope of the project.
  • By following proper change management.
  • Informing the effects of the change to the affected parties before making a change.
  • Documenting the new requirements in the project log.

29.  Which model is better Waterfall model or Spiral Model?

It is selecting the life cycle model for any project which should be based on its scope,type, and limitations. It is dependent on the culture of the organization, its policies and terms, and conditions and the process of developing the system.

30.  Which method is mostly used for assessment or evaluation of a prospective vendor?

In the business analysis process Vendor, Assessment technique is a more fruitful method.

31. What are the four most important metrics in business development?

Storming, Forming, Storming, norming, and performing are some important metrics in business development process.

32.  Explain critical path analysis?

A project that involved in a set of activities from Start to Finish. A critical path is a set of activities that includes the longest path in the entire project.

33. Difference between software development lifecycle and project lifecycle

Software development lifecycleProject lifecycle
Helps you to develop particular software products.Allows you to develop a new product in the business.
It involves single software across different phases.It Involves multiple software in a single customer scenario.
SDLC phases are requirement gathering, coding, documentation, operations, and maintenance.Project lifecycle phases are Idea generation, screening, development, testing, and analysis.

34. What are the important elements of BPMN gateway?

The important elements of BPMN gateway are:

  • Flow objects
  • Data connection objects
  • Swimlanes
  • Artifacts

35. What is the best way of using an Activity Diagram?

It successfully captures and represents visually the flow of user in a system. The best way of using it is at conceptualization stages.

36. What does OLTP stand for? What is its use?

OLTP or Online transaction Processing helps in data entry and processing for the purpose of data management and interpretation into the database.

37. Which one do you prefer more – a waterfall model or a spiral model?

Depending on the culture of an organizational lifecycle, model for a product such as a waterfall or spiral can be rightly ascertained.

38. When would you use Pugh Matrix?

It is a decision-making method that helps in the evaluation of advantages and disadvantages against a reference system.

39. Why is benchmarking required?

It is required to set standards for a company. It helps match policies with performance. It is required to set standards for a company. It helps match policies with performance.

40. Explain the steps that turn an idea into a product?

The steps include Market Analysis, Competitor Analysis, SWOT Analysis, Personas, Strategic Vision and Feature Set, Prioritize Features, Use Cases, SDLC, Storyboards, Test Cases, Monitoring, Scalability. The role of personas and feature prioritization is extremely crucial.

41. When do you use Pair-choice technique?

This is a prioritization technique. Its main aim is to identify the most important items in a process. It is usually determined by the key stakeholders. A comparative analysis helps to analyze different metrics to assign significance.

42. Are you familiar with the difference between pool and swimlane?

In an activity diagram, pool denotes single person engrossed in one activity, however, swimlane means activities among groups

43. How do you manage scope creep?

It is best to avoid scope creep through constant and vigilant project management. In case of scope creep or deviation, steps should be taken to arrest the development of scope creeps to cut down on further damages. It can be done by following proper protocol and documentation.

44. What are the skills that a business analyst must possess?

We can broadly categorize the skills of a business analyst in three types:

  • Fundamental skills
  • Technical skills
  • Business Analysis skills
Skill categorySkills
Fundamental skillsProblem Solving
Communication
Management skills
Research 
Technical skillsIT skills like MS Office, Operating systems, Programming languages, Knowledge of database, SDLC knowledge, Domain knowledge
Business Analysis skillsRequirement Elicitation
Documentation
Decision making
Creativity
Analytical skills

45. Which documents are used to capture non-functional requirements?

There are two documents that are used to capture non-functional requirements, and they are:

  • SDD (System Design Document)
  • FRD (Functional Requirement Document)

46. What is UML modeling?

UML stands for Unified Modelling Language. It is a standard that the industry uses for documenting, constructing and visualizing various components of a system. This modelling standard is primarily used for software development. However, it is also used for describing job roles, organizational functions, and business processes. Some of the important diagrams that BAs use as part of UML are the class diagram, state diagrams and use cases.

47. What are the best practices to follow while writing a use case?

  • To become a valid use case, the use case must provide some value back to the actor or stakeholder.
  • The functional and non-functional requirements must be captured appropriately in the use case.
  • The use case must have one or more alternate flow along with the main flow.
  • The use case should only describe what the system does and not how it is done which means it will not describe the design. It will act as a black box from the viewpoint of an actor.
  • The use case should not have any, i.e. it should be stand-alone.

48. What is the difference between exception flow and alternate flow?

Alternate flow are the alternative actions that can be performed apart for the main flow and can be considered as an optional flow.
Exception flow is the path traversed in case of any exception or error.

49. What are the different types of actors you know in use case diagram?

There are mainly two types of actors can be depicted in a Use case-

  • Primary actors – It starts the process
  • Secondary actors – It assists the primary actor

Moreover, we can categorized actors into four types :

  • Human
  • System
  • Hardware
  • Timer

50. What are the different types of the gap that a business analyst can encounter during gap analysis?

 There are mainly four types of gap –

  • Performance Gap – The difference between expected performance and the actual performance
  • Product/Market Gap – The gap between budgeted sales and actual sales is termed as product/market gap
  • Profit Gap – The variance between a targeted and actual profit of the company.
  • Manpower Gap – The gap between the required number and quality of workforce and actual strength in the organization

51. How do you decide that as a business analyst you have gathered all the requirements?

 We can conclude that all the requirements are gathered only when –

  • It is validated and approved by the business users.
  • The requirements are appropriately aligned with the project’s business requirements.
  • The requirements can be implemented with the available resources.
  • All the key business stakeholders are aligned with the elicited requirements.

52. How do you perform requirement gathering?

The requirement gathering process is generally divided into multiple steps which are agnostic to the SDLC cycle. Each step involves:

  • specific tasks to perform
  • principles to follow
  • documents to produce

53. Explain each step involved in requirement gathering?

Step 1: Gather Background Information – This may include collecting background information about the project, analyzing any potential risk associated with the project. Techniques like PESTLE analysis, Porter’s Five forces framework could be used for this purpose.

Step 2: Identify Stakeholders – They are the decision makers of a project and approver for requirements and priorities. Stakeholders may range from project owners to senior managers, end users, and even competitors.

Step 3: Discover Business Objectives – This is to understand the business needs of the project before going deep into the project. SWOT analysis, Benchmarking, analyzing business objectives SMART and listing business objectives are some of the techniques used for this purpose.

Step 4: Evaluate Options – This is to identify the options to achieve business objectives. Impact analysis, Risk analysis, Cost-benefit analysis are some of the methods which are used for this purpose.

Step 5: Scope Definition – A scope is a project development goal which is set based on the business objectives. A scope definition document is used to detail the goals for each phase of a project.

Step 6: Business Analyst Delivery Plan – Based on the project scope, stakeholders availability and project methodology a document called business analyst is created at this step. The document provides information on deliverables with their timeline.

Step 7: Define Project Requirements – In this step, two types of documents are used – Functional requirement document and Non-functional requirement document. Based on the development methodology to be used in the project the business analyst needs to clarify the requirements with the stakeholders by interviewing them on the requirements and get the sign off on the same.

Step 8: Support Implementation through SDLC – This is the technical implementation step of the requirements where a business analyst gets involved with different teams. This includes coordinating with the development team and testing team to ensure requirements are implemented as expected and appropriately tested against all the possible business scenarios. They also need to handle the change request which may arise from the stakeholders at the later point of time.

Step 9: Evaluate Value Added By Project – This is the continuous evaluation of the project to evaluate whether the business objectives implementation correctly meets the business needs outcome and timeline.

54. Why it is necessary for a business analyst to get involved during the implementation of requirements?

Gaining domain knowledge and providing an analytical solution are the two major criteria of a business analyst. Hence, during actual implementation of a requirement or use case a business analyst can help to resolve many business strategies related problems that may arise during the implementation stage. On the contrary, they can learn from the problems which may help them to provide the solution in similar scenarios and also help to gain their domain knowledge.

55. What are the problems that a business analyst may face?

From the initiation to post implementation of a project a business analyst may face the following problems –

  • Employees related issues
  • Technology related problems
  • Access related
  • Business policies related issues
  • Business model errors

56.  Explain the requirement elicitation strategy?

Requirement elicitation is the process to collect all the requirements related to a system from the end users, customers, and stakeholders. As per the BABOK guide, there are nine methods which can be used as part of requirement elicitation process, and these are:

  • Brainstorming
  • Interviews
  • Observation
  • Document Analysis
    Focus Groups
  • Requirements Workshops
  • Interface Analysis
  • Survey or Questionnaire
  • Prototyping

57. What is the difference between Business analysis and Business Analytics?

The key difference between Business analysis and Business analytics is the first one is more functions and process related whereas the second one is data related.

Business analysis – recognizes business needs and determine the solutions to that problems. Tools and techniques like SWOT, PESTEL, CATWOE, MOST, FIVE WHY, etc. are used for business analysis.

Business analytics – handles data and analyze data to get insights into a business. Finally, it generates reports. Mainly four types of business analytics are used, and they are – descriptive analytics, decisive analytics, prescriptive analytics, and predictive analytics Tools and technologies like Big data, BI is used for this purpose.

58. What are the effective skills to solve any problem as a business analyst?

  • Leadership skill
  • Excellent communication skill
  • Problem analysis skill
  • Technical knowledge
  • Domain knowledge

59. What is the Agile Manifesto?

Agile Manifesto is a software guide about the Agile development principles which ensure iterative solutions.

60. What are the essential qualities of an Agile BA?

An Agile BA must be able to:

  • The BA is expected work collaborate with product owner and developers to elicit requirements. The BA also must work to develop realistic functional requirements.
  • The BA must do requirement elicitation in an iterative way
  • The BA must make requirement specifications, data models and business rules as much lightweight as possible.
  • The BA must be technically sound so that he can understand how the components of the system interact with each other. Besides that, he must understand the agile terminologies as he acts as the middleman between the customer and the project team.
  • The BA must concentrate on the just-enough requirement and test criteria to meet the just in time delivery goal of an agile project.

61. When should you use Waterfall model instead of Scrum?

 If the requirement is simple and specific, we should go for Waterfall model instead of Scrum.

62. What are the four key phases of business development?

The four key phases of business development:

  • Forming
  • Storming
  • Norming
  • Performing

63. What do you know about Kanban?

Kanban is a tool which helps the agile team to visually guide and manage the work as it progresses through the process. Besides, it works as a scheduling system in Agile just-in-time production. The Kanban board is used to describe the current development status.

64. Mention about some of the most important agile metrics?

The following are some important agile Matrices

  • Velocity – This is used to track the progress of a project
  • The sprint burndown matric – This helps to track the work done with the sprint.
  • The priority of the work
  • Work category allocation – This metric helps to get an idea about the priority of the work and work category allocation.
  • The cumulative flow diagram – the uniform flow of work can be checked thought this diagram of cumulative flow. Here the x-axis represents time and the y-axis stands for the number of effort.
  • Defect removal awareness – This helps to produce quality products.
  • Business value delivered – This is used to estimate the work efficiency of the team. It associates 100 points for measurement.
  • Time coverage – It estimates the amount of time invested in coding during testing. It is the ratio of the number of lines of code called by the test suite to the number of relative lines of codes.
  • Defect resolution time – This is the turnaround time for detecting and fixing bugs. There processes involved in for this purpose are:
    • bug fixing
    • eliminating the bug
    • Scheduling a fix
    • Defect fixation
    • Handover of the resolution report

65. Is there any difference between incremental and iterative development?

In an iterative development software development happens without any interruption. Here the software development cycles which typically consist of sprint and release are repeated until the final product is obtained. Whereas, in an incremental model, software development follows the product design, implementation, and testing incrementally until the product is finished. Hence, it involves development and maintenance.

66. Difference between extreme programming and scrum?

Scrum and extreme programming both follow iterations which are known as sprints. However, the sprints in a Scrum process last up to two weeks to one month long whereas in extreme programming (XP) team the iteration lasts for one or two weeks. Extreme programming is more flexible than Scrum as Scrum does not allow any change in during iterations.

Though we have categorized the above business analyst interview questions based on the experience levels, however, it could be mixed and match for any career level depending on the organization and their requirement.

67.  Define “Requirement Elicitation.”

Requirement Elicitation denotes the process of collecting all system-related requirements from the stakeholders, end-users, and customers. According to the BABOK guide, the requirement elicitation process comprises of nine different techniques:

  • Brainstorming
  • Interviews
  • Observation
  • Prototyping
  • Focus groups
  • Document analysis
  • Interface analysis
  • Survey/Questionnaire
  • Requirements workshops

68. What are the types of gaps that can occur during a Gap Analysis?

 A Gap Analysis can result in four types of gaps:

  • Profit Gap – It is the gap between the estimated and actual profit of a company.
  • Manpower Gap – It denotes the gap between the required number and quality of workforce and actual workforce strength in a company. 
  • Performance Gap – It is the difference between the actual performance and the expected performance.
  • Product/Market Gap – It is the gap between estimated sales and actual sales.

69. How to avoid scope creep?

To avoid scope creep, a Business Analyst can do the following:

  • Document the scope of the project in a detailed manner.
  • Document the new requirements in the project log.
  • Communicate the impacts/results of the changes to all the relevant stakeholders before implementing the change.
  • Abide by proper change management procedures.

70. Differentiate between risk mitigation and risk avoidance?

Risk MitigationRisk Avoidance
Risk mitigation is what to do when a risk occurs.Risk avoidance is what to do to avoid the risk.
 It reduces the probability of risk occurrence.It avoids the risk by eliminating the cause.
It checks whether any impact occurs for the project/business.Impact of the threat occurrence is reduced to 0%.
Cost is high in case any risk occurs.Cost is eliminated in risk avoidance.

71.  How does CATWOE help in business analysis and decision-making?

Customers, Actors, Transformation process, Worldview, Owners, and Environmental constraints (CATWOE) helps in making decisions ahead of time. It includes analyzing how those decisions will affect customers (C); who are involved as actors (A); what different transformation (T) processes are which might affect the system, global picture, and worldwide (W) issues; who is responsible/has ownership (O) for the business; and what the environmental (E) impacts will be of the project/business.

72. What is RUP methodology?

Rational Unified Process (RUP) is a product application improvement method with numerous devices to help with coding the last product and assignments identified with this objective. RUP is an object-oriented approach that guarantees successful project management and top-notch software production.

72. What is RAD methodology?

Rapid Application Development (RAD) model is a kind of incremental model. The phases of a project are produced in parallel as individual projects. The developments in the project are timeboxed, delivered, and afterward assembled into a working model.

73. List the components of the Requirements Work Plan.

1. Project description
2. Key issues
3. Deliverables
4. Goals and objectives
5. Strategy
6. Resources
7. Budget and time

74. List the elicitation techniques in Business Analytics

Elicitation is a practice of collecting requirements from end customers and stakeholders; it is a requirement-gathering process. Various techniques involved in this are:

1. Brainstorming
2. Document analysis
3. Focus group
4. Interface analysis
5. Interview
6. Observation
7. Prototyping
8. Requirements workshop
9. Reverse engineering
10. Survey

75. How well can you explain the System Analysis in a business?

It is nothing but a simple process of interpretation of the business needs and all the rules imposed by the management for the use of technical systems. The restrictions and the boundations largely matters and businesses should pay very close attention to the same. 

76. As a Business Analyst, what are your views on the inter-organization migration of employees?

Well, sometimes the problems declare their presence because of no other reason than no proper resources. In the current time, most of the members of a business workforce have good technical knowledge. Even employees have the interest to work with other departments in some cases. Migrating the employees from one department to another is generally not common but is can solve a very large number of business problems if this is managed by a team of experts. Business Analysts often perform this task to get the best possible outcome.

77. Do you think a Business analyst should be engaged in testing and integrating new solutions?

Of course, this is because a business analyst has the right knowledge about the challenges associated with most of the tasks. Very useful information can be driven and the testing procedures can be made more useful. In addition to this, a business analyst can simply guide an organization on what better can be done in a solution while it is under a test.

78. What according to you are the basic needs of a Business Analyst to accomplish his/her task?

A Business Analyst can have some basic requirements and they can be

1. Availability of the case scenarios
2. Access to logical data models
3. Data flow diagrams of the problems
4. Reports
5. Work Instructions

79. What is the difference between post-implementation and pre-implementation problems of a project? What is the role of a BA in managing them both?

The problems that declare their presence before a project is actually executed or implemented are known as pre-implementation problems while the ones that come after the implementation of the same are post-implementation problems. Well, most of the problems come after the implementation of a project. A good Business Analyst cannot overcome them all but can impose a limit on the same. In fact, a BA always works to make sure that both the pre and post-implementation problems can be avoided up to a great extent within the minimum possible time.

80. What is Pugh Matrix?

Pugh Matrix – Helps to decide the most optimal & alternate product solutions. As this technique is a standard line of the Six Sigma technique, it is known as the design matrix/problem.

81. What are the advantages of using R for business analytics?

R provides a wide variety of statistical (linear and nonlinear modeling, classical statistical tests, time-series analysis, classification, clustering, …) and graphical techniques, and is highly extensible. The S language is often the vehicle of choice for research in statistical methodology, and R provides an Open Source route to participation in that activity.

One of R’s strengths is the ease with which well-designed publication-quality plots can be produced, including mathematical symbols and formulae where needed. Great care has been taken over the defaults for the minor design choices in graphics, but the user retains full control.

82. Explain the R environment?

R is an integrated suite of software facilities for data manipulation, calculation, and graphical display. It includes

  • an effective data handling and storage facility,
  • a suite of operators for calculations on arrays, in particular, matrices,
  • a large, coherent, integrated collection of intermediate tools for data analysis,
  • graphical facilities for data analysis and display either on-screen or on hardcopy, and
  • a well-developed, simple and effective programming language that includes conditionals, loops, user-defined recursive functions and input, and output facilities.

83. What does “Data Cleansing” mean? What are the best ways to practice this?

The best ways to clean data are:

  • Segregating data, according to their respective attributes.
  • Breaking large chunks of data into small datasets and then cleaning them.
  • Analyzing the statistics of each data column.
  • Creating a set of utility functions or scripts for dealing with common cleaning tasks.
  • Keeping track of all the data cleansing operations to facilitate easy addition or removal from the datasets, if required.

84. What is the difference between data profiling and data mining?

Data Profiling focuses on analyzing individual attributes of data, thereby providing valuable information on data attributes such as data type, frequency, length, along with their discrete values and value ranges. On the contrary, data mining aims to identify unusual records, analyze data clusters, and sequence discovery, to name a few.

85. What is KNN imputation method?

KNN imputation method seeks to impute the values of the missing attributes using those attribute values that are nearest to the missing attribute values. The similarity between two attribute values is determined using the distance function.

86. What should a data analyst do with missing or suspected data?

In such a case, a data analyst needs to:

  • Use data analysis strategies like deletion method, single imputation methods, and model-based methods to detect missing data.
  • Prepare a validation report containing all information about the suspected or missing data.
  • Scrutinize the suspicious data to assess their validity.
  • Replace all the invalid data (if any) with a proper validation code.

87. Define Outlier?

A data analyst interview question and answers guide will not complete without this question. An outlier is a term commonly used by data analysts when referring to a value that appears to be far removed and divergent from a set pattern in a sample. There are two kinds of outliers – Univariate and Multivariate.

The two methods used for detecting outliers are:

  • Box plot method – According to this method, if the value is higher or lesser than 1.5*IQR (interquartile range), such that it lies above the upper quartile (Q3) or below the lower quartile (Q1), the value is an outlier.
  • Standard deviation method – This method states that if a value is higher or lower than mean ± (3*standard deviation), it is an outlier.

88. What is “Clustering?” Name the properties of clustering algorithms.

Clustering is a method in which data is classified into clusters and groups. A clustering algorithm has the following properties:

  • Hierarchical or flat
  • Hard and soft
  • Iterative
  • Disjunctive

89.  Define “Collaborative Filtering”.

Collaborative filtering is an algorithm that creates a recommendation system based on the behavioral data of a user. For instance, online shopping sites usually compile a list of items under “recommended for you” based on your browsing history and previous purchases. The crucial components of this algorithm include users, objects, and their interest.

90. Name the statistical methods that are highly beneficial for data analysts?

The statistical methods that are mostly used by data analysts are:

  • Bayesian method
  • Markov process
  • Simplex algorithm
  • Imputation
  • Spatial and cluster processes
  • Rank statistics, percentile, outliers detection
  • Mathematical optimization

91. What is a hash table collision? How can it be prevented?

This is one of the important data analyst interview questions. When two separate keys hash to a common value, a hash table collision occurs. This means that two different data cannot be stored in the same slot.
Hash collisions can be avoided by:

  • Separate chaining – In this method, a data structure is used to store multiple items hashing to a common slot.
  • Open addressing – This method seeks out empty slots and stores the item in the first empty slot available.

92. How should you tackle multi-source problems?

To tackle multi-source problems, you need to:

  • Identify similar data records and combine them into one record that will contain all the useful attributes, minus the redundancy.
  • Facilitate schema integration through schema restructuring.

93. Mention the steps of a Data Analysis project.

The core steps of a Data Analysis project include:

  • The foremost requirement of a Data Analysis project is an in-depth understanding of the business requirements. 
  • The second step is to identify the most relevant data sources that best fit the business requirements and obtain the data from reliable and verified sources. 
  • The third step involves exploring the datasets, cleaning the data, and organizing the same to gain a better understanding of the data at hand. 
  • In the fourth step, Data Analysts must validate the data.
  • The fifth step involves implementing and tracking the datasets.
  • The final step is to create a list of the most probable outcomes and iterate until the desired results are accomplished.

94. What are the characteristics of a good data model?

For a data model to be considered as good and developed, it must depict the following characteristics:

  • It should have predictable performance so that the outcomes can be estimated accurately, or at least, with near accuracy.
  • It should be adaptive and responsive to changes so that it can accommodate the growing business needs from time to time. 
  • It should be capable of scaling in proportion to the changes in data. 
  • It should be consumable to allow clients/customers to reap tangible and profitable results.

95. Explain “Normal Distribution.”


One of the popular data analyst interview questions. Normal distribution, better known as the Bell Curve or Gaussian curve, refers to a probability function that describes and measures how the values of a variable are distributed, that is, how they differ in their means and their standard deviations. In the curve, the distribution is symmetric. While most of the observations cluster around the central peak, probabilities for the values steer further away from the mean, tapering off equally in both directions.

96. What are the advantages of version control?

The main advantages of version control are –

  • It allows you to compare files, identify differences, and consolidate the changes seamlessly. 
  • It helps to keep track of application builds by identifying which version is under which category – development, testing, QA, and production.
  • It maintains a complete history of project files that comes in handy if ever there’s a central server breakdown.
  • It is excellent for storing and maintaining multiple versions and variants of code files securely.
  • It allows you to see the changes made in the content of different files.

97. How can a Data Analyst highlight cells containing negative values in an Excel sheet?

The final question in our data analyst interview questions and answers guide. A Data Analyst can use conditional formatting to highlight the cells having negative values in an Excel sheet. Here are the steps for conditional formatting:

  • First, select the cells that have negative values.
  • Now, go to the Home tab and choose the Conditional Formatting option.
  • Then, go to the Highlight Cell Rules and select the Less Than option.
  • In the final step, you must go to the dialog box of the Less Than option and enter “0” as the value.

98. Differentiate between variance and covariance.

Variance and covariance are both statistical terms. Variance depicts how distant two numbers (quantities) are in relation to the mean value. So, you will only know the magnitude of the relationship between the two quantities (how much the data is spread around the mean). On the contrary, covariance depicts how two random variables will change together. Thus, covariance gives both the direction and magnitude of how two quantities vary with respect to each other.

99. Explain univariate, bivariate, and multivariate analysis.

Univariate analysis refers to a descriptive statistical technique that is applied to datasets containing a single variable. The univariate analysis considers the range of values and also the central tendency of the values. 

Bivariate analysis simultaneously analyzes two variables to explore the possibilities of an empirical relationship between them. It tries to determine if there is an association between the two variables and the strength of the association, or if there are any differences between the variables and what is the importance of these differences.  

Multivariate analysis is an extension of bivariate analysis. Based on the principles of multivariate statistics, the multivariate analysis observes and analyzes multiple variables (two or more independent variables) simultaneously to predict the value of a dependent variable for the individual subjects.

100. How can a Data Analyst highlight cells containing negative values in an Excel sheet?

A Data Analyst can use conditional formatting to highlight the cells having negative values in an Excel sheet. Here are the steps for conditional formatting:

  • First, select the cells that have negative values.
  • Now, go to the Home tab and choose the Conditional Formatting option.
  • Then, go to the Highlight Cell Rules and select the Less Than option.
  • In the final step, you must go to the dialog box of the Less Than option and enter “0” as the value.

7

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here

three × 3 =