i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I appeared for an interview in Jan 2021.
Answers to questions related to Informatica Developer role.
Factless fact is a fact table that does not have any measures.
Star schema has a single fact table and multiple dimension tables, while snowflake schema has multiple dimension tables that are further normalized.
Oracle joins include inner join, left join, right join, and full outer join.
I appeared for an interview in Feb 2025, where I was asked the following questions.
Citrix is a software company specializing in virtualization, networking, and cloud computing solutions.
Founded in 1989, Citrix provides technologies for remote access and virtualization.
Citrix Virtual Apps and Desktops allow users to access applications and desktops remotely.
Citrix ADC (Application Delivery Controller) optimizes application performance and security.
Citrix Workspace integrates various tools for a seamle...
MCS are frameworks for managing organizational performance, while PVS assess and value that performance.
MCS helps in aligning organizational goals with operational activities.
Examples of MCS include budgeting systems, performance measurement systems, and strategic planning.
PVS focuses on quantifying performance outcomes, often using metrics like ROI or KPIs.
An example of PVS is a balanced scorecard that evaluates finan
Netscaler is a networking device that optimizes application delivery and enhances security for web applications.
Acts as a load balancer to distribute traffic across multiple servers.
Provides application acceleration through caching and compression.
Enhances security with features like web application firewall (WAF).
Supports SSL offloading to reduce server load.
Integrates with cloud services for hybrid deployments.
A Citrix upgrade involves planning, testing, and executing updates to enhance performance and security of Citrix environments.
Assess current environment: Evaluate existing Citrix components and their versions.
Backup configurations: Ensure all settings and data are backed up before proceeding.
Review release notes: Understand new features and changes in the upgrade version.
Test in a lab: Conduct a trial upgrade in a cont...
A storefront upgrade involves enhancing an online retail platform's features, design, and performance for better user experience.
Improves user interface and design for easier navigation.
Enhances mobile responsiveness to cater to mobile shoppers.
Integrates new payment options like digital wallets (e.g., Apple Pay).
Updates inventory management systems for real-time tracking.
Incorporates advanced analytics tools for bette
Common issues in Citrix include connectivity problems, performance issues, and configuration errors affecting user experience.
Connectivity issues: Users may experience difficulties connecting to Citrix sessions due to network problems or firewall settings.
Performance degradation: Slow application response times can occur due to high server load or insufficient bandwidth.
Session timeouts: Users may be unexpectedly logge...
Encountered critical P1 and P2 issues in Citrix related to performance and connectivity affecting user experience.
P1 Issue: High latency during peak hours, causing significant delays in application response times.
P2 Issue: Intermittent disconnections from the Citrix environment, impacting user productivity.
Example of P1: Users reported a 10-second delay when launching applications, which was traced back to network cong...
Citrix 1912 architecture enables secure remote access and virtualization for applications and desktops.
Microservices architecture allows for modular deployment and scalability.
Utilizes Citrix Hypervisor for efficient resource management and virtualization.
Supports multi-cloud environments, enabling deployment on various cloud platforms.
Incorporates Citrix Workspace for unified access to applications and data.
Enhanced s...
Citrix uses various ports for its services, enabling secure communication and data transfer across networks.
Port 1494: Used for Citrix ICA (Independent Computing Architecture) traffic.
Port 2598: Utilized for Session Reliability, ensuring stable connections.
Port 443: Commonly used for secure HTTPS connections to Citrix services.
Port 80: Used for HTTP traffic, often for web-based applications.
Port 3389: Used for Remote D
Citrix Director is a web-based management console for monitoring and troubleshooting Citrix environments.
Provides real-time monitoring of user sessions and resource usage.
Enables administrators to troubleshoot issues with virtual desktops and applications.
Offers detailed analytics and reporting on performance metrics.
Allows for user session management, including logoff and shadowing capabilities.
Integrates with Citrix ...
Common issues with Citrix include connectivity problems, performance issues, and compatibility challenges.
Connectivity issues: Users may experience dropped sessions or inability to connect due to network instability.
Performance degradation: Slow application response times can occur, often due to bandwidth limitations or server overload.
Compatibility problems: Certain applications may not function properly in a virtuali...
Citrix provisioning process involves creating and managing virtual desktops and applications efficiently.
1. Image Creation: A master image is created with the desired OS and applications.
2. Provisioning Services (PVS): The master image is streamed to target devices over the network.
3. Virtual Desktop Management: Administrators can manage and update the master image centrally.
4. Load Balancing: PVS allows for load balan...
Upgrading Citrix MCS involves planning, preparing, and executing the upgrade while ensuring minimal disruption to services.
1. Review the release notes for the new version to understand new features and changes.
2. Backup existing configurations and data to prevent loss during the upgrade.
3. Test the upgrade process in a staging environment to identify potential issues.
4. Schedule the upgrade during off-peak hours to min...
Citrix PVS store contains essential files for managing virtual disk images and configurations.
vDisk files (.vhd or .vhdx) - These are the virtual hard disk files used by the target devices.
Configuration files - These include settings for vDisk and target device configurations.
Boot files - Necessary files for booting the virtual machines, such as boot loader files.
Snapshot files - Used for maintaining different versions...
Versioning Citrix vDisk in PVS involves creating, managing, and deploying different versions of virtual disks for efficient updates.
Create a new version of the vDisk by selecting the existing vDisk and using the 'Version' option in the PVS console.
Use the 'Edit' option to modify settings or configurations in the new version without affecting the original.
Deploy the new version to target devices while keeping the previo...
Citrix policies manage user access, resource allocation, and security settings in virtual environments.
Access Control: Policies define who can access specific applications and data.
Resource Allocation: Policies can prioritize resources for critical applications, ensuring performance.
Security Settings: Policies enforce security measures like multi-factor authentication and encryption.
User Experience: Policies can custom...
Citrix offers various licensing models to cater to different business needs, including user-based and device-based licenses.
User License: Allows a specific number of users to access Citrix services, e.g., Citrix Virtual Apps and Desktops.
Device License: Permits a specific number of devices to access Citrix services, suitable for shared devices.
Concurrent License: Enables multiple users to share a pool of licenses, idea...
Troubleshooting application login issues involves systematic checks of user credentials, network, and application settings.
Verify user credentials: Ensure the username and password are correct. Example: Check for case sensitivity.
Check network connectivity: Ensure the device is connected to the internet. Example: Test by accessing other websites.
Inspect application status: Confirm the application is running and not exp...
Managing hotfixes in Citrix involves identifying issues, applying fixes, testing, and documenting changes for stability and compliance.
Identify the need for a hotfix based on user-reported issues or system monitoring.
Download the appropriate hotfix from the Citrix support site, ensuring compatibility with your environment.
Test the hotfix in a staging environment to assess its impact and ensure it resolves the issue wit...
Server deployment involves setting up servers for use, while decommissioning involves safely retiring them from service.
1. Server Deployment: Involves planning, provisioning, and configuring servers for operational use.
2. Pre-deployment Assessment: Evaluate requirements, capacity planning, and resource allocation.
3. Installation: Physically set up hardware and install necessary software, such as operating systems and a...
A health check process assesses system performance, stability, and security to ensure optimal operation.
Monitors system metrics like CPU usage, memory, and disk space.
Checks for software updates and patches to maintain security.
Validates network connectivity and response times.
Conducts regular backups to prevent data loss.
Example: A web server health check might ping the server and check response times.
I appeared for an interview in Feb 2025.
How many questions are there for the aptitude test?
Prepare thoroughly, dress appropriately, and communicate effectively to excel in an interview.
Research the company: Understand its mission, values, and recent developments. For example, know their latest product launch.
Dress professionally: Choose attire that aligns with the company's culture. For instance, a suit for corporate roles or smart casual for startups.
Practice common interview questions: Prepare answers for ...
Selecting candidates requires evaluating skills, experience, cultural fit, and potential for growth.
Relevant Experience: Assess if the candidate has prior experience in accounting roles, such as bookkeeping or financial analysis.
Technical Skills: Evaluate proficiency in accounting software like QuickBooks or Excel, which are essential for the role.
Cultural Fit: Consider how well the candidate aligns with the company's ...
I will complete my assignment and provide the topic.
I will discuss my team and friends.
I am not familiar with coding, but I will undergo training.
The application process for Cognizant involves online application, assessments, interviews, and onboarding.
1. Online Application: Candidates submit their resumes through the Cognizant careers website.
2. Assessments: Applicants may need to complete online tests that evaluate technical skills and aptitude.
3. Interviews: Successful candidates are invited for one or more interviews, which may include HR and technical round...
What are the case studies you can assist me with?
I utilize various methods to search for applications, including online databases, networking, and professional organizations.
Use online job boards like Indeed or LinkedIn to find accounting applications.
Network with professionals in the field to learn about new opportunities.
Attend industry conferences and seminars to discover applications and trends.
Utilize social media platforms to follow companies and job postings.
C...
What people are saying about Cognizant
Azure Data Lake Storage (ADLS) is a scalable data storage service for big data analytics in the cloud.
ADLS is designed for big data analytics, allowing storage of large amounts of unstructured data.
It integrates seamlessly with Azure services like Azure Databricks and Azure HDInsight.
ADLS supports hierarchical namespace, enabling efficient organization of data in directories.
It provides fine-grained access control usin...
An integration pipeline automates the process of integrating code changes into a shared repository, ensuring quality and consistency.
Continuous Integration (CI) is a key component, where developers frequently merge code changes.
Automated tests run on each integration to catch bugs early, e.g., unit tests, integration tests.
Build automation tools like Jenkins or Travis CI are often used to manage the pipeline.
Deployment...
Azure Databricks is an Apache Spark-based analytics platform optimized for Azure cloud services.
Built on Apache Spark, it provides a collaborative environment for data scientists and engineers.
Supports multiple languages including Python, R, Scala, and SQL for data processing.
Integrates seamlessly with Azure services like Azure Data Lake Storage and Azure Machine Learning.
Offers features like interactive notebooks for ...
A cluster is a group of interconnected computers that work together to perform tasks as a single system.
Clusters improve performance by distributing workloads across multiple machines.
They provide redundancy; if one node fails, others can take over (e.g., database clusters).
Common types include load-balancing clusters and high-availability clusters.
Examples include Hadoop clusters for big data processing and Kubernetes
Cognizant interview questions for popular designations
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Custom hooks in React are reusable functions that allow you to extract component logic into separate functions for better code organization and reusability.
Custom hooks are created using the 'use' prefix and can be used to share logic between components.
Use cases for custom hooks include fetching data from an API, handling form state, managing local storage, and more.
Example of a custom hook for API call: const useFetc...
useMemo is used to memoize a value, while useCallback is used to memoize a function.
useMemo is used to memoize a value and recompute it only when its dependencies change.
useCallback is used to memoize a callback function and prevent unnecessary re-renders.
Example: useMemo can be used to memoize the result of a complex computation, while useCallback can be used to memoize an event handler function.
Class-based components use ES6 classes and have lifecycle methods, while functional components are simpler and use functions.
Class-based components use ES6 classes to create components, while functional components are created using functions.
Class-based components have lifecycle methods like componentDidMount and componentDidUpdate, while functional components do not.
Functional components are simpler and more lightweig...
Implementing the lifecycle of a React component in a functional component
Use the useEffect hook to replicate lifecycle methods like componentDidMount, componentDidUpdate, and componentWillUnmount
Pass an empty array as the second argument to useEffect to mimic componentDidMount
Pass a variable or state as the second argument to useEffect to mimic componentDidUpdate
Return a cleanup function inside useEffect to mimic compo
Various state management techniques in React include Context API, Redux, and local state.
Context API: React's built-in solution for passing data through the component tree without having to pass props down manually at every level.
Redux: A popular state management library for React applications, allowing for a centralized store to manage application state.
Local state: Managing state within individual components using us
Redux is a predictable state container for JavaScript apps. Middlewares are functions that intercept actions before they reach the reducer.
Redux follows a unidirectional data flow architecture.
Middlewares in Redux are functions that can intercept, modify, or dispatch actions.
Common use cases for middlewares include logging, asynchronous API calls, and handling side effects.
Examples of popular Redux middlewares are Redu...
Hoisting in JavaScript is the behavior where variable and function declarations are moved to the top of their containing scope during the compilation phase.
Variable declarations are hoisted to the top of their scope, but not their initializations.
Function declarations are fully hoisted, meaning they can be called before they are declared.
Hoisting can lead to unexpected behavior if not understood properly.
Event bubbling is the propagation of events from the target element up through its ancestors in the DOM tree.
Events triggered on a child element will 'bubble up' and trigger on parent elements.
Event listeners can be attached to parent elements to handle events from multiple child elements.
Stopping event propagation can be done using event.stopPropagation() or event.stopImmediatePropagation().
Block scope and function scope are two types of scopes in JavaScript that determine the visibility and accessibility of variables.
Block scope refers to the visibility of variables within a block of code enclosed by curly braces. Variables declared with 'let' and 'const' have block scope.
Function scope refers to the visibility of variables within a function. Variables declared with 'var' have function scope.
Variables de...
Yes, I have experience working with semantic tags in HTML.
Used semantic tags like <header>, <nav>, <main>, <section>, <article>, <aside>, <footer> for better structure and SEO.
Understand the importance of using semantic tags for accessibility and search engine optimization.
Semantic tags help in organizing content and making it more readable for developers and browsers.
Various methods for creating an object in JavaScript include object literals, constructor functions, ES6 classes, and Object.create() method.
Object literals: var obj = { key: value };
Constructor functions: function ObjectName() { this.key = value; } var obj = new ObjectName();
ES6 classes: class ClassName { constructor() { this.key = value; } } var obj = new ClassName();
Object.create() method: var obj = Object.create(pr
Shallow copy only copies the references of nested objects, while deep copy creates new copies of nested objects.
Shallow copy creates a new object but does not create copies of nested objects, only copies their references.
Deep copy creates a new object and also creates new copies of all nested objects.
Shallow copy can be achieved using Object.assign() or spread operator, while deep copy can be achieved using JSON.parse(
The code will throw an error because 'a' is declared but not initialized.
The code will result in a ReferenceError because 'a' is declared but not assigned a value.
Variables declared with 'const' must be initialized at the time of declaration.
Initializing 'a' with a value before calling test() will prevent the error.
CSS can be used to arrange elements in a row and column layout using flexbox or grid layout properties.
Use display: flex; for a row layout and display: flex; flex-direction: column; for a column layout
Use justify-content and align-items properties to align items in the main axis and cross axis respectively
For grid layout, use display: grid; and grid-template-columns or grid-template-rows to define the layout
Yes, I have utilized CSS preprocessors such as SASS and LESS.
I have experience using SASS to streamline my CSS workflow by utilizing variables, mixins, and nesting.
I have also worked with LESS to improve code organization and maintainability through features like variables and functions.
The color applied will be based on the specificity of the selector, with ID having higher specificity than class.
ID has higher specificity than class in CSS
Color applied will be based on the selector with higher specificity
Example: If ID selector has color red and class selector has color blue, the color applied will be red
Get interview-ready with Top Cognizant Interview Questions
I appeared for an interview in Feb 2025.
I am a UiPath Developer with experience in automating various business processes.
Developed automation solutions using UiPath for data entry tasks
Integrated UiPath robots with APIs to automate data retrieval and processing
Worked on projects to automate invoice processing and report generation
Implemented error handling mechanisms and logging in UiPath workflows
ReFramework is a template in UiPath for building robust, scalable, and reusable automation projects.
ReFramework is a template that includes Dispatcher and Performer components for handling transactions.
Dispatcher is responsible for reading input data and adding it to a queue.
Performer processes items from the queue, performs the necessary actions, and updates the status of each transaction.
DataTable transaction approac...
Execute query is used to retrieve data from a database, while execute non-query is used to perform operations that do not return data.
Execute query is used for SELECT statements to retrieve data from a database.
Execute non-query is used for INSERT, UPDATE, DELETE statements that do not return data.
Execute query returns a result set, while execute non-query returns the number of rows affected.
Examples: Execute query - S...
Switch statement is used for multiple conditions, while if-else statement is used for binary conditions.
Switch statement is more efficient when there are multiple conditions to check.
If-else statement is more flexible as it can handle complex conditions.
Switch statement uses 'case' and 'break' keywords, while if-else statement uses 'if', 'else if', and 'else'.
Datatable is used to store and manipulate data in UiPath. Connection string is used to establish a connection to a database.
Datatable is a structured data type used to store information in rows and columns.
You can use activities like 'Build Data Table' to create a new datatable or 'Read Range' to read data from an Excel file into a datatable.
Connection string is a string that contains information about how to connect t...
Project roles and responsibilities define tasks and expectations for team members to ensure project success.
Project Manager: Oversees project planning, execution, and closure. Example: Coordinating team meetings and tracking progress.
Team Members: Execute specific tasks assigned to them. Example: Developers coding features based on requirements.
Stakeholders: Provide input and feedback throughout the project. Example: C...
I appeared for an interview in Feb 2025.
I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.
There are multiple ways to call server side code from client side, including AJAX, WebSockets, and REST API calls.
AJAX
WebSockets
REST API calls
To create a new request type in ITSM, follow these steps.
Navigate to the Service Catalog in the ITSM module.
Click on 'Create New' to start creating a new request type.
Fill in the necessary details such as name, description, and category.
Define the workflow for the request type, including approval processes and assignment rules.
Test the new request type to ensure it functions correctly.
Publish the request type for users...
Restrict characters for 'Investment' field in incident table to 500 characters using UI policy.
Create a UI policy on the incident table
Add a condition to check the length of the 'Investment' field
Set the UI policy action to display an error message if the character limit is exceeded
GFST submit is used to submit a GlideFormState object in ServiceNow.
GFST submit is used to save the current state of a form in ServiceNow.
It is commonly used in client-side scripts to save form data without refreshing the page.
GFST submit can be used to trigger business rules and workflows upon form submission.
Yes, 'IT Service Manager' role description and short description should be visible.
Role description should clearly outline the responsibilities and requirements of the IT Service Manager position
Short description should provide a brief overview of the role to attract potential candidates
Both descriptions should be easily accessible on the job posting or company website
Client scripts in ServiceNow are used to automate processes on the client side.
onChange
onLoad
onSubmit
Client script runs before UI Policy due to the order of execution in ServiceNow.
Client script runs before UI Policy because it is executed on the client side before the form is submitted.
UI Policy runs after Client script as it is applied after the form is submitted.
Client script is used for field-level validation and manipulation, while UI Policy is used for controlling field visibility and mandatory fields.
Business rules in ServiceNow can be categorized as before, after, async, and synchronous. After business rules run after a record is inserted or updated, while async business rules run in the background.
Types of business rules in ServiceNow: before, after, async, synchronous
After business rules run after a record is inserted or updated
Async business rules run in the background without blocking the user interface
Differe...
Yes, the order of Business rules can be changed.
Yes, the order of Business rules can be changed by adjusting the order in which they are executed in the Business rule list.
This can be done by changing the 'Order' field value in the Business rule record.
Business rules with lower 'Order' values will be executed before those with higher 'Order' values.
Changing the order of Business rules can impact the overall behavior an
The isolate checkbox is used to prevent a script from running in the global scope.
Prevents variables and functions from being accessed globally
Helps in avoiding conflicts with other scripts
Useful when developing complex applications with multiple scripts
xml() and xml() wait are both used in ServiceNow to parse XML data, but xml() wait is used for asynchronous parsing.
xml() is used for synchronous parsing of XML data in ServiceNow
xml.wait() is used for asynchronous parsing of XML data in ServiceNow
xml() is blocking, while xml.wait() allows other operations to continue while parsing XML data
Update 'Investment' field in incident table from Standard to SMA for all records
Create a script to update the 'Investment' field in incident table for all records
Use a loop to iterate through each record and update the 'Investment' field value from Standard to SMA
Yes, we can use 'previous' in Business rule to access the previous value of a field.
Use 'previous' keyword in a Business rule to access the previous value of a field
Can be helpful in comparing current and previous values for triggering actions
Example: gs.info('Previous value: ' + current.previous.value)
get reference is used to retrieve a reference to a record in another table
Used to establish relationships between records in different tables
Allows for easy access to related information
Can be used in scripts to retrieve data from related records
I applied via Walk-in and was interviewed in Nov 2024. There were 2 interview rounds.
I am a Senior Automation Test Engineer with 5+ years of experience in designing and implementing automated testing frameworks.
5+ years of experience in automation testing
Proficient in designing and implementing automated testing frameworks
Strong knowledge of testing tools like Selenium, Appium, and JUnit
Experience in creating test scripts and executing test cases
Ability to analyze test results and identify defects
The syntax for using driver.findElement in Selenium is driver.findElement(By locator)
Use driver.findElement(By locator) to locate a single element on the web page
Specify the locator strategy (e.g. By.id, By.name, By.xpath) to identify the element
Example: WebElement element = driver.findElement(By.id("username"));
Different types of assertions and syntax for hard assertion in TestNG
Types of assertions: Hard assertions and Soft assertions
Syntax for hard assertion in TestNG: Assert.assertEquals(expected, actual)
Types of wait mechanisms include implicit wait, explicit wait, fluent wait, and thread.sleep.
Implicit wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit wait: Waits for a certain condition to occur before proceeding further.
Fluent wait: Waits for a condition to be true with a specified polling frequency.
Thread.sleep: Pauses the execution for a specified amount of time.
Frames in Selenium can be managed using switchTo() method to navigate between frames.
Use driver.switchTo().frame() method to switch to a frame by index, name or WebElement
Use driver.switchTo().defaultContent() method to switch back to the main content
Use driver.switchTo().parentFrame() method to switch to the parent frame
Use a Set data structure to remove duplicates from an array of strings.
Create a Set from the array to automatically remove duplicates
Convert the Set back to an array to get the unique values
List, Set, and Map are different types of collections in Java used to store and manipulate groups of objects.
List is an ordered collection that allows duplicate elements. Example: ArrayList, LinkedList
Set is a collection that does not allow duplicate elements. Example: HashSet, TreeSet
Map is a collection of key-value pairs where each key is unique. Example: HashMap, TreeMap
I would analyze the user stories and application functionality to identify the root cause of the mismatch and work towards resolving it.
Review the user stories and application functionality to understand the discrepancies
Communicate with stakeholders to clarify requirements and expectations
Update test cases and automation scripts to align with the corrected user stories
Collaborate with developers to address any underly
I have over 5 years of experience in automation testing, with a focus on creating and executing test scripts for web applications.
Developing automation test scripts using tools like Selenium and TestNG
Creating test plans and test cases based on requirements
Executing test cases and reporting defects
Collaborating with developers and QA team to ensure quality of the product
Participating in Agile ceremonies such as sprint
Demonstrating feature file step definitions with different sets of data in a previous project scenario
Create a feature file with a scenario outline that includes placeholders for different sets of data
Write step definitions that use the placeholders to run the scenario with different data sets
Use data tables or examples in the feature file to provide the different sets of data
Run the scenario with different data sets t...
To count URLs in an HTML page using Selenium and open the URL containing your name, you can use a combination of Selenium WebDriver methods and regular expressions.
Use Selenium WebDriver to navigate to the HTML page and retrieve its source code
Use regular expressions to identify and count the URLs in the source code
Iterate through the list of URLs to find the one containing your name
Use Selenium WebDriver to open the U
Use regular expressions to separate letters and digits from a string in Java.
Use the String class's split() method with a regular expression to separate letters and digits.
Create a regular expression pattern that matches either letters or digits.
Store the separated letters and digits in separate arrays.
I appeared for an interview in Jan 2025.
Various data sources such as databases, APIs, files, and streaming services are used for data ingestion and processing.
Databases (e.g. MySQL, PostgreSQL)
APIs (e.g. RESTful APIs)
Files (e.g. CSV, JSON)
Streaming services (e.g. Kafka, Pub/Sub)
Partitioning is dividing data into smaller chunks for efficient storage and retrieval, while clustering is organizing data within those partitions based on a specific column.
Partitioning is done at the storage level to distribute data across multiple nodes for better performance.
Clustering is done at the query level to physically group data based on a specific column, improving query performance.
Example: Partitioning b...
Using bq commands to create a table and load a CSV file in Google BigQuery
Use 'bq mk' command to create a new table in BigQuery
Use 'bq load' command to load a CSV file into the created table
Specify schema and source format when creating the table
Specify source format and destination table when loading the CSV file
Example: bq mk --table dataset.table_name schema.json
Example: bq load --source_format=CSV dataset.table_nam
Use 'bq show' command to display the schema of a table in BigQuery.
Use 'bq show' command followed by the dataset and table name to display the schema.
The schema includes the column names, data types, and mode (nullable or required).
Example: bq show project_id:dataset.table_name
Leaf nodes are the bottom nodes in a tree structure, while columnar storage stores data in columns rather than rows.
Leaf nodes are the end nodes in a tree structure, containing actual data or pointers to data.
Columnar storage stores data in columns rather than rows, allowing for faster query performance on specific columns.
Columnar storage is commonly used in data warehouses and analytics databases.
Leaf nodes are impor...
BigQuery does not have fixed slots, it dynamically allocates resources based on the query requirements.
BigQuery does not have a fixed number of slots like traditional databases.
It dynamically allocates resources based on the query requirements.
The number of slots available for a query can vary depending on the complexity and size of the query.
BigQuery's serverless architecture allows it to scale automatically to handle
Some of the top questions asked at the Cognizant interview -
The duration of Cognizant interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4.4k interviews
Interview experience
based on 51.4k reviews
Rating in categories
Hyderabad / Secunderabad,
Chennai
+11-5 Yrs
Not Disclosed
Associate
72.2k
salaries
| ₹5.2 L/yr - ₹16 L/yr |
Programmer Analyst
55.6k
salaries
| ₹2.4 L/yr - ₹9.4 L/yr |
Senior Associate
49.5k
salaries
| ₹8.9 L/yr - ₹28 L/yr |
Senior Processing Executive
29k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹25 L/yr |
TCS
Infosys
Wipro
Accenture