i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Walk-in and was interviewed in Nov 2020. There were 5 interview rounds.
An array linked list can be executed using a loop to traverse through the array and access the linked nodes.
Create an array to store the linked nodes
Assign the first node to the first element of the array
Use a loop to traverse through the array and access the linked nodes
To access the next node, use the index of the current node as the index of the next node in the array
Stop the loop when the last node is reached
Character constants are fixed values represented by a single character in C++.
They are enclosed in single quotes (' ')
Examples include 'a', 'B', '5', '$'
They are also known as character literals
OSI, TCP & IP are networking protocols used for communication between devices on a network.
OSI (Open Systems Interconnection) is a conceptual model that defines how data is transmitted over a network.
TCP (Transmission Control Protocol) is a protocol that ensures reliable transmission of data between devices.
IP (Internet Protocol) is a protocol that handles the addressing and routing of data packets between devices on a...
Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.
Streams in C++ are objects that allow reading from or writing to external sources or destinations.
cin is the standard input stream used for reading input from the user.
cout is the standard output stream used for printing output to the console.
cerr is the standard error stream used for printing error mess...
RDBMS stands for Relational Database Management System.
It is a type of database management system that stores data in tables with relationships between them.
It uses SQL (Structured Query Language) to manipulate and retrieve data.
Examples include MySQL, Oracle, and Microsoft SQL Server.
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves breaking down a table into smaller tables and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, with each level having specific rules to follow.
Examples of normalization include converting repeating gr...
INDEX is generally created on columns that are frequently used in WHERE, JOIN, and ORDER BY clauses.
INDEX improves the performance of SELECT queries.
INDEX should be created on columns with high selectivity.
INDEX should not be created on columns with low selectivity.
Examples of columns to create INDEX on are primary keys, foreign keys, and columns used in search queries.
Object oriented model is a programming paradigm that uses objects to represent real-world entities.
Objects have properties and methods that define their behavior
Encapsulation, inheritance, and polymorphism are key concepts in OOP
Examples of OOP languages include Java, C++, and Python
Top-n analysis is a technique used in DBMS to retrieve the top n records based on a specific criteria.
Used to retrieve top n records
Based on specific criteria
Commonly used in data analysis and reporting
DML is provided to manipulate data in a database.
DML stands for Data Manipulation Language.
It is used to insert, update, delete, and retrieve data from a database.
DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and maintaining data in a database.
Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.
Reference variables are declared using an ampersand (&) symbol.
They must be initialized when declared and cannot be reassigned to refer to a different variable.
Changes made to a reference variable affect the original variable it refers to.
They are commonly used to pass variables by reference to funct...
RDBMS is a type of DBMS that stores data in a structured manner using tables with relationships.
RDBMS stands for Relational Database Management System
Data is stored in tables with predefined relationships
Data is accessed using SQL (Structured Query Language)
Examples include MySQL, Oracle, and SQL Server
DBMS is a broader term that includes all types of database management systems
Examples of DBMS include MongoDB, Cassand
Normalization is a process of organizing data in a database to eliminate redundancy and improve data integrity.
First Normal Form (1NF) - Eliminate duplicate data by separating them into multiple tables.
Second Normal Form (2NF) - Remove partial dependencies by creating separate tables for sets of attributes.
Third Normal Form (3NF) - Eliminate transitive dependencies by creating separate tables for related attributes.
Boy...
Scope rules in C++ determine the visibility and accessibility of variables and functions within a program.
Variables declared within a block have local scope and are only accessible within that block.
Global variables have file scope and can be accessed from any function within the file.
Function parameters have function scope and are only accessible within that function.
Nested blocks can have their own scope, and variabl...
BCNF is not necessarily better than 2NF & 3NF, it depends on the specific requirements of the database.
BCNF is the highest normal form and ensures that there are no non-trivial functional dependencies between any subset of candidate keys.
2NF and 3NF are also important and should be used when appropriate.
For example, if a database has a composite primary key and non-key attributes that depend on only one part of the key...
An operating system is a software that manages computer hardware and software resources.
It acts as an interface between the user and the computer hardware.
It provides services to applications and manages system resources.
Examples include Windows, macOS, Linux, Android, and iOS.
Exclusive lock is used when a resource is being modified and prevents other processes from accessing it. Shared lock allows multiple processes to read a resource simultaneously.
Exclusive lock is used for write operations, while shared lock is used for read operations.
Exclusive lock blocks other processes from acquiring both exclusive and shared locks on the same resource.
Shared lock allows multiple processes to acquire...
rand() generates a random number, srand() seeds the random number generator.
rand() generates a pseudo-random number between 0 and RAND_MAX
srand() sets the seed for the random number generator used by rand()
srand() should be called before rand() to ensure different sequences of random numbers
Example: srand(time(NULL)) sets the seed to the current time, ensuring a different sequence each time the program is run
A subquery is a query within another query used to retrieve data that will be used in the main query.
Subqueries are enclosed in parentheses and placed within the WHERE clause of the main query.
They can be used to filter results based on a condition that involves data from another table.
Subqueries can also be used in the SELECT, FROM, and HAVING clauses.
Examples include finding the average salary of employees in a depar...
Linked List is a linear data structure. Stack and Queue are abstract data types.
Linked List: A collection of nodes where each node points to the next node.
Stack: A data structure where elements are added and removed from the top only.
Queue: A data structure where elements are added at the rear and removed from the front only.
Example: Browser history can be implemented using a Linked List.
Example: Undo/Redo functionalit...
Triggers are events that initiate an action or set of actions. They are commonly used in databases and automation systems.
Triggers are used in databases to automatically execute a set of actions when a certain event occurs, such as inserting or updating data.
They can also be used in automation systems to initiate a process or workflow when a specific event occurs, such as receiving an email or a file upload.
Triggers ca...
Semaphore and monitor are synchronization tools used in concurrent programming.
Semaphore is a signaling mechanism that allows multiple threads to access a shared resource simultaneously.
Monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block) for a certain condition to become true.
Semaphore is a lower-level primitive, while monitor is a higher-level abstra...
Transparent DBMS allows users to see and control the underlying database operations.
Transparent DBMS provides visibility into the database operations and allows users to monitor and control them.
It enables users to see how data is being stored, accessed, and manipulated in real-time.
Examples include Oracle Transparent Data Encryption and Microsoft SQL Server Transparent Data Encryption.
Transparent DBMS can improve secu...
RDBMS KERNEL is not a commonly used term in the industry.
There is no widely accepted definition of RDBMS KERNEL.
It may refer to the core components of a relational database management system.
It could also be a term used by a specific company or product.
Without more context, it is difficult to provide a specific answer.
Primary key uniquely identifies a record, foreign key links tables, candidate key can be primary key, super key is a set of attributes.
Primary key: Unique identifier for a record in a table
Foreign key: Links tables together by referencing the primary key of another table
Candidate key: A set of attributes that can be used as a primary key
Super key: A set of attributes that can uniquely identify a record
I applied via Naukri.com and was interviewed in Apr 2024. There were 2 interview rounds.
Was easy. hashmap array question
Easy apti questions.
I applied via Naukri.com and was interviewed in Oct 2022. There were 4 interview rounds.
Because it's so easy And because of that I have prepared for it
Because it's so easy and become of that I have prepared for it
Yes, I have good time management skills.
I prioritize my tasks based on their urgency and importance.
I use a to-do list to keep track of my tasks and deadlines.
I break down larger tasks into smaller, manageable chunks.
I try to minimize distractions and stay focused on the task at hand.
I regularly review my progress and adjust my schedule as needed.
What people are saying about Cognizant
I applied via Naukri.com and was interviewed in Jul 2022. There were 2 interview rounds.
Promise is a one-time event while Observable can emit multiple values over time.
Promise is used for asynchronous operations that will return a single value or an error.
Observable is used for asynchronous operations that can return multiple values over time.
Promise can be in one of three states: pending, fulfilled, or rejected.
Observable can emit values, errors, and completion events.
Promise can be converted to an Obser...
Angular lifecycle hooks are methods that get called at specific stages of a component's lifecycle.
ngOnInit() - called after the component is initialized
ngOnChanges() - called when the component's input properties change
ngOnDestroy() - called just before the component is destroyed
ngAfterViewInit() - called after the component's view has been initialized
ngAfterContentInit() - called after the component's content has been
Jwt security implementation in Angular
Install angular-jwt package
Create an auth service to handle token storage and retrieval
Add an HttpInterceptor to attach the token to outgoing requests
Use guards to protect routes based on authentication status
Cognizant interview questions for designations
I applied via Recruitment Consultant and was interviewed in May 2021. There was 1 interview round.
Get interview-ready with Top Cognizant Interview Questions
Good morning sir have a you sir my name is hemant Ramchandra narkhede
Java script simple frame
JavaScript has several data types including string, number, boolean, object, function, undefined, and null.
String: 'hello', '123'
Number: 123, 3.14
Boolean: true, false
Object: { key: 'value' }
Function: function() { }
Undefined: undefined
Null: null
var is function-scoped while let is block-scoped in JavaScript.
var keyword is function-scoped, meaning it is accessible throughout the function it is declared in.
let keyword is block-scoped, meaning it is only accessible within the block it is declared in.
Using var can lead to variable hoisting issues, while let provides more predictable behavior.
let allows for better variable scoping and reduces the risk of unintended
Pair programming promotes collaboration, knowledge sharing, and code quality.
Enhances code quality through immediate code review and feedback
Promotes knowledge sharing and learning from each other
Fosters collaboration and teamwork
Reduces the likelihood of bugs and errors
Increases productivity by leveraging two minds on the same problem
Helps in breaking down complex problems into smaller tasks
Improves communication skil
I use a combination of manual testing, unit testing, and debugging tools to identify bugs in my code.
Perform manual testing by running the code and checking for any unexpected behavior or errors.
Write unit tests to verify the functionality of individual components and catch any issues early on.
Utilize debugging tools like breakpoints, logging, and stack traces to track down the root cause of bugs.
Collaborate with team ...
I have been coding primarily in Python for 5 years.
I started learning Python in college and have been using it extensively in my professional career.
I have worked on various projects using Python, including web development, data analysis, and automation.
I am proficient in Python libraries such as NumPy, Pandas, and Django.
HR round full stack developer experience
Best atitude round questions
posted on 21 Nov 2024
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.
Lambda expressions allow for more concise code and easier parallel programming.
Functional interfaces enable the use of lambda expressions.
Streams provide a way to work with sequences of elements and perform operations on them.
Default methods allow interfaces to have method implementations.
Optional cl...
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Mime types are identifiers used to specify the type of data being sent over the internet.
Mime types are used in HTTP headers to indicate the type of content being sent, such as text/html for HTML files or image/jpeg for JPEG images.
They help browsers and servers understand how to handle the content being transmitted.
Mime types also help in determining how a file should be processed or displayed by the receiving end.
Com...
I applied via LinkedIn and was interviewed in Jun 2024. There were 3 interview rounds.
Technical related questions
In Ai related question
posted on 7 Feb 2024
Closures in JavaScript are functions that have access to variables from their outer scope, even after the outer function has finished executing.
Closures are created when a function is defined inside another function.
The inner function has access to the outer function's variables, parameters, and even the outer function's return value.
Closures are useful for creating private variables and data encapsulation.
They can be ...
Props and state are both used in React to manage and pass data, but they have different purposes and behaviors.
Props are read-only and passed from parent components to child components.
State is mutable and managed within a component.
Props are used to pass data from a parent component to a child component.
State is used to manage and update data within a component.
Props are passed as attributes to a component in JSX.
Stat...
Performance optimization involves identifying and resolving bottlenecks to improve the efficiency of software.
Identify and analyze performance bottlenecks
Optimize algorithms and data structures
Improve database performance through indexing and query optimization
Use caching techniques to reduce database and network calls
Minimize network latency by optimizing network requests
Optimize front-end code by reducing DOM manipul...
Class-based components are ES6 classes that extend React.Component, while function-based components are functions that return JSX.
Class-based components are more feature-rich and have access to lifecycle methods.
Function-based components are simpler and easier to read and test.
Class-based components can have state and use lifecycle methods like componentDidMount and componentDidUpdate.
Function-based components can use ...
ES6 (ECMAScript 2015) introduced several new features to JavaScript, enhancing its functionality and making it more efficient.
Arrow functions: concise syntax for writing functions
Let and const: block-scoped variables
Template literals: easier string interpolation
Destructuring assignment: extracting values from arrays or objects
Spread syntax: expanding elements in arrays or objects
Classes: syntactical sugar for creating ...
based on 21 reviews
Rating in categories
Associate
72.4k
salaries
| ₹5.1 L/yr - ₹15.9 L/yr |
Programmer Analyst
55.4k
salaries
| ₹2.4 L/yr - ₹9.6 L/yr |
Senior Associate
48.3k
salaries
| ₹8.9 L/yr - ₹27.1 L/yr |
Senior Processing Executive
28.6k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹24.2 L/yr |
TCS
Infosys
Wipro
Accenture