i
Cognizant
Filter interviews by
One new technology I know about is blockchain, a decentralized and secure way to store and transfer data.
Blockchain is a distributed ledger technology that securely records transactions across multiple computers.
It is most commonly known for being the technology behind cryptocurrencies like Bitcoin.
Blockchain has applications beyond finance, such as supply chain management, voting systems, and healthcare records.
S...
A simple Python program can perform basic tasks like calculations, data manipulation, or file handling.
Use 'print()' to display output. Example: print('Hello, World!')
Define functions with 'def'. Example: def add(a, b): return a + b
Utilize lists for data storage. Example: my_list = [1, 2, 3]
Implement loops for iteration. Example: for i in range(5): print(i)
Use conditionals for decision-making. Example: if a > b...
For loop is used for iterating over a sequence while while loop is used for executing a block of code repeatedly.
For loop is used when the number of iterations is known beforehand
While loop is used when the number of iterations is not known beforehand
For loop is faster than while loop for iterating over a sequence
While loop is useful for creating an infinite loop until a certain condition is met
An abstract class is a class that cannot be instantiated and is used as a base class for other classes.
An abstract class can have abstract and non-abstract methods.
Abstract methods have no implementation and must be implemented by the derived classes.
An abstract class can have constructors and fields.
An example of an abstract class is the Shape class, where the methods like area() and perimeter() are abstract and ...
What people are saying about Cognizant
Network security refers to the practice of protecting computer networks from unauthorized access or attacks.
Network security involves implementing various measures to prevent unauthorized access to a network, such as firewalls, intrusion detection systems, and virtual private networks (VPNs).
It also includes ensuring the confidentiality, integrity, and availability of data transmitted over the network.
Examples of ...
Object-oriented programming concepts include encapsulation, inheritance, and polymorphism.
Encapsulation: Bundling data and methods together in a class to hide implementation details.
Inheritance: Creating new classes from existing ones, inheriting their properties and behaviors.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Example: Encapsulation - A class 'Car' with pri...
Code for critical section in C/Java/C++
Use mutex or semaphore to protect critical section
In C/C++, use pthread_mutex_lock() and pthread_mutex_unlock()
In Java, use synchronized keyword
In C++, use std::mutex and std::lock_guard
Ensure only one thread can access critical section at a time
Critical section is a part of code that must not be executed by more than one thread at a time.
It is used in multi-threaded programming to avoid race conditions.
It is usually protected by locks or semaphores.
Examples include updating shared variables or accessing shared resources.
It is important for ensuring data consistency and preventing deadlocks.
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Both techniques allow for efficient use of memory and protection of memory from unauthorized access.
Examples of operating systems that use paging and segmentation include...
Run time mapping between pages and frames is the process of mapping virtual memory pages to physical memory frames during program execution.
During program execution, the operating system maps virtual memory pages to physical memory frames to ensure efficient memory management.
This mapping is done dynamically and can change as the program runs.
The mapping is maintained in a page table, which is used by the operatin...
I applied via Campus Placement and was interviewed before Sep 2023. There were 2 interview rounds.
Two codes will be given oncampus recruitment.
I applied via Campus Placement and was interviewed before Apr 2023. There were 2 interview rounds.
Quant, reasoning, coading
One new technology I know about is blockchain, a decentralized and secure way to store and transfer data.
Blockchain is a distributed ledger technology that securely records transactions across multiple computers.
It is most commonly known for being the technology behind cryptocurrencies like Bitcoin.
Blockchain has applications beyond finance, such as supply chain management, voting systems, and healthcare records.
Smart ...
I applied via Campus Placement and was interviewed before Jun 2022. There were 4 interview rounds.
Exam level easy to moderate
Just communication round it was without elimination
I applied via Referral and was interviewed before Feb 2022. There were 4 interview rounds.
I applied via LinkedIn and was interviewed in Jun 2021. There were 4 interview rounds.
I appeared for an interview in Dec 2020.
Round duration - 180 minutes
Round difficulty - Hard
First round having five section.Quantitative Aptitude, Logical Reasoning, Verbal Ability, Automata Fix (7 questions) and essay writing (1 essay 20 mins). One coding question was also asked.
Calculate the Nth term in the Fibonacci sequence, where the sequence is defined as follows: F(n) = F(n-1) + F(n-2)
, with initial conditions F(1) = F(2) = 1
.
Calculate the Nth Fibonacci number efficiently using dynamic programming.
Use dynamic programming to store previously calculated Fibonacci numbers to avoid redundant calculations.
Start with base cases F(1) and F(2) as 1, then iteratively calculate F(n) using F(n-1) and F(n-2).
Ensure the input N is within the constraints 1 <= N <= 10000.
Return the Nth Fibonacci number as the output.
Round duration - 40 minutes
Round difficulty - Hard
This is (Technical + HR) round. They asked various questions from Electronics (15-20), Python (3-4), Cloud Computing (2), Aptitude problems (5-7), and projects.
Tip 1 : Practice as much as you can.
Tip 2 : Do atleast 1 minor and 1 major projects.
Tip 3 : Whatever programming language you have mentioned in your resume, try to use the same language in your projects.
Tip 4 : Coding Ninjas is the best option for preparation.
Tip 1 : Mention all internships which you have done.
Tip 2 : Add only those skills which you are pretty confident.
I applied via Job Fair and was interviewed before Aug 2021. There were 2 interview rounds.
Its an easy test just for qualify you need to score 65% or more
A simple Python program can perform basic tasks like calculations, data manipulation, or file handling.
Use 'print()' to display output. Example: print('Hello, World!')
Define functions with 'def'. Example: def add(a, b): return a + b
Utilize lists for data storage. Example: my_list = [1, 2, 3]
Implement loops for iteration. Example: for i in range(5): print(i)
Use conditionals for decision-making. Example: if a > b: pri...
For loop is used for iterating over a sequence while while loop is used for executing a block of code repeatedly.
For loop is used when the number of iterations is known beforehand
While loop is used when the number of iterations is not known beforehand
For loop is faster than while loop for iterating over a sequence
While loop is useful for creating an infinite loop until a certain condition is met
Array, LinkedList, and ArrayList are data structures used to store and manipulate collections of elements.
Arrays are fixed in size and can only store elements of the same data type.
LinkedLists are dynamic in size and can store elements of different data types.
ArrayLists are dynamic in size and can only store elements of the same data type.
Arrays have faster access time for elements, while LinkedLists have faster insert...
Storage account types refer to the different types of storage accounts available in cloud computing.
There are four types of storage accounts in Azure: General-purpose v1, General-purpose v2, Blob storage, and Premium Block Blob storage.
General-purpose v1 and v2 accounts are used for storing files, queues, tables, and blobs.
Blob storage accounts are used for storing unstructured data like images, videos, and audio files...
The port numbers for Windows and Linux VMs depend on the specific application or service being used.
Port numbers can vary depending on the specific application or service being used on the VMs.
Common port numbers for Windows VMs include 3389 for Remote Desktop Protocol and 445 for SMB file sharing.
Common port numbers for Linux VMs include 22 for SSH and 80 for HTTP.
It is important to ensure that the necessary ports are...
based on 4 interview experiences
Difficulty level
Duration
based on 213 reviews
Rating in categories
Associate
73.1k
salaries
| ₹5.3 L/yr - ₹12.5 L/yr |
Programmer Analyst
56.2k
salaries
| ₹3.5 L/yr - ₹7.3 L/yr |
Senior Associate
52.9k
salaries
| ₹10.5 L/yr - ₹23.4 L/yr |
Senior Processing Executive
29.8k
salaries
| ₹2.2 L/yr - ₹6.5 L/yr |
Technical Lead
19k
salaries
| ₹6 L/yr - ₹21.3 L/yr |
TCS
Infosys
Wipro
Accenture