Filter interviews by
Hash table is a data structure that maps keys to values using a hash function.
Hash function maps keys to indices in an array
Collisions can occur, which can be resolved using techniques like chaining or open addressing
Lookup, insertion, and deletion operations have an average time complexity of O(1)
I am comfortable working with multiple languages and have experience in doing so.
I have experience working with languages such as Java, Python, C++, and JavaScript.
I am able to quickly adapt to new languages and learn them efficiently.
I understand the importance of proper documentation and commenting in code to ensure readability for others.
I have worked on projects that required integration of multiple languages,...
Comparable is an interface used for natural ordering while Comparator is an interface used for custom ordering.
Comparable is implemented by the class whose objects need to be sorted
Comparator is implemented by a separate class to define custom sorting logic
Comparable uses compareTo() method to compare objects
Comparator uses compare() method to compare objects
Example: String class implements Comparable interface fo...
To get unique elements from a list, use set() function.
Convert the list to a set using set() function
Convert the set back to list using list() function
Example: list(set(['apple', 'banana', 'apple', 'orange'])) will return ['apple', 'banana', 'orange']
This C program checks if a given number is a power of 2 using bitwise operations.
A number is a power of 2 if it has exactly one bit set in its binary representation.
Use the expression (n & (n - 1)) == 0 to check if n is a power of 2.
Example: 1 (2^0), 2 (2^1), 4 (2^2), 8 (2^3) are powers of 2.
Example: 3, 5, 6 are not powers of 2.
Count the number of palindromic substrings in a given string efficiently.
A palindrome reads the same forwards and backwards, e.g., 'madam'.
To find palindromes, check all substrings of the string.
Use a center expansion technique to count palindromes efficiently.
Example: For 'abba', the palindromes are 'a', 'b', 'bb', 'abba'.
Single characters are always palindromes.
Discussing recent Palo Alto firewall vulnerabilities and mitigation strategies.
Stay updated on Palo Alto's security advisories and patches.
Implement strict access controls and segmentation to limit exposure.
Regularly review and update firewall rules to minimize attack surfaces.
Utilize threat intelligence feeds to identify and block known vulnerabilities.
Conduct regular vulnerability assessments and penetration tes...
A spike at 400ns in TDR measurements may indicate impedance mismatches or reflections in the transmission line.
Impedance mismatch: A sudden change in impedance can cause reflections, leading to spikes in TDR measurements.
Connector issues: Poorly connected or damaged connectors can introduce discontinuities, resulting in spikes.
Cable defects: Faulty cables, such as those with breaks or shorts, can create reflection...
PCIe Gen3 RL and IL specifications define the electrical and protocol requirements for high-speed data transfer.
RL stands for Receiver Loss and IL stands for Insertion Loss.
RL specification defines the maximum amount of signal loss that can be tolerated by the receiver.
IL specification defines the maximum amount of signal loss that can be tolerated by the channel.
PCIe Gen3 RL and IL specifications ensure reliable ...
IBIS models can be verified by comparing simulation results with actual measurements.
Compare simulation results with actual measurements
Use a variety of test cases to ensure accuracy
Verify the model's compliance with IBIS standards
Check for consistency with other models and datasheets
I applied via Approached by Company and was interviewed in Dec 2024. There were 4 interview rounds.
Java, DSA Coding Questions, Array, LL
I appeared for an interview in May 2025, where I was asked the following questions.
Effective team management and cost reduction strategies are essential for project success.
Establish clear communication channels to ensure everyone is aligned on goals and tasks.
Implement agile methodologies to enhance flexibility and responsiveness to changes.
Conduct regular team meetings to assess progress and address any challenges promptly.
Encourage collaboration and knowledge sharing among team members to leverage...
I appeared for an interview in May 2025, where I was asked the following questions.
BADI (Business Add-In) and BAPI (Business Application Programming Interface) are SAP enhancements for custom functionality and integration.
BADI allows developers to add custom code to standard SAP applications without modifying the original code.
Example of BADI: Implementing custom logic in sales order processing.
BAPI is a standardized programming interface that allows external applications to interact with SAP systems...
I appeared for an interview in Feb 2025, where I was asked the following questions.
Kubernetes is a container orchestration platform that automates deployment, scaling, and management of containerized applications.
Master Node: Controls the Kubernetes cluster, managing the API server, scheduler, and controller manager.
Worker Nodes: Run the containerized applications and are managed by the master node.
Pods: The smallest deployable units in Kubernetes, which can contain one or more containers.
Services: A...
Copy and Add in Docker are commands used to manage files in images, with distinct behaviors and use cases.
COPY: Used to copy files/directories from the host to the Docker image.
ADD: Similar to COPY but can also extract tar files and fetch files from URLs.
Example of COPY: COPY ./localfile.txt /app/ in Dockerfile copies a file to the image.
Example of ADD: ADD ./archive.tar.gz /app/ extracts the tar file into the image.
CO...
CMD specifies default commands for a container, while ENTRYPOINT sets the main command to run.
CMD provides default arguments for the ENTRYPOINT command.
ENTRYPOINT is used to define the main command that will always run in the container.
Example of CMD: CMD ["nginx", "-g", "daemon off;"]
Example of ENTRYPOINT: ENTRYPOINT ["/usr/sbin/nginx"]
Using both: ENTRYPOINT ["/usr/sbin/nginx"] CMD ["-g", "daemon off;"]
Git merge combines branches, preserving history; git rebase rewrites history for a linear commit structure.
Merge creates a new commit that combines changes from both branches.
Rebase moves or combines commits from one branch onto another, creating a linear history.
Example of merge: 'git merge feature-branch' creates a merge commit.
Example of rebase: 'git rebase main' applies commits from the feature branch on top of mai...
A Terraform module is a container for multiple resources that are used together, promoting reusability and organization.
Modules can be created for specific tasks, like setting up a web server or a database.
A module can include resources, input variables, output values, and even other modules.
Example: A module for an AWS VPC can include subnets, route tables, and security groups.
Modules can be sourced from local paths, ...
Manual testing is necessary to ensure the quality of the software by simulating real user interactions and scenarios.
Manual testing allows for human intuition and creativity to uncover unexpected issues.
Certain tests, such as usability testing, cannot be automated and require manual execution.
Exploratory testing is best performed manually to discover new defects and areas of improvement.
Manual testing is crucial for va...
Unresolved reference is an error in programming where a variable or function is used without being defined or declared.
Occurs when a variable or function is used before it is declared or defined
Can also happen when a variable or function is misspelled
Common in programming languages like Python, Java, and C++
This question is likely related to a discrepancy between a library and netlist causing a difference in the size of PMOS transistors.
Mismatch between the library and netlist can lead to incorrect sizing of transistors
Ensure consistency between the library files and netlist to avoid discrepancies
Check for any errors or warnings related to library and netlist mismatch in the design tool logs
Verify the sizing of PMOS trans...
Basic apti and easy one can solve it easily
I have worked on various projects including developing software applications, designing systems, and implementing new technologies.
Developed a mobile application for tracking fitness goals
Designed a database system for managing customer information
Implemented a new cloud-based storage solution for data backup
I appeared for an interview in Mar 2025, where I was asked the following questions.
Top trending discussions
Some of the top questions asked at the Capgemini Engineering interview for experienced candidates -
The duration of Capgemini Engineering interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 82 interview experiences
Difficulty level
Duration
based on 2.3k reviews
Rating in categories
1-14 Yrs
Not Disclosed
1-12 Yrs
Not Disclosed
4-15 Yrs
Not Disclosed
Senior Software Engineer
1.8k
salaries
| ₹4.8 L/yr - ₹21.7 L/yr |
Technical Lead
1.3k
salaries
| ₹14.4 L/yr - ₹24 L/yr |
Software Engineer
1.1k
salaries
| ₹4.8 L/yr - ₹11 L/yr |
Senior Consultant
455
salaries
| ₹14 L/yr - ₹24 L/yr |
Consultant
402
salaries
| ₹9.3 L/yr - ₹16.6 L/yr |
Genpact
DXC Technology
Virtusa Consulting Services
CGI Group