i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I appeared for an interview in Jan 2025.
Identify first occurrences of vowels in a string and return their indices along with count.
Loop through the string and check if each character is a vowel (a, e, i, o, u)
Store the index of the first occurrence of each vowel in a separate array
Return the array of indices and the count of indices
Calculate the difference between two integers and find how many numbers within that difference are divisible by 3.
Calculate the absolute difference between the two integers
Iterate through the range of numbers within the difference and check if each number is divisible by 3
Keep a count of numbers divisible by 3
Content negotiation in ASP .Net Web API allows clients to request data in different formats like JSON, XML, etc.
Content negotiation is the process of selecting the best representation for a given response when there are multiple representations available.
In ASP .Net Web API, content negotiation is handled by the MediaTypeFormatter class which selects the appropriate formatter based on the request headers.
Clients can sp...
Git conflicts can be resolved by merging changes, resolving conflicts manually, and using tools like Git mergetool.
Merge changes from the conflicting branches
Resolve conflicts manually by editing the conflicting files
Use Git mergetool to help resolve conflicts
Commit the resolved changes after resolving conflicts
Static constructor is used to initialize static data members of a class.
Executed only once when the class is first accessed
Cannot have any access modifiers or parameters
Used to initialize static variables or perform any necessary setup tasks
To invoke methods from two interfaces with same method names, use explicit interface implementation.
Use explicit interface implementation to differentiate between the methods from each interface.
Specify the interface name followed by the method name to invoke the desired method.
Example: InterfaceA.Method() and InterfaceB.Method() to invoke methods from InterfaceA and InterfaceB respectively.
Count the occurrence of each character in a given string.
Iterate through the string and use a hashmap to store the count of each character.
Handle both uppercase and lowercase characters separately.
Consider using ASCII values to map characters to their respective counts.
Rest is lightweight, WCF is feature-rich. Rest uses HTTP, WCF uses SOAP. Rest is platform-independent, WCF is Microsoft-centric.
Rest is lightweight and simple to use, making it ideal for web services. WCF is feature-rich and provides more advanced capabilities.
Rest uses HTTP for communication, making it easier to work with in web environments. WCF uses SOAP, which can be more complex and heavyweight.
Rest is platform-in...
Microservices communicate with each other through APIs, messaging queues, and service discovery.
APIs: Microservices can communicate with each other by exposing APIs that allow them to send and receive data.
Messaging queues: Microservices can use messaging queues like RabbitMQ or Kafka to send messages to each other asynchronously.
Service discovery: Microservices can use service discovery tools like Consul or Eureka to ...
Clustered index physically orders the data rows in the table, while non-clustered index does not.
Clustered index determines the physical order of data rows in the table.
Non-clustered index is a separate structure that contains pointers to the actual data rows.
Clustered index is faster for retrieval of data in the order of the index key.
Non-clustered index is faster for retrieval of data not in the order of the index ke
Print 'hello world!!' in three separate lines.
Use a programming language's print function to output 'hello' on the first line, 'world' on the second line, and '!!' on the third line.
In JavaScript, you can achieve this using console.log() function with line breaks like console.log('hello\nworld\n!!');
I applied via Recruitment Consulltant and was interviewed in Oct 2022. There were 3 interview rounds.
Dependency injection is a design pattern used to remove hard-coded dependencies and make code more flexible and testable.
It allows objects to be created with their dependencies rather than having to create them within the object itself.
It promotes loose coupling between objects.
It makes code more modular and easier to maintain.
Examples include using a DI container like Unity or Autofac, or manually injecting dependenci
Azure service is a cloud computing platform by Microsoft that provides various services for building, deploying, and managing applications.
Azure service offers a wide range of services including virtual machines, storage, databases, and analytics.
It also provides services for AI and machine learning, IoT, and DevOps.
Azure service can be used for building and deploying web applications, mobile apps, and enterprise solut...
What people are saying about Capgemini
I appeared for an interview in Sep 2021.
I applied via Naukri.com and was interviewed in Mar 2021. There was 1 interview round.
I applied via Company Website and was interviewed in Jun 2021. There was 1 interview round.
I applied via Campus Placement and was interviewed in Sep 2020. There were 3 interview rounds.
I am familiar with a wide range of technologies used in software development.
Java
Python
C++
JavaScript
HTML/CSS
SQL
Git
Linux
RESTful APIs
Agile methodologies
OOPs concepts in Java include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods together in a class.
Inheritance: Creating new classes from existing ones, inheriting their properties and behaviors.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Abstraction: Hiding complex implementation details and providing a simplified interfa
Abstraction can be achieved through interfaces, abstract classes, and encapsulation.
Using interfaces to define a set of methods that a class must implement
Using abstract classes to provide a base implementation that can be extended by subclasses
Encapsulating implementation details to hide complexity and provide a simpler interface
Using design patterns such as Factory and Strategy to abstract away implementation details
Class is a blueprint for creating objects while interface defines a contract for implementing classes.
Class is a template for creating objects with properties and methods.
Interface is a contract that defines a set of methods and properties that a class must implement.
Object is an instance of a class that has its own set of properties and methods.
Function instance is a reference to a function that can be called with arg...
Access modifiers control the visibility and accessibility of class members.
Access modifiers include public, private, protected, and internal.
Public members can be accessed from anywhere.
Private members can only be accessed within the same class.
Protected members can be accessed within the same class and its subclasses.
Internal members can be accessed within the same assembly.
Access modifiers help enforce encapsulation ...
Cloud refers to the delivery of computing services over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
Cloud services can be categorized into three main types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Cloud providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
...
There are multiple ways to achieve tasks on AWS depending on the specific task.
Using AWS Management Console
Using AWS CLI
Using AWS SDKs
Using AWS CloudFormation
Using AWS Elastic Beanstalk
Using AWS Lambda
Using AWS Step Functions
Using AWS Batch
I applied via Naukri.com and was interviewed in Dec 2020. There were 3 interview rounds.
SID stands for Security Identifier. It is a unique identifier assigned to a user, group, or computer account in Windows.
SID is used to control access to resources in Windows
It is a string of alphanumeric characters
SID is generated by the Windows operating system during the creation of an account
It is used to identify users, groups, and computers in a network
Example: S-1-5-21-3623811015-3361044348-30300820-1013
Some of the top questions asked at the Capgemini Dot Net Fullstack Developer interview -
based on 2 interviews
Interview experience
based on 1 review
Rating in categories
Hyderabad / Secunderabad,
Bangalore / Bengaluru
+19-12 Yrs
Not Disclosed
Consultant
56k
salaries
| ₹5.2 L/yr - ₹18 L/yr |
Associate Consultant
50.7k
salaries
| ₹2.9 L/yr - ₹12 L/yr |
Senior Consultant
47.3k
salaries
| ₹7.5 L/yr - ₹25 L/yr |
Senior Analyst
21.1k
salaries
| ₹2.2 L/yr - ₹9 L/yr |
Senior Software Engineer
20.6k
salaries
| ₹3.5 L/yr - ₹12.9 L/yr |
Wipro
Accenture
Cognizant
TCS