Add office photos
Engaged Employer

Cognizant

3.8
based on 50.2k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

20+ Qentelli Interview Questions and Answers

Updated 23 Jan 2025
Popular Designations

Q1. Annotations to initialisation of the pre requisites and methods to perform actions in testng a d difference between background keywrod

Ans.

Annotations in TestNG are used to initialize prerequisites and perform actions in tests. Background keyword is not a TestNG concept.

  • Annotations in TestNG are used to define the behavior of test methods or classes.

  • Annotations like @BeforeSuite, @BeforeTest, @BeforeClass, @BeforeMethod are used to initialize prerequisites.

  • Annotations like @Test are used to define the actual test methods.

  • Annotations like @AfterMethod, @AfterClass, @AfterTest, @AfterSuite are used to perform acti...read more

Add your answer

Q2. 1. What is owasp top 10 web? 2. Types of injection attack?. 3. Java based questions?. 4. Projects and internship?.

Ans.

OWASP Top 10 is a list of the top 10 most critical web application security risks.

  • Injection attacks include SQL injection, LDAP injection, and XPath injection.

  • Java based questions may include topics like object-oriented programming, exception handling, and multithreading.

  • Projects and internships can showcase practical application of skills and knowledge gained in a real-world setting.

Add your answer

Q3. Program to build a traingle of squares in c or java

Ans.

Program to build a triangle of squares in C or Java.

  • Use nested loops to print the required number of squares in each row.

  • The number of squares in each row increases by 1.

  • The loop should run for the required number of rows.

  • Use printf or cout statements to print the squares.

Add your answer

Q4. What is the use of Object cloning

Ans.

Object cloning is the process of creating an exact copy of an object, including all of its properties and methods.

  • Object cloning is useful for creating backups of objects, preserving the state of an object at a particular point in time.

  • It allows for the creation of independent copies of objects, preventing unintended side effects from modifying the original object.

  • Object cloning can be achieved through shallow cloning (copying only the top-level properties) or deep cloning (c...read more

Add your answer
Discover Qentelli interview dos and don'ts from real experiences

Q5. What is mul key in db?

Ans.

A multi key in a database is a key that consists of multiple columns, used to uniquely identify a record in a table.

  • A multi key is created by combining two or more columns in a table.

  • It is used to ensure uniqueness and improve query performance.

  • Example: a multi key combining 'first_name' and 'last_name' columns in a 'users' table.

Add your answer

Q6. What are dangling and a null pointers

Ans.

Dangling pointers are pointers that point to a memory location that has been deleted or freed. Null pointers point to nothing.

  • Dangling pointers can cause crashes or unexpected behavior in a program.

  • Null pointers are often used to indicate that a pointer does not point to a valid memory location.

  • Dangling pointers can be avoided by setting pointers to NULL after freeing the memory they point to.

  • Null pointers can be checked before dereferencing to avoid crashes.

Add your answer
Are these interview questions helpful?

Q7. Normalisation with example, ACID properties

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. ACID properties ensure database transactions are reliable.

  • Normalization involves breaking down data into smaller, more manageable parts to reduce redundancy.

  • ACID properties (Atomicity, Consistency, Isolation, Durability) ensure database transactions are reliable and maintain data integrity.

  • Example: Normalization can be seen in a database where customer information is...read more

Add your answer

Q8. What is OOP and it's pillars.

Ans.

OOP stands for Object-Oriented Programming. Its pillars are encapsulation, inheritance, and polymorphism.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (object).

  • Inheritance: Ability of a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is the use ofSerialisation

Ans.

Serialization is the process of converting an object into a format that can be easily stored or transmitted.

  • Serialization is used to save the state of an object so that it can be reconstructed later.

  • It is commonly used in networking to send objects over the network.

  • Serialization is also used in file storage, database operations, and caching mechanisms.

Add your answer

Q10. Write a program to reverse a string

Ans.

Program to reverse a string

  • Create a function that takes a string as input

  • Use a loop to iterate through the characters of the string in reverse order

  • Append each character to a new string to build the reversed string

Add your answer

Q11. Explain over riding and over loading

Ans.

Overriding is when a subclass provides a specific implementation of a method that is already provided by its parent class, while overloading is when a class has multiple methods with the same name but different parameters.

  • Overriding involves a subclass providing a specific implementation of a method from its parent class.

  • Overloading involves a class having multiple methods with the same name but different parameters.

  • In overriding, the method in the subclass must have the same...read more

Add your answer

Q12. Explain factory design pattern with code

Ans.

Factory design pattern is a creational pattern that provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objects that will be created.

  • Factory design pattern involves creating an interface (or abstract class) for creating objects, and letting subclasses decide which class to instantiate.

  • It helps in creating objects without exposing the instantiation logic to the client and refers to the newly created object through a common int...read more

Add your answer

Q13. Difference between String and Stringbuffer

Ans.

String is immutable, StringBuffer is mutable in Java.

  • String is immutable, meaning once created, it cannot be changed. StringBuffer is mutable, allowing for modifications.

  • String concatenation creates a new String object each time, while StringBuffer allows for efficient string manipulation.

  • StringBuffer is synchronized, making it thread-safe, while String is not.

  • Example: String str = "Hello"; StringBuffer sb = new StringBuffer("Hello");

Add your answer

Q14. Difference between set and list

Ans.

Sets are unordered collections of unique elements, while lists are ordered collections of elements that allow duplicates.

  • Sets do not allow duplicate elements, while lists do.

  • Sets are unordered, while lists are ordered.

  • Sets are implemented using hash tables, while lists are implemented using arrays or linked lists.

Add your answer

Q15. Difference between map and hashmap

Ans.

HashMap is a specific implementation of the Map interface in Java.

  • Map is an interface in Java that represents a mapping between a key and a value.

  • HashMap is a class in Java that implements the Map interface.

  • HashMap allows null values and one null key, while Map does not allow null keys.

Add your answer

Q16. What is change data capture

Ans.

Change data capture is a process of identifying and capturing changes made to data in a database.

  • Captures changes made to data in a database

  • Tracks inserts, updates, and deletes

  • Enables synchronization of data across different systems

  • Used in data replication and integration processes

Add your answer

Q17. Hashmap architechure of project

Ans.

Hashmap architecture of a project involves organizing data using key-value pairs for efficient retrieval and storage.

  • Hashmap is a data structure that stores key-value pairs and allows for fast retrieval of values based on keys.

  • It uses a hashing function to map keys to specific locations in memory for quick access.

  • Hashmaps are commonly used in programming for tasks like caching, indexing, and implementing associative arrays.

  • Example: In a social media application, a hashmap can...read more

Add your answer

Q18. Sort of numbers in a list

Ans.

Sorting numbers in a list

  • Use a sorting algorithm like bubble sort, selection sort, or quicksort

  • Compare each pair of numbers and swap them if they are in the wrong order

  • Repeat this process until the list is sorted

  • Example: [5, 2, 8, 1, 3] -> [1, 2, 3, 5, 8]

Add your answer

Q19. C programming code prime number

Ans.

To check if a number is prime in C programming, iterate from 2 to n/2 and check for divisibility.

  • Iterate from 2 to n/2 and check if n is divisible by any number

  • If n is divisible by any number, it is not a prime number

  • If n is not divisible by any number, it is a prime number

Add your answer

Q20. Angular hooks and types

Ans.

Angular hooks are functions that allow developers to execute code at specific points in the component's lifecycle. Types in Angular refer to TypeScript data types used for type checking.

  • Angular hooks include ngOnInit, ngOnDestroy, ngOnChanges, etc.

  • Types in Angular help catch errors during development by enforcing strict data types.

  • Example: Using ngOnChanges hook to detect changes in input properties.

  • Example: Using types like string, number, boolean in Angular components.

Add your answer

Q21. Angular data sharing types

Ans.

Angular data sharing types include Input, Output, ViewChild, and Services.

  • Input: Parent component passes data to child component using @Input decorator.

  • Output: Child component emits events to parent component using @Output decorator.

  • ViewChild: Parent component accesses child component using @ViewChild decorator.

  • Services: Shared services can be used to share data between components.

Add your answer

Q22. Veeva vault configuration

Ans.

Veeva Vault configuration involves setting up user permissions, document types, workflows, and security settings.

  • Configure user roles and permissions to control access to documents

  • Define document types and metadata fields for organizing content

  • Set up workflows for document approval processes

  • Implement security settings to protect sensitive information

Add your answer

Q23. Oops concept from java

Ans.

Oops concept from java

  • Object-oriented programming paradigm

  • Encapsulation, Inheritance, Polymorphism, Abstraction

  • Classes and Objects

  • Access Modifiers

  • Example: Class Car with properties like make, model, year and methods like start, stop, accelerate

  • Example: Inheritance - Class SUV extends Car with additional property like off-road capability

Add your answer

Q24. Locator techniques

Ans.

Locator techniques involve methods used to find and identify specific items or objects.

  • Locator techniques can include GPS tracking, RFID technology, barcode scanning, and manual searching.

  • GPS tracking uses satellites to pinpoint the exact location of an object or person.

  • RFID technology uses radio waves to track and identify items with RFID tags.

  • Barcode scanning involves scanning a barcode to retrieve information about a product or item.

  • Manual searching involves physically loo...read more

Add your answer

Q25. explain scheduling process

Ans.

Scheduling process involves creating a timeline for tasks and resources to ensure efficient completion of a project.

  • Identify tasks and their dependencies

  • Estimate duration for each task

  • Allocate resources based on availability

  • Create a timeline or Gantt chart

  • Monitor progress and adjust schedule as needed

Add your answer

Q26. Wiiling to relocate

Ans.

Yes, I am willing to relocate for the right opportunity.

  • I am open to relocating for a position that aligns with my career goals and offers growth opportunities.

  • I have experience moving for previous job opportunities and am comfortable with the process.

  • I am excited about the possibility of exploring a new city or country and experiencing different cultures.

  • I understand the importance of being flexible and adaptable in today's job market.

Add your answer

Q27. Sql join conditions

Ans.

SQL join conditions are used to combine rows from two or more tables based on a related column between them.

  • Join conditions are specified in the ON clause of the JOIN statement.

  • Common join types include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;

Add your answer

More about working at Cognizant

Top Rated Mega Company - 2024
Top Rated IT/ITES Company - 2024
HQ - Teaneck. New Jersey., United States (USA)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Qentelli

based on 56 interviews
4 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Associate Engineer Interview Questions from Similar Companies

3.8
 • 21 Interview Questions
4.0
 • 18 Interview Questions
4.1
 • 10 Interview Questions
3.7
 • 10 Interview Questions
3.9
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter