Filter interviews by
Infrastructure as Code (IaC) for EC2 allows automated provisioning and management of AWS EC2 instances.
Use AWS CloudFormation to define EC2 resources in YAML or JSON.
Example: Define an EC2 instance in CloudFormation template.
Utilize Terraform for IaC, with HCL syntax to manage EC2 instances.
Example: 'resource "aws_instance" "example" { ami = "ami-123456" instance_type = "t2.micro" }'
Leverage AWS CDK (Cloud Develop...
Familiarity with emerging technologies and tools enhances project management efficiency and effectiveness.
Agile methodologies (e.g., Scrum, Kanban) improve project flexibility and responsiveness.
Project management software (e.g., Jira, Trello) aids in task tracking and collaboration.
Data analytics tools (e.g., Tableau, Power BI) provide insights for informed decision-making.
Cloud-based solutions (e.g., Microsoft A...
Best practices in PMO enhance project management efficiency, alignment, and stakeholder engagement.
Establish clear governance structures to define roles and responsibilities, ensuring accountability.
Implement standardized project management methodologies (e.g., Agile, Waterfall) to maintain consistency across projects.
Utilize project management tools (e.g., Jira, Trello) for better tracking and collaboration among...
Yes, I have experience handling P1/P2 incidents in my previous roles.
Yes, I have handled multiple P1 incidents where immediate action was required to resolve critical issues impacting production systems.
I have also managed P2 incidents by prioritizing and troubleshooting to minimize impact on operations.
Examples include resolving server outages, database failures, and network connectivity issues under time pressur...
The Linux boot process involves several stages, including BIOS, bootloader, kernel initialization, and user space initialization.
BIOS (Basic Input/Output System) performs hardware initialization and loads bootloader
Bootloader (GRUB, LILO) loads the Linux kernel into memory
Kernel initializes devices, mounts the root filesystem, and starts user space processes
User space initialization involves starting system servic...
The importance of cybersecurity in today's digital age
Cybersecurity is essential to protect sensitive data and prevent cyber attacks
Companies invest in cybersecurity measures to safeguard their networks and systems
Cybersecurity professionals use tools like firewalls, antivirus software, and encryption to secure data
Regular security audits and updates are crucial to stay ahead of evolving threats
Training employees ...
A string is a sequence of characters used to represent text, enclosed in quotation marks.
A string can contain letters, numbers, symbols, and spaces
Strings are commonly used in programming to store and manipulate text data
Example: 'Hello, World!' is a string
In Java, exceptions can be handled using try-catch blocks to catch and handle specific exceptions.
Use try-catch blocks to catch exceptions and handle them gracefully
Use multiple catch blocks to handle different types of exceptions
Use finally block to execute code regardless of whether an exception is thrown or not
Throw custom exceptions using throw keyword
map transforms each element in a stream, while flatMap transforms each element into multiple elements
map applies a function to each element in a stream and returns a new stream of the results
flatMap applies a function that returns a stream for each element in the original stream, then flattens the streams into a single stream
Example: map - stream.map(x -> x * x), flatMap - stream.flatMap(str -> Arrays.stream(str.s...
ConcurrentModificationException occurs when a collection is modified while iterating over it.
Use Iterator to iterate over the collection instead of foreach loop.
If modification is necessary, use Iterator's remove() method instead of collection's remove() method.
Consider using synchronized collections or ConcurrentHashMap to avoid ConcurrentModificationException.
I have over 5 years of experience in software development, with expertise in Java, Python, and SQL.
5+ years of experience in software development
Proficient in Java, Python, and SQL
Worked on various projects including web development and data analysis
Experience with Agile methodologies and version control systems like Git
I appeared for an interview in Dec 2024.
Logical intelligence
Any information can be discussed.
A comprehensive analysis of an individual, group, situation, or phenomenon over an extended duration.
The reporter vanished while on assignment in the war zone.
I appeared for an interview in Dec 2024.
The Linux boot process involves several stages, including BIOS, bootloader, kernel initialization, and user space initialization.
BIOS (Basic Input/Output System) performs hardware initialization and loads bootloader
Bootloader (GRUB, LILO) loads the Linux kernel into memory
Kernel initializes devices, mounts the root filesystem, and starts user space processes
User space initialization involves starting system services an...
Yes, I have experience handling P1/P2 incidents in my previous roles.
Yes, I have handled multiple P1 incidents where immediate action was required to resolve critical issues impacting production systems.
I have also managed P2 incidents by prioritizing and troubleshooting to minimize impact on operations.
Examples include resolving server outages, database failures, and network connectivity issues under time pressure.
Dependency Injection is a design pattern in which components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
In Java, exceptions can be handled using try-catch blocks to catch and handle specific exceptions.
Use try-catch blocks to catch exceptions and handle them gracefully
Use multiple catch blocks to handle different types of exceptions
Use finally block to execute code regardless of whether an exception is thrown or not
Throw custom exceptions using throw keyword
map transforms each element in a stream, while flatMap transforms each element into multiple elements
map applies a function to each element in a stream and returns a new stream of the results
flatMap applies a function that returns a stream for each element in the original stream, then flattens the streams into a single stream
Example: map - stream.map(x -> x * x), flatMap - stream.flatMap(str -> Arrays.stream(str.split(...
ConcurrentModificationException occurs when a collection is modified while iterating over it.
Use Iterator to iterate over the collection instead of foreach loop.
If modification is necessary, use Iterator's remove() method instead of collection's remove() method.
Consider using synchronized collections or ConcurrentHashMap to avoid ConcurrentModificationException.
I appeared for an interview in May 2025, where I was asked the following questions.
Dynamic professional with a background in project management and a passion for driving efficiency and innovation in teams.
Over 5 years of experience in project management, successfully leading cross-functional teams to deliver projects on time and within budget.
Skilled in Agile methodologies, having implemented Scrum practices that improved team productivity by 30%.
Strong communication skills, demonstrated through regu...
I appeared for an interview in May 2025, where I was asked the following questions.
Primary keys uniquely identify records in a table, while unique keys ensure all values in a column are distinct.
Primary Key: A column or set of columns that uniquely identifies each row in a table.
Example: In a 'Users' table, 'UserID' can be a primary key.
Unique Key: A constraint that ensures all values in a column are unique, but allows one NULL value.
Example: In a 'Users' table, 'Email' can be a unique key, allowing ...
Java consists of several key components including the Java Development Kit, Java Runtime Environment, and Java Virtual Machine.
Java Development Kit (JDK): A software development kit for developing Java applications. Example: JDK 17.
Java Runtime Environment (JRE): Provides libraries and components necessary to run Java applications. Example: JRE 8.
Java Virtual Machine (JVM): An abstract machine that enables Java bytecod...
I applied via Job Portal and was interviewed in Nov 2024. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Jun 2024. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Sep 2024. There was 1 interview round.
I am shifting to seek new challenges, enhance my skills, and contribute to innovative projects in a dynamic environment.
Desire for professional growth: I want to expand my skill set and take on more responsibilities.
Interest in new technologies: I'm excited about working with modern frameworks and tools that I haven't used before.
Cultural fit: I believe the new company aligns better with my values and work style.
Career...
Top trending discussions
Some of the top questions asked at the Fujitsu interview -
The duration of Fujitsu interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 187 interview experiences
Difficulty level
Duration
based on 2.6k reviews
Rating in categories
Technical Service Engineer
1.2k
salaries
| ₹2.3 L/yr - ₹14 L/yr |
Application Developer
1k
salaries
| ₹2.1 L/yr - ₹15.4 L/yr |
Assistant Application Developer
696
salaries
| ₹2.5 L/yr - ₹7 L/yr |
Assistant Technical Service Engineer
633
salaries
| ₹2.5 L/yr - ₹7.8 L/yr |
Associate Application Developer
565
salaries
| ₹3.8 L/yr - ₹15.7 L/yr |
Accenture
TCS
Wipro
Cognizant