i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Average time should be considered during performance analysis with ST03 transaction.
Average time gives a more accurate representation of overall performance compared to total time.
Total time can be skewed by outliers or extreme values, while average time provides a more balanced view.
For example, if there are a few long-running processes that significantly impact total time, focusing on average time can help identify o
Minimize downtime during SAP upgrade with SUM by using parallel processing, proper planning, and testing.
Utilize parallel processing to speed up the upgrade process
Properly plan and schedule the upgrade during off-peak hours to minimize impact on users
Perform thorough testing in a non-production environment before the actual upgrade
Use SAP EarlyWatch Alert to identify potential issues before the upgrade
Implement SAP Sy...
R3trans and R3load processes are used during SAP upgrade using SUM for data migration and transport.
R3trans is used for transporting data between systems during the upgrade process.
R3load is used for loading data into the upgraded system.
R3trans and R3load are part of the Software Update Manager (SUM) tool used for SAP upgrades.
SUM 2.0 is an updated version of SUM 1.0 with improved features. SUM 2.0 cannot be used for SAP JAVA systems due to compatibility issues.
SUM 2.0 has enhanced functionalities and better performance compared to SUM 1.0
SUM 2.0 is not compatible with SAP JAVA systems because it lacks support for certain Java-specific components and processes
Using SUM 2.0 for SAP JAVA systems can lead to errors and issues during the upgrade
Check prerequisites, resolve issues, update software components, check system status, and re-run maintenance planner.
Check if all prerequisites are met before running maintenance planner
Resolve any issues or errors that are causing the maintenance planner to not be green
Update software components if necessary
Check the system status to ensure it is stable and running properly
Re-run the maintenance planner after addressi
Delta Merge in SAP HANA is a process where data from delta storage is merged into main storage to optimize performance.
Delta merge is a process in SAP HANA where data from delta storage is merged into main storage to optimize performance.
It helps in reducing the size of delta storage and improving query performance.
Delta merge is triggered automatically by SAP HANA based on certain conditions like memory consumption or...
Delta merge may not run properly due to incorrect configuration, insufficient resources, or system errors.
Check the configuration settings for delta merge to ensure they are correct
Ensure that there are enough resources (memory, CPU, disk space) available for delta merge to run smoothly
Monitor system logs for any errors or issues that may be preventing delta merge from running properly
Restart the system or the relevant...
Pre-requisites for manual delta merge include proper system backup, sufficient disk space, and no active users.
Ensure system backup is taken before performing manual delta merge.
Make sure there is enough disk space available for the merge process.
Ensure there are no active users or critical processes running during the merge.
Check for any pending updates or patches that may interfere with the merge.
Verify that all nece...
Strust is a transaction code used in SAP for managing SSL server PSEs. Different PSEs are used for different purposes.
Strust is used to manage SSL server PSEs in SAP systems
Different PSEs are used for different purposes such as encryption, authentication, etc.
Examples of PSEs include SSL server PSE, SSL client PSE, SNC PSE, etc.
To connect a 3rd party system with SAP, steps include creating RFC destination, configuring communication user, setting up authorizations, and exchanging certificates.
Create RFC destination in SAP system
Configure communication user in SAP system
Set up necessary authorizations for the RFC user
Exchange certificates between the 3rd party system and SAP system
Trusted RFC connections are secure connections between SAP systems for communication.
Trusted RFC connections are used to establish secure communication between SAP systems.
These connections are needed to ensure data integrity and confidentiality during data exchange.
To create trusted RFC connections, you need to configure the RFC destination in both sending and receiving systems.
You also need to maintain the trusted re...
Yes, it is possible to automate TR movement from DEV to QA.
Use transport management system (TMS) in SAP to automate TR movement
Set up transport routes and configure TMS to automatically release and import transports
Schedule background jobs to move transports at specific times
Use transport of copies (TOC) functionality to copy transports between systems
Label printers are specialized printers used to print labels for various purposes.
Label printers are designed specifically for printing labels, tags, and stickers.
They are commonly used in industries like manufacturing, retail, logistics, and healthcare.
Label printers use different types of printing technologies such as direct thermal or thermal transfer.
Unlike usual printers, label printers are more durable and can ha...
Possible reasons for performance issue between 1 to 2 PM everyday and how to resolve it
Check for any scheduled jobs or backups running during that time causing high system load
Monitor system resources like CPU, memory, and disk usage during that time
Review system logs for any errors or warnings occurring at that specific time
Consider implementing performance tuning measures such as optimizing database queries or increa...
Different tcodes for traces in SAP BASIS and specific information to look for in STAD
ST01 - System Trace: Monitor user activities and authorization checks
ST05 - Performance Trace: Analyze performance issues
ST11 - Display Developer Traces: View developer traces for debugging
ST12 - SAP System Trace Configuration: Configure trace settings
ST22 - ABAP Dump Analysis: Check for ABAP dumps and errors
TMS in SAP HANA manages transport requests for system changes, similar to SAP JAVA. It ensures controlled deployment of changes.
TMS in SAP HANA is used to manage transport requests for system changes, ensuring controlled deployment.
It allows for organizing changes into packages, moving them between systems, and tracking changes.
TMS in SAP JAVA also serves a similar purpose, managing transport requests for Java-based sy...
Domain link in SAP is a logical link between a domain and a data element.
Domain link is used to assign a domain to a data element in SAP.
It helps in defining the characteristics and constraints of the data element.
Domain link ensures consistency and reusability of domain definitions.
Example: Linking a domain 'Material Number' to a data element 'MATNR' in SAP.
Yes, it is possible to add another transport layer between QA and Prod systems.
Yes, you can add an additional transport layer between QA and Prod systems in SAP by creating a new transport route.
This can be achieved by configuring a new transport layer in the landscape configuration.
The new transport layer can be used to control the flow of transports between QA and Prod systems separately.
This setup allows for better ...
A single HANA node can have a maximum memory of 24 TB.
A single HANA node can have a maximum memory of 24 TB.
The memory capacity of a HANA node can vary depending on the hardware configuration.
For example, a HANA node with 2 TB RAM per socket can have up to 12 sockets, resulting in a total memory capacity of 24 TB.
Yes, ECC on HANA can have scaleout scenario.
ECC on HANA can be scaled out by adding additional application servers to distribute workload.
Scaleout scenario helps in improving performance and handling increased workload.
It allows for horizontal scaling by adding more servers to the existing landscape.
Example: Adding more application servers to an ECC on HANA system to handle increased user load.
SAP Software Update Manager (SUM) offers various strategies for system updates and upgrades.
Downtime-minimized strategy: Reduces system downtime during updates by performing most of the activities online.
Standard strategy: Follows the traditional update process with downtime for the system.
Maintenance planner strategy: Uses SAP Maintenance Planner tool to plan updates and upgrades.
Stack XML strategy: Allows importing s...
Sizing of SAP and HANA involves determining the hardware requirements based on the workload and usage patterns.
Sizing involves analyzing the current and future workload of the SAP system.
Factors such as number of users, transactions, data volume, and growth projections are considered.
Tools like SAP Quick Sizer and SAP HANA Sizing reports are used to estimate hardware requirements.
Proper sizing ensures optimal performan
Approximately 1.5 TB of memory is needed for a HANA system with 1TB of database.
HANA systems typically require 1.5 times the size of the database in memory for optimal performance
In this case, with a 1TB database, approximately 1.5 TB of memory would be needed
Memory requirements may vary based on specific configurations and usage patterns
HANA Cockpit is a web-based tool for administration and monitoring, while HANA Studio is a desktop application for development and modeling.
HANA Cockpit is web-based, accessible via a browser, while HANA Studio is a desktop application.
HANA Cockpit is used for administration, monitoring, and performance tuning, while HANA Studio is used for development, modeling, and data provisioning.
HANA Cockpit provides a centralize...
Yes, in SAP HANA it is possible to create multiple files for backup instead of one big file.
Yes, in SAP HANA, you can split the backup into multiple files for easier management and storage.
This can be achieved by specifying the number of backup files and their sizes during the backup process.
For example, you can create 10 files of 100 GB each for a total backup size of 1 TB.
SAP HANA 2.0 SPS 05 is the latest version available on SAP Marketplace.
SAP HANA 2.0 SPS 05 was released in May 2020.
It includes new features and enhancements for improved performance and usability.
Customers can download the latest version from the SAP Marketplace.
To install SAP HANA license for Tenant DB, use HDBLCM tool and apply the licenses in a specific sequence.
Use HDBLCM tool to install SAP HANA license for Tenant DB
Apply the licenses in the following sequence: System DB, Tenant DB, and then XS Advanced
Ensure that the license key is valid and matches the hardware key of the system
I appeared for an interview in Feb 2025.
How many questions are there for the aptitude test?
Prepare thoroughly, dress appropriately, and communicate effectively to excel in an interview.
Research the company: Understand its mission, values, and recent developments. For example, know their latest product launch.
Dress professionally: Choose attire that aligns with the company's culture. For instance, a suit for corporate roles or smart casual for startups.
Practice common interview questions: Prepare answers for ...
Selecting candidates requires evaluating skills, experience, cultural fit, and potential for growth.
Relevant Experience: Assess if the candidate has prior experience in accounting roles, such as bookkeeping or financial analysis.
Technical Skills: Evaluate proficiency in accounting software like QuickBooks or Excel, which are essential for the role.
Cultural Fit: Consider how well the candidate aligns with the company's ...
I will complete my assignment and provide the topic.
I will discuss my team and friends.
I am not familiar with coding, but I will undergo training.
The application process for Cognizant involves online application, assessments, interviews, and onboarding.
1. Online Application: Candidates submit their resumes through the Cognizant careers website.
2. Assessments: Applicants may need to complete online tests that evaluate technical skills and aptitude.
3. Interviews: Successful candidates are invited for one or more interviews, which may include HR and technical round...
What are the case studies you can assist me with?
I utilize various methods to search for applications, including online databases, networking, and professional organizations.
Use online job boards like Indeed or LinkedIn to find accounting applications.
Network with professionals in the field to learn about new opportunities.
Attend industry conferences and seminars to discover applications and trends.
Utilize social media platforms to follow companies and job postings.
C...
Azure Data Lake Storage (ADLS) is a scalable data storage service for big data analytics in the cloud.
ADLS is designed for big data analytics, allowing storage of large amounts of unstructured data.
It integrates seamlessly with Azure services like Azure Databricks and Azure HDInsight.
ADLS supports hierarchical namespace, enabling efficient organization of data in directories.
It provides fine-grained access control usin...
An integration pipeline automates the process of integrating code changes into a shared repository, ensuring quality and consistency.
Continuous Integration (CI) is a key component, where developers frequently merge code changes.
Automated tests run on each integration to catch bugs early, e.g., unit tests, integration tests.
Build automation tools like Jenkins or Travis CI are often used to manage the pipeline.
Deployment...
Azure Databricks is an Apache Spark-based analytics platform optimized for Azure cloud services.
Built on Apache Spark, it provides a collaborative environment for data scientists and engineers.
Supports multiple languages including Python, R, Scala, and SQL for data processing.
Integrates seamlessly with Azure services like Azure Data Lake Storage and Azure Machine Learning.
Offers features like interactive notebooks for ...
A cluster is a group of interconnected computers that work together to perform tasks as a single system.
Clusters improve performance by distributing workloads across multiple machines.
They provide redundancy; if one node fails, others can take over (e.g., database clusters).
Common types include load-balancing clusters and high-availability clusters.
Examples include Hadoop clusters for big data processing and Kubernetes
What people are saying about Cognizant
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Custom hooks in React are reusable functions that allow you to extract component logic into separate functions for better code organization and reusability.
Custom hooks are created using the 'use' prefix and can be used to share logic between components.
Use cases for custom hooks include fetching data from an API, handling form state, managing local storage, and more.
Example of a custom hook for API call: const useFetc...
useMemo is used to memoize a value, while useCallback is used to memoize a function.
useMemo is used to memoize a value and recompute it only when its dependencies change.
useCallback is used to memoize a callback function and prevent unnecessary re-renders.
Example: useMemo can be used to memoize the result of a complex computation, while useCallback can be used to memoize an event handler function.
Class-based components use ES6 classes and have lifecycle methods, while functional components are simpler and use functions.
Class-based components use ES6 classes to create components, while functional components are created using functions.
Class-based components have lifecycle methods like componentDidMount and componentDidUpdate, while functional components do not.
Functional components are simpler and more lightweig...
Implementing the lifecycle of a React component in a functional component
Use the useEffect hook to replicate lifecycle methods like componentDidMount, componentDidUpdate, and componentWillUnmount
Pass an empty array as the second argument to useEffect to mimic componentDidMount
Pass a variable or state as the second argument to useEffect to mimic componentDidUpdate
Return a cleanup function inside useEffect to mimic compo
Various state management techniques in React include Context API, Redux, and local state.
Context API: React's built-in solution for passing data through the component tree without having to pass props down manually at every level.
Redux: A popular state management library for React applications, allowing for a centralized store to manage application state.
Local state: Managing state within individual components using us
Redux is a predictable state container for JavaScript apps. Middlewares are functions that intercept actions before they reach the reducer.
Redux follows a unidirectional data flow architecture.
Middlewares in Redux are functions that can intercept, modify, or dispatch actions.
Common use cases for middlewares include logging, asynchronous API calls, and handling side effects.
Examples of popular Redux middlewares are Redu...
Hoisting in JavaScript is the behavior where variable and function declarations are moved to the top of their containing scope during the compilation phase.
Variable declarations are hoisted to the top of their scope, but not their initializations.
Function declarations are fully hoisted, meaning they can be called before they are declared.
Hoisting can lead to unexpected behavior if not understood properly.
Event bubbling is the propagation of events from the target element up through its ancestors in the DOM tree.
Events triggered on a child element will 'bubble up' and trigger on parent elements.
Event listeners can be attached to parent elements to handle events from multiple child elements.
Stopping event propagation can be done using event.stopPropagation() or event.stopImmediatePropagation().
Block scope and function scope are two types of scopes in JavaScript that determine the visibility and accessibility of variables.
Block scope refers to the visibility of variables within a block of code enclosed by curly braces. Variables declared with 'let' and 'const' have block scope.
Function scope refers to the visibility of variables within a function. Variables declared with 'var' have function scope.
Variables de...
Yes, I have experience working with semantic tags in HTML.
Used semantic tags like <header>, <nav>, <main>, <section>, <article>, <aside>, <footer> for better structure and SEO.
Understand the importance of using semantic tags for accessibility and search engine optimization.
Semantic tags help in organizing content and making it more readable for developers and browsers.
Various methods for creating an object in JavaScript include object literals, constructor functions, ES6 classes, and Object.create() method.
Object literals: var obj = { key: value };
Constructor functions: function ObjectName() { this.key = value; } var obj = new ObjectName();
ES6 classes: class ClassName { constructor() { this.key = value; } } var obj = new ClassName();
Object.create() method: var obj = Object.create(pr
Shallow copy only copies the references of nested objects, while deep copy creates new copies of nested objects.
Shallow copy creates a new object but does not create copies of nested objects, only copies their references.
Deep copy creates a new object and also creates new copies of all nested objects.
Shallow copy can be achieved using Object.assign() or spread operator, while deep copy can be achieved using JSON.parse(
The code will throw an error because 'a' is declared but not initialized.
The code will result in a ReferenceError because 'a' is declared but not assigned a value.
Variables declared with 'const' must be initialized at the time of declaration.
Initializing 'a' with a value before calling test() will prevent the error.
CSS can be used to arrange elements in a row and column layout using flexbox or grid layout properties.
Use display: flex; for a row layout and display: flex; flex-direction: column; for a column layout
Use justify-content and align-items properties to align items in the main axis and cross axis respectively
For grid layout, use display: grid; and grid-template-columns or grid-template-rows to define the layout
Yes, I have utilized CSS preprocessors such as SASS and LESS.
I have experience using SASS to streamline my CSS workflow by utilizing variables, mixins, and nesting.
I have also worked with LESS to improve code organization and maintainability through features like variables and functions.
The color applied will be based on the specificity of the selector, with ID having higher specificity than class.
ID has higher specificity than class in CSS
Color applied will be based on the selector with higher specificity
Example: If ID selector has color red and class selector has color blue, the color applied will be red
Cognizant interview questions for popular designations
I appeared for an interview in Feb 2025.
I am a UiPath Developer with experience in automating various business processes.
Developed automation solutions using UiPath for data entry tasks
Integrated UiPath robots with APIs to automate data retrieval and processing
Worked on projects to automate invoice processing and report generation
Implemented error handling mechanisms and logging in UiPath workflows
ReFramework is a template in UiPath for building robust, scalable, and reusable automation projects.
ReFramework is a template that includes Dispatcher and Performer components for handling transactions.
Dispatcher is responsible for reading input data and adding it to a queue.
Performer processes items from the queue, performs the necessary actions, and updates the status of each transaction.
DataTable transaction approac...
Execute query is used to retrieve data from a database, while execute non-query is used to perform operations that do not return data.
Execute query is used for SELECT statements to retrieve data from a database.
Execute non-query is used for INSERT, UPDATE, DELETE statements that do not return data.
Execute query returns a result set, while execute non-query returns the number of rows affected.
Examples: Execute query - S...
Switch statement is used for multiple conditions, while if-else statement is used for binary conditions.
Switch statement is more efficient when there are multiple conditions to check.
If-else statement is more flexible as it can handle complex conditions.
Switch statement uses 'case' and 'break' keywords, while if-else statement uses 'if', 'else if', and 'else'.
Datatable is used to store and manipulate data in UiPath. Connection string is used to establish a connection to a database.
Datatable is a structured data type used to store information in rows and columns.
You can use activities like 'Build Data Table' to create a new datatable or 'Read Range' to read data from an Excel file into a datatable.
Connection string is a string that contains information about how to connect t...
Get interview-ready with Top Cognizant Interview Questions
Project roles and responsibilities define tasks and expectations for team members to ensure project success.
Project Manager: Oversees project planning, execution, and closure. Example: Coordinating team meetings and tracking progress.
Team Members: Execute specific tasks assigned to them. Example: Developers coding features based on requirements.
Stakeholders: Provide input and feedback throughout the project. Example: C...
I appeared for an interview in Feb 2025.
I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.
There are multiple ways to call server side code from client side, including AJAX, WebSockets, and REST API calls.
AJAX
WebSockets
REST API calls
To create a new request type in ITSM, follow these steps.
Navigate to the Service Catalog in the ITSM module.
Click on 'Create New' to start creating a new request type.
Fill in the necessary details such as name, description, and category.
Define the workflow for the request type, including approval processes and assignment rules.
Test the new request type to ensure it functions correctly.
Publish the request type for users...
Restrict characters for 'Investment' field in incident table to 500 characters using UI policy.
Create a UI policy on the incident table
Add a condition to check the length of the 'Investment' field
Set the UI policy action to display an error message if the character limit is exceeded
GFST submit is used to submit a GlideFormState object in ServiceNow.
GFST submit is used to save the current state of a form in ServiceNow.
It is commonly used in client-side scripts to save form data without refreshing the page.
GFST submit can be used to trigger business rules and workflows upon form submission.
Yes, 'IT Service Manager' role description and short description should be visible.
Role description should clearly outline the responsibilities and requirements of the IT Service Manager position
Short description should provide a brief overview of the role to attract potential candidates
Both descriptions should be easily accessible on the job posting or company website
Client scripts in ServiceNow are used to automate processes on the client side.
onChange
onLoad
onSubmit
Client script runs before UI Policy due to the order of execution in ServiceNow.
Client script runs before UI Policy because it is executed on the client side before the form is submitted.
UI Policy runs after Client script as it is applied after the form is submitted.
Client script is used for field-level validation and manipulation, while UI Policy is used for controlling field visibility and mandatory fields.
Business rules in ServiceNow can be categorized as before, after, async, and synchronous. After business rules run after a record is inserted or updated, while async business rules run in the background.
Types of business rules in ServiceNow: before, after, async, synchronous
After business rules run after a record is inserted or updated
Async business rules run in the background without blocking the user interface
Differe...
Yes, the order of Business rules can be changed.
Yes, the order of Business rules can be changed by adjusting the order in which they are executed in the Business rule list.
This can be done by changing the 'Order' field value in the Business rule record.
Business rules with lower 'Order' values will be executed before those with higher 'Order' values.
Changing the order of Business rules can impact the overall behavior an
The isolate checkbox is used to prevent a script from running in the global scope.
Prevents variables and functions from being accessed globally
Helps in avoiding conflicts with other scripts
Useful when developing complex applications with multiple scripts
xml() and xml() wait are both used in ServiceNow to parse XML data, but xml() wait is used for asynchronous parsing.
xml() is used for synchronous parsing of XML data in ServiceNow
xml.wait() is used for asynchronous parsing of XML data in ServiceNow
xml() is blocking, while xml.wait() allows other operations to continue while parsing XML data
Update 'Investment' field in incident table from Standard to SMA for all records
Create a script to update the 'Investment' field in incident table for all records
Use a loop to iterate through each record and update the 'Investment' field value from Standard to SMA
Yes, we can use 'previous' in Business rule to access the previous value of a field.
Use 'previous' keyword in a Business rule to access the previous value of a field
Can be helpful in comparing current and previous values for triggering actions
Example: gs.info('Previous value: ' + current.previous.value)
get reference is used to retrieve a reference to a record in another table
Used to establish relationships between records in different tables
Allows for easy access to related information
Can be used in scripts to retrieve data from related records
I applied via Walk-in and was interviewed in Nov 2024. There were 2 interview rounds.
I am a Senior Automation Test Engineer with 5+ years of experience in designing and implementing automated testing frameworks.
5+ years of experience in automation testing
Proficient in designing and implementing automated testing frameworks
Strong knowledge of testing tools like Selenium, Appium, and JUnit
Experience in creating test scripts and executing test cases
Ability to analyze test results and identify defects
The syntax for using driver.findElement in Selenium is driver.findElement(By locator)
Use driver.findElement(By locator) to locate a single element on the web page
Specify the locator strategy (e.g. By.id, By.name, By.xpath) to identify the element
Example: WebElement element = driver.findElement(By.id("username"));
Different types of assertions and syntax for hard assertion in TestNG
Types of assertions: Hard assertions and Soft assertions
Syntax for hard assertion in TestNG: Assert.assertEquals(expected, actual)
Types of wait mechanisms include implicit wait, explicit wait, fluent wait, and thread.sleep.
Implicit wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit wait: Waits for a certain condition to occur before proceeding further.
Fluent wait: Waits for a condition to be true with a specified polling frequency.
Thread.sleep: Pauses the execution for a specified amount of time.
Frames in Selenium can be managed using switchTo() method to navigate between frames.
Use driver.switchTo().frame() method to switch to a frame by index, name or WebElement
Use driver.switchTo().defaultContent() method to switch back to the main content
Use driver.switchTo().parentFrame() method to switch to the parent frame
Use a Set data structure to remove duplicates from an array of strings.
Create a Set from the array to automatically remove duplicates
Convert the Set back to an array to get the unique values
List, Set, and Map are different types of collections in Java used to store and manipulate groups of objects.
List is an ordered collection that allows duplicate elements. Example: ArrayList, LinkedList
Set is a collection that does not allow duplicate elements. Example: HashSet, TreeSet
Map is a collection of key-value pairs where each key is unique. Example: HashMap, TreeMap
I would analyze the user stories and application functionality to identify the root cause of the mismatch and work towards resolving it.
Review the user stories and application functionality to understand the discrepancies
Communicate with stakeholders to clarify requirements and expectations
Update test cases and automation scripts to align with the corrected user stories
Collaborate with developers to address any underly
I have over 5 years of experience in automation testing, with a focus on creating and executing test scripts for web applications.
Developing automation test scripts using tools like Selenium and TestNG
Creating test plans and test cases based on requirements
Executing test cases and reporting defects
Collaborating with developers and QA team to ensure quality of the product
Participating in Agile ceremonies such as sprint
Demonstrating feature file step definitions with different sets of data in a previous project scenario
Create a feature file with a scenario outline that includes placeholders for different sets of data
Write step definitions that use the placeholders to run the scenario with different data sets
Use data tables or examples in the feature file to provide the different sets of data
Run the scenario with different data sets t...
To count URLs in an HTML page using Selenium and open the URL containing your name, you can use a combination of Selenium WebDriver methods and regular expressions.
Use Selenium WebDriver to navigate to the HTML page and retrieve its source code
Use regular expressions to identify and count the URLs in the source code
Iterate through the list of URLs to find the one containing your name
Use Selenium WebDriver to open the U
Use regular expressions to separate letters and digits from a string in Java.
Use the String class's split() method with a regular expression to separate letters and digits.
Create a regular expression pattern that matches either letters or digits.
Store the separated letters and digits in separate arrays.
I appeared for an interview in Feb 2025, where I was asked the following questions.
Citrix is a software company specializing in virtualization, networking, and cloud computing solutions.
Founded in 1989, Citrix provides technologies for remote access and virtualization.
Citrix Virtual Apps and Desktops allow users to access applications and desktops remotely.
Citrix ADC (Application Delivery Controller) optimizes application performance and security.
Citrix Workspace integrates various tools for a seamle...
MCS are frameworks for managing organizational performance, while PVS assess and value that performance.
MCS helps in aligning organizational goals with operational activities.
Examples of MCS include budgeting systems, performance measurement systems, and strategic planning.
PVS focuses on quantifying performance outcomes, often using metrics like ROI or KPIs.
An example of PVS is a balanced scorecard that evaluates finan
Netscaler is a networking device that optimizes application delivery and enhances security for web applications.
Acts as a load balancer to distribute traffic across multiple servers.
Provides application acceleration through caching and compression.
Enhances security with features like web application firewall (WAF).
Supports SSL offloading to reduce server load.
Integrates with cloud services for hybrid deployments.
A Citrix upgrade involves planning, testing, and executing updates to enhance performance and security of Citrix environments.
Assess current environment: Evaluate existing Citrix components and their versions.
Backup configurations: Ensure all settings and data are backed up before proceeding.
Review release notes: Understand new features and changes in the upgrade version.
Test in a lab: Conduct a trial upgrade in a cont...
A storefront upgrade involves enhancing an online retail platform's features, design, and performance for better user experience.
Improves user interface and design for easier navigation.
Enhances mobile responsiveness to cater to mobile shoppers.
Integrates new payment options like digital wallets (e.g., Apple Pay).
Updates inventory management systems for real-time tracking.
Incorporates advanced analytics tools for bette
Common issues in Citrix include connectivity problems, performance issues, and configuration errors affecting user experience.
Connectivity issues: Users may experience difficulties connecting to Citrix sessions due to network problems or firewall settings.
Performance degradation: Slow application response times can occur due to high server load or insufficient bandwidth.
Session timeouts: Users may be unexpectedly logge...
Encountered critical P1 and P2 issues in Citrix related to performance and connectivity affecting user experience.
P1 Issue: High latency during peak hours, causing significant delays in application response times.
P2 Issue: Intermittent disconnections from the Citrix environment, impacting user productivity.
Example of P1: Users reported a 10-second delay when launching applications, which was traced back to network cong...
Citrix 1912 architecture enables secure remote access and virtualization for applications and desktops.
Microservices architecture allows for modular deployment and scalability.
Utilizes Citrix Hypervisor for efficient resource management and virtualization.
Supports multi-cloud environments, enabling deployment on various cloud platforms.
Incorporates Citrix Workspace for unified access to applications and data.
Enhanced s...
Citrix uses various ports for its services, enabling secure communication and data transfer across networks.
Port 1494: Used for Citrix ICA (Independent Computing Architecture) traffic.
Port 2598: Utilized for Session Reliability, ensuring stable connections.
Port 443: Commonly used for secure HTTPS connections to Citrix services.
Port 80: Used for HTTP traffic, often for web-based applications.
Port 3389: Used for Remote D
EdgeSight is a performance monitoring tool for Citrix environments, providing insights into application and user experience.
Monitors application performance and user experience in real-time.
Provides detailed analytics on resource usage, helping to identify bottlenecks.
Integrates with Citrix environments to track metrics like latency and session performance.
Offers customizable dashboards for visualizing performance data...
Citrix Director is a web-based management console for monitoring and troubleshooting Citrix environments.
Provides real-time monitoring of user sessions and resource usage.
Enables administrators to troubleshoot issues with virtual desktops and applications.
Offers detailed analytics and reporting on performance metrics.
Allows for user session management, including logoff and shadowing capabilities.
Integrates with Citrix ...
Common issues with Citrix include connectivity problems, performance issues, and compatibility challenges.
Connectivity issues: Users may experience dropped sessions or inability to connect due to network instability.
Performance degradation: Slow application response times can occur, often due to bandwidth limitations or server overload.
Compatibility problems: Certain applications may not function properly in a virtuali...
Citrix provisioning process involves creating and managing virtual desktops and applications efficiently.
1. Image Creation: A master image is created with the desired OS and applications.
2. Provisioning Services (PVS): The master image is streamed to target devices over the network.
3. Virtual Desktop Management: Administrators can manage and update the master image centrally.
4. Load Balancing: PVS allows for load balan...
Upgrading Citrix MCS involves planning, preparing, and executing the upgrade while ensuring minimal disruption to services.
1. Review the release notes for the new version to understand new features and changes.
2. Backup existing configurations and data to prevent loss during the upgrade.
3. Test the upgrade process in a staging environment to identify potential issues.
4. Schedule the upgrade during off-peak hours to min...
Patching Citrix servers involves planning, testing, and applying updates to ensure security and performance.
1. Assess the current environment: Identify the Citrix components in use (e.g., Citrix Virtual Apps, Citrix ADC).
2. Review release notes: Check for any known issues or prerequisites for the patch version.
3. Backup: Create backups of the server and configurations to prevent data loss.
4. Test in a lab environment: ...
Citrix PVS store contains essential files for managing virtual disk images and configurations.
vDisk files (.vhd or .vhdx) - These are the virtual hard disk files used by the target devices.
Configuration files - These include settings for vDisk and target device configurations.
Boot files - Necessary files for booting the virtual machines, such as boot loader files.
Snapshot files - Used for maintaining different versions...
Versioning Citrix vDisk in PVS involves creating, managing, and deploying different versions of virtual disks for efficient updates.
Create a new version of the vDisk by selecting the existing vDisk and using the 'Version' option in the PVS console.
Use the 'Edit' option to modify settings or configurations in the new version without affecting the original.
Deploy the new version to target devices while keeping the previo...
Citrix policies manage user access, resource allocation, and security settings in virtual environments.
Access Control: Policies define who can access specific applications and data.
Resource Allocation: Policies can prioritize resources for critical applications, ensuring performance.
Security Settings: Policies enforce security measures like multi-factor authentication and encryption.
User Experience: Policies can custom...
Citrix environments utilize various databases for configuration, monitoring, and management of virtual applications and desktops.
Microsoft SQL Server: Commonly used for Citrix Virtual Apps and Desktops to store configuration data.
Oracle Database: Sometimes utilized for larger enterprise environments requiring robust database solutions.
PostgreSQL: An open-source option that can be used for certain Citrix components.
SQLi...
Citrix offers various licensing models to cater to different business needs, including user-based and device-based licenses.
User License: Allows a specific number of users to access Citrix services, e.g., Citrix Virtual Apps and Desktops.
Device License: Permits a specific number of devices to access Citrix services, suitable for shared devices.
Concurrent License: Enables multiple users to share a pool of licenses, idea...
Change management is a structured approach to transitioning individuals, teams, and organizations to a desired future state.
Identify the change: Recognize what needs to change, e.g., implementing a new software system.
Assess the impact: Evaluate how the change will affect processes and people, e.g., training needs for staff.
Develop a change management plan: Create a roadmap for implementation, including timelines and r...
Troubleshooting application login issues involves systematic checks of user credentials, network, and application settings.
Verify user credentials: Ensure the username and password are correct. Example: Check for case sensitivity.
Check network connectivity: Ensure the device is connected to the internet. Example: Test by accessing other websites.
Inspect application status: Confirm the application is running and not exp...
Managing hotfixes in Citrix involves identifying issues, applying fixes, testing, and documenting changes for stability and compliance.
Identify the need for a hotfix based on user-reported issues or system monitoring.
Download the appropriate hotfix from the Citrix support site, ensuring compatibility with your environment.
Test the hotfix in a staging environment to assess its impact and ensure it resolves the issue wit...
Server deployment involves setting up servers for use, while decommissioning involves safely retiring them from service.
1. Server Deployment: Involves planning, provisioning, and configuring servers for operational use.
2. Pre-deployment Assessment: Evaluate requirements, capacity planning, and resource allocation.
3. Installation: Physically set up hardware and install necessary software, such as operating systems and a...
HSD processes encompass creation, deployment, management, and deletion for efficient data handling.
Creation: Involves data acquisition and processing, e.g., collecting data from IoT devices.
Deployment: Involves setting up data infrastructure, e.g., cloud storage solutions like AWS or Azure.
Management: Involves monitoring and optimizing data usage, e.g., using analytics tools to track performance.
Deletion: Involves secu...
A health check process assesses system performance, stability, and security to ensure optimal operation.
Monitors system metrics like CPU usage, memory, and disk space.
Checks for software updates and patches to maintain security.
Validates network connectivity and response times.
Conducts regular backups to prevent data loss.
Example: A web server health check might ping the server and check response times.
I appeared for an interview in Jan 2025.
Various data sources such as databases, APIs, files, and streaming services are used for data ingestion and processing.
Databases (e.g. MySQL, PostgreSQL)
APIs (e.g. RESTful APIs)
Files (e.g. CSV, JSON)
Streaming services (e.g. Kafka, Pub/Sub)
Partitioning is dividing data into smaller chunks for efficient storage and retrieval, while clustering is organizing data within those partitions based on a specific column.
Partitioning is done at the storage level to distribute data across multiple nodes for better performance.
Clustering is done at the query level to physically group data based on a specific column, improving query performance.
Example: Partitioning b...
Using bq commands to create a table and load a CSV file in Google BigQuery
Use 'bq mk' command to create a new table in BigQuery
Use 'bq load' command to load a CSV file into the created table
Specify schema and source format when creating the table
Specify source format and destination table when loading the CSV file
Example: bq mk --table dataset.table_name schema.json
Example: bq load --source_format=CSV dataset.table_nam
Use 'bq show' command to display the schema of a table in BigQuery.
Use 'bq show' command followed by the dataset and table name to display the schema.
The schema includes the column names, data types, and mode (nullable or required).
Example: bq show project_id:dataset.table_name
Leaf nodes are the bottom nodes in a tree structure, while columnar storage stores data in columns rather than rows.
Leaf nodes are the end nodes in a tree structure, containing actual data or pointers to data.
Columnar storage stores data in columns rather than rows, allowing for faster query performance on specific columns.
Columnar storage is commonly used in data warehouses and analytics databases.
Leaf nodes are impor...
BigQuery does not have fixed slots, it dynamically allocates resources based on the query requirements.
BigQuery does not have a fixed number of slots like traditional databases.
It dynamically allocates resources based on the query requirements.
The number of slots available for a query can vary depending on the complexity and size of the query.
BigQuery's serverless architecture allows it to scale automatically to handle
Some of the top questions asked at the Cognizant interview -
The duration of Cognizant interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4.4k interviews
Interview experience
based on 51.9k reviews
Rating in categories
Hyderabad / Secunderabad
3-5 Yrs
Not Disclosed
Associate
72.3k
salaries
| ₹5.2 L/yr - ₹16 L/yr |
Programmer Analyst
55.6k
salaries
| ₹2.4 L/yr - ₹9.3 L/yr |
Senior Associate
50.3k
salaries
| ₹9 L/yr - ₹28.6 L/yr |
Senior Processing Executive
29.1k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.7k
salaries
| ₹6 L/yr - ₹25 L/yr |
TCS
Infosys
Wipro
Accenture