i
Infosys
Work with us
Filter interviews by
Identifying prime numbers involves checking divisibility by integers up to the square root of the number.
A prime number is greater than 1 and has no divisors other than 1 and itself.
To check if a number n is prime, test divisibility from 2 to √n.
For example, to check if 29 is prime: test 2, 3, 4, 5 (all ≤ √29). None divide 29, so it's prime.
For composite numbers, like 30, it can be divided by 2, 3, 5, etc., confir...
DevOps is a collaborative process that integrates software development and IT operations for faster delivery and improved quality.
Continuous Integration (CI): Automating code integration and testing, e.g., using Jenkins or GitHub Actions.
Continuous Delivery (CD): Ensuring code is always in a deployable state, e.g., using Docker for containerization.
Infrastructure as Code (IaC): Managing infrastructure through code...
I have worked on various projects, including web applications, mobile apps, and data analysis tools, showcasing my diverse skill set.
Developed a full-stack web application using React and Node.js for a local business, improving their online presence.
Created a mobile app for tracking fitness goals, which gained 1,000+ downloads on the App Store.
Implemented a data analysis tool using Python and Pandas to help a non-...
HashMap in Java is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to find the index in the array where it will be stored.
If multiple keys hash to the same index (collision), a linked list is used to store all key-value pairs at that ...
Extension methods are a way to add new methods to existing types without modifying the original type.
Extension methods allow you to add new methods to existing classes or interfaces.
They are defined as static methods in a static class.
They are called as if they were instance methods of the existing type.
Extension methods can be used to extend functionality of third-party or system types.
Example: Adding a method to...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Eliminates data redundancy by structuring data into tables.
Ensures data dependencies make sense, reducing the chance of anomalies.
First Normal Form (1NF): Ensures each column contains atomic values. Example: A table of students should not have multiple phone numbers in one column.
Second Normal Form (2NF): ...
Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics
Authorization determines the permissions and access levels a user has within a system
Examples include logging in with a username and password (authentication) and being able to view/edit specific files ...
Boxing is the process of converting a value type to a reference type, while unboxing is the process of converting a reference type to a value type.
Boxing is implicit, while unboxing is explicit.
Boxing involves wrapping a value type in an object, while unboxing involves extracting the value type from the object.
Boxing can lead to performance overhead due to memory allocation, while unboxing can lead to runtime erro...
Access modifiers in .NET are keywords used to specify the accessibility of classes, methods, and other members.
Access modifiers include public, private, protected, internal, protected internal, and private protected.
Public - accessible from any other code in the same assembly or another assembly.
Private - accessible only within the containing type.
Protected - accessible within the containing type and by derived ty...
A panagram is a sentence containing every letter of the alphabet at least once.
Create a function that takes a string as input
Convert the input string to lowercase for case-insensitivity
Iterate through each letter of the alphabet and check if it exists in the input string
It was good . 3 question
It was hard, 5 questions
It was good I gave my best
Difficult it much to learn
Functions are reusable blocks of code that perform specific tasks and can take inputs and return outputs.
Functions encapsulate code for reuse, e.g., 'def add(a, b): return a + b'.
They can take parameters, e.g., 'def greet(name): print('Hello, ' + name)'.
Functions can return values, e.g., 'def square(x): return x * x'.
They help in organizing code, making it more readable and maintainable.
Functions can be higher-order, m...
I have experience working on various projects and following best practices in software development.
I have worked on developing web applications using Agile methodology.
I have followed version control using Git for tracking changes in code.
I have implemented unit testing using JUnit for ensuring code quality.
I have used code reviews to improve code readability and maintainability.
I have documented code and project requi...
A panagram is a sentence containing every letter of the alphabet at least once.
Create a function that takes a string as input
Convert the input string to lowercase for case-insensitivity
Iterate through each letter of the alphabet and check if it exists in the input string
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
A record in C# is a data structure that contains a fixed number of fields of different data types.
Records are similar to classes but are immutable by default
They are used to group related data together
Records are value types and are compared by value rather than by reference
I appeared for an interview in May 2025, where I was asked the following questions.
REST APIs are architectural styles for designing networked applications using HTTP requests to access and manipulate data.
REST stands for Representational State Transfer.
Uses standard HTTP methods: GET, POST, PUT, DELETE.
Stateless communication; each request from client to server must contain all information.
Resources are identified by URIs (Uniform Resource Identifiers). Example: /users/123.
Commonly used in web servic...
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There was 1 interview round.
I applied via Campus Placement and was interviewed in Oct 2024. There were 2 interview rounds.
59 aptitude questions
Boxing is the process of converting a value type to a reference type, while unboxing is the process of converting a reference type to a value type.
Boxing is implicit, while unboxing is explicit.
Boxing involves wrapping a value type in an object, while unboxing involves extracting the value type from the object.
Boxing can lead to performance overhead due to memory allocation, while unboxing can lead to runtime errors if...
What people are saying about Infosys
Some of the top questions asked at the Infosys Software Engineer interview -
The duration of Infosys Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 137 interview experiences
Difficulty level
Duration
based on 459 reviews
Rating in categories
Technology Analyst
55.8k
salaries
| ₹3 L/yr - ₹11.7 L/yr |
Senior Systems Engineer
53.6k
salaries
| ₹2.5 L/yr - ₹8.1 L/yr |
Technical Lead
35k
salaries
| ₹7.3 L/yr - ₹20 L/yr |
System Engineer
32.4k
salaries
| ₹2.4 L/yr - ₹5.3 L/yr |
Senior Associate Consultant
30.9k
salaries
| ₹6.3 L/yr - ₹15 L/yr |
TCS
Wipro
Cognizant
Accenture