Filter interviews by
Change management in Windchill PLM involves controlling product changes efficiently throughout the lifecycle.
Change management ensures that all product changes are documented and approved, reducing errors.
Windchill PLM provides tools for tracking change requests, such as Engineering Change Orders (ECOs).
For example, if a design modification is needed, an ECO can be initiated to assess impacts and approvals.
It inte...
I prioritize tasks by assessing urgency, impact, and deadlines, ensuring efficient management of responsibilities.
Assess urgency: Identify tasks that are time-sensitive, like resolving critical database issues.
Evaluate impact: Focus on tasks that significantly affect system performance or user experience, such as optimizing slow queries.
Use a task management tool: Implement tools like Trello or Jira to visualize a...
Inheritance in OOP allows a class to inherit properties and methods from another class, promoting code reusability and organization.
Single Inheritance: A class inherits from one superclass. Example: class Dog extends Animal.
Multiple Inheritance: A class inherits from multiple superclasses (not supported in Java). Example: class Dog extends Animal, Pet.
Multilevel Inheritance: A class inherits from a superclass, whi...
DDL and DML are SQL sublanguages for defining database structures and manipulating data within those structures.
DDL (Data Definition Language): Used to define and manage all database objects. Examples include CREATE, ALTER, and DROP commands.
CREATE: Used to create new tables or databases. Example: CREATE TABLE users (id INT, name VARCHAR(100));
ALTER: Used to modify existing database objects. Example: ALTER TABLE u...
Classes are blueprints for creating objects, encapsulating data and behavior in object-oriented programming.
A class defines properties (attributes) and methods (functions) that its objects will have.
An object is an instance of a class, representing a specific entity with state and behavior.
Example: A 'Car' class may have attributes like 'color' and 'model', and methods like 'drive()' and 'stop()'.
Multiple objects ...
A deployment.yaml file defines the desired state for deploying applications in Kubernetes, including replicas and container specifications.
apiVersion: apps/v1: Specifies the API version for the deployment.
kind: Deployment: Indicates that this YAML file is for a deployment resource.
metadata: Contains the name and labels for the deployment, e.g., name: my-app.
spec: Defines the desired state, including replicas, sele...
Copy and Add in Docker are commands used to manage files in images, with distinct behaviors and use cases.
COPY: Used to copy files/directories from the host to the Docker image.
ADD: Similar to COPY but can also extract tar files and fetch files from URLs.
Example of COPY: COPY ./localfile.txt /app/ in Dockerfile copies a file to the image.
Example of ADD: ADD ./archive.tar.gz /app/ extracts the tar file into the ima...
Git merge combines branches, preserving history; git rebase rewrites history for a linear commit structure.
Merge creates a new commit that combines changes from both branches.
Rebase moves or combines commits from one branch onto another, creating a linear history.
Example of merge: 'git merge feature-branch' creates a merge commit.
Example of rebase: 'git rebase main' applies commits from the feature branch on top o...
A Terraform module is a container for multiple resources that are used together, promoting reusability and organization.
Modules can be created for specific tasks, like setting up a web server or a database.
A module can include resources, input variables, output values, and even other modules.
Example: A module for an AWS VPC can include subnets, route tables, and security groups.
Modules can be sourced from local pa...
Azure App Service is a cloud platform for building, deploying, and scaling web apps and APIs quickly and efficiently.
Supports multiple programming languages like .NET, Java, Node.js, and Python.
Offers built-in features such as auto-scaling, custom domains, and SSL certificates.
Integrates seamlessly with Azure DevOps for CI/CD pipelines.
Provides a managed environment, reducing the need for infrastructure management...
C++ is an extension of C with object-oriented programming features.
C++ supports object-oriented programming while C does not.
C++ has classes and templates while C does not.
C++ has better support for exception handling than C.
C++ has a standard library while C does not.
C++ allows function overloading while C does not.
Arrays are contiguous blocks of memory while linked lists are made up of nodes that point to the next node.
Arrays have fixed size while linked lists can grow dynamically.
Insertion and deletion are faster in linked lists than in arrays.
Arrays have better cache locality while linked lists have better memory utilization.
Arrays are accessed using indices while linked lists are accessed using pointers.
Examples of arrays inc...
Data abstraction is the process of hiding implementation details and showing only necessary information.
Abstraction is achieved through abstract classes and interfaces.
It helps in reducing complexity and increasing efficiency.
Example: abstract class Shape with abstract method draw() implemented by its subclasses like Circle and Rectangle.
TCP/IP is a protocol used for communication between devices on the internet. OSI model is a conceptual framework for network communication.
TCP/IP is a suite of protocols that governs communication between devices on the internet.
OSI model is a conceptual framework that divides network communication into seven layers.
TCP/IP is based on a four-layer model, which includes the application, transport, internet, and network ...
Program counter is a register that stores the memory address of the next instruction to be executed by the processor.
Program counter is also known as instruction pointer.
It is a part of the processor's control unit.
The value of program counter is incremented after each instruction is executed.
If a program counter is corrupted, the processor may execute incorrect instructions.
Example: If the program counter is pointing ...
A program to reverse a given string.
Create an empty string to store the reversed string.
Iterate through the original string from end to start.
Append each character to the empty string.
Return the reversed string.
Recursion is a technique where a function calls itself to solve a problem. WAP for recursion is to write a program using recursion.
Recursion is used to solve problems that can be broken down into smaller sub-problems.
The base case is the condition where the function stops calling itself.
The recursive case is where the function calls itself with a smaller input.
Example: Factorial of a number can be calculated using recu...
A microprocessor is a computer processor that incorporates the functions of a central processing unit on a single integrated circuit.
Microprocessors are used in various electronic devices such as computers, smartphones, and gaming consoles.
Register names include program counter (PC), accumulator (ACC), general-purpose registers (GPR), and memory address register (MAR).
Registers are used to store data and instructions t...
SQL commands are used to interact with databases and manipulate data.
SELECT: retrieve data from a database
INSERT: add new data to a database
UPDATE: modify existing data in a database
DELETE: remove data from a database
CREATE: create a new database or table
ALTER: modify the structure of a database or table
DROP: delete a database or table
JOIN: combine data from multiple tables
GROUP BY: group data based on a specific colum...
SQL query to join two tables
Use JOIN keyword to combine two tables based on a common column
Specify the columns to be selected using SELECT keyword
Use ON keyword to specify the common column between two tables
Pointers are variables that store memory addresses. Heap is a region of memory used for dynamic memory allocation.
Pointers are used to access memory directly
Heap is used for dynamic memory allocation
Pointers can be used to create data structures like linked lists
Heap memory must be manually managed to avoid memory leaks
The process of converting Example.c file to Example.exe involves several steps.
Preprocessing: includes header file inclusion, macro expansion, and conditional compilation
Compilation: converts source code to object code
Linking: combines object code with libraries to create executable file
Debugging: identifying and fixing errors in code
Optimization: improving performance of executable file
I have implemented various software applications on Linux OS.
Developed a web application using Python Flask framework on Linux server
Created a custom Linux kernel module for a hardware device driver
Implemented a distributed system using Apache Kafka on Linux machines
Optimized performance of a database server running on Linux by tuning kernel parameters
I am a software engineer with 5 years of experience in developing web applications using Java and JavaScript.
5 years of experience in software development
Expertise in Java and JavaScript
Proficient in developing web applications
Strong problem-solving and analytical skills
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Different types of changes include organizational, technological, process, and strategic changes.
Organizational changes involve restructuring, mergers, or leadership changes.
Technological changes refer to implementing new systems, software, or tools.
Process changes focus on improving workflows, procedures, or policies.
Strategic changes involve shifts in overall goals, vision, or direction.
A PIR report is a Post-Implementation Review report that evaluates the success of a change or project after it has been implemented.
PIR reports assess the effectiveness of a change or project in meeting its objectives.
They identify lessons learned and areas for improvement for future changes or projects.
PIR reports often include feedback from stakeholders and key performance indicators (KPIs) to measure success.
Example...
The change management process in ITIL involves requesting, assessing, authorizing, implementing, and reviewing changes to IT services.
Requesting changes: Users or stakeholders submit change requests for IT services.
Assessing changes: Change managers evaluate the potential impact and risks of proposed changes.
Authorizing changes: Changes are approved or rejected based on their impact and alignment with business goals.
Im...
I am very flexible with shift schedules and can adapt to different timings as needed.
I have experience working various shifts in my previous roles.
I am willing to adjust my schedule to meet the needs of the team or project.
I understand the importance of being available during critical times, even if it means working non-traditional hours.
Agile is an iterative approach to project management, while waterfall is a linear approach.
Agile is iterative and allows for flexibility and changes throughout the project.
Waterfall is a linear approach where each phase must be completed before moving on to the next.
Agile focuses on delivering working software in short iterations, while waterfall follows a sequential process from requirements to testing and deployment.
I handle agile waterfall projects by blending the flexibility of agile with the structure of waterfall.
I create a hybrid approach that combines the iterative nature of agile with the sequential phases of waterfall.
I prioritize requirements and plan sprints while also defining clear milestones and deliverables.
I ensure constant communication and collaboration among team members to adapt to changes while staying on track...
Managed a large-scale construction project using the waterfall methodology
Developed a detailed project plan outlining all tasks and dependencies
Assigned specific roles and responsibilities to team members
Implemented a strict change control process to minimize scope creep
Conducted regular status meetings to track progress and address any issues
Completed the project on time and within budget
Data centre setup should evolve with advancements in technology and increasing demands for storage and processing power.
Regularly assess and upgrade hardware to ensure optimal performance
Implement virtualization to maximize resource utilization
Utilize cloud services for scalability and flexibility
Enhance security measures to protect sensitive data
Consider energy efficiency and sustainability in design
I applied via Approached by Company and was interviewed in Dec 2024. There were 4 interview rounds.
Java, DSA Coding Questions, Array, LL
A closure is a function that has access to its own scope, as well as the scope in which it was defined.
A closure allows a function to access variables from an outer function even after the outer function has finished executing.
Closures are commonly used in event handlers, callbacks, and in functional programming.
Example: const outerFunction = () => { const outerVar = 'I am outer'; return () => { console.log(outer...
State is mutable and managed within a component, while props are immutable and passed from parent to child components.
State is managed within a component and can be changed using setState() method
Props are passed from parent to child components and cannot be changed within the child component
State is used for internal component data management, while props are used for passing data from parent to child components
Exampl...
display block takes up full width and starts on a new line, while display inline only takes up as much width as necessary and does not start on a new line.
display block elements start on a new line and take up the full width available, while display inline elements do not start on a new line and only take up as much width as necessary
display block elements can have margin and padding applied on all four sides, while di...
A promise is an object representing the eventual completion or failure of an asynchronous operation.
Promises are used to handle asynchronous operations in JavaScript.
A promise can be in one of three states: pending, fulfilled, or rejected.
Promises can be chained using .then() to handle success and .catch() to handle errors.
Example: Fetching data from an API returns a promise that resolves with the data or rejects with ...
Good morning raise a simple terms of the following sentence to be ready to to to to to to to to
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
No, service and controller annotations cannot be interchanged.
Service annotations are used to define a class as a service component, while controller annotations are used to define a class as a controller component.
Service annotations are typically used for business logic and data manipulation, while controller annotations are used for handling HTTP requests and responses.
Interchanging these annotations can lead to une...
SQL joins combine rows from two or more tables based on related columns, enabling complex queries and data retrieval.
INNER JOIN: Returns records with matching values in both tables. Example: SELECT * FROM A INNER JOIN B ON A.id = B.id;
LEFT JOIN: Returns all records from the left table and matched records from the right table. Example: SELECT * FROM A LEFT JOIN B ON A.id = B.id;
RIGHT JOIN: Returns all records from the r...
Seeking new challenges and opportunities for growth in a different environment.
Desire for new challenges and opportunities
Seeking professional growth and development
Interested in exploring different work environment
Looking for a change in career path
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
MCQ’s only, DSA and other MCQ 1 hour
I applied via Campus Placement and was interviewed in Oct 2024. There were 2 interview rounds.
Easy and gaming round also included which has more weightage
The four pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: The ability for objects of different classes to respond to the same message.
Abstraction: Hiding the complex implementation details and showing only the n...
A Database Management System (DBMS) is software that enables the creation, management, and manipulation of databases.
DBMS allows users to create and manage databases efficiently.
Examples include MySQL, PostgreSQL, and Oracle Database.
It provides data security, integrity, and consistency.
DBMS supports data retrieval through query languages like SQL.
It enables concurrent access for multiple users.
Top trending discussions
The duration of Capgemini Engineering interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 281 interview experiences
Difficulty level
Duration
based on 2.3k reviews
Rating in categories
1-18 Yrs
Not Disclosed
1-14 Yrs
Not Disclosed
2-18 Yrs
Not Disclosed
Senior Software Engineer
1.9k
salaries
| ₹4.9 L/yr - ₹22.4 L/yr |
Technical Lead
1.3k
salaries
| ₹14.2 L/yr - ₹24 L/yr |
Software Engineer
1.3k
salaries
| ₹4.1 L/yr - ₹10 L/yr |
Network Engineer
414
salaries
| ₹4 L/yr - ₹9.7 L/yr |
Senior Consultant
407
salaries
| ₹14.3 L/yr - ₹25.5 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions