Filter interviews by
Retrieve employee names with salaries exceeding the average salary from the employee table.
Use the AVG() function to calculate the average salary.
Use a subquery to compare each employee's salary against the average.
Example SQL query: SELECT name FROM employees WHERE salary > (SELECT AVG(salary) FROM employees);
Ensure the employee table has 'name' and 'salary' columns.
I will address user issues by actively listening, analyzing problems, and providing effective solutions promptly.
Listen actively to understand the user's concerns and gather all relevant information.
Analyze the issue by identifying patterns or common problems, using data if available.
Provide clear and concise solutions, ensuring the user understands the steps to resolve their issue.
Follow up with users to ensure t...
I am a dedicated professional with strong communication skills and a passion for delivering excellent customer service in non-voice processes.
Background: I have a degree in Business Administration, which has equipped me with essential skills in management and communication.
Experience: I have worked in a customer support role for over two years, where I handled inquiries and resolved issues efficiently.
Skills: Prof...
HashMap is non-synchronized and allows null keys/values, while Hashtable is synchronized and does not allow nulls.
HashMap is part of the Java Collections Framework, while Hashtable is part of the legacy collection classes.
HashMap allows one null key and multiple null values; Hashtable does not allow any null keys or values.
HashMap is faster than Hashtable due to lack of synchronization overhead.
HashMap is not thre...
Public key and private key are cryptographic keys used in asymmetric encryption for secure data transmission.
Public Key: A key that can be shared openly and is used to encrypt data.
Private Key: A key kept secret by the owner, used to decrypt data encrypted with the public key.
Example: In email encryption, a sender uses the recipient's public key to encrypt a message, which only the recipient can decrypt with their...
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewalls can be hardware-based, software-based, or a combination of both.
They help protect networks from unauthorized access and cyber threats.
Examples include Windows Firewall, Cisco ASA, and pfSense.
Firewalls can filter traffic based on IP addresses, ports, and protocols...
Oops concept is a programming paradigm that focuses on objects and classes to organize code and promote reusability.
Oops stands for Object-Oriented Programming
It involves concepts like inheritance, encapsulation, polymorphism, and abstraction
Objects are instances of classes, which define attributes and behaviors
Classes can inherit attributes and behaviors from other classes
Polymorphism allows objects to be treated...
Interfaces in programming define contracts for classes, enabling polymorphism and code reusability.
An interface is a reference type in Java that can contain only constants, method signatures, default methods, static methods, and nested types.
Example: In Java, 'public interface Animal { void sound(); }' defines a contract for any class that implements it.
Interfaces allow multiple inheritance in languages like Java,...
HTTP methods are used to indicate the desired action to be performed on a resource.
GET: Retrieve data from a server
POST: Submit data to be processed by a server
PUT: Update an existing resource on a server
DELETE: Remove a resource from a server
PATCH: Partially update a resource on a server
OPTIONS: Get information about the communication options available for a resource
Deadlock is a situation in which two or more competing actions are each waiting for the other to finish, preventing any of them from progressing.
Occurs in multitasking environments when processes are unable to proceed because each is waiting for the other to release a resource
Can happen in database systems when two transactions are each waiting for a resource locked by the other
Prevention methods include using tim...
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There was 1 interview round.
Cross-browser testing ensures web applications function correctly across different browsers and devices.
Identify target browsers: Focus on popular browsers like Chrome, Firefox, Safari, and Edge.
Use automated testing tools: Tools like Selenium or BrowserStack can simulate different browsers and devices.
Perform manual testing: Check critical functionalities manually on various browsers to catch any discrepancies.
Test re...
I applied via Recruitment Consulltant
Normal questions on some logic and all
Java is a high-level programming language known for its portability, security, and versatility.
Java is an object-oriented language
It is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)
Java is used for developing a wide range of applications, from mobile apps to enterprise systems
I applied via Job Fair and was interviewed in Sep 2024. There were 4 interview rounds.
Test on logical aptitude and some technical aptitude
Basic coding questions and logics
posted on 30 Oct 2024
I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.
Normal aptitude test
Two coding questions, two SQL questions, and ten multiple choice questions.
I applied via Walk-in and was interviewed in Aug 2024. There was 1 interview round.
Stages of testing involve planning, preparation, execution, and reporting of test results.
Planning: Define test objectives, scope, and resources.
Preparation: Develop test cases, scripts, and test data.
Execution: Run tests, record outcomes, and report defects.
Reporting: Summarize test results, provide recommendations for improvement.
Example: In software testing, stages include unit testing, integration testing, system t...
Maven cycle is the process of building, testing, packaging, and deploying a project using Maven build tool.
Maven cycle consists of phases like validate, compile, test, package, verify, install, and deploy.
Each phase in Maven cycle performs specific tasks such as compiling source code, running tests, packaging the application, etc.
Maven uses a project object model (POM) file to define the project structure and dependenc...
Sanity is mental health and clarity, while smoke is a visible suspension of carbon or other particles in air.
Sanity refers to mental health and clarity of mind, while smoke is a visible suspension of carbon or other particles in the air.
Sanity is related to one's state of mind and ability to think rationally, while smoke is a physical substance that can be seen and inhaled.
Examples: A person with good mental health is ...
To swap two integers, use a temporary variable to store one value before swapping.
Create a temporary variable to store one of the integers
Assign the value of the first integer to the second integer
Assign the value of the temporary variable to the first integer
Deadlock is a situation in which two or more competing actions are each waiting for the other to finish, preventing any of them from progressing.
Occurs in multitasking environments when processes are unable to proceed because each is waiting for the other to release a resource
Can happen in database systems when two transactions are each waiting for a resource locked by the other
Prevention methods include using timeouts...
HTTP methods are used to indicate the desired action to be performed on a resource.
GET: Retrieve data from a server
POST: Submit data to be processed by a server
PUT: Update an existing resource on a server
DELETE: Remove a resource from a server
PATCH: Partially update a resource on a server
OPTIONS: Get information about the communication options available for a resource
Top trending discussions
The duration of Cognizant Solutions Corp interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 73 interview experiences
Difficulty level
Duration
based on 155 reviews
Rating in categories
Senior Processing Executive
82
salaries
| ₹2.2 L/yr - ₹6 L/yr |
Processing Executive
53
salaries
| ₹2 L/yr - ₹3.7 L/yr |
Programmer Analyst
31
salaries
| ₹4 L/yr - ₹5.6 L/yr |
Senior Associate
30
salaries
| ₹3.9 L/yr - ₹21.5 L/yr |
Associate
22
salaries
| ₹5.7 L/yr - ₹12.6 L/yr |
TCS
Accenture
Wipro
Cognizant