i
Cognizant
Filter interviews by
Yes, I am familiar with various Google products that enhance productivity and communication.
Google Search: The world's most popular search engine for finding information online.
Gmail: A widely used email service that offers features like spam filtering and organization.
Google Drive: A cloud storage service that allows users to store and share files securely.
Google Docs: A collaborative word processing tool that en...
Exceptions are events that disrupt the normal flow of a program's execution, categorized into checked and unchecked types.
Checked Exceptions: Must be handled or declared, e.g., IOException.
Unchecked Exceptions: Runtime issues, e.g., NullPointerException.
Errors: Serious problems, e.g., OutOfMemoryError.
Custom Exceptions: User-defined exceptions for specific scenarios.
A hashmap is a data structure that stores key-value pairs for efficient data retrieval using a hash function.
Hashmaps provide average O(1) time complexity for insertions, deletions, and lookups.
They use a hash function to compute an index into an array of buckets or slots.
Example: In Java, HashMap allows null values and one null key.
Collisions are handled using techniques like chaining or open addressing.
This program generates the Fibonacci series using a collection data structure in Java.
Use an ArrayList to store Fibonacci numbers.
Initialize the first two Fibonacci numbers: 0 and 1.
Iterate to generate the next Fibonacci number by summing the last two.
Add each new number to the ArrayList.
Print the Fibonacci series from the ArrayList.
What people are saying about Cognizant
General Liability is insurance that protects businesses from claims of bodily injury, property damage, and personal injury.
Covers legal costs and settlements for lawsuits against a business.
Includes protection against slip-and-fall accidents on business premises.
Covers damage caused by business operations, such as a contractor damaging a client's property.
Protects against claims of advertising injury, like copyrig...
My favorite programming language is Python due to its simplicity, versatility, and extensive libraries for various applications.
Easy to learn and read, making it great for beginners.
Versatile for web development, data analysis, machine learning, and automation.
Rich ecosystem with libraries like NumPy for numerical computing and Django for web applications.
Strong community support and extensive documentation availa...
Malware is malicious software designed to harm, exploit, or otherwise compromise computer systems and networks.
Types of Malware: Includes viruses, worms, trojans, ransomware, spyware, and adware, each with distinct methods of attack.
Viruses: Malicious code that attaches itself to clean files and spreads throughout a computer system, often corrupting data.
Ransomware: A type of malware that encrypts files and demand...
SIEM stands for Security Information and Event Management, crucial for real-time analysis of security alerts generated by applications and network hardware.
Centralized Logging: SIEM collects and aggregates log data from various sources, such as firewalls, servers, and applications, for comprehensive analysis.
Real-Time Monitoring: SIEM systems provide real-time monitoring and alerting for suspicious activities, hel...
Ransomware is a type of malicious software that encrypts files, demanding payment for their release.
File Encryption: Ransomware encrypts files on the victim's system, making them inaccessible until a ransom is paid.
Ransom Demand: Victims typically receive a message demanding payment, often in cryptocurrency, to decrypt their files.
Delivery Methods: Ransomware can spread through phishing emails, malicious downloads...
Internal threats in cybersecurity arise from within an organization, often involving employees or trusted individuals compromising security.
Malicious Insiders: Employees who intentionally steal data or sabotage systems, such as a disgruntled employee leaking sensitive information.
Negligent Insiders: Employees who inadvertently cause security breaches through careless actions, like falling for phishing scams or mis...
I appeared for an interview in Jan 2025.
It was easy, bacis aptitude questions asked in this round
I enjoy hiking, reading, and playing guitar. My hometown is a small coastal town known for its beautiful beaches and seafood.
Hobbies include hiking, reading, and playing guitar
Hometown is a small coastal town
Known for beautiful beaches and seafood
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Absolute Xpath starts from the root element, while relative Xpath starts from any node in the DOM structure.
Absolute Xpath starts with a single forward slash (/) and starts selection from the root node.
Relative Xpath starts with a double forward slash (//) and starts selection from the current node or any node in the DOM structure.
Absolute Xpath is more brittle and prone to breaking if the structure of the page changes...
The return would be the number of tabs open in the browser.
The return value would be an integer representing the count of open tabs.
For example, if there are 5 tabs open, the return value would be 5.
Types of waits in Selenium include Implicit Wait, Explicit Wait, and Fluent Wait.
Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.
Fluent Wait: Waits for a condition to be true with a defined polling frequency.
Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);
Exceptions in Selenium are errors that occur during test execution, disrupting the flow of the test script.
Exceptions are thrown when there is an unexpected behavior in the application under test or in the test script itself.
Common exceptions in Selenium include NoSuchElementException, ElementNotVisibleException, TimeoutException, and StaleElementReferenceException.
Handling exceptions in Selenium can be done using try-...
Feature files contain high-level description of the functionality to be tested, while step definitions are the implementation of the steps in the feature file using code.
Feature files are written in Gherkin syntax and describe the behavior of the application in plain text.
Step definitions are written in programming languages like Java, Ruby, etc., and map the steps in the feature file to automation code.
Feature files a...
Data can be input in Cucumber using feature files and step definitions.
Data can be input in feature files using scenarios and scenario outlines
Step definitions can be used to define the actions to be taken with the input data
Data tables can be used in feature files to input structured data
Examples keyword can be used in scenario outlines to provide multiple sets of input data
Test case is a set of conditions or variables under which a tester will determine whether a system under test satisfies requirements. Test plan is a document outlining the scope, approach, resources, and schedule of testing activities. Test scenarios are detailed descriptions of possible interactions with the system.
Test case: specific conditions to be tested, expected results, steps to execute
Test plan: overall strate...
Hooks in Java are methods that allow subclasses to override or extend the behavior of a superclass.
Hooks are commonly used in frameworks like JUnit and TestNG for test automation.
They are often used for setup and teardown operations before and after test methods.
Examples include @Before, @After, @BeforeClass, and @AfterClass annotations in JUnit.
I appeared for an interview before Jul 2024, where I was asked the following questions.
I am a detail-oriented Process Executive with strong analytical skills and experience in process improvement.
Experienced in analyzing and optimizing business processes
Proficient in data analysis and reporting
Skilled in project management and problem-solving
Strong communication and teamwork abilities
I appeared for an interview in Jun 2025, where I was asked the following questions.
I applied via Campus Placement and was interviewed in Nov 2024. There was 1 interview round.
I appeared for an interview in Jan 2025.
It was conducted in Superset.
Yes, I am open to relocating for the right opportunity.
I am willing to relocate for a position that aligns with my career goals and offers growth opportunities.
I have relocated in the past for job opportunities and have found it to be a positive experience.
I understand that relocating may be necessary for certain roles and am prepared to make that commitment.
I appeared for an interview in May 2025, where I was asked the following questions.
Key OOP concepts, ASP.NET Core MVC middleware, SQL Server features, and CTE explained with examples.
OOP Concepts: Encapsulation, Inheritance, Polymorphism, Abstraction.
Example of Encapsulation: Using properties in a class to restrict access.
ASP.NET Core Middleware: Components that handle requests and responses.
Example of Middleware: Authentication middleware that checks user credentials.
SOLID Principles: Five design pr...
I appeared for an interview in May 2025, where I was asked the following questions.
I appeared for an interview before Jul 2024, where I was asked the following questions.
Exceptions are events that disrupt the normal flow of a program's execution, categorized into checked and unchecked types.
Checked Exceptions: Must be handled or declared, e.g., IOException.
Unchecked Exceptions: Runtime issues, e.g., NullPointerException.
Errors: Serious problems, e.g., OutOfMemoryError.
Custom Exceptions: User-defined exceptions for specific scenarios.
A hashmap is a data structure that stores key-value pairs for efficient data retrieval using a hash function.
Hashmaps provide average O(1) time complexity for insertions, deletions, and lookups.
They use a hash function to compute an index into an array of buckets or slots.
Example: In Java, HashMap allows null values and one null key.
Collisions are handled using techniques like chaining or open addressing.
Multithreading allows concurrent execution of multiple threads within a single process, enhancing performance and resource utilization.
1. Definition: Multithreading is a programming technique that enables multiple threads to run concurrently within a single process.
2. Benefits: It improves application performance, responsiveness, and resource sharing.
3. Methods to achieve multithreading: Using threads in programming la...
This program generates the Fibonacci series using a collection data structure in Java.
Use an ArrayList to store Fibonacci numbers.
Initialize the first two Fibonacci numbers: 0 and 1.
Iterate to generate the next Fibonacci number by summing the last two.
Add each new number to the ArrayList.
Print the Fibonacci series from the ArrayList.
Some of the top questions asked at the Cognizant interview for freshers -
The duration of Cognizant interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 421 interview experiences
Difficulty level
Duration
based on 55.4k reviews
Rating in categories
Associate
71.2k
salaries
| ₹5.4 L/yr - ₹12.5 L/yr |
Programmer Analyst
56.1k
salaries
| ₹3.5 L/yr - ₹7.3 L/yr |
Senior Associate
55.6k
salaries
| ₹10.3 L/yr - ₹23.6 L/yr |
Senior Processing Executive
30k
salaries
| ₹2.2 L/yr - ₹6.5 L/yr |
Technical Lead
18.5k
salaries
| ₹6 L/yr - ₹21.1 L/yr |
TCS
Infosys
Wipro
Accenture