i
HCLTech
Filter interviews by
I ensure projects stay within budget through careful planning, monitoring, and proactive communication with stakeholders.
Conduct thorough budget planning at the project's outset, including all potential costs and contingencies.
Implement regular budget reviews to track spending against the budget, adjusting forecasts as necessary.
Utilize project management tools to monitor expenses in real-time, allowing for quick ...
Organizations face challenges like data quality, resource allocation, and adapting to market changes, impacting decision-making.
Data Quality: Inaccurate or incomplete data can lead to poor analysis. For example, missing patient records can affect healthcare outcomes.
Resource Allocation: Limited budget and personnel can hinder data projects. For instance, a small team may struggle to analyze large datasets.
Market A...
A palindrome number reads the same forwards and backwards, like 121 or 12321.
A number is a palindrome if reversing its digits results in the same number.
Example: 121 is a palindrome because reversing it gives 121.
Example: 123 is not a palindrome because reversing it gives 321.
To check if a number is a palindrome, convert it to a string and compare it with its reverse.
A market research report outlines key findings, insights, and recommendations based on data analysis.
1. Executive Summary: A brief overview of the report's key findings and recommendations.
2. Introduction: Background information on the research objectives and scope.
3. Methodology: Description of research methods used, such as surveys or focus groups.
4. Market Overview: Analysis of the current market landscape, inc...
What people are saying about HCLTech
I aim to leverage data-driven insights to enhance decision-making and drive strategic initiatives for sustainable growth.
Implement advanced analytics to identify market trends, improving product offerings.
Foster cross-departmental collaboration to streamline processes, as seen in my previous role where I reduced project timelines by 20%.
Utilize stakeholder feedback to refine business strategies, ensuring alignment...
My father is a dedicated civil engineer, specializing in infrastructure projects that enhance community living standards.
He has worked on several major highway construction projects, improving transportation efficiency.
He often collaborates with local governments to design sustainable urban spaces.
His recent project involved the renovation of a historic bridge, balancing modern needs with preservation.
Nexus switches are designed for data centers, while Catalyst switches are for enterprise networks, each serving different needs.
Nexus switches support advanced features like Virtual Port Channels (vPC) and FabricPath for data center environments.
Catalyst switches are optimized for Layer 2 and Layer 3 switching in enterprise networks, focusing on access and distribution layers.
Nexus switches typically use a more mo...
VXLAN is a network virtualization technology that encapsulates Layer 2 Ethernet frames in Layer 4 UDP packets for scalability.
VXLAN stands for Virtual Extensible LAN, enabling the creation of virtual networks over existing physical infrastructure.
It uses a 24-bit segment ID (VXLAN Network Identifier) to support up to 16 million logical networks.
VXLAN encapsulates Ethernet frames in UDP packets, allowing Layer 2 co...
BGP backdoor allows for alternative routing paths in BGP, enhancing control over traffic flow and redundancy.
BGP backdoor is used to prefer a specific route over others, even if it has a higher AS path.
It can be configured to allow internal routes to take precedence over external routes.
Example: If a company has a private link to a branch office, it can use BGP backdoor to ensure traffic uses this link.
This featur...
This question tests basic programming skills through simple coding tasks.
Understand the problem statement clearly.
Break down the problem into smaller parts.
Write pseudocode before actual coding.
Test your code with different inputs.
I applied via Walk-in and was interviewed in Feb 2022. There was 1 interview round.
Classic folders are traditional file storage structures, while modern folders are enhanced with additional features and capabilities.
Classic folders follow a hierarchical structure, with subfolders and files organized in a tree-like format.
Modern folders often include metadata, tags, and other attributes to enhance search and organization.
Classic folders rely on manual organization and navigation, while modern folders ...
Named user license is assigned to a specific individual while concurrent user license is shared among multiple users.
Named user license is assigned to a specific individual and cannot be shared with others.
Concurrent user license is shared among multiple users and can be used by any user at any time, as long as the maximum number of users is not exceeded.
Named user license is typically more expensive than concurrent us...
Orchestrator can be installed on-premises or in the cloud using the UiPath Platform Installer.
Download and run the UiPath Platform Installer
Select the Orchestrator option
Choose the installation type (on-premises or cloud)
Follow the installation wizard prompts
Configure Orchestrator settings after installation
Lambda function syntax for filtering data in an array of strings.
Use the filter() method with a lambda function as the argument.
The lambda function should return a boolean value based on the condition to filter.
Syntax: array.filter(lambda_function)
Example: ['apple', 'banana', 'cherry'].filter(lambda x: 'a' in x)
Action Centre is a feature in Windows 10 that provides quick access to common settings and notifications.
It can be accessed by clicking on the notification icon in the taskbar.
It allows users to view and manage notifications from various apps.
Users can also access quick settings such as Wi-Fi, Bluetooth, and airplane mode.
It can be customized to show or hide specific quick actions.
Yes, I have worked on document understanding.
I have experience with natural language processing (NLP) techniques to extract information from unstructured documents.
I have worked on developing algorithms to classify and extract data from documents such as invoices, receipts, and contracts.
I have also used machine learning models to improve the accuracy of document understanding.
One example of a project I worked on invol...
Handwritten receipts can be handled from RPA using OCR technology.
OCR technology can be used to extract text from handwritten receipts.
The extracted text can be processed and entered into a database or accounting software.
Machine learning algorithms can be used to improve the accuracy of OCR technology.
Human validation may be required to ensure accuracy.
OCR technology can also be used to extract data from other types o...
APIs in UiPath allow for integration with external systems and services.
APIs can be used to retrieve data from external sources, such as databases or web services.
APIs can also be used to send data to external systems, such as updating a CRM or sending an email.
UiPath provides activities for working with REST and SOAP APIs.
API keys and authentication may be required for accessing certain APIs.
Deserializing JSON means converting JSON data into a usable object in a programming language.
Deserialization is the opposite of serialization.
It involves parsing JSON data and mapping it to a class or object in a programming language.
Deserialization is commonly used in web applications to receive and process JSON data from APIs.
Examples of programming languages that support JSON deserialization include Java, Python, an...
Best practices for RPA projects include proper planning, testing, and documentation.
Identify and prioritize processes for automation
Ensure proper security measures are in place
Conduct thorough testing and validation
Document processes and maintain version control
Provide proper training and support for end-users
Various statuses can be available in a queue depending on the system.
Pending
In Progress
On Hold
Completed
Cancelled
I appeared for an interview in May 2025, where I was asked the following questions.
malloc allocates memory without initialization; calloc allocates and initializes memory to zero.
malloc(size_t size): Allocates 'size' bytes of memory. Example: int *arr = (int *)malloc(10 * sizeof(int));
calloc(size_t num, size_t size): Allocates memory for an array of 'num' elements, each 'size' bytes, initialized to zero. Example: int *arr = (int *)calloc(10, sizeof(int));
malloc does not initialize memory, leading to ...
Both 'const char* p' and 'char const* p' are equivalent, indicating a pointer to a constant character string.
const char* p: Pointer to a constant character. The character data cannot be modified through this pointer.
char const* p: Same as above; the const qualifier applies to the character data, not the pointer itself.
Example: const char* str1 = 'Hello'; char const* str2 = 'World'; Both point to string literals that ca...
A function in C is a block of code that performs a specific task and can be reused throughout a program.
Functions help in code modularity and reusability.
Syntax: returnType functionName(parameters) { /* code */ }
Example: int add(int a, int b) { return a + b; }
Functions can return values or be void (no return).
Example of void function: void printHello() { printf('Hello'); }
C has several data types, including basic types, derived types, and user-defined types, each serving different purposes.
1. Basic Data Types: Include int, char, float, and double. Example: int age = 30;
2. Derived Data Types: Arrays, pointers, structures, and unions. Example: int arr[5];
3. User-Defined Data Types: Enums and typedefs. Example: enum Color {RED, GREEN, BLUE};
4. Size and Range: Each data type has a specific ...
A dangling pointer is a pointer that does not point to a valid object or memory location, often due to deallocation.
Occurs when an object is deleted or goes out of scope, but the pointer still references it.
Example: If you delete an object and still try to access it through a pointer, it becomes dangling.
Can lead to undefined behavior, crashes, or data corruption if dereferenced.
Common in languages like C and C++ where...
I appeared for an interview in Jan 2025.
A sequence was provided: 4181, 2684, 1597, 987, 610.
first 2 are given and write code for other value calculation using java 8
The second question required writing a reverse of a palindrome using both Java 8 streams. I was able to successfully write both and clear the first round.
Java 17 introduces sealed classes to restrict inheritance and improve code maintainability.
Sealed classes are declared using the 'sealed' keyword followed by the permitted subclasses.
Subclasses of a sealed class must be either final or sealed themselves.
Errors may occur when trying to extend a sealed class with a non-permitted subclass.
Implementation of 'notify me if item is back in stock' feature in an ecommerce application
Create a database table to store user notifications for out-of-stock items
Implement a service to check item availability and send notifications to subscribed users
Provide a user interface for users to subscribe to notifications for specific items
Utilize Java concurrency features to optimize Excel operations for faster response times.
Use Java's ExecutorService to manage a pool of threads for concurrent processing.
Implement parallel streams to process large datasets in Excel efficiently.
Utilize Apache POI for reading/writing Excel files in a multi-threaded manner.
Consider using CompletableFuture for asynchronous operations on Excel data.
Batch operations to minim...
I appeared for an interview in Jul 2025, where I was asked the following questions.
To analyze customer churn, I would identify patterns, segment customers, and use predictive modeling to understand and mitigate churn.
1. Data Collection: Gather data on customer demographics, purchase history, and engagement metrics.
2. Identify Churn Indicators: Analyze historical data to find common traits among customers who have churned.
3. Segmentation: Segment customers based on behavior, demographics, and engageme...
Handling missing and inconsistent data involves identifying, cleaning, and validating data to ensure accuracy and reliability.
Identify missing data: Use methods like 'isnull()' in Python to find missing values in datasets.
Impute missing values: Replace missing data with mean, median, or mode, e.g., using pandas' 'fillna()' function.
Remove duplicates: Use 'drop_duplicates()' to eliminate repeated entries that can skew a...
Personal growth ●Self awareness ●Reading industry journals and publications Skills development ●job shadowing ●stretch assignments ●volunteering for leadership roles
Deploying a machine learning model involves several steps to ensure it operates effectively in a production environment.
1. Model Training: Train the model using historical data and validate its performance with metrics like accuracy or F1 score.
2. Model Serialization: Save the trained model using formats like Pickle or Joblib in Python for easy loading in production.
3. API Development: Create a RESTful API using framew...
Organizations face challenges like data quality, resource allocation, and adapting to market changes, impacting decision-making.
Data Quality: Inaccurate or incomplete data can lead to poor analysis. For example, missing patient records can affect healthcare outcomes.
Resource Allocation: Limited budget and personnel can hinder data projects. For instance, a small team may struggle to analyze large datasets.
Market Adapta...
I appeared for an interview in Jan 2025.
Experienced Accounts Payable Executive with a strong background in financial management and process improvement.
Over 8 years of experience in accounts payable management
Skilled in streamlining processes to improve efficiency and accuracy
Proficient in financial analysis and reporting
Strong attention to detail and ability to meet deadlines
Excellent communication and interpersonal skills
I process invoices by verifying accuracy, coding, obtaining approvals, and entering into the system. I address queries related to payment status, discrepancies, and vendor information through email.
Verify accuracy of invoices
Code invoices based on expense categories
Obtain necessary approvals before processing
Enter invoices into the accounting system
Address queries related to payment status
Resolve discrepancies in invoi...
Experienced Accounts Payable Executive with a strong background in financial management and process improvement.
Over 8 years of experience in accounts payable management
Skilled in streamlining processes to improve efficiency and accuracy
Proficient in financial analysis and reporting
Strong attention to detail and ability to meet deadlines
Managed a team of AP specialists to ensure timely payments and vendor relationships
When invoicing in a different currency, I take actions such as converting the amount to the company's base currency, checking for exchange rate fluctuations, and ensuring accuracy in the conversion process.
Convert the amount on the invoice to the company's base currency using the current exchange rate
Check for exchange rate fluctuations to ensure accuracy in the conversion process
Communicate with vendors or suppliers t...
I applied via Campus Placement and was interviewed in Dec 2024. There were 5 interview rounds.
The assessment focused on general aptitude, which was relatively easy and manageable to pass. However, the pseudo-code section may pose a greater challenge during the first round.
It is very easy; you just need to speak at least once to easily pass through this round. mostly they dont try to reject you unless you are very nervous and very low about confidence they want you to speak atleast once , even the point is valid or not.
You will undergo a written test comprising three coding sections (either in Python or C) containing five or six questions each, along with ten multiple-choice questions on software testing, which are relatively easy. However, the most challenging section is networking, for which you will need to write theory responses; therefore, it is important to prepare thoroughly for that part.
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows for authentication and authorization of users
Enables administrators to assign policies, deploy software, and apply updates
Example: Creating user accounts, managing group policies
Active Directory Users and Computers is a Microsoft Management Console snap-in that allows administrators to manage users, groups, computers, and organizational units in a Windows domain environment.
Allows administrators to create, delete, and manage user accounts
Enables administrators to create and manage security groups
Provides the ability to manage computer accounts and organizational units
Allows for delegation of a...
Creating users and groups in Active Directory involves using tools like Active Directory Users and Computers.
Open Active Directory Users and Computers tool
Navigate to the appropriate organizational unit (OU)
Right-click on the OU and select 'New' -> 'User' or 'Group'
Fill in the required user or group information such as name, username, password, etc.
Click 'OK' to create the user or group
Enabling and disabling users in Active Directory involves using the Active Directory Users and Computers tool.
Open Active Directory Users and Computers tool
Locate the user account to enable/disable
Right-click on the user account and select 'Enable Account' or 'Disable Account'
Click 'Apply' to save the changes
A Distribution List in Exchange Server is a group of email recipients that can be addressed as a single recipient.
Used to send emails to multiple recipients at once
Can be created and managed by users or administrators
Can include both internal and external email addresses
Can be used for sending newsletters, announcements, etc.
A shared mailbox in Exchange Server is a mailbox that multiple users can access to send and receive emails.
Allows multiple users to access the same mailbox
Users can send and receive emails on behalf of the shared mailbox
Useful for departments or teams to manage a common email address
Can be set up with permissions to control access levels
Group Policy in Active Directory is applied through a hierarchical process based on site, domain, and organizational unit levels.
Group Policy objects (GPOs) are created and linked to sites, domains, or organizational units in Active Directory.
The order of precedence for applying Group Policy is Local, Site, Domain, and Organizational Unit.
Group Policy settings are inherited from parent containers to child containers un...
GPOs are applied in the following order: Local, Site, Domain, OU. The last applied GPO takes precedence.
Local GPOs are applied first
Site GPOs are applied next
Domain GPOs are applied after Site GPOs
OU GPOs are applied last and take precedence over others
The last applied GPO takes precedence in case of conflicting settings
WMI in GPO allows administrators to manage Windows settings and resources through a centralized interface.
WMI is a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification.
In GPO, WMI filters can be used to apply policies based on specific conditions, such as hardware or software configurations.
Administrators can...
Distribution list is used for sending emails to a group of people, while a shared mailbox is used for multiple users to access and send emails from a single email address.
Distribution list is a group email address that sends emails to multiple recipients.
Shared mailbox is an email address that multiple users can access and send emails from.
Distribution list is mainly used for broadcasting emails to a group of people.
Sh...
E1, E3, and E5 plans in Microsoft Office 365 differ in features and pricing.
E1 plan includes basic Office applications and online services.
E3 plan includes advanced Office applications, email hosting, and online services.
E5 plan includes all features of E3 plus advanced security and compliance tools.
E5 plan is the most expensive among the three plans.
Cloud storage is stored on remote servers accessed over the internet, while on-premises storage is stored locally within an organization's physical location.
Cloud storage is accessed over the internet, providing flexibility and scalability.
On-premises storage is physically located within an organization's premises, providing more control over data security.
Cloud storage is typically managed by a third-party provider, w...
An administrative role can be assigned to a user in Active Directory by using the Active Directory Users and Computers tool.
Open Active Directory Users and Computers tool
Locate the user to whom you want to assign the administrative role
Right-click on the user and select Properties
Go to the Member Of tab
Click Add and enter the name of the administrative group
Click OK to save the changes
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows for authentication and authorization of users
Enables single sign-on for users across multiple applications
Supports group policies for managing security and access control
ADDS is a service provided by Microsoft Windows Server for managing users, computers, and resources in a network.
ADDS is a directory service used to store information about network resources such as users, groups, and computers.
It allows administrators to manage and secure resources within a network.
ADDS uses a hierarchical structure with domains, trees, and forests to organize network resources.
It provides features li...
A database schema is a blueprint that defines the structure of a database, including tables, fields, relationships, and constraints.
Defines the organization of data into tables and columns
Specifies relationships between tables
Includes constraints to enforce data integrity
Can be represented visually using diagrams
Example: In a library database schema, there may be tables for books, authors, and borrowers with relationsh...
The object management system in Active Directory is used to organize and manage objects such as users, groups, and computers within the directory.
Allows for centralized management of objects within the directory
Enables administrators to create, modify, and delete objects
Helps in organizing objects into logical containers for easier management
Facilitates delegation of administrative tasks to specific users or groups
Supp...
I applied for this job by submitting an online application through the company's career portal.
Visited company's website and navigated to the careers section
Filled out the online application form with my personal and professional details
Uploaded my resume and cover letter as required documents
Received confirmation email after submitting the application
In my last job, I was responsible for managing a team of specialists, overseeing project timelines, and ensuring quality control.
Managed a team of specialists to ensure project completion
Oversaw project timelines and deadlines
Ensured quality control measures were implemented and followed
Collaborated with other departments to meet project goals
Yes, I am comfortable working in a rotational shift.
I have previous experience working in rotational shifts and have adapted well to the schedule.
I understand the importance of flexibility in the workplace and am willing to adjust my schedule as needed.
I am able to maintain a healthy work-life balance even with a rotational shift.
I am aware of the potential challenges of working in different shifts and have strategies ...
I appeared for an interview in Jul 2025, where I was asked the following questions.
I ensure projects stay within budget through careful planning, monitoring, and proactive communication with stakeholders.
Conduct thorough budget planning at the project's outset, including all potential costs and contingencies.
Implement regular budget reviews to track spending against the budget, adjusting forecasts as necessary.
Utilize project management tools to monitor expenses in real-time, allowing for quick ident...
I motivated my team during a challenging project by fostering collaboration and recognizing individual contributions.
Set clear goals: We established specific targets for the project to give everyone a sense of direction.
Encouraged open communication: I held regular check-ins to discuss progress and address any concerns.
Recognized achievements: I celebrated both team and individual milestones to boost morale.
Provided su...
I am drawn to HCLTech for its innovation, values, and the opportunity to lead impactful projects in a dynamic environment.
HCLTech is a global leader in technology services and consulting, known for its commitment to innovation and customer-centric solutions.
The company emphasizes a culture of collaboration and continuous learning, which aligns with my values as a supervisor.
I admire HCLTech's focus on sustainability an...
I have led multiple real-time projects, enhancing team efficiency and delivering quality results through effective supervision.
Managed a team of 10 in a software development project, improving delivery time by 20%.
Implemented Agile methodologies, resulting in a 30% increase in team productivity.
Conducted regular training sessions, enhancing team skills and reducing onboarding time for new members.
Collaborated with cros...
I appeared for an interview in Dec 2024.
20 - MCQ test related C&C++ basic to advance
2 - coding questions -
1) create class which allows only one instance creation at a time if you try to create another before deleting existing object then class should throw exception..
2) find the distance between leftmost string and rightmost string(string's chars order doesn't matter) In a given long shuffled string.
Ex :-
Shuffled string = "xaxxcxbxxxcxxaxxbx"
target string= "abc"
Ans: 3
(Leftmost string is last index 6
Right most is 9 so 9-6=3)
Note:- other chars not necessarily 'x' it can be any
OOP is a programming paradigm based on the concept of objects, which can contain data and code to manipulate that data.
OOP focuses on creating objects that interact with each other to solve complex problems.
Encapsulation: Objects encapsulate data and behavior within a single unit.
Inheritance: Objects can inherit attributes and methods from other objects.
Polymorphism: Objects can take on different forms or have multiple...
Runtime polymorphism allows objects of different classes to be treated as objects of a common superclass.
Use virtual functions in base class and override them in derived classes
Use pointers or references of base class to call derived class methods
Example: Animal class with virtual function 'makeSound', Dog and Cat classes overriding 'makeSound'
Vtable and Vptr are mechanisms in C++ for supporting dynamic polymorphism through virtual functions.
Vtable (Virtual Table) is a static table created by the compiler for each class with virtual functions.
Vptr (Virtual Pointer) is a pointer in each object instance that points to the Vtable of its class.
When a virtual function is called, the Vptr is used to look up the correct function in the Vtable.
Example: If class A ha...
STL libraries provide efficient and easy-to-use container classes like Vector for storing and manipulating data.
STL Vector is a dynamic array that can resize itself automatically.
It provides random access to elements, similar to arrays.
Vector supports various operations like push_back, pop_back, insert, erase, etc.
Example: std::vector<int> numbers = {1, 2, 3, 4, 5};
Singleton class ensures only one instance of a class is created and provides a global point of access to it.
Ensures only one instance of a class is created
Provides a global point of access to the instance
Useful for managing global resources or settings
Mutex is used in multithreading to prevent multiple threads from accessing shared resources simultaneously.
Mutex stands for mutual exclusion and is used to synchronize access to shared resources in multithreaded programs.
It allows only one thread to access the shared resource at a time, preventing data corruption or race conditions.
Mutexes are typically used in critical sections of code where data integrity is importan...
Some of the top questions asked at the HCLTech interview -
The duration of HCLTech interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 3.6k interview experiences
Difficulty level
Duration
based on 40.7k reviews
Rating in categories
Software Engineer
25.3k
salaries
| ₹2.7 L/yr - ₹8.1 L/yr |
Technical Lead
23.4k
salaries
| ₹10.8 L/yr - ₹23 L/yr |
Senior Software Engineer
17.1k
salaries
| ₹6.2 L/yr - ₹15.6 L/yr |
Lead Engineer
16.7k
salaries
| ₹5.8 L/yr - ₹12.5 L/yr |
Analyst
16.2k
salaries
| ₹2.3 L/yr - ₹6.6 L/yr |
TCS
Wipro
Accenture
Cognizant