i
Capgemini
Filter interviews by
Dynamic forms are interactive forms that adapt based on user input, enhancing user experience and data collection.
Dynamic forms change in real-time based on user selections, such as showing or hiding fields.
They can include conditional logic, like displaying additional questions if a specific answer is given.
Examples include online surveys that adjust based on previous answers or registration forms that reveal opt...
isBlank checks for empty strings, while isNull checks for null references in programming.
isBlank: Returns true if the string is empty or contains only whitespace. Example: ''.isBlank() returns true.
isNull: Checks if a variable is null (not initialized). Example: String str = null; str.isNull() returns true.
isBlank is often used for user input validation, while isNull is used to check object initialization.
In Java,...
Behavior Driven Development (BDD) is a software development approach that enhances collaboration between developers, testers, and non-technical stakeholders.
Focuses on the behavior of the application from the user's perspective.
Uses a common language (Gherkin) to write test scenarios, e.g., 'Given a user is logged in, when they click on the dashboard, then they see their profile.'
Encourages collaboration among tea...
Slicing is a technique used to extract a subset of data from a larger dataset or array.
In programming, slicing allows you to access a portion of an array or list, e.g., array[1:4] returns elements at index 1, 2, and 3.
In data analysis, slicing can be used to filter rows in a DataFrame based on specific conditions, e.g., df[df['age'] > 30].
In image processing, slicing can refer to extracting a specific region of...
What people are saying about Capgemini
The current version of Python can be checked using the command line or by inspecting the environment settings.
Use the command 'python --version' or 'python3 --version' in the terminal to check the version.
In a Python script, you can check the version using 'import sys' followed by 'print(sys.version)'.
Python 3.x is the latest major version, with 3.10 and 3.11 being popular recent releases.
Tool-based validation uses software tools to verify the accuracy and functionality of systems or processes.
Automated testing tools like Selenium can validate web applications by simulating user interactions.
Static code analysis tools, such as SonarQube, check code quality and adherence to coding standards.
Performance testing tools like JMeter validate system performance under various load conditions.
In the context...
Patch validation ensures that software updates meet regulatory and functional requirements in a validated system.
Identify the patches to be validated based on risk assessment and impact analysis.
Review patch release notes to understand changes and potential impacts on system functionality.
Develop a validation plan outlining the scope, objectives, and testing methods for the patch.
Execute testing, including functio...
Optimizing stored procedures enhances performance, reduces resource consumption, and improves maintainability.
Use SET NOCOUNT ON to prevent extra result sets from interfering with SELECT statements.
Avoid using SELECT *; specify only the columns needed to reduce data transfer.
Use appropriate indexing on tables to speed up data retrieval. For example, create an index on frequently queried columns.
Minimize the use of...
This program counts the occurrences of each character in a given string, considering case sensitivity.
Use a dictionary to store character counts. Example: {'A': 1, 'a': 2, 'B': 1, 'b': 2, ...}
Iterate through each character in the string and update the count in the dictionary.
Consider case sensitivity: 'A' and 'a' are counted separately.
Finally, print or return the dictionary containing character counts.
Abstraction focuses on hiding complexity, while encapsulation restricts access to data and methods in an object.
Abstraction simplifies complex systems by exposing only the necessary parts. Example: A car's dashboard shows speed and fuel level, hiding engine complexity.
Encapsulation bundles data and methods that operate on that data within a single unit (class). Example: A class 'Car' with private attributes like '...
I appeared for an interview in Feb 2025.
I balance my professional life and studies through effective time management, prioritization, and self-discipline.
I create a detailed schedule that allocates specific time blocks for work and study, ensuring I stay organized.
I prioritize tasks based on deadlines and importance, allowing me to focus on high-impact assignments first.
I utilize tools like calendars and task management apps to keep track of both work respon...
Cash flow types include operating, investing, and financing; direct and indirect methods differ in presentation and calculation.
Types of cash flow: Operating, Investing, Financing.
Operating cash flow: Cash generated from core business activities.
Investing cash flow: Cash used for investments in assets or securities.
Financing cash flow: Cash received from or paid to investors and creditors.
Direct cash flow: Lists actual...
Depreciation is not charged on land due to its indefinite lifespan and potential for appreciation.
Land is considered a non-depreciable asset because it does not wear out or get used up over time.
Unlike buildings or machinery, land does not have a finite useful life.
Land often appreciates in value due to factors like location and demand, contrasting with depreciable assets.
For example, a plot of land in a growing urban ...
The P2P cycle involves the process of procuring goods and services, from requisition to payment.
1. Requisition: Initiating a purchase request, e.g., a department needing office supplies.
2. Purchase Order: Creating a formal order to the supplier, ensuring terms are clear.
3. Receipt of Goods/Services: Confirming delivery and quality of items received.
4. Invoice Processing: Matching the supplier's invoice with the purchas...
VLOOKUP is an Excel function used to search for a value in the first column of a table and return a value in the same row from a specified column.
VLOOKUP stands for 'Vertical Lookup'.
Syntax: VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup]).
Example: =VLOOKUP(A2, B2:D10, 3, FALSE) looks for the value in A2 within the first column of B2:D10 and returns the corresponding value from the third column.
The 'ra...
I have a notice period of one month, and I plan to manage my studies by creating a structured schedule and prioritizing tasks.
Create a detailed study schedule that allocates specific time slots for studying each subject.
Utilize weekends and evenings for intensive study sessions to maximize productivity.
Incorporate breaks to avoid burnout and maintain focus during study periods.
Use productivity tools like calendars or a...
HMV and LMV in GST refer to High Value and Low Value transactions, impacting compliance and reporting requirements.
HMV (High Value) transactions are those exceeding a specified monetary threshold, requiring detailed reporting.
LMV (Low Value) transactions are those below the threshold, often subject to simplified compliance.
For example, if the threshold is set at βΉ2,50,000, any transaction above this is HMV, while those...
GSTR-1 is a monthly return for outward supplies, while GSTR-3B is a summary return for GST payment.
GSTR-1 is filed by registered taxpayers to report sales and outward supplies.
It includes details like invoice-wise sales, credit/debit notes, and exports.
Example: A business selling goods worth βΉ1,00,000 must report this in GSTR-1.
GSTR-3B is a simplified return for taxpayers to declare their GST liability.
It includes summ...
I have worked with design patterns such as Singleton, Factory, Observer, and Strategy.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified a...
I would immediately investigate the issue, identify the root cause, and work on a solution to prevent it from happening again.
Investigate the issue thoroughly to understand the scope and impact
Identify the root cause by analyzing logs, code, and configurations
Work on a solution to fix the issue and prevent it from reoccurring
Communicate with stakeholders about the issue and the steps taken to resolve it
I would embrace the challenge of leading a team by fostering collaboration, setting clear goals, and leveraging individual strengths.
Establish clear communication channels to ensure everyone is on the same page.
Set specific, measurable goals for the team to achieve, such as completing a project by a certain deadline.
Encourage team members to share their ideas and expertise, fostering a culture of collaboration.
Provide ...
Yes, I am able to work under pressure by staying organized, prioritizing tasks, and maintaining a positive attitude.
I stay organized by creating to-do lists and setting deadlines for tasks.
I prioritize tasks based on urgency and importance to ensure critical tasks are completed first.
I maintain a positive attitude by taking short breaks, practicing deep breathing exercises, and seeking support from colleagues when need...
SOLID is a set of five principles in object-oriented programming that help make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with object...
A detailed approach to solving a moderately difficult coding problem with edge case considerations.
Understand the problem requirements and constraints clearly.
Break down the problem into smaller, manageable parts.
Consider edge cases such as empty inputs or maximum limits.
Choose an efficient algorithm based on time and space complexity.
Test the solution with various test cases to ensure robustness.
I appeared for an interview in Jan 2025.
Identify first occurrences of vowels in a string and return their indices along with count.
Loop through the string and check if each character is a vowel (a, e, i, o, u)
Store the index of the first occurrence of each vowel in a separate array
Return the array of indices and the count of indices
Calculate the difference between two integers and find how many numbers within that difference are divisible by 3.
Calculate the absolute difference between the two integers
Iterate through the range of numbers within the difference and check if each number is divisible by 3
Keep a count of numbers divisible by 3
Content negotiation in ASP .Net Web API allows clients to request data in different formats like JSON, XML, etc.
Content negotiation is the process of selecting the best representation for a given response when there are multiple representations available.
In ASP .Net Web API, content negotiation is handled by the MediaTypeFormatter class which selects the appropriate formatter based on the request headers.
Clients can sp...
Git conflicts can be resolved by merging changes, resolving conflicts manually, and using tools like Git mergetool.
Merge changes from the conflicting branches
Resolve conflicts manually by editing the conflicting files
Use Git mergetool to help resolve conflicts
Commit the resolved changes after resolving conflicts
Static constructor is used to initialize static data members of a class.
Executed only once when the class is first accessed
Cannot have any access modifiers or parameters
Used to initialize static variables or perform any necessary setup tasks
To invoke methods from two interfaces with same method names, use explicit interface implementation.
Use explicit interface implementation to differentiate between the methods from each interface.
Specify the interface name followed by the method name to invoke the desired method.
Example: InterfaceA.Method() and InterfaceB.Method() to invoke methods from InterfaceA and InterfaceB respectively.
Count the occurrence of each character in a given string.
Iterate through the string and use a hashmap to store the count of each character.
Handle both uppercase and lowercase characters separately.
Consider using ASCII values to map characters to their respective counts.
Rest is lightweight, WCF is feature-rich. Rest uses HTTP, WCF uses SOAP. Rest is platform-independent, WCF is Microsoft-centric.
Rest is lightweight and simple to use, making it ideal for web services. WCF is feature-rich and provides more advanced capabilities.
Rest uses HTTP for communication, making it easier to work with in web environments. WCF uses SOAP, which can be more complex and heavyweight.
Rest is platform-in...
Microservices communicate with each other through APIs, messaging queues, and service discovery.
APIs: Microservices can communicate with each other by exposing APIs that allow them to send and receive data.
Messaging queues: Microservices can use messaging queues like RabbitMQ or Kafka to send messages to each other asynchronously.
Service discovery: Microservices can use service discovery tools like Consul or Eureka to ...
Clustered index physically orders the data rows in the table, while non-clustered index does not.
Clustered index determines the physical order of data rows in the table.
Non-clustered index is a separate structure that contains pointers to the actual data rows.
Clustered index is faster for retrieval of data in the order of the index key.
Non-clustered index is faster for retrieval of data not in the order of the index ke...
I applied via Approached by Company and was interviewed in Dec 2024.Β There was 1 interview round.
Java 8 introduced static and default methods in interfaces, allowing for method implementation and code reusability.
Java 8 introduced static methods in interfaces, allowing for method implementation directly in the interface itself.
Default methods were also introduced in Java 8, enabling interfaces to have method implementations without affecting implementing classes.
Static methods in interfaces can be called using the...
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To synchronize a HashMap, you can use the synchronizedMap() m...
No, the program will not compile if the parent class throws a runtime exception while the child class throws an arithmetic exception.
In Java, if a parent class method throws a checked exception, the child class method can only throw the same exception or its subclasses.
ArithmeticException is an unchecked exception, so if the parent class throws a checked exception and the child class throws an unchecked exception, the ...
Configure JDBC in Spring Boot to specify which database to use
Define multiple DataSource beans in the configuration class
Use @Primary annotation to specify the primary DataSource
Use @Qualifier annotation to specify the secondary DataSource
Inject the DataSource beans where needed in the application
I would implement timeout mechanisms and retries to handle the scenario of one microservice awaiting a response from another microservice taking an extended time.
Implement timeout mechanisms in the calling microservice to limit the waiting time for a response.
Set up retry logic to automatically resend the request to the slow microservice if no response is received within the specified timeout period.
Use circuit breaker...
I appeared for an interview in Jun 2025, where I was asked the following questions.
A CI/CD pipeline in AWS automates the software development lifecycle, enabling continuous integration and delivery of applications.
Continuous Integration (CI) involves automatically building and testing code changes, e.g., using AWS CodeBuild.
Continuous Delivery (CD) automates the deployment process, e.g., using AWS CodeDeploy to deploy applications to EC2 instances.
AWS CodePipeline orchestrates the entire CI/CD proces...
Infrastructure as Code (IaC) automates infrastructure management using code, enabling consistent and repeatable deployments.
IaC allows developers to define infrastructure using code, making it version-controlled and easily reproducible.
Tools like AWS CloudFormation and Terraform enable the creation and management of cloud resources through declarative templates.
IaC promotes collaboration between development and operati...
AWS is a comprehensive cloud platform offering various services for computing, storage, and networking.
Compute Services: EC2 (Elastic Compute Cloud) for scalable virtual servers.
Storage Services: S3 (Simple Storage Service) for object storage and EBS (Elastic Block Store) for block storage.
Database Services: RDS (Relational Database Service) for managed databases like MySQL and PostgreSQL.
Networking: VPC (Virtual Priva...
Cloud computing delivers on-demand computing resources over the internet, enabling scalable and flexible IT solutions.
Cloud computing provides services like storage, databases, and servers over the internet.
Examples include AWS, Microsoft Azure, and Google Cloud Platform.
It allows for scalability, meaning resources can be adjusted based on demand.
Cloud services can be categorized into IaaS, PaaS, and SaaS.
It enhances c...
Jenkins is an open-source automation server used for continuous integration and continuous delivery (CI/CD) of software projects.
Supports building, deploying, and automating software development processes.
Integrates with various version control systems like Git, SVN, etc.
Allows for the creation of pipelines to automate testing and deployment.
Plugins available for integration with cloud services, testing frameworks, and...
I applied via Naukri.com and was interviewed in Dec 2024.Β There was 1 interview round.
SOLID principles in Java focus on object-oriented design principles. Java 8 features like lambdas and streams adhere to these principles.
S - Single Responsibility Principle: Java 8 lambdas allow for defining single-purpose functions.
O - Open/Closed Principle: Java 8 streams enable extending behavior without modifying existing code.
L - Liskov Substitution Principle: Java 8 interfaces support polymorphism and substitutio...
Code to print unique elements from an array of strings
Create a HashSet to store unique elements
Iterate through the array and add elements to the HashSet
Print out the elements in the HashSet to get unique elements
Code to find the second largest element in an array
Iterate through the array and keep track of the largest and second largest elements
Initialize variables to store the largest and second largest elements
Compare each element with the largest and second largest elements and update accordingly
Hash collision occurs when two different inputs produce the same hash value. hashCode() and equals() methods are from Object class.
Hash collision can occur when two different objects have the same hash code value.
hashCode() method is used to get the hash code value of an object.
equals() method is used to compare two objects for equality.
Circuit breaker is a design pattern used to prevent cascading failures in distributed systems.
Circuit breaker monitors for failures and trips when a threshold is reached
It then redirects calls to a fallback mechanism to prevent further failures
Once the system stabilizes, the circuit breaker can be reset to allow normal operation
I appeared for an interview in Jan 2025, where I was asked the following questions.
In my last role, I faced challenges in time management, communication, and adapting to technology changes, which I addressed effectively.
Time Management: I implemented a prioritization system using digital tools to manage tasks efficiently, ensuring deadlines were met.
Communication: I initiated weekly check-ins with team members to enhance collaboration and address any concerns promptly, improving team dynamics.
Technol...
I possess strong organizational skills, adaptability, and a proactive approach, making me an ideal fit for the Executive Assistant role.
Exceptional organizational skills: I have managed multiple calendars and schedules for executives, ensuring efficient time management.
Strong communication abilities: I have experience drafting professional correspondence and liaising with stakeholders at all levels.
Proactive problem-so...
I am detail-oriented and organized, but I sometimes struggle with delegation and can be overly critical of my work.
Strength: Excellent organizational skills - I manage multiple calendars and prioritize tasks effectively.
Strength: Strong communication - I ensure clear and concise communication with team members and executives.
Weakness: Difficulty with delegation - I tend to take on too much myself, fearing that others w...
I appeared for an interview in Dec 2024.
I have over 10 years of experience in designing and implementing complex software systems.
Designed and implemented scalable software solutions for various clients
Led a team of developers in delivering projects on time and within budget
Worked closely with stakeholders to gather requirements and ensure customer satisfaction
I have used tools such as ANSYS, Abaqus, and SolidWorks Simulation for performing finite element analysis (FEA).
ANSYS
Abaqus
SolidWorks Simulation
Basic knowledge of strength of materials and finite element method (FEM) is essential for analyzing structural behavior and designing components.
Understanding of stress, strain, and material properties is crucial in analyzing the behavior of materials under different loading conditions.
Knowledge of FEM helps in simulating complex structures and predicting their response to various loads.
Ability to interpret FEM results...
SFD and BMD for cantilever beams of two different materials under point load P at free end
Calculate reactions at the fixed end of the beam
Determine the shear force at different points along the beam by considering the applied load and reactions
Draw the SFD by plotting the shear force values against the beam length
Calculate the bending moment at different points along the beam using the shear force values
Draw the BMD by...
Static analysis is a software testing technique used to analyze code without executing it.
Identify potential bugs and security vulnerabilities in the code
Ensure code quality and adherence to coding standards
Help in detecting performance issues and memory leaks
Examples: linting tools like ESLint, static code analyzers like SonarQube
I appeared for an interview in Jun 2025, where I was asked the following questions.
The project architecture is a layered structure that separates concerns and enhances maintainability and scalability.
1. Presentation Layer: Handles user interface and user experience, e.g., JSP, Thymeleaf for web applications.
2. Business Logic Layer: Contains core application logic, e.g., services that process data and enforce business rules.
3. Data Access Layer: Manages database interactions, e.g., using JPA or Hibern...
Kafka is a distributed streaming platform that handles real-time data feeds efficiently.
Kafka uses a publish-subscribe model for messaging, allowing producers to send messages to topics.
Messages are stored in partitions, which are distributed across brokers for scalability and fault tolerance.
Each message in a partition has a unique offset, which allows consumers to track their position in the stream.
Kafka supports mul...
I appeared for an interview in Jun 2025, where I was asked the following questions.
OOPs stands for Object-Oriented Programming, a programming paradigm based on objects and classes to structure software design.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class using properties and methods of an existing class (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present the same inter...
Behavior Driven Development (BDD) is a software development approach that enhances collaboration between developers, testers, and non-technical stakeholders.
Focuses on the behavior of the application from the user's perspective.
Uses a common language (Gherkin) to write test scenarios, e.g., 'Given a user is logged in, when they click on the dashboard, then they see their profile.'
Encourages collaboration among team mem...
Some of the top questions asked at the Capgemini interview -
The duration of Capgemini interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4.1k interview experiences
Difficulty level
Duration
based on 46.9k reviews
Rating in categories
Bangalore / Bengaluru,
Gurgaon / Gurugram
12-20 Yrs
Not Disclosed
Consultant
59k
salaries
| βΉ8.9 L/yr - βΉ16.6 L/yr |
Associate Consultant
51.2k
salaries
| βΉ4.5 L/yr - βΉ10 L/yr |
Senior Consultant
50.4k
salaries
| βΉ12.1 L/yr - βΉ21 L/yr |
Senior Analyst
22.4k
salaries
| βΉ3.1 L/yr - βΉ7.6 L/yr |
Senior Software Engineer
21.7k
salaries
| βΉ4.7 L/yr - βΉ13 L/yr |
Wipro
Accenture
Cognizant
TCS