Filter interviews by
OOP features include encapsulation, inheritance, polymorphism, and abstraction, enhancing code modularity and reusability.
Encapsulation: Bundles data and methods, e.g., a class 'Car' with properties like 'speed' and methods like 'accelerate()'.
Inheritance: Allows a class to inherit properties from another, e.g., 'ElectricCar' inherits from 'Car'.
Polymorphism: Enables methods to do different things based on the obj...
This program removes duplicates from an unsorted array of strings using a set for efficiency.
Use a set to track unique strings. Example: Input: ['apple', 'banana', 'apple'], Output: ['apple', 'banana'].
Iterate through the array and add each string to the set. If it's already in the set, skip it.
Convert the set back to a list to return the result. Example: Input: ['cat', 'dog', 'cat'], Output: ['cat', 'dog'].
Change management in Windchill PLM involves controlling product changes efficiently throughout the lifecycle.
Change management ensures that all product changes are documented and approved, reducing errors.
Windchill PLM provides tools for tracking change requests, such as Engineering Change Orders (ECOs).
For example, if a design modification is needed, an ECO can be initiated to assess impacts and approvals.
It inte...
OOPS in Java refers to Object-Oriented Programming, which uses objects and classes to structure software design.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., class).
Inheritance: Mechanism where one class can inherit fields and methods from another (e.g., class Dog extends Animal).
Polymorphism: Ability to present the same interface for different underlying forms (e.g., met...
Resources type defines the structure of the data while traits define reusable properties and behaviors.
Resources type specifies the structure of the data that can be accessed through the API endpoints.
Traits define reusable properties and behaviors that can be applied to multiple resources or methods.
Resources type is used to define the data model, while traits are used to define common functionalities like authen...
CloudHub 2.0 is a cloud-based integration platform that allows organizations to connect applications, data, and devices across multiple environments.
CloudHub 2.0 offers enhanced scalability and performance compared to its predecessor.
It provides a centralized platform for managing integrations, APIs, and data flows.
Organizations can use CloudHub 2.0 to streamline their business processes and improve efficiency.
Exa...
Implement a binary search algorithm to find the index of a target in a sorted array.
Use binary search to achieve O(log n) complexity.
Initialize two pointers: left at 0 and right at length of nums - 1.
While left <= right, calculate mid index as (left + right) / 2.
If nums[mid] equals target, return mid index.
If nums[mid] is less than target, move left pointer to mid + 1.
If nums[mid] is greater than target, move r...
The OSI model has seven layers that standardize network communication processes.
1. Physical Layer: Deals with the physical connection (e.g., cables, switches).
2. Data Link Layer: Manages node-to-node data transfer (e.g., Ethernet).
3. Network Layer: Handles routing of data packets (e.g., IP).
4. Transport Layer: Ensures reliable data transfer (e.g., TCP, UDP).
5. Session Layer: Manages sessions between applications (...
Authentication verifies the identity of a user, while authorization determines what actions the user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Example: Logging into a system with a username and password is authentication, while being able to view certa...
String operations programs manipulate and modify strings.
Use built-in string functions like substring, replace, and split.
Implement algorithms like string reversal, palindrome check, and string compression.
Regular expressions can also be used for advanced string operations.
Examples: reversing a string, counting occurrences of a substring, converting a string to title case.
I appeared for an interview in Feb 2025, where I was asked the following questions.
This program removes duplicates from an unsorted array of strings using a set for efficiency.
Use a set to track unique strings. Example: Input: ['apple', 'banana', 'apple'], Output: ['apple', 'banana'].
Iterate through the array and add each string to the set. If it's already in the set, skip it.
Convert the set back to a list to return the result. Example: Input: ['cat', 'dog', 'cat'], Output: ['cat', 'dog'].
OOP features include encapsulation, inheritance, polymorphism, and abstraction, enhancing code modularity and reusability.
Encapsulation: Bundles data and methods, e.g., a class 'Car' with properties like 'speed' and methods like 'accelerate()'.
Inheritance: Allows a class to inherit properties from another, e.g., 'ElectricCar' inherits from 'Car'.
Polymorphism: Enables methods to do different things based on the object, ...
Resources type defines the structure of the data while traits define reusable properties and behaviors.
Resources type specifies the structure of the data that can be accessed through the API endpoints.
Traits define reusable properties and behaviors that can be applied to multiple resources or methods.
Resources type is used to define the data model, while traits are used to define common functionalities like authenticat...
Authentication verifies the identity of a user, while authorization determines what actions the user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Example: Logging into a system with a username and password is authentication, while being able to view certain fi...
CloudHub 2.0 is a cloud-based integration platform that allows organizations to connect applications, data, and devices across multiple environments.
CloudHub 2.0 offers enhanced scalability and performance compared to its predecessor.
It provides a centralized platform for managing integrations, APIs, and data flows.
Organizations can use CloudHub 2.0 to streamline their business processes and improve efficiency.
Examples...
I applied via Company Website and was interviewed in Sep 2024. There were 3 interview rounds.
NORMAL aptitude questions
The question requires a detailed response based on the provided sentences.
Identify key themes in the sentences.
Analyze the context and implications of the statements.
Consider the audience and purpose of the sentences.
Provide examples to illustrate your points.
I am a dedicated and detail-oriented analyst with a strong background in data analysis and problem-solving.
Experienced in conducting thorough research and interpreting complex data sets
Skilled in using various analytical tools and software
Strong communication skills for presenting findings and recommendations
Proven track record of delivering actionable insights to drive business decisions
Write 2 code for answers
Averages , percentage , numbers
I appeared for an interview in Feb 2024.
MCQ based questions,mainly pseudo code
I applied via Campus Placement
Maths aptitude with pseudocode
Moderate coding round on basic questions
Easy to carck not only aptitude some technical questions involved
Top trending discussions
The duration of Capgemini Engineering Analyst interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 15 interview experiences
Difficulty level
Duration
based on 14 reviews
Rating in categories
Senior Software Engineer
1.8k
salaries
| ₹4.9 L/yr - ₹21.8 L/yr |
Technical Lead
1.3k
salaries
| ₹14.7 L/yr - ₹24 L/yr |
Software Engineer
1.2k
salaries
| ₹4.5 L/yr - ₹11 L/yr |
Senior Consultant
451
salaries
| ₹14.2 L/yr - ₹24 L/yr |
Network Engineer
395
salaries
| ₹4 L/yr - ₹8.5 L/yr |
Genpact
DXC Technology
Virtusa Consulting Services
CGI Group