i
Amdocs
Filter interviews by
A friend function is a non-member function that has access to the private and protected members of a class.
Declared inside the class but defined outside the class scope
Can access private and protected members of the class
Not a member of the class but has access to its private members
Used to allow external functions to access and modify private data of a class
Can be declared as a friend in another class
atoi function converts a string to an integer in C.
The function takes a string as input and returns an integer.
Leading white spaces are ignored.
If the string contains non-numeric characters, the function stops conversion and returns the converted value.
The function returns 0 if the input string is not a valid integer.
Example: atoi('123') returns 123.
A program to print star pattern
Use nested loops to print the pattern
The outer loop controls the number of rows
The inner loop controls the number of stars to be printed in each row
Use print() or println() function to print the stars
Run time polymorphism is the ability of a program to determine the object type at runtime and call the appropriate method.
It is achieved through virtual functions and dynamic binding.
Allows for more flexible and extensible code.
Example: a base class Animal with virtual function makeSound() and derived classes Dog and Cat that override makeSound().
At runtime, if an Animal pointer points to a Dog object, calling makeSoun
Right outer join is a type of join operation that returns all the rows from the right table and the matching rows from the left table.
Right outer join is denoted by the RIGHT JOIN keyword in SQL.
It is used to combine rows from two tables based on a related column.
In the result set, unmatched rows from the right table will have NULL values for the columns of the left table.
A real-world scenario for using a right outer j...
Refrential integrity ensures that relationships between tables in a database remain consistent.
It is a database concept that ensures that foreign key values in one table match the primary key values in another table.
It prevents orphaned records in a database.
It maintains data consistency and accuracy.
For example, if a customer record is deleted, all related orders for that customer should also be deleted.
It is enforced...
Primary key uniquely identifies a record in a table, while Unique key ensures uniqueness of a column.
Primary key can't have null values, Unique key can have one null value
A table can have only one Primary key, but multiple Unique keys
Primary key is automatically indexed, Unique key is not necessarily indexed
Triggers are database objects that are automatically executed in response to certain events.
Triggers can be used to enforce business rules, audit changes, or replicate data.
There are two types of triggers: DML triggers and DDL triggers.
DML triggers are fired in response to DML statements (INSERT, UPDATE, DELETE).
DDL triggers are fired in response to DDL statements (CREATE, ALTER, DROP).
Swapping two character variables without using third
Use XOR operator to swap two variables without using third variable
Assign the XOR of both variables to the first variable
Assign the XOR of the first variable and second variable to the second variable
I applied via Campus Placement
I applied via campus placement at National Institute of Technology, Surathkal and was interviewed in Dec 2024. There were 3 interview rounds.
Easy coding question in c
Multiple sections on aptitude, coding
Amdocs interview questions for designations
I applied via campus placement at Manipal Institute of Technology (MIT)
60 mins test , consisting mcqs and 1 coding question
Detect cycle in LinkedList by using Floyd's Tortoise and Hare algorithm.
Use two pointers, slow and fast, to traverse the LinkedList.
If there is a cycle, the fast pointer will eventually meet the slow pointer.
Initialize slow and fast pointers at the head of the LinkedList.
Move slow pointer by one step and fast pointer by two steps.
If fast pointer reaches the end of the LinkedList, there is no cycle.
Get interview-ready with Top Amdocs Interview Questions
I applied via campus placement at National Institute of Technology (NIT), Warangal and was interviewed in Jul 2024. There were 2 interview rounds.
Asked basic questions
Quantitative Aptitude, Logical Reasoning, 60 mins test
I applied via campus placement at National Institute of Technology (NIT), Durgapur and was interviewed in Sep 2023. There was 1 interview round.
Contains apptitude and coding.
I applied via campus placement at National Institute of Technology (NIT), Kurukshetra and was interviewed in Aug 2023. There was 1 interview round.
Count the number of occurrences of a specific substring in an array of strings.
Iterate through each string in the array and use a function to count occurrences of the substring.
Use a loop to go through each character in the string and check for matches with the substring.
Keep a count variable to track the number of occurrences found.
Top trending discussions
Some of the top questions asked at the Amdocs Associate Software Engineer interview -
The duration of Amdocs Associate Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 35 interviews
4 Interview rounds
based on 119 reviews
Rating in categories
Software Developer
8.2k
salaries
| ₹5 L/yr - ₹17 L/yr |
Software Engineer
1.9k
salaries
| ₹4 L/yr - ₹16 L/yr |
Softwaretest Engineer
1.7k
salaries
| ₹3.8 L/yr - ₹14 L/yr |
Functional Test Engineer
1.2k
salaries
| ₹4 L/yr - ₹12.1 L/yr |
Associate Software Engineer
1k
salaries
| ₹3 L/yr - ₹12 L/yr |
TCS
IBM
Infosys
Wipro