i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Jun 2022. There were 3 interview rounds.
posted on 6 Jan 2025
Major incident management involves identifying, prioritizing, and resolving critical issues to minimize impact on business operations.
Establish a clear process for reporting and escalating major incidents.
Prioritize incidents based on impact and urgency to ensure timely resolution.
Communicate effectively with stakeholders to provide updates on incident status and resolution.
Document incidents and resolutions for future...
SLA is a formal agreement between a service provider and a customer, while OLA is an agreement between different teams within the same organization.
SLA is between a service provider and a customer, outlining the services provided, quality, responsibilities, etc.
OLA is between different teams within the same organization, defining the interdependent relationships and responsibilities.
SLA is external, OLA is internal.
SLA...
Files in SSIS can be iterated using Foreach Loop Container or Script Task.
Use Foreach Loop Container to iterate through a list of files in a specified directory.
Set the Enumerator type to 'Foreach File Enumerator' and configure the necessary properties like file extension, file path, etc.
Alternatively, use a Script Task to programmatically iterate through files and perform custom actions.
Checkpoint in SSIS is a feature that allows packages to restart from a specific point in case of failure.
Checkpoints are used to save the state of the package at specific points during execution.
They help in resuming package execution from the last successful checkpoint in case of failure.
Checkpoints can be configured at the package level or at the task level.
They are useful in scenarios where long-running packages nee...
SSIS expressions are used to dynamically set property values at runtime in SQL Server Integration Services packages.
SSIS expressions are written using a combination of functions, operators, and constants.
Expressions can be used to set properties such as connection strings, file paths, and SQL queries.
Expressions can be used to make packages more flexible and reusable.
For example, an expression can be used to dynamicall...
posted on 7 Aug 2024
To list files, use command line tools like ls or dir.
Use 'ls' command in Unix/Linux systems to list files in a directory
Use 'dir' command in Windows systems to list files in a directory
Add options like -l for detailed listing or -a to show hidden files
Use wildcards like * to filter files based on patterns
grep is a basic pattern matching tool, while egrep is an extended version with more advanced pattern matching capabilities.
grep is a basic command-line utility for searching plain-text data sets for lines that match a regular expression pattern.
egrep is an extended version of grep that supports more advanced regular expression patterns.
egrep is equivalent to grep -E, which enables extended regular expressions.
egrep is ...
posted on 24 Sep 2023
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.
If multiple key-value pairs hash to the same index, they are stored in a linked list at that index.
To retrieve a value...
HashMap is not thread-safe while ConcurrentHashMap is thread-safe.
HashMap is not thread-safe and can lead to ConcurrentModificationException if modified while iterating.
ConcurrentHashMap allows concurrent modifications without the need for external synchronization.
ConcurrentHashMap achieves thread-safety by dividing the map into segments, allowing multiple threads to operate on different segments concurrently.
Concurren...
No, main method in Java cannot be overridden.
Main method is a static method of a class and cannot be overridden.
Subclasses can have their own main method, but it will not be considered as the entry point of the program.
Example: public class SubClass extends MainClass { public static void main(String[] args) { // This is not the entry point of the program }}
Use the 'ls' command with the '-a' flag to find hidden files in Unix.
Use the command 'ls -a' to list all files, including hidden files.
Hidden files in Unix start with a dot (.) before the file name.
Example: 'ls -a' will display all files, including hidden files.
Use the sed command to replace a string in Unix
Use the following syntax: sed 's/original_string/new_string/g' filename
The 's' flag stands for substitute, 'g' flag stands for global (replace all occurrences)
Example: sed 's/hello/goodbye/g' file.txt
posted on 18 Oct 2023
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
Associate
72.4k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
Programmer Analyst
55.5k
salaries
| ₹2.4 L/yr - ₹8 L/yr |
Senior Associate
48.4k
salaries
| ₹9 L/yr - ₹27.2 L/yr |
Senior Processing Executive
28.8k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹24.2 L/yr |
TCS
Infosys
Wipro
Accenture