
Capgemini Engineering

20+ Capgemini Engineering Interview Questions and Answers for Freshers
Q1. What have you done on real implementation on linux OS?
I have implemented various software applications on Linux OS.
Developed a web application using Python Flask framework on Linux server
Created a custom Linux kernel module for a hardware device driver
Implemented a distributed system using Apache Kafka on Linux machines
Optimized performance of a database server running on Linux by tuning kernel parameters
Q2. What is microprocessor and explain register names?
A microprocessor is a computer processor that incorporates the functions of a central processing unit on a single integrated circuit.
Microprocessors are used in various electronic devices such as computers, smartphones, and gaming consoles.
Register names include program counter (PC), accumulator (ACC), general-purpose registers (GPR), and memory address register (MAR).
Registers are used to store data and instructions temporarily for processing.
The number of registers and thei...read more
Q3. What is difference between C and C++?
C++ is an extension of C with object-oriented programming features.
C++ supports object-oriented programming while C does not.
C++ has classes and templates while C does not.
C++ has better support for exception handling than C.
C++ has a standard library while C does not.
C++ allows function overloading while C does not.
Q4. What is difference between array and linked list?
Arrays are contiguous blocks of memory while linked lists are made up of nodes that point to the next node.
Arrays have fixed size while linked lists can grow dynamically.
Insertion and deletion are faster in linked lists than in arrays.
Arrays have better cache locality while linked lists have better memory utilization.
Arrays are accessed using indices while linked lists are accessed using pointers.
Examples of arrays include int[] and char[] while examples of linked lists inclu...read more
Q5. Explain whole process for Example.c file to Example.exe conversion
The process of converting Example.c file to Example.exe involves several steps.
Preprocessing: includes header file inclusion, macro expansion, and conditional compilation
Compilation: converts source code to object code
Linking: combines object code with libraries to create executable file
Debugging: identifying and fixing errors in code
Optimization: improving performance of executable file
Q6. What is data abstraction and explain with code?
Data abstraction is the process of hiding implementation details and showing only necessary information.
Abstraction is achieved through abstract classes and interfaces.
It helps in reducing complexity and increasing efficiency.
Example: abstract class Shape with abstract method draw() implemented by its subclasses like Circle and Rectangle.
Q7. Write a SQL query to join two tables?
SQL query to join two tables
Use JOIN keyword to combine two tables based on a common column
Specify the columns to be selected using SELECT keyword
Use ON keyword to specify the common column between two tables
Q8. WAP for recursion and explain its working?
Recursion is a technique where a function calls itself to solve a problem. WAP for recursion is to write a program using recursion.
Recursion is used to solve problems that can be broken down into smaller sub-problems.
The base case is the condition where the function stops calling itself.
The recursive case is where the function calls itself with a smaller input.
Example: Factorial of a number can be calculated using recursion.
Example: Fibonacci series can be generated using rec...read more
Q9. What is TCP/IP,OSI model?
TCP/IP is a protocol used for communication between devices on the internet. OSI model is a conceptual framework for network communication.
TCP/IP is a suite of protocols that governs communication between devices on the internet.
OSI model is a conceptual framework that divides network communication into seven layers.
TCP/IP is based on a four-layer model, which includes the application, transport, internet, and network access layers.
The OSI model includes the physical, data li...read more
Q10. What is program counter?
Program counter is a register that stores the memory address of the next instruction to be executed by the processor.
Program counter is also known as instruction pointer.
It is a part of the processor's control unit.
The value of program counter is incremented after each instruction is executed.
If a program counter is corrupted, the processor may execute incorrect instructions.
Example: If the program counter is pointing to memory address 100, the next instruction to be executed...read more
Q11. Explain SQL commands?
SQL commands are used to interact with databases and manipulate data.
SELECT: retrieve data from a database
INSERT: add new data to a database
UPDATE: modify existing data in a database
DELETE: remove data from a database
CREATE: create a new database or table
ALTER: modify the structure of a database or table
DROP: delete a database or table
JOIN: combine data from multiple tables
GROUP BY: group data based on a specific column
ORDER BY: sort data based on a specific column
Q12. What is join and how many types.
Join is a SQL operation that combines rows from two or more tables based on a related column between them.
Join is used to retrieve data from multiple tables in a single query.
There are four types of joins: Inner Join, Left Join, Right Join, and Full Outer Join.
Inner Join returns only the matching rows from both tables.
Left Join returns all the rows from the left table and matching rows from the right table.
Right Join returns all the rows from the right table and matching rows...read more
Q13. WAP to reverse string?
A program to reverse a given string.
Create an empty string to store the reversed string.
Iterate through the original string from end to start.
Append each character to the empty string.
Return the reversed string.
Q14. Explain pointers and heap ?
Pointers are variables that store memory addresses. Heap is a region of memory used for dynamic memory allocation.
Pointers are used to access memory directly
Heap is used for dynamic memory allocation
Pointers can be used to create data structures like linked lists
Heap memory must be manually managed to avoid memory leaks
Q15. Single linked list operations ( adding and deleting a node)
Single linked list operations involve adding and deleting nodes in a linear data structure.
To add a node, create a new node and set its next pointer to the current head, then set the head to the new node.
To delete a node, traverse the list until the node to be deleted is found, then set the previous node's next pointer to the node after the one being deleted.
Be careful to handle edge cases such as adding to an empty list or deleting the head node.
Q16. Explain about the different layers in OSI model.
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical layer - deals with the physical aspects of transmitting data
Layer 2: Data link layer - responsible for error-free transfer of data between nodes
Layer 3: Network layer - manages the routing of data between nodes
Layer 4: Transport layer - ensures reliable delivery of data between applications
Layer 5: Session layer - establishes and manages connections between applications
Layer 6: Pre...read more
Q17. Programs on string operations
String operations programs manipulate and modify strings.
Use built-in string functions like substring, replace, and split.
Implement algorithms like string reversal, palindrome check, and string compression.
Regular expressions can also be used for advanced string operations.
Examples: reversing a string, counting occurrences of a substring, converting a string to title case.
Q18. Why is Linux preferred over Wi dows for Server
Linux is preferred over Windows for servers due to its stability, security, flexibility, and cost-effectiveness.
Linux is open-source, allowing for customization and flexibility in server configurations.
Linux is known for its stability and reliability, making it a popular choice for servers that require constant uptime.
Linux has a strong focus on security, with regular updates and a large community of developers actively working to address vulnerabilities.
Linux is cost-effecti...read more
Q19. Binary search with an example
Binary search is a search algorithm that finds the position of a target value within a sorted array.
Divide the array into two halves
Compare the target value with the middle element
If the target value matches the middle element, return its position
If the target value is less than the middle element, search the left half
If the target value is greater than the middle element, search the right half
Q20. Difference between let, var and const
let is block scoped, var is function scoped, const is immutable
let: block scoped, can be reassigned
var: function scoped, can be reassigned
const: block scoped, cannot be reassigned, but properties can be modified
Q21. Smoke testing,sanity testing retesting regression testing difference
Smoke testing, sanity testing, retesting, and regression testing are all types of software testing.
Smoke testing is a quick and shallow test to check if the basic functionalities of the software are working.
Sanity testing is a narrow and deep test to check if the major functionalities of the software are working after a change.
Retesting is a type of testing that is done to ensure that a defect that was found and fixed has been resolved.
Regression testing is a type of testing ...read more
Q22. What is your opinion on Additive Manufacturing?
Additive Manufacturing is a revolutionary technology that enables the creation of complex and customized objects through layer-by-layer construction.
Additive Manufacturing, also known as 3D printing, has the potential to disrupt traditional manufacturing processes.
It allows for the production of intricate designs that are difficult or impossible to create using traditional methods.
Additive Manufacturing offers cost and time savings by eliminating the need for tooling and redu...read more
Q23. 3. Explain Oops Concepts?
Oops Concepts are fundamental principles of Object-Oriented Programming.
Encapsulation - binding data and functions together
Inheritance - acquiring properties and behavior of parent class
Polymorphism - ability of objects to take multiple forms
Abstraction - hiding implementation details and showing only necessary information
Q24. Expected CTC and Preferred Location
Expected CTC and preferred location are important factors to consider in a job interview.
Expected CTC refers to the salary or compensation package the candidate is expecting from the job.
Preferred location indicates the geographical area where the candidate would like to work.
These factors help the employer assess if the candidate's expectations align with the company's budget and location requirements.
Candidates should research industry standards and consider their experienc...read more
Q25. Code for palindrom number
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Compare the original string with the reversed string
Q26. Current project Framework
Our current project framework is based on Selenium WebDriver with TestNG for test automation.
Selenium WebDriver is used for automating web application testing
TestNG is used for test execution and reporting
Framework includes page object model design pattern for better code organization
Top HR Questions asked in Capgemini Engineering for Freshers
Interview Process at Capgemini Engineering for Freshers

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

