Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2023. There were 5 interview rounds.
The first round was aptitude followed by coding
30 mcqs followed by 3 coding questions
if you pass ,you will be directed to technical interview followed by HR
3 coding questions based on the previous year question patterns
Top trending discussions
I applied via Company Website and was interviewed before Mar 2021. There were 2 interview rounds.
I appeared for an interview in Sep 2016.
I am a recent graduate with a degree in Computer Science and a passion for coding and problem-solving.
Graduated with a degree in Computer Science
Passionate about coding and problem-solving
Completed internships at tech companies
I was responsible for managing social media accounts and creating engaging content for a marketing agency.
Managed social media accounts for clients
Created content calendars and posts for various platforms
Analyzed engagement metrics to optimize content strategy
MBA provides advanced business knowledge, skills, and networking opportunities.
MBA helps develop strategic thinking and leadership skills.
It provides a deeper understanding of business concepts and practices.
MBA graduates often have better job prospects and higher earning potential.
Networking opportunities with industry professionals and alumni can lead to valuable connections.
Specializations in areas like finance, mar...
Key takeaways from MBA include leadership skills, strategic thinking, and networking opportunities.
Developing strong leadership skills through coursework and group projects
Learning strategic thinking and decision-making through case studies and simulations
Building a strong professional network through internships, networking events, and alumni connections
Cognizant offers a diverse range of opportunities for growth and development in the IT industry.
Cognizant is a global leader in IT services and consulting.
They have a strong reputation for delivering high-quality solutions to clients.
Cognizant provides a collaborative and inclusive work environment.
They offer extensive training and learning programs to enhance skills.
Cognizant has a strong focus on innovation and digit...
Studied case studies on marketing strategies and ethical dilemmas in business.
Analyzed a case study on how Coca-Cola's marketing strategies helped increase sales and brand awareness.
Discussed a case study on a company facing an ethical dilemma and the consequences of their decisions.
Explored the impact of social media on consumer behavior in a case study on a successful marketing campaign.
My goal in life is to make a positive impact on others and contribute to the betterment of society.
To work towards improving healthcare access and quality
To advocate for social justice and equality
To continuously learn and grow both personally and professionally
To build meaningful relationships and support others in their journeys
To leave a lasting legacy that inspires future generations
I resolved a disagreement between two team members by facilitating a meeting and encouraging open communication.
Identified the root cause of the disagreement
Scheduled a meeting with both parties to discuss the issue
Encouraged open communication and active listening
Facilitated a compromise that satisfied both parties
I appeared for an interview before Jul 2021.
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I applied via Campus Placement and was interviewed in Oct 2021. There were 3 interview rounds.
I'm sorry, but you haven't provided a clear question for me to answer.
Please provide a specific question for me to answer.
Without a clear question, I cannot provide an opinion or response.
Please rephrase or clarify your question.
I applied via Campus Placement and was interviewed in Sep 2021. There were 2 interview rounds.
Round duration - 40+140 minutes
Round difficulty - null
Conceptual/ Code Analysis and Case study.
Answer a DSA question
Understand the problem statement
Identify the data structures and algorithms required
Write the code and test thoroughly
The technical face-to-face interview round is the most crucial in the entire interview process. I was
well-versed in computer science fundamentals such as OOPS, DBMS, CN, OS
and was able to communicate them clearly to the interviewer.
Classful addressing uses fixed network sizes, while classless addressing allows for variable network sizes.
Classful addressing divides IP addresses into five classes: A, B, C, D, and E.
Classful addressing assumes that all networks within a class have the same network size.
Classless addressing allows for more flexibility in network size and allows for the creation of subnets.
Classless addressing is used in modern networ...
IPv4 and IPv6 are internet protocol versions used to identify devices on a network.
IPv4 uses 32-bit addresses and can support up to 4.3 billion unique addresses.
IPv6 uses 128-bit addresses and can support an almost infinite number of unique addresses.
IPv6 also includes features such as better security and improved routing.
Both protocols are currently in use, but IPv6 is becoming more widely adopted as IPv4 addresses be
Denormalization is the process of adding redundant data to improve query performance.
It involves duplicating data in multiple tables to avoid joins and improve query speed.
It can be useful in read-heavy applications where query performance is critical.
Examples include adding a total sales column to a customer table instead of calculating it through joins.
It can also involve flattening nested data structures to improve ...
Paging is a memory management technique used by operating systems to manage memory usage.
It involves dividing memory into fixed-size pages.
Pages are loaded into physical memory as needed.
Allows for more efficient use of memory and prevents fragmentation.
Examples include demand paging and page replacement algorithms.
Segmentation is the process of dividing a larger market into smaller groups of consumers with similar needs or characteristics.
Segmentation helps companies to better understand their target audience and create more effective marketing strategies.
There are different types of segmentation such as demographic, geographic, psychographic, and behavioral.
For example, a company may use demographic segmentation to target a spe...
Thrashing is a phenomenon in computer systems where excessive paging or swapping occurs, resulting in decreased performance.
Occurs when the system spends more time swapping pages than executing instructions
Caused by insufficient memory or poorly optimized programs
Can be identified by high disk activity and low CPU utilization
Example: A computer running multiple memory-intensive applications simultaneously
Yes, I am interested in an internship or learning program.
I am eager to gain practical experience in my field of study.
I am open to learning new skills and expanding my knowledge.
I am excited to work with professionals in the industry and learn from their expertise.
I applied via Prepinsta and was interviewed in Sep 2021. There were 3 interview rounds.
Round duration - 45 minutes
Round difficulty - null
The test was on AMCAT platform and the questions were multiple choice questions.
It was an online test.
There are 3 sections:-
1. Quants
2. Logical
3. English
The questions were of easy to moderate difficulty level.
Round duration - 20 minutes
Round difficulty - null
As I belonged to a core background(mechanical) so the interviewer was quite lenient and asked
more from my subjects and basic questions related to C, python and OOPs concepts.
I am a highly motivated individual with a passion for learning and problem-solving.
I have a degree in computer science and have worked as a software developer for 2 years.
I am proficient in programming languages such as Java, Python, and C++.
I have experience working in agile development environments and collaborating with cross-functional teams.
I am a quick learner and enjoy taking on new challenges.
In my free time, I
Data types are classifications of data items based on their characteristics and properties.
Data types determine the type of data that can be stored in a variable or used in an expression.
Common data types include integers, floating-point numbers, characters, strings, and booleans.
Data types can be categorized as primitive or non-primitive, depending on whether they are built-in or user-defined.
Primitive data types incl...
OOPs is a programming paradigm that focuses on objects and their interactions to solve problems.
OOPs stands for Object-Oriented Programming.
It emphasizes on encapsulation, inheritance, and polymorphism.
Encapsulation is the process of hiding implementation details from the user.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism allows objects to take on multiple forms or behavio...
Memory allocation is the process of assigning memory space to programs or processes.
Memory allocation is essential for programs to run efficiently.
It involves reserving a block of memory for a program to use.
There are different methods of memory allocation such as stack allocation and heap allocation.
Examples of memory allocation functions in programming languages include malloc() in C and new operator in C++.
Beams are structural elements that support loads by resisting bending.
Beams are typically horizontal, but can also be vertical or diagonal.
They are commonly made of wood, steel, or concrete.
The shape and size of a beam depends on the load it needs to support and the span it needs to cover.
Examples of beams include floor joists, roof trusses, and bridge girders.
Thrust is the force that propels an object forward.
Thrust is a force that acts in the opposite direction to drag.
It is commonly used in the context of propulsion systems, such as rockets and jet engines.
Thrust can be measured in units of force, such as pounds or newtons.
Examples of thrust include the force generated by a car's engine, the thrust of a rocket during liftoff, and the thrust of a swimmer's arms and legs th
Turbines are machines that convert fluid energy into mechanical energy. There are four types of turbines: steam, gas, hydro, and wind.
Turbines are used in power generation, aviation, and marine propulsion.
Steam turbines are commonly used in power plants.
Gas turbines are used in aviation and power generation.
Hydro turbines are used in hydroelectric power plants.
Wind turbines are used in wind farms to generate electricit...
Round duration - 10 minutes
Round difficulty - null
It was an extremely short round where most of it was focused on document verification and id-proofs.
Yes, I am a team leader.
I have experience leading a team of 5 in my previous job.
I have successfully managed projects and delegated tasks to team members.
I have received positive feedback from my team members and superiors on my leadership skills.
I believe in fostering a collaborative and supportive work environment to achieve team goals.
I presented my Aadhaar Card and College ID as requested.
I handed over my Aadhaar Card and College ID to the interviewer.
The interviewer checked both documents to verify my identity and enrollment in college.
I applied via Campus Placement and was interviewed before Feb 2021. There were 2 interview rounds.
I applied via Job Portal
It was coding test genc-next ,there was total 3 questions 1 hard 1 medium and 1 easy ,i had pass 1.5 question and i had shortlisted for genc-elevate further round.
based on 1 interview
Interview experience
Computer Scientist
30
salaries
| ₹8.8 L/yr - ₹22 L/yr |
Senior Computer Scientist
11
salaries
| ₹15 L/yr - ₹30 L/yr |
Team Lead
7
salaries
| ₹27 L/yr - ₹33 L/yr |
QA Team Lead
7
salaries
| ₹18 L/yr - ₹34 L/yr |
Test Engineer
6
salaries
| ₹5.2 L/yr - ₹12.5 L/yr |
Cognizant
Sutherland Global Services
Optum Global Solutions
Hexaware Technologies