i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Approached by Company and was interviewed in Nov 2021. There were 2 interview rounds.
The question is about various topics related to programming, including exceptions, collections, triggers, and functions.
Types of exceptions include checked and unchecked exceptions
Exceptions can be handled using try-catch blocks
Types of collections include lists, sets, and maps
Example of a program using a collection: storing and retrieving student names in a list
Example of a program using an exception: dividing two num...
I applied via Naukri.com and was interviewed in Dec 2021. There were 2 interview rounds.
I applied via Company Website and was interviewed in Mar 2022. There were 4 interview rounds.
About general questions
About programming
What people are saying about Cognizant
I applied via Naukri.com and was interviewed in Oct 2021. There were 2 interview rounds.
I am a software programmer with experience in Rest API, SharePoint, and SPFx.
Discuss experience with Rest API and retrieving more than 5000 values
Differentiate between List workflow and Reusable workflow
Explain how to fetch lookup value and user information in Rest API
Discuss threshold limit of list and differences between SharePoint online and on-premises
Explain what SPFx is and how to use it
Discuss how to get data fr
Cognizant interview questions for designations
posted on 20 Feb 2024
I applied via Campus Placement and was interviewed in Aug 2023. There were 4 interview rounds.
It is easy basic questions will be asked
Easy,only basic knowledge of programming is reuired
I applied via Company Website and was interviewed in Feb 2022. There were 4 interview rounds.
Aptitude and reasoning
C language
I applied via Walk-in and was interviewed in May 2022. There were 2 interview rounds.
I applied via Walk-in
There are various types of constraints in DOT NET development, including primary key, foreign key, unique, check, and default constraints.
Primary key constraints ensure each record in a table is unique.
Foreign key constraints enforce referential integrity between tables.
Unique constraints ensure that all values in a column are distinct.
Check constraints validate the data before it is inserted or updated.
Default constra...
Independent class can be instantiated while abstract class cannot be instantiated directly.
Independent class can be directly instantiated using the 'new' keyword.
Abstract class cannot be instantiated directly, it can only be used as a base class for other classes.
Independent class does not require any derived class to implement its members.
Abstract class can have abstract methods that must be implemented by derived cla
Seeking new challenges, growth opportunities, and a better work-life balance.
Looking for new challenges and opportunities to learn and grow.
Seeking a better work-life balance.
Interested in working with new technologies or in a different industry.
Wanting to advance my career and take on more responsibilities.
Company restructuring or changes in management.
Coding test will be pretty hard. 2 questions will be giv
Coding test will be pretty hard. Have to choose any one of 2 questions given and solve it in 45 mins.
Atleast 70-80% test case needs to be cleared to pass
Basic oops implementation.
Middleware is software that acts as a bridge between an operating system or database and applications, while DI (Dependency Injection) is a design pattern used to increase flexibility and maintainability of code.
Middleware is software that provides common services and capabilities to applications, such as authentication, logging, and routing.
DI is a design pattern where the dependencies of a class are injected from the...
Authentication in Web API involves verifying the identity of a user or system before granting access to resources.
Authentication headers like Authorization header are used to send credentials
Web API can use various authentication methods like JWT, OAuth, Basic Authentication
Authentication middleware is used to validate credentials and generate tokens
Access control lists (ACLs) can be used to define permissions for diff
Capgemini is a global leader in consulting, technology services and digital transformation, offering a wide range of opportunities for growth and development.
Capgemini is a well-established global company with a strong reputation in the IT industry
They offer a wide range of projects and opportunities for career growth
Capgemini values innovation and provides a collaborative work environment
The company has a strong focus...
based on 41 reviews
Rating in categories
Associate
72.4k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
Programmer Analyst
55.4k
salaries
| ₹2.4 L/yr - ₹9.7 L/yr |
Senior Associate
48.3k
salaries
| ₹9 L/yr - ₹27 L/yr |
Senior Processing Executive
28.6k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹24 L/yr |
TCS
Infosys
Wipro
Accenture