i
Amdocs
Filter interviews by
A friend function is a non-member function that has access to the private and protected members of a class.
Declared inside the class but defined outside the class scope
Can access private and protected members of the class
Not a member of the class but has access to its private members
Used to allow external functions to access and modify private data of a class
Can be declared as a friend in another class
atoi function converts a string to an integer in C.
The function takes a string as input and returns an integer.
Leading white spaces are ignored.
If the string contains non-numeric characters, the function stops conversion and returns the converted value.
The function returns 0 if the input string is not a valid integer.
Example: atoi('123') returns 123.
A program to print star pattern
Use nested loops to print the pattern
The outer loop controls the number of rows
The inner loop controls the number of stars to be printed in each row
Use print() or println() function to print the stars
Run time polymorphism is the ability of a program to determine the object type at runtime and call the appropriate method.
It is achieved through virtual functions and dynamic binding.
Allows for more flexible and extensible code.
Example: a base class Animal with virtual function makeSound() and derived classes Dog and Cat that override makeSound().
At runtime, if an Animal pointer points to a Dog object, calling makeSoun
Right outer join is a type of join operation that returns all the rows from the right table and the matching rows from the left table.
Right outer join is denoted by the RIGHT JOIN keyword in SQL.
It is used to combine rows from two tables based on a related column.
In the result set, unmatched rows from the right table will have NULL values for the columns of the left table.
A real-world scenario for using a right outer j...
Refrential integrity ensures that relationships between tables in a database remain consistent.
It is a database concept that ensures that foreign key values in one table match the primary key values in another table.
It prevents orphaned records in a database.
It maintains data consistency and accuracy.
For example, if a customer record is deleted, all related orders for that customer should also be deleted.
It is enforced...
Primary key uniquely identifies a record in a table, while Unique key ensures uniqueness of a column.
Primary key can't have null values, Unique key can have one null value
A table can have only one Primary key, but multiple Unique keys
Primary key is automatically indexed, Unique key is not necessarily indexed
Triggers are database objects that are automatically executed in response to certain events.
Triggers can be used to enforce business rules, audit changes, or replicate data.
There are two types of triggers: DML triggers and DDL triggers.
DML triggers are fired in response to DML statements (INSERT, UPDATE, DELETE).
DDL triggers are fired in response to DDL statements (CREATE, ALTER, DROP).
Swapping two character variables without using third
Use XOR operator to swap two variables without using third variable
Assign the XOR of both variables to the first variable
Assign the XOR of the first variable and second variable to the second variable
I was interviewed in Feb 2025.
JIRA hierarchy includes Boards, Projects, Issues, Epics, Stories, and Sub-tasks.
Boards are used to visualize and manage work in progress.
Projects contain issues and can be broken down into Epics, Stories, and Sub-tasks.
Epics are large bodies of work that can be broken down into Stories.
Stories represent individual units of work that can be further broken down into Sub-tasks.
Risk management is the process of identifying, assessing, and prioritizing risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and impact of unfortunate events.
Identifying potential risks that could impact the project or organization
Assessing the likelihood and impact of each risk
Prioritizing risks based on their potential impact
Developing strategies t...
I applied via Company Website and was interviewed in Dec 2024. There were 3 interview rounds.
Basic self evaluation test.
Handling class imbalance involves techniques like resampling, using different algorithms, and adjusting class weights.
Use resampling techniques like oversampling or undersampling to balance the classes.
Utilize algorithms that are robust to class imbalance, such as Random Forest, XGBoost, or SVM.
Adjust class weights in the model to give more importance to minority class.
Use evaluation metrics like F1 score, precision, r...
I applied via Campus Placement
1 coding question and MCQ on CS fundamentals were asked.
Amdocs interview questions for popular designations
Data structure related question
To find the second highest integer in an array, sort the array in descending order and return the second element.
Sort the array in descending order
Return the second element in the sorted array
Handle edge cases like duplicates or small arrays
Get interview-ready with Top Amdocs Interview Questions
I applied via Naukri.com and was interviewed in Dec 2024. There were 3 interview rounds.
Agenda could be anything but prepration should be in essential pointers
I have been employed with the organization for 5 years.
Employed for 5 years
Started in entry-level position and progressed to current role
Received promotions and increased responsibilities over time
I was interviewed in Aug 2024.
Writing a Junit test case for a software engineer interview
Create a test class that extends TestCase or uses the @Test annotation
Write test methods that test specific functionality of the code
Use assertions to verify expected outcomes
Set up any necessary test data or mocks before running the test
Use annotations like @Before and @After for setup and teardown tasks
I want to join Amdocs because of their reputation for innovation and their commitment to employee growth.
Amdocs is known for its cutting-edge technology solutions in the telecommunications industry
I am impressed by Amdocs' focus on continuous learning and development for its employees
I believe that Amdocs offers a dynamic and challenging work environment that will help me grow as a software engineer
I applied via Campus Placement
Big data refers to large and complex data sets that are difficult to process using traditional data processing applications.
Big data involves large volumes of data
It includes data from various sources such as social media, sensors, and business transactions
Big data requires specialized tools and technologies for processing and analysis
Spark is a distributed computing framework that processes big data in memory and is known for its speed and ease of use.
Spark is a distributed computing framework that can process data in memory for faster processing.
It uses Resilient Distributed Datasets (RDDs) for fault-tolerant distributed data processing.
Spark provides high-level APIs in Java, Scala, Python, and R for ease of use.
It supports various data sources li...
Our application is a data engineering platform that processes and analyzes large volumes of data to provide valuable insights.
Our application uses various data processing techniques such as ETL (Extract, Transform, Load) to clean and transform raw data into usable formats.
We utilize big data technologies like Hadoop, Spark, and Kafka to handle large datasets efficiently.
The application also includes machine learning al...
Key concepts of OOP include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Abstraction: Hiding complex implementation details and showing onl
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.
If multiple keys hash to the same index (collision), a linked list is used to store these pairs.
To retrieve a value, t...
Easy to medium questions
Reversing the nodes in a linked list involves changing the direction of pointers to go from the end to the beginning.
Iterate through the linked list and reverse the pointers to point to the previous node instead of the next node.
Use three pointers - prev, current, and next - to keep track of the nodes while reversing the list.
Update the head of the linked list to point to the last node after reversing.
Top trending discussions
Some of the top questions asked at the Amdocs interview -
The duration of Amdocs interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 355 interviews
Interview experience
Software Developer
8.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
1.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Softwaretest Engineer
1.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Functional Test Engineer
1.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Software Engineer
1k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
IBM
Infosys
Wipro