i
Infosys
Work with us
Filter interviews by
A switch is a networking device that connects devices within a local area network (LAN) and forwards data packets between them.
Switches operate at the data link layer of the OSI model.
They use MAC addresses to forward data to the correct destination.
Switches increase network performance by reducing collisions and segmenting traffic.
Examples of switches include Cisco Catalyst series, Netgear ProSAFE series, and TP-...
Angular performance improvements involve optimizing code, reducing load times, and minimizing rendering cycles.
Use lazy loading to only load components when needed
Optimize change detection by using OnPush strategy
Minimize DOM manipulation by using ngZone
Implement server-side rendering for faster initial page load
Use AOT (Ahead-of-Time) compilation to reduce bundle size
Boxing is the process of converting a value type to a reference type, while unboxing is the process of converting a reference type to a value type.
Boxing is implicit, while unboxing is explicit.
Boxing involves converting a value type to an object type, while unboxing involves extracting the value type from the object type.
Boxing creates a new reference type object on the heap, while unboxing retrieves the original...
Analytic functions in SQL are used to perform calculations across a set of rows related to the current row.
Common analytic functions include ROW_NUMBER, RANK, DENSE_RANK, LEAD, and LAG.
They can be used to calculate running totals, moving averages, and identify duplicates in a dataset.
Analytic functions are typically used with the OVER() clause to define the window of rows to be used in the calculation.
Rank assigns unique ranks to each distinct value, while dense rank assigns consecutive ranks to each distinct value.
Rank leaves gaps between ranks if there are ties, while dense rank does not
Rank function is used to assign a unique rank to each distinct row, while dense rank function is used to assign consecutive ranks to each distinct row
Example: If we have values 10, 20, 20, 30 - Rank would assign ranks as 1, 2,...
Kersal server is a type of server used for hosting websites and applications.
Kersal server is known for its reliability and performance.
It is often used by businesses to host their websites and applications.
Kersal server offers features like high uptime, security, and scalability.
Examples of Kersal server providers include AWS, Google Cloud, and Microsoft Azure.
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing and maintenance of code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
mv command is used in Unix and Linux operating systems to move files or directories from one location to another.
Used to rename files or directories by moving them to a new location
Syntax: mv [options] source destination
Example: mv file1.txt /path/to/new/location/
cp command is used in Unix and Linux operating systems to copy files and directories.
Used to copy files and directories from one location to another
Syntax: cp [options] source destination
Options include -r for recursive copying, -i for interactive mode, -v for verbose output
Example: cp file1.txt /path/to/directory/
A mutating error occurs when a program attempts to modify a data structure while iterating over it.
Occurs when a program tries to modify a collection (e.g. array, list) while iterating through it
Can lead to unexpected behavior or errors in the program
Common in languages like Python, where modifying a list while iterating over it can cause a mutating error
ListView is a legacy view for displaying lists in Android, while RecyclerView is a more flexible and efficient replacement.
ListView is less efficient in terms of memory and performance compared to RecyclerView.
RecyclerView provides better performance by recycling views and separating the responsibilities of layout and data management.
RecyclerView supports more advanced features like animations and item decorations.
List...
Services and work manager are components in software development that help manage background tasks and processes.
Services are components that run in the background to perform long-running operations without affecting the user interface.
Work manager is a library that helps manage background tasks efficiently, taking into account factors like battery life and network availability.
Services can be used for tasks like downl...
I applied via Job Portal
Use the extend() method in Python to combine multiple lists into a single list.
Use the extend() method to add elements from one list to another list.
Alternatively, you can use the + operator to concatenate lists.
Example: list1 = [1, 2, 3], list2 = [4, 5, 6], combined_list = list1 + list2
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
Types of classes include abstract classes, concrete classes, interface classes, and inner classes.
Abstract classes cannot be instantiated and may contain abstract methods.
Concrete classes can be instantiated and provide implementations for all methods.
Interface classes define a contract for classes to implement.
Inner classes are classes defined within another class.
I address difficult situations within a team by promoting open communication, seeking to understand all perspectives, and collaborating on solutions.
Promote open communication to address issues early on
Seek to understand all perspectives before making decisions
Collaborate with team members to find mutually beneficial solutions
Cloning Oracle E-Business Suite R12.2 involves several key steps for replication and maintenance.
1. Prepare the source instance by ensuring it is in a stable state.
2. Create a backup of the source database and application files.
3. Use the Rapid Clone utility to clone the instance.
4. Update the configuration files for the new instance.
5. Run post-cloning scripts to finalize the setup.
6. Verify the cloned instance by per...
Steps to resolve tablespace issues and phases of ADOP in application development.
Monitor tablespace usage regularly to anticipate issues before they arise.
Increase the size of the tablespace by adding data files.
Archive or purge old data to free up space.
Implement partitioning to manage large tables more effectively.
Review and optimize database queries to reduce space consumption.
In ADOP, phases include: Prepare, Apply...
I appeared for an interview in Jun 2025, where I was asked the following questions.
I've utilized various design patterns like Singleton, Observer, and Factory in my projects to enhance code maintainability and scalability.
Singleton: Ensured a single instance of a configuration manager in a web application.
Observer: Implemented in a notification system where multiple components react to user actions.
Factory: Used to create different types of user objects based on user roles in an authentication module...
I implemented various security measures, including encryption, access controls, and regular audits to safeguard project data.
Conducted a thorough risk assessment to identify potential vulnerabilities.
Implemented encryption protocols for data at rest and in transit, such as AES-256.
Established role-based access controls to limit data access to authorized personnel only.
Regularly updated software and systems to patch kno...
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
Kersal server is a type of server used for hosting websites and applications.
Kersal server is known for its reliability and performance.
It is often used by businesses to host their websites and applications.
Kersal server offers features like high uptime, security, and scalability.
Examples of Kersal server providers include AWS, Google Cloud, and Microsoft Azure.
We are using a microservices architecture in our project.
Decomposes the application into smaller, independent services
Each service is responsible for a specific function
Allows for scalability and flexibility
Example: Netflix, Amazon, Uber
What people are saying about Infosys
Some of the top questions asked at the Infosys Technology Analyst interview -
The duration of Infosys Technology Analyst interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 235 interview experiences
Difficulty level
Duration
based on 4.7k reviews
Rating in categories
Technology Analyst
55k
salaries
| ₹4.8 L/yr - ₹10 L/yr |
Senior Systems Engineer
54.6k
salaries
| ₹2.5 L/yr - ₹6.3 L/yr |
Technical Lead
35.5k
salaries
| ₹9.5 L/yr - ₹16.5 L/yr |
System Engineer
32.7k
salaries
| ₹2.4 L/yr - ₹5.5 L/yr |
Senior Associate Consultant
32.6k
salaries
| ₹8.3 L/yr - ₹15 L/yr |
TCS
Wipro
Cognizant
Accenture