i
Capgemini
Filter interviews by
OAuth 2.0 is used for secure authorization and authentication in various applications.
OAuth 2.0 is used by Google to allow third-party applications to access user data without sharing passwords.
It is used by Facebook to allow users to log in to other websites using their Facebook credentials.
It is used by Microsoft to allow users to grant access to their Office 365 data to third-party applications.
OAuth 2.0 is als...
SOAP is a protocol while REST is an architectural style for web services.
SOAP uses XML for messaging while REST uses JSON or XML.
SOAP requires more bandwidth and processing power than REST.
SOAP has built-in error handling while REST relies on HTTP error codes.
SOAP supports both stateful and stateless communication while REST is stateless.
SOAP is commonly used in enterprise applications while REST is used for web-b...
Public cloud is accessible to everyone while private cloud is restricted to a specific organization.
Public cloud is owned and operated by third-party providers while private cloud is owned and operated by the organization itself.
Public cloud is accessible over the internet while private cloud is accessible only within the organization's network.
Public cloud is more cost-effective for small businesses while private...
OAuth 2.0 is an authorization framework that allows third-party applications to access user data without sharing passwords.
OAuth 2.0 is used for authentication and authorization.
It allows users to grant access to their resources stored on one site to another site.
It uses access tokens to grant access to resources.
Examples of OAuth 2.0 providers include Google, Facebook, and Twitter.
What people are saying about Capgemini
REST supports methods like GET, POST, PUT, DELETE, PATCH, OPTIONS, HEAD.
GET - retrieves a resource
POST - creates a new resource
PUT - updates an existing resource
DELETE - deletes a resource
PATCH - partially updates a resource
OPTIONS - returns the supported methods for a resource
HEAD - returns metadata about a resource
One way SSL is unidirectional while two way SSL is bidirectional.
One way SSL only authenticates the server to the client while two way SSL authenticates both the server and the client to each other.
One way SSL uses only server certificate while two way SSL uses both server and client certificates.
One way SSL is commonly used in websites while two way SSL is used in applications that require higher security such as...
OOPs is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs stands for Object-Oriented Programming.
It focuses on creating objects that interact with each other to solve a problem.
It has four main concepts: Encapsulation, Inheritance, Polymorphism, and Abstraction.
Encapsulation is the process of hiding data and methods within a class.
Inheritance allows a class to inherit pro...
Multiple dispatch is not a feature of Redux. It can be achieved using middleware or custom logic.
Middleware like redux-thunk or redux-saga can be used to dispatch multiple actions based on a single action.
Custom logic can be implemented in the reducer to handle multiple actions based on a single action type.
For example, a single 'ADD_ITEM' action can trigger multiple actions like 'UPDATE_TOTAL', 'UPDATE_HISTORY', ...
Generic collections provide type safety and reusability in software development.
Generic collections allow us to store and manipulate objects of any type in a type-safe manner.
They provide compile-time type checking, reducing the chances of runtime errors.
They promote code reusability by allowing the same collection to be used with different types.
Generic collections improve performance by eliminating the need for ...
Given an array 'ARR' of size 'N', determine if there exists a triplet (i, j, k) satisfying the conditions: 0 < i , i + 1 < j , j + 1 < k and k < N ...
The problem involves determining if there exists a triplet in an array such that the sums of specific subarrays are equal.
Iterate through all possible triplets (i, j, k) satisfying the given conditions.
Calculate the sum of subarrays [0, i - 1], [i + 1, j - 1], [j + 1, k - 1], [k + 1, N - 1] for each triplet.
Check if any triplet has equal sums for the subarrays, return True if found, else False.
I appeared for an interview in Jun 2025, where I was asked the following questions.
Prime numbers are natural numbers greater than 1 that have no divisors other than 1 and themselves.
A prime number is only divisible by 1 and itself. Example: 2, 3, 5.
The first prime number is 2, which is also the only even prime number.
All other even numbers greater than 2 are not prime because they can be divided by 2.
The prime numbers between 1 and 100 are: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, ...
Palindromes are words, phrases, or sequences that read the same backward as forward, showcasing symmetry in language.
Words: 'level', 'radar', 'civic', 'deified'
Phrases: 'A man, a plan, a canal, Panama!'
Numbers: 121, 12321
Dates: 02/02/2020
I appeared for an interview in Mar 2025, where I was asked the following questions.
I am excited to join this company for its innovative projects, collaborative culture, and opportunities for professional growth.
The company's commitment to cutting-edge technology aligns with my passion for innovation, as seen in projects like [specific project].
I admire the collaborative culture here, which fosters teamwork and creativity, similar to my experience in [previous team project].
The opportunities for profe...
I applied via Recruitment Consulltant and was interviewed in Jul 2024. There was 1 interview round.
Using Streams API to write code for software development tasks.
Use Stream.of() to create a stream from a list of elements
Use filter() to apply a predicate to filter elements
Use map() to transform elements in the stream
Use collect() to convert the stream into a collection
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Use Java 8 Streams to efficiently remove duplicates from an array of strings.
Convert the array to a stream: `Arrays.stream(array)`.
Use `distinct()` to filter out duplicates: `.distinct()`.
Collect the results back into an array: `.toArray(String[]::new)`.
Example: `String[] uniqueArray = Arrays.stream(array).distinct().toArray(String[]::new);`.
Various exceptions can occur in PL/SQL, such as NO_DATA_FOUND, TOO_MANY_ROWS, and INVALID_CURSOR.
NO_DATA_FOUND exception is raised when a SELECT INTO statement returns no rows.
TOO_MANY_ROWS exception is raised when a SELECT INTO statement returns multiple rows.
INVALID_CURSOR exception is raised when an invalid cursor operation is performed.
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
An assessment to measure a candidate's mental aptitude/mental ability
Review the basics and practice
I appeared for an interview in Mar 2024.
Database structure design involves identifying entities, relationships, attributes, and normalization.
Identify entities and their relationships
Define attributes for each entity
Normalize the database to reduce redundancy
Consider indexing for efficient querying
Use primary and foreign keys to establish relationships
Choose appropriate data types for each attribute
I use various design tools such as Adobe XD, Sketch, Figma, and InVision for designing user interfaces.
Adobe XD
Sketch
Figma
InVision
Some of the top questions asked at the Capgemini Software Developer interview for experienced candidates -
The duration of Capgemini Software Developer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 32 interview experiences
Difficulty level
Duration
based on 438 reviews
Rating in categories
Noida,
Chennai
+12-7 Yrs
₹ 1.5-40 LPA
Consultant
58.6k
salaries
| ₹8.9 L/yr - ₹15 L/yr |
Associate Consultant
51.2k
salaries
| ₹4.5 L/yr - ₹10 L/yr |
Senior Consultant
49.9k
salaries
| ₹12.2 L/yr - ₹21 L/yr |
Senior Analyst
22.2k
salaries
| ₹3.1 L/yr - ₹7.5 L/yr |
Senior Software Engineer
21.5k
salaries
| ₹4.7 L/yr - ₹12.7 L/yr |
Wipro
Accenture
Cognizant
TCS