Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by CGI Group Team. If you also belong to the team, you can get access from here

CGI Group Verified Tick

Compare button icon Compare button icon Compare
4.0

based on 4.4k Reviews

Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards

zig zag pattern zig zag pattern

Filter interviews by

CGI Group Fullstack Java Application Developer Interview Questions, Process, and Tips

Updated 21 Jun 2024

CGI Group Fullstack Java Application Developer Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(3 Questions)

  • Q1. What is Dependency Injection
  • Ans. 

    Dependency Injection is a design pattern in which components are given their dependencies rather than creating them internally.

    • In Dependency Injection, the dependencies of a class are injected from the outside, typically through constructor injection or setter injection.

    • This helps in achieving loose coupling between classes, making the code more modular and easier to test.

    • Example: Spring Framework uses Dependency Injec...

  • Answered by AI
  • Q2. How is exception handled in Inheritance
  • Ans. 

    Exceptions in inheritance are handled using try-catch blocks in the subclass.

    • Inherited methods can throw exceptions that need to be caught in the subclass.

    • Subclass can override superclass methods and handle exceptions differently.

    • Superclass methods can declare checked exceptions that subclasses must handle.

    • Exceptions can be rethrown or wrapped in a new exception in the subclass.

  • Answered by AI
  • Q3. Define a immutable class
  • Ans. 

    Immutable class is a class whose instances cannot be modified after creation.

    • Immutable classes have all fields as final and private.

    • Immutable classes do not have any setter methods.

    • Examples of immutable classes in Java are String, Integer, and LocalDate.

  • Answered by AI
Round 2 - Technical 

(2 Questions)

  • Q1. Different design pattern and how you have implement in projects
  • Ans. 

    I have implemented design patterns like Singleton, Factory, and Observer in various projects.

    • Implemented Singleton pattern to ensure only one instance of a class exists.

    • Utilized Factory pattern to create objects without specifying the exact class of object that will be created.

    • Used Observer pattern to establish a one-to-many dependency between objects, so that when one object changes state, all its dependents are notif

  • Answered by AI
  • Q2. How to improve the performance of a running application.
  • Ans. 

    To improve the performance of a running application, consider optimizing code, database queries, caching, and server resources.

    • Optimize code by identifying and fixing bottlenecks, reducing unnecessary loops, and improving algorithms.

    • Optimize database queries by using indexes, avoiding unnecessary joins, and limiting the amount of data retrieved.

    • Implement caching mechanisms to store frequently accessed data in memory, r...

  • Answered by AI

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Approached by Company and was interviewed in Feb 2023. There was 1 interview round.

Round 1 - Technical 

(21 Questions)

  • Q1. Types of cloning in java
  • Ans. 

    There are two types of cloning in Java: Shallow and Deep cloning.

    • Shallow cloning creates a new object with the same field values as the original object, but the fields refer to the same objects as the original object.

    • Deep cloning creates a new object with the same field values as the original object, but the fields refer to new copies of the original objects.

    • Shallow cloning can be done using the clone() method, while d...

  • Answered by AI
  • Q2. What are idempotent methods in rest
  • Ans. 

    Idempotent methods in REST are HTTP methods that can be repeated multiple times without changing the result beyond the initial application.

    • Idempotent methods are safe to retry or repeat without causing unintended side effects.

    • GET, HEAD, PUT, and DELETE are idempotent methods.

    • POST is not idempotent because it creates a new resource with a new URI each time it is called.

    • Idempotency is important for ensuring the reliabili

  • Answered by AI
  • Q3. Difference between put and post
  • Ans. 

    PUT is used to update an existing resource, while POST is used to create a new resource.

    • PUT replaces the entire resource with the new data, while POST appends the new data to the existing resource.

    • PUT is idempotent, meaning multiple identical requests will have the same effect as a single request, while POST is not.

    • PUT requires the client to specify the resource ID in the request URL, while POST does not.

    • Example: PUT /...

  • Answered by AI
  • Q4. Describe caching mechanism in hibernate
  • Ans. 

    Hibernate provides two levels of caching: first-level cache and second-level cache.

    • First-level cache is enabled by default and is associated with a Session object.

    • Second-level cache is optional and can be configured to use different caching providers like Ehcache, Hazelcast, etc.

    • Caching can improve application performance by reducing the number of database queries.

    • Caching can also cause data inconsistency issues if not...

  • Answered by AI
  • Q5. Association between hashcode and equals to method
  • Ans. 

    Hashcode and equals method are related in Java to ensure proper object comparison and hashing.

    • The hashcode method returns an integer value that represents the object's unique identifier.

    • The equals method compares two objects for equality and returns a boolean value.

    • If two objects are equal, their hashcodes must be equal as well.

    • If two objects have the same hashcode, it does not necessarily mean they are equal.

    • It is imp...

  • Answered by AI
  • Q6. What is the logging framework you used and errors it highlights
  • Q7. Write a program to get duplicate element in array list
  • Ans. 

    Program to find duplicate elements in an array list

    • Create a HashSet to store unique elements

    • Loop through the array list and add each element to the HashSet

    • If an element already exists in the HashSet, it is a duplicate

    • Add the duplicate element to another list or print it

  • Answered by AI
  • Q8. Describe cascading in hibernate
  • Ans. 

    Cascading in Hibernate refers to the ability to propagate the state of an entity to its associated entities.

    • Cascading is used to automatically persist, update, or delete associated entities when the state of the parent entity changes.

    • There are different types of cascading options available in Hibernate, such as ALL, PERSIST, MERGE, REMOVE, and REFRESH.

    • For example, if a parent entity has a collection of child entities a...

  • Answered by AI
  • Q9. Difference between get session and load in hibernate
  • Ans. 

    getSession() retrieves the current session while load() method loads the object by its identifier.

    • getSession() method is used to retrieve the current session from the session factory.

    • load() method is used to load the object by its identifier.

    • getSession() method returns null if there is no current session.

    • load() method throws an exception if the object is not found in the database.

    • getSession() method is used for read an...

  • Answered by AI
  • Q10. What is hql? what are it's benefits?
  • Ans. 

    HQL stands for Hibernate Query Language. It is an object-oriented query language used to retrieve data from a database.

    • HQL is similar to SQL but uses object-oriented concepts like inheritance, polymorphism, and association.

    • It is database independent and can be used with any database supported by Hibernate.

    • HQL queries are compiled to SQL queries at runtime, which makes it more efficient than using SQL directly.

    • It suppor...

  • Answered by AI
  • Q11. How to do xml validation
  • Ans. 

    XML validation can be done using XML Schema Definition (XSD) or Document Type Definition (DTD).

    • XSD is the preferred method for XML validation as it provides more features and is easier to use.

    • DTD is an older method and has limited features compared to XSD.

    • XML validation can be done using tools like XMLSpy, Notepad++, and online validators like W3C Markup Validation Service.

    • Validation can be done programmatically using ...

  • Answered by AI
  • Q12. What are methods of object class
  • Ans. 

    Methods of Object class in Java

    • toString() - returns a string representation of the object

    • equals(Object obj) - checks if two objects are equal

    • hashCode() - returns a hash code value for the object

    • getClass() - returns the runtime class of the object

    • wait() - causes the current thread to wait

    • notify() - wakes up a single thread that is waiting on the object

    • notifyAll() - wakes up all threads that are waiting on the object

  • Answered by AI
  • Q13. How to secure rest api
  • Ans. 

    Secure REST API using authentication, encryption, and authorization.

    • Use HTTPS protocol to encrypt data in transit

    • Implement authentication using tokens or OAuth2

    • Implement authorization using roles and permissions

    • Use input validation and output encoding to prevent injection attacks

    • Implement rate limiting to prevent DDoS attacks

  • Answered by AI
  • Q14. Which authentication methods used to secure rest api
  • Ans. 

    Various authentication methods can be used to secure REST API, including OAuth, JWT, Basic Authentication, and API Keys.

    • OAuth is a popular authentication method that allows users to grant access to third-party applications without sharing their credentials.

    • JWT (JSON Web Tokens) is a stateless authentication mechanism that uses a token to authenticate users.

    • Basic Authentication uses a username and password to authentica...

  • Answered by AI
  • Q15. How do we handle exceptions in rest
  • Ans. 

    Exceptions in REST are handled using try-catch blocks and HTTP status codes.

    • Use try-catch blocks to catch exceptions thrown by the application

    • Map exceptions to appropriate HTTP status codes

    • Return error messages in the response body

    • Use global exception handlers to handle uncaught exceptions

    • Avoid returning sensitive information in error messages

  • Answered by AI
  • Q16. Which data structure used in array and hashmap
  • Ans. 

    Arrays use a linear data structure while HashMap uses a key-value pair data structure.

    • Arrays are indexed collections of elements of the same data type.

    • HashMaps store key-value pairs and allow for fast retrieval of values based on their keys.

    • Arrays have a fixed size while HashMaps can dynamically resize.

    • Arrays are more efficient for simple data structures while HashMaps are better for complex data structures.

  • Answered by AI
  • Q17. What is sql injection
  • Ans. 

    SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.

    • SQL injection can be used to steal sensitive information, modify or delete data, or even take control of the entire database.

    • It can be prevented by using parameterized queries, input validation, and limiting user privileges.

    • Example: Entering ' OR 1=1;--' in a login form can bypass authentic...

  • Answered by AI
  • Q18. What is synchronized key word
  • Ans. 

    Synchronized keyword is used to control access to shared resources in a multithreaded environment.

    • It ensures that only one thread can access the shared resource at a time.

    • It can be applied to methods or blocks of code.

    • It can cause performance issues if used excessively.

    • Example: synchronized void myMethod() { //code }

    • Example: synchronized(this) { //code }

  • Answered by AI
  • Q19. Difference between string and string buffer
  • Ans. 

    String is immutable while StringBuffer is mutable.

    • StringBuffer is faster for concatenation operations.

    • StringBuffer has methods to modify the string while String does not.

    • StringBuffer is thread-safe while String is not.

    • Example: String str = "hello"; StringBuffer sb = new StringBuffer(str); sb.append(" world");

    • Example: String str = "hello"; str.concat(" world"); // returns a new string, original string is not modified.

  • Answered by AI
  • Q20. Design patterns in java
  • Ans. 

    Design patterns are reusable solutions to common software problems.

    • Design patterns help in creating flexible, reusable, and maintainable code.

    • Some popular design patterns in Java are Singleton, Factory, Observer, and Decorator.

    • Singleton pattern ensures that only one instance of a class is created.

    • Factory pattern provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objec...

  • Answered by AI
  • Q21. Describe reflection api in java
  • Ans. 

    Reflection API in Java allows inspection and modification of runtime behavior of a program.

    • Reflection API provides classes like Class, Method, Field, Constructor, etc. to inspect and modify the behavior of a program at runtime.

    • It can be used to access private fields and methods of a class.

    • It can be used to create new instances of a class dynamically.

    • It can be used to invoke methods of a class dynamically.

    • It can be used...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Mainly they are looking for experienced spring boot developers. Be sure to have knowledge of all things mentioned in your resume.

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Assignment 

Coding is little difficult so please go through logic

Round 3 - Technical 

(2 Questions)

  • Q1. The interview is based on the skills you mentioned in resume
  • Q2. What is the use of Java
  • Ans. 

    Java is a versatile programming language used for developing a wide range of applications, from web and mobile apps to enterprise systems.

    • Java is used for developing web applications, mobile applications, desktop applications, and enterprise systems.

    • It is commonly used in backend development for server-side programming.

    • Java is also used in game development, scientific applications, and big data processing.

    • It is platfor...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Atos is the only company where many freshers are forced to resign as they don't have projects

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. About company and your skills
  • Q2. Java full stack developet
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Campus Placement

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Aptitude Test 

Normal Gaming Question and Aptitude

Round 3 - HR 

(2 Questions)

  • Q1. Introduce yourself. Tell me Something about your Project.
  • Q2. Technical Question from Java.

Interview Preparation Tips

Interview preparation tips for other job seekers - Make a Few Projects and Learn at least 1 programming Language.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
No response

I applied via Recruitment Consulltant and was interviewed in Aug 2024. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. Where are Logic App logs stored?
  • Ans. 

    Logic App logs are stored in Azure Monitor Logs (formerly known as Log Analytics).

    • Logic App logs are stored in Azure Monitor Logs, which is a centralized log storage and analytics service in Azure.

    • Logs can be viewed and analyzed using Azure Monitor Logs queries.

    • Logs can also be integrated with other Azure services for monitoring and alerting purposes.

  • Answered by AI
  • Q2. How to get the 5th top position data in Sql?
  • Ans. 

    Use the OFFSET and FETCH clauses in SQL to get the 5th top position data.

    • Use the ORDER BY clause to sort the data in descending order.

    • Use the OFFSET clause to skip the first 4 rows.

    • Use the FETCH clause to retrieve only the next row after skipping the first 4 rows.

  • Answered by AI
  • Q3. How do you implement custom middleware in .net core?
  • Ans. 

    Custom middleware in .NET Core can be implemented by creating a class that implements the IMiddleware interface and adding it to the application pipeline.

    • Create a class that implements the IMiddleware interface

    • Implement the InvokeAsync method in the middleware class to handle the request processing logic

    • Add the custom middleware to the application pipeline in the Configure method of the Startup class

  • Answered by AI
  • Q4. Explain Authentication & Authorization in asp.net core?
  • Ans. 

    Authentication verifies the identity of a user, while authorization determines what resources a user can access.

    • Authentication confirms the identity of a user through credentials like username and password.

    • Authorization determines the permissions and access levels of a user based on their authenticated identity.

    • In ASP.NET Core, authentication is handled through middleware like Identity, OAuth, or JWT tokens.

    • Authorizati...

  • Answered by AI
  • Q5. Explain session management in asp.net core?
  • Ans. 

    Session management in ASP.NET Core involves storing and retrieving user-specific data during a user's visit to a website.

    • Session data is stored on the server side by default in ASP.NET Core

    • Session data can be accessed and manipulated using the HttpContext.Session property

    • Session data can be configured to use different storage providers such as in-memory, distributed cache, or SQL Server

    • Session data is typically used to...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for NTT Data Dot Net Fullstack Developer interview:
  • Dot Net
  • Azure
  • Angular
Interview preparation tips for other job seekers - Prepare from begginer to expert level on the JD

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Oct 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. What is Dependency injection
  • Q2. What is middleware
Round 2 - techno mangerial 

(1 Question)

  • Q1. Project based questions
Round 3 - HR 

(1 Question)

  • Q1. Salaru neogiation
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Coding Test 

Def factorial_iterative(n):
result = 1
for i in range(1, n + 1):
result *= i
return result

Interview Preparation Tips

Interview preparation tips for other job seekers - Working on personal projects can showcase your skills and initiative, especially if you’re pivoting to a new field.
Interview experience
1
Bad
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Not Selected

I was interviewed in Aug 2023.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Double-check your resume for any spelling mistakes. The recruiter may consider spelling mistakes as careless behavior or poor communication skills.
View all tips
Round 2 - Technical 

(4 Questions)

  • Q1. SQL - a table with emp-id, emp-name, manager-id, Need to find the manger name for each emplyee.
  • Q2. FizzBuzz - if number is divisible by 3 print "fizz", if by 5 print "buzz", if by both "fizzbuzz"
  • Ans. 

    A simple program to print 'fizz' for multiples of 3, 'buzz' for multiples of 5, and 'fizzbuzz' for multiples of both.

    • Iterate through numbers from 1 to n.

    • Use modulo operator to check divisibility by 3 and 5.

    • Print 'fizz', 'buzz', or 'fizzbuzz' accordingly.

  • Answered by AI
  • Q3. Is it necessary for classes implementing an interface to implement interface methods?
  • Ans. 

    Yes, classes implementing an interface must implement interface methods.

    • Classes implementing an interface must provide concrete implementations for all methods declared in the interface.

    • Failure to implement all interface methods will result in a compilation error.

    • Interfaces are used to define a contract that implementing classes must adhere to.

  • Answered by AI
  • Q4. Spring basics - annotations
Round 3 - Technical 

(1 Question)

  • Q1. Spring boot basics
Round 4 - HR 

(1 Question)

  • Q1. Talked about my previous companies and salary. Before they conduct the interview I had told them my expectation, while negotiation they denied for providing that and were offering just 10% hike over my cur...

Interview Preparation Tips

Interview preparation tips for other job seekers - Don't go for this company. It is just waste of time.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via campus placement at Ajay Kumar Garg Engineering College, Ghaziabad and was interviewed before May 2023. There were 3 interview rounds.

Round 1 - Coding Test 

Core Java
DSA
MySQL
Aptitude

Round 2 - Technical 

(1 Question)

  • Q1. Oops concept one dsa question based on array sql query for filter data LinkedList
Round 3 - HR 

(1 Question)

  • Q1. Just document veriication

CGI Group Interview FAQs

How many rounds are there in CGI Group Fullstack Java Application Developer interview?
CGI Group interview process usually has 2 rounds. The most common rounds in the CGI Group interview process are One-on-one Round and Technical.
What are the top questions asked in CGI Group Fullstack Java Application Developer interview?

Some of the top questions asked at the CGI Group Fullstack Java Application Developer interview -

  1. How to improve the performance of a running applicati...read more
  2. Different design pattern and how you have implement in proje...read more
  3. How is exception handled in Inherita...read more

Tell us how to improve this page.

CGI Group Fullstack Java Application Developer Interview Process

based on 1 interview

Interview experience

4
  
Good
View more
Software Engineer
8.1k salaries
unlock blur

₹3.8 L/yr - ₹12 L/yr

Senior Software Engineer
7.2k salaries
unlock blur

₹6.1 L/yr - ₹22.5 L/yr

Lead Analyst
3.1k salaries
unlock blur

₹9.9 L/yr - ₹30 L/yr

Associate Software Engineer
1.8k salaries
unlock blur

₹2.5 L/yr - ₹6.6 L/yr

Senior Test Engineer
1.2k salaries
unlock blur

₹6 L/yr - ₹20 L/yr

Explore more salaries
Compare CGI Group with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview