i
Capgemini
Filter interviews by
I am proficient in several programming languages, including Python, Java, and JavaScript, each with unique strengths for various applications.
Python: Excellent for data analysis and machine learning; libraries like Pandas and TensorFlow are widely used.
Java: Strongly typed language ideal for enterprise applications; used in Android development and large-scale systems.
JavaScript: Essential for web development; fram...
I have extensive experience using Selenium with Java for automated testing, ensuring high-quality software delivery.
Proficient in writing test scripts using Selenium WebDriver in Java.
Implemented Page Object Model (POM) for better test maintenance and readability.
Utilized TestNG for managing test cases and generating reports.
Integrated Selenium tests with CI/CD pipelines using Jenkins.
Experience in handling dynami...
To find the 2nd highest salary, use SQL queries to retrieve distinct salaries and order them.
Use the SQL query: SELECT DISTINCT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 1;
This query selects distinct salaries, orders them in descending order, and skips the highest salary.
Ensure the table has at least two distinct salary values to get a valid result.
A tuple in Python is an immutable sequence type used to store collections of items.
Tuples are defined using parentheses: example: my_tuple = (1, 2, 3)
They are immutable, meaning once created, their elements cannot be changed.
Tuples can contain mixed data types: example: mixed_tuple = (1, 'hello', 3.14)
They support indexing and slicing: example: my_tuple[1] returns '2'
Tuples can be nested: example: nested_tuple = (...
What people are saying about Capgemini
React is a popular JavaScript library for building user interfaces, particularly single-page applications, using a component-based architecture.
Component-Based: React allows developers to build encapsulated components that manage their own state, making code reusable and easier to maintain.
Virtual DOM: React uses a virtual DOM to optimize rendering, updating only the parts of the UI that have changed, which improv...
Machine learning is a subset of AI that enables systems to learn from data and improve over time without explicit programming.
Machine learning algorithms can be supervised (e.g., predicting house prices) or unsupervised (e.g., clustering customer data).
Common algorithms include decision trees, neural networks, and support vector machines.
Applications range from image recognition (e.g., facial recognition) to natur...
Use Java 8 Streams to find the first non-repeating character in a string efficiently.
Utilize a Map to count character occurrences: `Map<Character, Long> charCount = str.chars().mapToObj(c -> (char) c).collect(Collectors.groupingBy(Function.identity(), Collectors.counting()));`
Filter the characters based on their count: `charCount.entrySet().stream().filter(entry -> entry.getValue() == 1)`.
Find the firs...
Identify, assess, and resolve the bug while communicating with stakeholders and ensuring minimal disruption to users.
Immediately assess the severity of the bug and its impact on users.
Communicate with the development team to gather insights and potential fixes.
Document the bug details, including steps to reproduce and screenshots if applicable.
Prioritize the bug based on its impact and urgency, and escalate if nec...
Testing without test cases involves exploratory testing, risk assessment, and user feedback to ensure quality.
Exploratory Testing: Test the application without predefined cases, focusing on user experience and functionality.
Risk-Based Testing: Identify critical areas of the application and prioritize testing efforts based on potential risks.
User Feedback: Engage end-users to gather insights on usability and functi...
The defect life cycle outlines the stages a defect goes through, while priority and severity determine its impact and urgency.
1. Defect Life Cycle: Stages include Identification, Reporting, Triage, Fixing, Verification, and Closure.
2. Severity: Indicates the impact of the defect on the system (e.g., Critical, Major, Minor).
3. Priority: Indicates the urgency to fix the defect (e.g., High, Medium, Low).
4. Example of...
I applied via Approached by Company and was interviewed in May 2022. There were 3 interview rounds.
Outliers can be handled by removing, transforming or imputing them. Imbalanced datasets can be handled by resampling techniques. Feature engineering involves creating new features from existing ones.
Outliers can be removed using statistical methods like z-score or IQR.
Outliers can be transformed using techniques like log transformation or box-cox transformation.
Outliers can be imputed using techniques like mean imputat...
I appeared for an interview in Feb 2025.
I balance my professional life and studies through effective time management, prioritization, and self-discipline.
I create a detailed schedule that allocates specific time blocks for work and study, ensuring I stay organized.
I prioritize tasks based on deadlines and importance, allowing me to focus on high-impact assignments first.
I utilize tools like calendars and task management apps to keep track of both work respon...
Cash flow types include operating, investing, and financing; direct and indirect methods differ in presentation and calculation.
Types of cash flow: Operating, Investing, Financing.
Operating cash flow: Cash generated from core business activities.
Investing cash flow: Cash used for investments in assets or securities.
Financing cash flow: Cash received from or paid to investors and creditors.
Direct cash flow: Lists actual...
Depreciation is not charged on land due to its indefinite lifespan and potential for appreciation.
Land is considered a non-depreciable asset because it does not wear out or get used up over time.
Unlike buildings or machinery, land does not have a finite useful life.
Land often appreciates in value due to factors like location and demand, contrasting with depreciable assets.
For example, a plot of land in a growing urban ...
The P2P cycle involves the process of procuring goods and services, from requisition to payment.
1. Requisition: Initiating a purchase request, e.g., a department needing office supplies.
2. Purchase Order: Creating a formal order to the supplier, ensuring terms are clear.
3. Receipt of Goods/Services: Confirming delivery and quality of items received.
4. Invoice Processing: Matching the supplier's invoice with the purchas...
VLOOKUP is an Excel function used to search for a value in the first column of a table and return a value in the same row from a specified column.
VLOOKUP stands for 'Vertical Lookup'.
Syntax: VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup]).
Example: =VLOOKUP(A2, B2:D10, 3, FALSE) looks for the value in A2 within the first column of B2:D10 and returns the corresponding value from the third column.
The 'ra...
I have a notice period of one month, and I plan to manage my studies by creating a structured schedule and prioritizing tasks.
Create a detailed study schedule that allocates specific time slots for studying each subject.
Utilize weekends and evenings for intensive study sessions to maximize productivity.
Incorporate breaks to avoid burnout and maintain focus during study periods.
Use productivity tools like calendars or a...
HMV and LMV in GST refer to High Value and Low Value transactions, impacting compliance and reporting requirements.
HMV (High Value) transactions are those exceeding a specified monetary threshold, requiring detailed reporting.
LMV (Low Value) transactions are those below the threshold, often subject to simplified compliance.
For example, if the threshold is set at ₹2,50,000, any transaction above this is HMV, while those...
GSTR-1 is a monthly return for outward supplies, while GSTR-3B is a summary return for GST payment.
GSTR-1 is filed by registered taxpayers to report sales and outward supplies.
It includes details like invoice-wise sales, credit/debit notes, and exports.
Example: A business selling goods worth ₹1,00,000 must report this in GSTR-1.
GSTR-3B is a simplified return for taxpayers to declare their GST liability.
It includes summ...
I have worked with design patterns such as Singleton, Factory, Observer, and Strategy.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified a...
I would immediately investigate the issue, identify the root cause, and work on a solution to prevent it from happening again.
Investigate the issue thoroughly to understand the scope and impact
Identify the root cause by analyzing logs, code, and configurations
Work on a solution to fix the issue and prevent it from reoccurring
Communicate with stakeholders about the issue and the steps taken to resolve it
I would embrace the challenge of leading a team by fostering collaboration, setting clear goals, and leveraging individual strengths.
Establish clear communication channels to ensure everyone is on the same page.
Set specific, measurable goals for the team to achieve, such as completing a project by a certain deadline.
Encourage team members to share their ideas and expertise, fostering a culture of collaboration.
Provide ...
Yes, I am able to work under pressure by staying organized, prioritizing tasks, and maintaining a positive attitude.
I stay organized by creating to-do lists and setting deadlines for tasks.
I prioritize tasks based on urgency and importance to ensure critical tasks are completed first.
I maintain a positive attitude by taking short breaks, practicing deep breathing exercises, and seeking support from colleagues when need...
SOLID is a set of five principles in object-oriented programming that help make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with object...
A detailed approach to solving a moderately difficult coding problem with edge case considerations.
Understand the problem requirements and constraints clearly.
Break down the problem into smaller, manageable parts.
Consider edge cases such as empty inputs or maximum limits.
Choose an efficient algorithm based on time and space complexity.
Test the solution with various test cases to ensure robustness.
I appeared for an interview in Jan 2025.
Identify first occurrences of vowels in a string and return their indices along with count.
Loop through the string and check if each character is a vowel (a, e, i, o, u)
Store the index of the first occurrence of each vowel in a separate array
Return the array of indices and the count of indices
Calculate the difference between two integers and find how many numbers within that difference are divisible by 3.
Calculate the absolute difference between the two integers
Iterate through the range of numbers within the difference and check if each number is divisible by 3
Keep a count of numbers divisible by 3
Content negotiation in ASP .Net Web API allows clients to request data in different formats like JSON, XML, etc.
Content negotiation is the process of selecting the best representation for a given response when there are multiple representations available.
In ASP .Net Web API, content negotiation is handled by the MediaTypeFormatter class which selects the appropriate formatter based on the request headers.
Clients can sp...
Git conflicts can be resolved by merging changes, resolving conflicts manually, and using tools like Git mergetool.
Merge changes from the conflicting branches
Resolve conflicts manually by editing the conflicting files
Use Git mergetool to help resolve conflicts
Commit the resolved changes after resolving conflicts
Static constructor is used to initialize static data members of a class.
Executed only once when the class is first accessed
Cannot have any access modifiers or parameters
Used to initialize static variables or perform any necessary setup tasks
To invoke methods from two interfaces with same method names, use explicit interface implementation.
Use explicit interface implementation to differentiate between the methods from each interface.
Specify the interface name followed by the method name to invoke the desired method.
Example: InterfaceA.Method() and InterfaceB.Method() to invoke methods from InterfaceA and InterfaceB respectively.
Count the occurrence of each character in a given string.
Iterate through the string and use a hashmap to store the count of each character.
Handle both uppercase and lowercase characters separately.
Consider using ASCII values to map characters to their respective counts.
Rest is lightweight, WCF is feature-rich. Rest uses HTTP, WCF uses SOAP. Rest is platform-independent, WCF is Microsoft-centric.
Rest is lightweight and simple to use, making it ideal for web services. WCF is feature-rich and provides more advanced capabilities.
Rest uses HTTP for communication, making it easier to work with in web environments. WCF uses SOAP, which can be more complex and heavyweight.
Rest is platform-in...
Microservices communicate with each other through APIs, messaging queues, and service discovery.
APIs: Microservices can communicate with each other by exposing APIs that allow them to send and receive data.
Messaging queues: Microservices can use messaging queues like RabbitMQ or Kafka to send messages to each other asynchronously.
Service discovery: Microservices can use service discovery tools like Consul or Eureka to ...
Clustered index physically orders the data rows in the table, while non-clustered index does not.
Clustered index determines the physical order of data rows in the table.
Non-clustered index is a separate structure that contains pointers to the actual data rows.
Clustered index is faster for retrieval of data in the order of the index key.
Non-clustered index is faster for retrieval of data not in the order of the index ke...
I applied via Approached by Company and was interviewed in Dec 2024. There was 1 interview round.
Java 8 introduced static and default methods in interfaces, allowing for method implementation and code reusability.
Java 8 introduced static methods in interfaces, allowing for method implementation directly in the interface itself.
Default methods were also introduced in Java 8, enabling interfaces to have method implementations without affecting implementing classes.
Static methods in interfaces can be called using the...
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To synchronize a HashMap, you can use the synchronizedMap() m...
No, the program will not compile if the parent class throws a runtime exception while the child class throws an arithmetic exception.
In Java, if a parent class method throws a checked exception, the child class method can only throw the same exception or its subclasses.
ArithmeticException is an unchecked exception, so if the parent class throws a checked exception and the child class throws an unchecked exception, the ...
Configure JDBC in Spring Boot to specify which database to use
Define multiple DataSource beans in the configuration class
Use @Primary annotation to specify the primary DataSource
Use @Qualifier annotation to specify the secondary DataSource
Inject the DataSource beans where needed in the application
I would implement timeout mechanisms and retries to handle the scenario of one microservice awaiting a response from another microservice taking an extended time.
Implement timeout mechanisms in the calling microservice to limit the waiting time for a response.
Set up retry logic to automatically resend the request to the slow microservice if no response is received within the specified timeout period.
Use circuit breaker...
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
SOLID principles in Java focus on object-oriented design principles. Java 8 features like lambdas and streams adhere to these principles.
S - Single Responsibility Principle: Java 8 lambdas allow for defining single-purpose functions.
O - Open/Closed Principle: Java 8 streams enable extending behavior without modifying existing code.
L - Liskov Substitution Principle: Java 8 interfaces support polymorphism and substitutio...
Code to print unique elements from an array of strings
Create a HashSet to store unique elements
Iterate through the array and add elements to the HashSet
Print out the elements in the HashSet to get unique elements
Code to find the second largest element in an array
Iterate through the array and keep track of the largest and second largest elements
Initialize variables to store the largest and second largest elements
Compare each element with the largest and second largest elements and update accordingly
Hash collision occurs when two different inputs produce the same hash value. hashCode() and equals() methods are from Object class.
Hash collision can occur when two different objects have the same hash code value.
hashCode() method is used to get the hash code value of an object.
equals() method is used to compare two objects for equality.
Circuit breaker is a design pattern used to prevent cascading failures in distributed systems.
Circuit breaker monitors for failures and trips when a threshold is reached
It then redirects calls to a fallback mechanism to prevent further failures
Once the system stabilizes, the circuit breaker can be reset to allow normal operation
I appeared for an interview in Dec 2024.
I have over 10 years of experience in designing and implementing complex software systems.
Designed and implemented scalable software solutions for various clients
Led a team of developers in delivering projects on time and within budget
Worked closely with stakeholders to gather requirements and ensure customer satisfaction
I have used tools such as ANSYS, Abaqus, and SolidWorks Simulation for performing finite element analysis (FEA).
ANSYS
Abaqus
SolidWorks Simulation
Basic knowledge of strength of materials and finite element method (FEM) is essential for analyzing structural behavior and designing components.
Understanding of stress, strain, and material properties is crucial in analyzing the behavior of materials under different loading conditions.
Knowledge of FEM helps in simulating complex structures and predicting their response to various loads.
Ability to interpret FEM results...
SFD and BMD for cantilever beams of two different materials under point load P at free end
Calculate reactions at the fixed end of the beam
Determine the shear force at different points along the beam by considering the applied load and reactions
Draw the SFD by plotting the shear force values against the beam length
Calculate the bending moment at different points along the beam using the shear force values
Draw the BMD by...
Static analysis is a software testing technique used to analyze code without executing it.
Identify potential bugs and security vulnerabilities in the code
Ensure code quality and adherence to coding standards
Help in detecting performance issues and memory leaks
Examples: linting tools like ESLint, static code analyzers like SonarQube
I appeared for an interview in Dec 2024.
Implementing an explicit wait in Selenium using WebDriverWait class
Import WebDriverWait class from Selenium
Specify the maximum time to wait and the polling interval
Use ExpectedConditions to define the condition to wait for
Apply the wait to a specific element or the entire page
Implementing a Robot class in Java
Create a Robot class with attributes like name, batteryLevel, etc.
Include methods for moving, turning, and charging the robot
Use inheritance if needed for different types of robots
To locate the Xpath for the 'Today's Deal' menu item on Amazon, inspect the element using browser developer tools.
Open the Amazon website and right-click on the 'Today's Deal' menu item.
Select 'Inspect' to open the browser developer tools.
Look for the HTML code corresponding to the 'Today's Deal' menu item.
Right-click on the HTML code and choose 'Copy' > 'Copy XPath'.
The copied XPath can be used to locate the 'Today...
str1 will be stored in the string pool while str2 will be stored in the heap memory.
str1 will be stored in the string pool, which is a part of the heap memory.
str2 will create a new String object in the heap memory, separate from the string pool.
str1==str2 compares the memory addresses of the two strings, while str1.equals(str2) compares the actual contents of the strings.
str1==str2 checks if the two string variables point to the same memory location.
str1.equals(str2) compares the actual characters in the strings for equality.
Example: String str1 = "hello"; String str2 = "hello"; str1==str2 will return false, but str1.equals(str2) will return true.
401 - Unauthorized, 502 - Bad Gateway
401 status code indicates that the request requires user authentication
502 status code indicates that the server received an invalid response from an upstream server
Print first 4 and last 4 letters of a given string
Use string slicing to extract the first 4 letters: str[:4]
Use string slicing to extract the last 4 letters: str[-4:]
I appeared for an interview in Jan 2025.
HashMap is unordered, uses hashing for key-value pairs. TreeMap is ordered, uses Red-Black tree for key-value pairs.
HashMap uses hashing to store key-value pairs, allowing for O(1) retrieval time on average.
TreeMap uses Red-Black tree to store key-value pairs, maintaining order based on keys.
HashMap allows one null key and multiple null values, while TreeMap does not allow null keys.
Example: HashMap<String, Integer&...
A functional interface in Java is an interface with a single abstract method, enabling lambda expressions and method references.
A functional interface can have multiple default or static methods.
Common examples include Runnable, Callable, and Comparator.
It is annotated with @FunctionalInterface for clarity.
Lambda expressions can be used to instantiate functional interfaces.
A Singleton Class ensures a class has only one instance and provides a global point of access to it.
Singleton pattern restricts instantiation of a class to one object.
It is commonly used for logging, driver objects, caching, and thread pools.
Example in Java: Use a private constructor and a static method to get the instance.
Thread-safe implementation can be achieved using synchronized methods or double-checked locking.
Eureka Server is a service registry for microservices in a cloud environment.
Eureka Server is part of Netflix OSS and allows microservices to register themselves and discover other services.
It helps in load balancing and failover of services by keeping track of available instances.
Eureka Server uses a REST API for communication between services and the server.
Example: Microservices A, B, and C register themselves with ...
Exception handling in SpringBoot involves using @ExceptionHandler, @ControllerAdvice, and global exception handling.
Use @ExceptionHandler annotation in controller classes to handle specific exceptions.
Use @ControllerAdvice annotation to define global exception handling for all controllers.
Implement a custom exception handler class to handle exceptions globally.
Use ResponseEntity to return custom error messages and stat...
Calculate average salary of employees in each department using Java 8 Stream.
Use Java 8 Stream to group employees by department
Calculate average salary for each department using Stream's 'collect' method
Use 'Collectors.averagingDouble' to calculate average salary
Circuit Breaker is a design pattern used in software development to prevent cascading failures in distributed systems.
Circuit Breaker monitors the health of a service and stops sending requests if the service is not responding properly.
It helps in improving the resilience of the system by providing a fallback mechanism when a service is down.
Circuit Breaker can be configured with thresholds for error rates or response ...
Docker is a platform for developing, shipping, and running applications in containers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications.
Docker allows developers to package applications and dependencies into containers for easy deployment and scalability.
Kubernetes helps in automating the deployment, scaling, and management of containerized applications...
I appeared for an interview in Jan 2025.
Multi cast in Angular allows multiple subscribers to receive the same data from a single source.
Used to broadcast data to multiple subscribers
Helps in reducing duplicate API calls
Can be implemented using Subjects in RxJS
Event emitter is used in Angular to facilitate communication between components by emitting events.
Event emitter is a class in Angular that allows components to emit custom events.
It is used to facilitate communication between parent and child components.
Parent components can subscribe to these events and react accordingly.
Example: Child component emitting an event to notify the parent component about a change.
Use RxJS to handle multiple API calls efficiently in Angular.
Use RxJS operators like forkJoin, combineLatest, or mergeMap to handle multiple API calls concurrently or sequentially.
Consider using catchError operator to handle errors and retry operator to retry failed API calls.
Use switchMap operator to cancel previous API calls when making new ones to avoid memory leaks.
Utilize subjects or BehaviorSubjects to share data...
Child route is used for nested routes within a parent route, while forRoot is used for configuring routes at the root level of the application.
Child routes are defined within the parent route's configuration, allowing for nested routing structures.
forRoot is used in the AppRoutingModule to configure routes at the root level of the application.
Child routes are typically used for organizing and managing related component...
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
Create a data pipeline using Azure Data Factory to move data from ADLS to SQL Database.
1. Set up Azure Data Factory (ADF) instance in your Azure portal.
2. Create linked services for both Azure Data Lake Storage (ADLS) and SQL Database.
3. Define datasets for the source (ADLS) and destination (SQL Database).
4. Create a pipeline in ADF and add a copy activity to move data.
5. Configure the copy activity to specify source a...
Use Azure Data Factory (ADF) to filter, join, and aggregate data through data flows and pipelines.
Utilize Data Flows in ADF for data transformation tasks.
Use the Filter transformation to remove unwanted rows based on conditions.
Employ the Join transformation to combine datasets on common keys, e.g., joining patient records with treatment data.
Implement Aggregate transformation to summarize data, such as calculating ave...
Medallion architecture is a data management framework for organizing data in stages: bronze, silver, and gold.
Bronze layer: Raw data ingestion, e.g., logs, JSON files from IoT devices.
Silver layer: Cleaned and transformed data, e.g., structured tables for analytics.
Gold layer: Aggregated and curated data for business intelligence, e.g., dashboards and reports.
The medallion architecture in Databricks organizes data into layers for efficient processing and analytics.
Bronze Layer: Raw data ingestion, e.g., storing logs or sensor data.
Silver Layer: Cleaned and transformed data, e.g., aggregating daily sales.
Gold Layer: Business-ready data, e.g., curated datasets for reporting.
Some of the top questions asked at the Capgemini interview -
The duration of Capgemini interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4k interview experiences
Difficulty level
Duration
based on 46.1k reviews
Rating in categories
Consultant
58.4k
salaries
| ₹5.3 L/yr - ₹19 L/yr |
Associate Consultant
51.2k
salaries
| ₹2.9 L/yr - ₹12.2 L/yr |
Senior Consultant
49.8k
salaries
| ₹7.8 L/yr - ₹26 L/yr |
Senior Analyst
22k
salaries
| ₹1.6 L/yr - ₹9.1 L/yr |
Senior Software Engineer
21.4k
salaries
| ₹3.5 L/yr - ₹13.1 L/yr |
Wipro
Accenture
Cognizant
TCS