i
Cognizant
Filter interviews by
I applied via Walk-in and was interviewed in Nov 2020. There were 5 interview rounds.
An array linked list can be executed using a loop to traverse through the array and access the linked nodes.
Create an array to store the linked nodes
Assign the first node to the first element of the array
Use a loop to traverse through the array and access the linked nodes
To access the next node, use the index of the current node as the index of the next node in the array
Stop the loop when the last node is reached
Character constants are fixed values represented by a single character in C++.
They are enclosed in single quotes (' ')
Examples include 'a', 'B', '5', '$'
They are also known as character literals
OSI, TCP & IP are networking protocols used for communication between devices on a network.
OSI (Open Systems Interconnection) is a conceptual model that defines how data is transmitted over a network.
TCP (Transmission Control Protocol) is a protocol that ensures reliable transmission of data between devices.
IP (Internet Protocol) is a protocol that handles the addressing and routing of data packets between devices on a...
Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.
Streams in C++ are objects that allow reading from or writing to external sources or destinations.
cin is the standard input stream used for reading input from the user.
cout is the standard output stream used for printing output to the console.
cerr is the standard error stream used for printing error mess...
RDBMS stands for Relational Database Management System.
It is a type of database management system that stores data in tables with relationships between them.
It uses SQL (Structured Query Language) to manipulate and retrieve data.
Examples include MySQL, Oracle, and Microsoft SQL Server.
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves breaking down a table into smaller tables and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, with each level having specific rules to follow.
Examples of normalization include converting repeating gr...
INDEX is generally created on columns that are frequently used in WHERE, JOIN, and ORDER BY clauses.
INDEX improves the performance of SELECT queries.
INDEX should be created on columns with high selectivity.
INDEX should not be created on columns with low selectivity.
Examples of columns to create INDEX on are primary keys, foreign keys, and columns used in search queries.
Object oriented model is a programming paradigm that uses objects to represent real-world entities.
Objects have properties and methods that define their behavior
Encapsulation, inheritance, and polymorphism are key concepts in OOP
Examples of OOP languages include Java, C++, and Python
Top-n analysis is a technique used in DBMS to retrieve the top n records based on a specific criteria.
Used to retrieve top n records
Based on specific criteria
Commonly used in data analysis and reporting
DML is provided to manipulate data in a database.
DML stands for Data Manipulation Language.
It is used to insert, update, delete, and retrieve data from a database.
DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and maintaining data in a database.
Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.
Reference variables are declared using an ampersand (&) symbol.
They must be initialized when declared and cannot be reassigned to refer to a different variable.
Changes made to a reference variable affect the original variable it refers to.
They are commonly used to pass variables by reference to funct...
RDBMS is a type of DBMS that stores data in a structured manner using tables with relationships.
RDBMS stands for Relational Database Management System
Data is stored in tables with predefined relationships
Data is accessed using SQL (Structured Query Language)
Examples include MySQL, Oracle, and SQL Server
DBMS is a broader term that includes all types of database management systems
Examples of DBMS include MongoDB, Cassand
Normalization is a process of organizing data in a database to eliminate redundancy and improve data integrity.
First Normal Form (1NF) - Eliminate duplicate data by separating them into multiple tables.
Second Normal Form (2NF) - Remove partial dependencies by creating separate tables for sets of attributes.
Third Normal Form (3NF) - Eliminate transitive dependencies by creating separate tables for related attributes.
Boy...
Scope rules in C++ determine the visibility and accessibility of variables and functions within a program.
Variables declared within a block have local scope and are only accessible within that block.
Global variables have file scope and can be accessed from any function within the file.
Function parameters have function scope and are only accessible within that function.
Nested blocks can have their own scope, and variabl...
BCNF is not necessarily better than 2NF & 3NF, it depends on the specific requirements of the database.
BCNF is the highest normal form and ensures that there are no non-trivial functional dependencies between any subset of candidate keys.
2NF and 3NF are also important and should be used when appropriate.
For example, if a database has a composite primary key and non-key attributes that depend on only one part of the key...
An operating system is a software that manages computer hardware and software resources.
It acts as an interface between the user and the computer hardware.
It provides services to applications and manages system resources.
Examples include Windows, macOS, Linux, Android, and iOS.
Exclusive lock is used when a resource is being modified and prevents other processes from accessing it. Shared lock allows multiple processes to read a resource simultaneously.
Exclusive lock is used for write operations, while shared lock is used for read operations.
Exclusive lock blocks other processes from acquiring both exclusive and shared locks on the same resource.
Shared lock allows multiple processes to acquire...
rand() generates a random number, srand() seeds the random number generator.
rand() generates a pseudo-random number between 0 and RAND_MAX
srand() sets the seed for the random number generator used by rand()
srand() should be called before rand() to ensure different sequences of random numbers
Example: srand(time(NULL)) sets the seed to the current time, ensuring a different sequence each time the program is run
A subquery is a query within another query used to retrieve data that will be used in the main query.
Subqueries are enclosed in parentheses and placed within the WHERE clause of the main query.
They can be used to filter results based on a condition that involves data from another table.
Subqueries can also be used in the SELECT, FROM, and HAVING clauses.
Examples include finding the average salary of employees in a depar...
Linked List is a linear data structure. Stack and Queue are abstract data types.
Linked List: A collection of nodes where each node points to the next node.
Stack: A data structure where elements are added and removed from the top only.
Queue: A data structure where elements are added at the rear and removed from the front only.
Example: Browser history can be implemented using a Linked List.
Example: Undo/Redo functionalit...
Triggers are events that initiate an action or set of actions. They are commonly used in databases and automation systems.
Triggers are used in databases to automatically execute a set of actions when a certain event occurs, such as inserting or updating data.
They can also be used in automation systems to initiate a process or workflow when a specific event occurs, such as receiving an email or a file upload.
Triggers ca...
Semaphore and monitor are synchronization tools used in concurrent programming.
Semaphore is a signaling mechanism that allows multiple threads to access a shared resource simultaneously.
Monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block) for a certain condition to become true.
Semaphore is a lower-level primitive, while monitor is a higher-level abstra...
Transparent DBMS allows users to see and control the underlying database operations.
Transparent DBMS provides visibility into the database operations and allows users to monitor and control them.
It enables users to see how data is being stored, accessed, and manipulated in real-time.
Examples include Oracle Transparent Data Encryption and Microsoft SQL Server Transparent Data Encryption.
Transparent DBMS can improve secu...
RDBMS KERNEL is not a commonly used term in the industry.
There is no widely accepted definition of RDBMS KERNEL.
It may refer to the core components of a relational database management system.
It could also be a term used by a specific company or product.
Without more context, it is difficult to provide a specific answer.
Primary key uniquely identifies a record, foreign key links tables, candidate key can be primary key, super key is a set of attributes.
Primary key: Unique identifier for a record in a table
Foreign key: Links tables together by referencing the primary key of another table
Candidate key: A set of attributes that can be used as a primary key
Super key: A set of attributes that can uniquely identify a record
I appeared for an interview in Feb 2025.
My name is Naveen Kumar katru
Strength is the capacity to endure, resist, or exert force, often reflecting physical, mental, or emotional resilience.
Physical strength: The ability to lift heavy objects, e.g., weightlifting.
Mental strength: Resilience in facing challenges, e.g., overcoming failure.
Emotional strength: Managing emotions effectively, e.g., staying calm in crises.
Social strength: Building and maintaining relationships, e.g., teamwork in
My salary expectation is 25 k to 30 k
I tend to be overly critical of my own work, which can slow down my productivity at times.
I often spend too much time reviewing my work to ensure it's perfect, which can lead to delays.
For example, during a recent project, I missed a deadline because I was re-evaluating my presentation multiple times.
I've learned to set strict time limits for revisions to improve my efficiency.
I also seek feedback from colleagues to ga
I hail from a vibrant city known for its rich culture, diverse community, and beautiful landscapes that inspire creativity.
I grew up in a city that celebrates various festivals, such as Diwali and Christmas, showcasing its cultural diversity.
The local cuisine is a blend of flavors, with popular dishes like biryani and street food like pani puri that reflect the region's heritage.
Nature is abundant here, with parks and ...
I appeared for an interview in Feb 2025.
How many questions are there for the aptitude test?
Prepare thoroughly, dress appropriately, and communicate effectively to excel in an interview.
Research the company: Understand its mission, values, and recent developments. For example, know their latest product launch.
Dress professionally: Choose attire that aligns with the company's culture. For instance, a suit for corporate roles or smart casual for startups.
Practice common interview questions: Prepare answers for ...
Selecting candidates requires evaluating skills, experience, cultural fit, and potential for growth.
Relevant Experience: Assess if the candidate has prior experience in accounting roles, such as bookkeeping or financial analysis.
Technical Skills: Evaluate proficiency in accounting software like QuickBooks or Excel, which are essential for the role.
Cultural Fit: Consider how well the candidate aligns with the company's ...
I will complete my assignment and provide the topic.
I will discuss my team and friends.
I am not familiar with coding, but I will undergo training.
What are the case studies you can assist me with?
I utilize various methods to search for applications, including online databases, networking, and professional organizations.
Use online job boards like Indeed or LinkedIn to find accounting applications.
Network with professionals in the field to learn about new opportunities.
Attend industry conferences and seminars to discover applications and trends.
Utilize social media platforms to follow companies and job postings.
C...
What people are saying about Cognizant
Azure Data Lake Storage (ADLS) is a scalable data storage service for big data analytics in the cloud.
ADLS is designed for big data analytics, allowing storage of large amounts of unstructured data.
It integrates seamlessly with Azure services like Azure Databricks and Azure HDInsight.
ADLS supports hierarchical namespace, enabling efficient organization of data in directories.
It provides fine-grained access control usin...
An integration pipeline automates the process of integrating code changes into a shared repository, ensuring quality and consistency.
Continuous Integration (CI) is a key component, where developers frequently merge code changes.
Automated tests run on each integration to catch bugs early, e.g., unit tests, integration tests.
Build automation tools like Jenkins or Travis CI are often used to manage the pipeline.
Deployment...
Azure Databricks is an Apache Spark-based analytics platform optimized for Azure cloud services.
Built on Apache Spark, it provides a collaborative environment for data scientists and engineers.
Supports multiple languages including Python, R, Scala, and SQL for data processing.
Integrates seamlessly with Azure services like Azure Data Lake Storage and Azure Machine Learning.
Offers features like interactive notebooks for ...
A cluster is a group of interconnected computers that work together to perform tasks as a single system.
Clusters improve performance by distributing workloads across multiple machines.
They provide redundancy; if one node fails, others can take over (e.g., database clusters).
Common types include load-balancing clusters and high-availability clusters.
Examples include Hadoop clusters for big data processing and Kubernetes
Cognizant interview questions for popular designations
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Custom hooks in React are reusable functions that allow you to extract component logic into separate functions for better code organization and reusability.
Custom hooks are created using the 'use' prefix and can be used to share logic between components.
Use cases for custom hooks include fetching data from an API, handling form state, managing local storage, and more.
Example of a custom hook for API call: const useFetc...
useMemo is used to memoize a value, while useCallback is used to memoize a function.
useMemo is used to memoize a value and recompute it only when its dependencies change.
useCallback is used to memoize a callback function and prevent unnecessary re-renders.
Example: useMemo can be used to memoize the result of a complex computation, while useCallback can be used to memoize an event handler function.
Class-based components use ES6 classes and have lifecycle methods, while functional components are simpler and use functions.
Class-based components use ES6 classes to create components, while functional components are created using functions.
Class-based components have lifecycle methods like componentDidMount and componentDidUpdate, while functional components do not.
Functional components are simpler and more lightweig...
Implementing the lifecycle of a React component in a functional component
Use the useEffect hook to replicate lifecycle methods like componentDidMount, componentDidUpdate, and componentWillUnmount
Pass an empty array as the second argument to useEffect to mimic componentDidMount
Pass a variable or state as the second argument to useEffect to mimic componentDidUpdate
Return a cleanup function inside useEffect to mimic compo
Various state management techniques in React include Context API, Redux, and local state.
Context API: React's built-in solution for passing data through the component tree without having to pass props down manually at every level.
Redux: A popular state management library for React applications, allowing for a centralized store to manage application state.
Local state: Managing state within individual components using us
Redux is a predictable state container for JavaScript apps. Middlewares are functions that intercept actions before they reach the reducer.
Redux follows a unidirectional data flow architecture.
Middlewares in Redux are functions that can intercept, modify, or dispatch actions.
Common use cases for middlewares include logging, asynchronous API calls, and handling side effects.
Examples of popular Redux middlewares are Redu...
Hoisting in JavaScript is the behavior where variable and function declarations are moved to the top of their containing scope during the compilation phase.
Variable declarations are hoisted to the top of their scope, but not their initializations.
Function declarations are fully hoisted, meaning they can be called before they are declared.
Hoisting can lead to unexpected behavior if not understood properly.
Event bubbling is the propagation of events from the target element up through its ancestors in the DOM tree.
Events triggered on a child element will 'bubble up' and trigger on parent elements.
Event listeners can be attached to parent elements to handle events from multiple child elements.
Stopping event propagation can be done using event.stopPropagation() or event.stopImmediatePropagation().
Block scope and function scope are two types of scopes in JavaScript that determine the visibility and accessibility of variables.
Block scope refers to the visibility of variables within a block of code enclosed by curly braces. Variables declared with 'let' and 'const' have block scope.
Function scope refers to the visibility of variables within a function. Variables declared with 'var' have function scope.
Variables de...
Yes, I have experience working with semantic tags in HTML.
Used semantic tags like <header>, <nav>, <main>, <section>, <article>, <aside>, <footer> for better structure and SEO.
Understand the importance of using semantic tags for accessibility and search engine optimization.
Semantic tags help in organizing content and making it more readable for developers and browsers.
Various methods for creating an object in JavaScript include object literals, constructor functions, ES6 classes, and Object.create() method.
Object literals: var obj = { key: value };
Constructor functions: function ObjectName() { this.key = value; } var obj = new ObjectName();
ES6 classes: class ClassName { constructor() { this.key = value; } } var obj = new ClassName();
Object.create() method: var obj = Object.create(pr
Shallow copy only copies the references of nested objects, while deep copy creates new copies of nested objects.
Shallow copy creates a new object but does not create copies of nested objects, only copies their references.
Deep copy creates a new object and also creates new copies of all nested objects.
Shallow copy can be achieved using Object.assign() or spread operator, while deep copy can be achieved using JSON.parse(
The code will throw an error because 'a' is declared but not initialized.
The code will result in a ReferenceError because 'a' is declared but not assigned a value.
Variables declared with 'const' must be initialized at the time of declaration.
Initializing 'a' with a value before calling test() will prevent the error.
CSS can be used to arrange elements in a row and column layout using flexbox or grid layout properties.
Use display: flex; for a row layout and display: flex; flex-direction: column; for a column layout
Use justify-content and align-items properties to align items in the main axis and cross axis respectively
For grid layout, use display: grid; and grid-template-columns or grid-template-rows to define the layout
Yes, I have utilized CSS preprocessors such as SASS and LESS.
I have experience using SASS to streamline my CSS workflow by utilizing variables, mixins, and nesting.
I have also worked with LESS to improve code organization and maintainability through features like variables and functions.
The color applied will be based on the specificity of the selector, with ID having higher specificity than class.
ID has higher specificity than class in CSS
Color applied will be based on the selector with higher specificity
Example: If ID selector has color red and class selector has color blue, the color applied will be red
Get interview-ready with Top Cognizant Interview Questions
I appeared for an interview in Feb 2025.
I am a UiPath Developer with experience in automating various business processes.
Developed automation solutions using UiPath for data entry tasks
Integrated UiPath robots with APIs to automate data retrieval and processing
Worked on projects to automate invoice processing and report generation
Implemented error handling mechanisms and logging in UiPath workflows
ReFramework is a template in UiPath for building robust, scalable, and reusable automation projects.
ReFramework is a template that includes Dispatcher and Performer components for handling transactions.
Dispatcher is responsible for reading input data and adding it to a queue.
Performer processes items from the queue, performs the necessary actions, and updates the status of each transaction.
DataTable transaction approac...
Execute query is used to retrieve data from a database, while execute non-query is used to perform operations that do not return data.
Execute query is used for SELECT statements to retrieve data from a database.
Execute non-query is used for INSERT, UPDATE, DELETE statements that do not return data.
Execute query returns a result set, while execute non-query returns the number of rows affected.
Examples: Execute query - S...
Switch statement is used for multiple conditions, while if-else statement is used for binary conditions.
Switch statement is more efficient when there are multiple conditions to check.
If-else statement is more flexible as it can handle complex conditions.
Switch statement uses 'case' and 'break' keywords, while if-else statement uses 'if', 'else if', and 'else'.
Datatable is used to store and manipulate data in UiPath. Connection string is used to establish a connection to a database.
Datatable is a structured data type used to store information in rows and columns.
You can use activities like 'Build Data Table' to create a new datatable or 'Read Range' to read data from an Excel file into a datatable.
Connection string is a string that contains information about how to connect t...
Project roles and responsibilities define tasks and expectations for team members to ensure project success.
Project Manager: Oversees project planning, execution, and closure. Example: Coordinating team meetings and tracking progress.
Team Members: Execute specific tasks assigned to them. Example: Developers coding features based on requirements.
Stakeholders: Provide input and feedback throughout the project. Example: C...
I appeared for an interview in Feb 2025.
I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.
There are multiple ways to call server side code from client side, including AJAX, WebSockets, and REST API calls.
AJAX
WebSockets
REST API calls
To create a new request type in ITSM, follow these steps.
Navigate to the Service Catalog in the ITSM module.
Click on 'Create New' to start creating a new request type.
Fill in the necessary details such as name, description, and category.
Define the workflow for the request type, including approval processes and assignment rules.
Test the new request type to ensure it functions correctly.
Publish the request type for users...
Restrict characters for 'Investment' field in incident table to 500 characters using UI policy.
Create a UI policy on the incident table
Add a condition to check the length of the 'Investment' field
Set the UI policy action to display an error message if the character limit is exceeded
GFST submit is used to submit a GlideFormState object in ServiceNow.
GFST submit is used to save the current state of a form in ServiceNow.
It is commonly used in client-side scripts to save form data without refreshing the page.
GFST submit can be used to trigger business rules and workflows upon form submission.
Yes, 'IT Service Manager' role description and short description should be visible.
Role description should clearly outline the responsibilities and requirements of the IT Service Manager position
Short description should provide a brief overview of the role to attract potential candidates
Both descriptions should be easily accessible on the job posting or company website
Client scripts in ServiceNow are used to automate processes on the client side.
onChange
onLoad
onSubmit
Client script runs before UI Policy due to the order of execution in ServiceNow.
Client script runs before UI Policy because it is executed on the client side before the form is submitted.
UI Policy runs after Client script as it is applied after the form is submitted.
Client script is used for field-level validation and manipulation, while UI Policy is used for controlling field visibility and mandatory fields.
Business rules in ServiceNow can be categorized as before, after, async, and synchronous. After business rules run after a record is inserted or updated, while async business rules run in the background.
Types of business rules in ServiceNow: before, after, async, synchronous
After business rules run after a record is inserted or updated
Async business rules run in the background without blocking the user interface
Differe...
Yes, the order of Business rules can be changed.
Yes, the order of Business rules can be changed by adjusting the order in which they are executed in the Business rule list.
This can be done by changing the 'Order' field value in the Business rule record.
Business rules with lower 'Order' values will be executed before those with higher 'Order' values.
Changing the order of Business rules can impact the overall behavior an
The isolate checkbox is used to prevent a script from running in the global scope.
Prevents variables and functions from being accessed globally
Helps in avoiding conflicts with other scripts
Useful when developing complex applications with multiple scripts
xml() and xml() wait are both used in ServiceNow to parse XML data, but xml() wait is used for asynchronous parsing.
xml() is used for synchronous parsing of XML data in ServiceNow
xml.wait() is used for asynchronous parsing of XML data in ServiceNow
xml() is blocking, while xml.wait() allows other operations to continue while parsing XML data
Update 'Investment' field in incident table from Standard to SMA for all records
Create a script to update the 'Investment' field in incident table for all records
Use a loop to iterate through each record and update the 'Investment' field value from Standard to SMA
Yes, we can use 'previous' in Business rule to access the previous value of a field.
Use 'previous' keyword in a Business rule to access the previous value of a field
Can be helpful in comparing current and previous values for triggering actions
Example: gs.info('Previous value: ' + current.previous.value)
get reference is used to retrieve a reference to a record in another table
Used to establish relationships between records in different tables
Allows for easy access to related information
Can be used in scripts to retrieve data from related records
I applied via Walk-in and was interviewed in Nov 2024. There were 2 interview rounds.
I am a Senior Automation Test Engineer with 5+ years of experience in designing and implementing automated testing frameworks.
5+ years of experience in automation testing
Proficient in designing and implementing automated testing frameworks
Strong knowledge of testing tools like Selenium, Appium, and JUnit
Experience in creating test scripts and executing test cases
Ability to analyze test results and identify defects
The syntax for using driver.findElement in Selenium is driver.findElement(By locator)
Use driver.findElement(By locator) to locate a single element on the web page
Specify the locator strategy (e.g. By.id, By.name, By.xpath) to identify the element
Example: WebElement element = driver.findElement(By.id("username"));
Different types of assertions and syntax for hard assertion in TestNG
Types of assertions: Hard assertions and Soft assertions
Syntax for hard assertion in TestNG: Assert.assertEquals(expected, actual)
Types of wait mechanisms include implicit wait, explicit wait, fluent wait, and thread.sleep.
Implicit wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit wait: Waits for a certain condition to occur before proceeding further.
Fluent wait: Waits for a condition to be true with a specified polling frequency.
Thread.sleep: Pauses the execution for a specified amount of time.
Frames in Selenium can be managed using switchTo() method to navigate between frames.
Use driver.switchTo().frame() method to switch to a frame by index, name or WebElement
Use driver.switchTo().defaultContent() method to switch back to the main content
Use driver.switchTo().parentFrame() method to switch to the parent frame
Use a Set data structure to remove duplicates from an array of strings.
Create a Set from the array to automatically remove duplicates
Convert the Set back to an array to get the unique values
List, Set, and Map are different types of collections in Java used to store and manipulate groups of objects.
List is an ordered collection that allows duplicate elements. Example: ArrayList, LinkedList
Set is a collection that does not allow duplicate elements. Example: HashSet, TreeSet
Map is a collection of key-value pairs where each key is unique. Example: HashMap, TreeMap
I would analyze the user stories and application functionality to identify the root cause of the mismatch and work towards resolving it.
Review the user stories and application functionality to understand the discrepancies
Communicate with stakeholders to clarify requirements and expectations
Update test cases and automation scripts to align with the corrected user stories
Collaborate with developers to address any underly
I have over 5 years of experience in automation testing, with a focus on creating and executing test scripts for web applications.
Developing automation test scripts using tools like Selenium and TestNG
Creating test plans and test cases based on requirements
Executing test cases and reporting defects
Collaborating with developers and QA team to ensure quality of the product
Participating in Agile ceremonies such as sprint
Demonstrating feature file step definitions with different sets of data in a previous project scenario
Create a feature file with a scenario outline that includes placeholders for different sets of data
Write step definitions that use the placeholders to run the scenario with different data sets
Use data tables or examples in the feature file to provide the different sets of data
Run the scenario with different data sets t...
To count URLs in an HTML page using Selenium and open the URL containing your name, you can use a combination of Selenium WebDriver methods and regular expressions.
Use Selenium WebDriver to navigate to the HTML page and retrieve its source code
Use regular expressions to identify and count the URLs in the source code
Iterate through the list of URLs to find the one containing your name
Use Selenium WebDriver to open the U
Use regular expressions to separate letters and digits from a string in Java.
Use the String class's split() method with a regular expression to separate letters and digits.
Create a regular expression pattern that matches either letters or digits.
Store the separated letters and digits in separate arrays.
I appeared for an interview in Jan 2025.
Various data sources such as databases, APIs, files, and streaming services are used for data ingestion and processing.
Databases (e.g. MySQL, PostgreSQL)
APIs (e.g. RESTful APIs)
Files (e.g. CSV, JSON)
Streaming services (e.g. Kafka, Pub/Sub)
Partitioning is dividing data into smaller chunks for efficient storage and retrieval, while clustering is organizing data within those partitions based on a specific column.
Partitioning is done at the storage level to distribute data across multiple nodes for better performance.
Clustering is done at the query level to physically group data based on a specific column, improving query performance.
Example: Partitioning b...
Using bq commands to create a table and load a CSV file in Google BigQuery
Use 'bq mk' command to create a new table in BigQuery
Use 'bq load' command to load a CSV file into the created table
Specify schema and source format when creating the table
Specify source format and destination table when loading the CSV file
Example: bq mk --table dataset.table_name schema.json
Example: bq load --source_format=CSV dataset.table_nam
Use 'bq show' command to display the schema of a table in BigQuery.
Use 'bq show' command followed by the dataset and table name to display the schema.
The schema includes the column names, data types, and mode (nullable or required).
Example: bq show project_id:dataset.table_name
Leaf nodes are the bottom nodes in a tree structure, while columnar storage stores data in columns rather than rows.
Leaf nodes are the end nodes in a tree structure, containing actual data or pointers to data.
Columnar storage stores data in columns rather than rows, allowing for faster query performance on specific columns.
Columnar storage is commonly used in data warehouses and analytics databases.
Leaf nodes are impor...
BigQuery does not have fixed slots, it dynamically allocates resources based on the query requirements.
BigQuery does not have a fixed number of slots like traditional databases.
It dynamically allocates resources based on the query requirements.
The number of slots available for a query can vary depending on the complexity and size of the query.
BigQuery's serverless architecture allows it to scale automatically to handle
Some of the top questions asked at the Cognizant interview -
The duration of Cognizant interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4.3k interviews
Interview experience
based on 50.6k reviews
Rating in categories
Associate
72.1k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
Programmer Analyst
55.5k
salaries
| ₹2.4 L/yr - ₹9.5 L/yr |
Senior Associate
48.9k
salaries
| ₹9 L/yr - ₹27.8 L/yr |
Senior Processing Executive
28.9k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.5k
salaries
| ₹5.9 L/yr - ₹21 L/yr |
TCS
Infosys
Wipro
Accenture