i
HCLTech
Filter interviews by
I applied via Naukri.com and was interviewed before Apr 2023. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jan 2023. There was 1 interview round.
Storage classes in C define the scope and lifetime of variables.
There are four storage classes in C: auto, register, static, and extern.
Auto storage class is the default storage class for all local variables.
Register storage class is used to define local variables that should be stored in a register for faster access.
Static storage class is used to define local variables that retain their value between function calls.
E...
Program to reverse an array of strings
Iterate through each string in the array and reverse it using built-in functions or by swapping characters
Use a temporary variable to store the reversed string before updating the original string
Ensure to handle edge cases like empty strings or null values
malloc pointer is a function in C programming used to dynamically allocate memory.
malloc pointer is used to allocate memory during runtime in C programming.
It returns a pointer to the allocated memory.
Example: int *ptr = (int*)malloc(10 * sizeof(int));
ACL protocol stands for Access Control List protocol, used to control access to network resources by defining rules for allowing or denying traffic.
ACL protocol is commonly used in networking to restrict access to certain resources based on defined rules.
ACLs can be configured on routers, switches, and firewalls to control traffic flow.
ACLs can be configured based on source/destination IP addresses, ports, protocols, e...
Program to find 1st and 2nd lowest numbers in an array of strings
Convert array of strings to array of integers
Sort the array in ascending order
Return the first and second elements of the sorted array
I applied via Naukri.com and was interviewed before Mar 2022. There were 2 interview rounds.
AGILE is a project management methodology that emphasizes on iterative development and customer collaboration.
AGILE focuses on delivering working software frequently
It values customer collaboration over contract negotiation
AGILE teams are self-organizing and cross-functional
It emphasizes on responding to change over following a plan
AGILE principles are outlined in the Agile Manifesto
Verification ensures that the product is built according to the requirements, while validation ensures that the product meets the customer's needs.
Verification checks if the product is built correctly, while validation checks if the right product is built.
Verification is a process of evaluating the intermediate work products, while validation is a process of evaluating the final product.
Verification is done by develope...
I applied via Naukri.com and was interviewed before Mar 2023. There were 2 interview rounds.
HCLTech interview questions for designations
I applied via Naukri.com and was interviewed before Feb 2023. There were 3 interview rounds.
Get interview-ready with Top HCLTech Interview Questions
I applied via Recruitment Consulltant and was interviewed in Feb 2022. There were 3 interview rounds.
DI stands for Dependency Injection in .Net Core.
DI is a design pattern used to achieve loose coupling between objects.
It allows for easier testing and maintenance of code.
In .Net Core, DI is implemented through the built-in service container.
Services can be registered and injected into classes using constructor injection.
Example: services.AddScoped
Example: public MyClass(IMyService myService)
Design patterns provide reusable solutions to common software design problems.
Design patterns help improve code readability and maintainability.
They provide a common language for developers to communicate and collaborate.
Examples include Singleton, Factory, and Observer patterns.
Design patterns can also improve performance and scalability.
They are especially useful in large and complex software systems.
Procedures and functions are both subroutines, but functions return a value while procedures do not.
Functions return a value while procedures do not
Functions can be used in expressions while procedures cannot
Functions can have parameters passed by value or reference while procedures can only have parameters passed by reference
Examples of functions include mathematical operations like addition and subtraction, while exa...
Check constraints ensure data integrity by limiting the values that can be inserted into a database table.
Check constraints are used to enforce business rules or data validation rules.
They prevent invalid data from being inserted into a table.
For example, a check constraint can ensure that a date column only contains dates in the future.
Check constraints can also be used to limit the range of values that can be inserte...
VDC stands for Virtual Design and Construction. Supervisor oversees VDC process.
VDC is a process of creating a digital model of a construction project before it is built.
It helps in identifying and resolving potential issues before construction begins.
Supervisor oversees the VDC process to ensure that the digital model is accurate and meets the project requirements.
VDC can also help in improving communication and colla...
VSL is the voltage at which the substrate current becomes zero in VSS.
VSL is the voltage at which the substrate current becomes zero in VSS.
It is the minimum voltage required to maintain a zero substrate current.
VSL is important in VSS as it helps in reducing the leakage current.
It is achieved by applying a negative voltage to the substrate.
VSL is typically set to -0.5V or -1.0V in modern CMOS processes.
MLAG is a protocol used for creating a loop-free network topology. LACP and PAGP are link aggregation protocols.
MLAG stands for Multi-Chassis Link Aggregation Group.
It allows multiple switches to appear as a single logical switch to the connected devices.
LACP (Link Aggregation Control Protocol) is an IEEE standard protocol used for link aggregation.
PAGP (Port Aggregation Protocol) is a Cisco proprietary protocol used f...
BGP path attributes used to manipulate ingress traffic and transit via 3rd AS.
AS Path attribute is used to manipulate ingress traffic by adding or removing AS numbers.
Local Preference attribute is used to influence the path selection within the same AS.
MED (Multi-Exit Discriminator) attribute is used to influence the path selection between different ASes.
Communities attribute is used to tag routes and influence the pat...
BGP community is a way to tag routes with additional information. It helps in controlling the flow of traffic.
BGP community is a 32-bit number that can be attached to a route advertisement.
It is used to tag routes with additional information.
It helps in controlling the flow of traffic by allowing network administrators to manipulate the way BGP routes are propagated and selected.
BGP communities can be used to implement...
VTep is a virtual tunnel endpoint used in VXLAN to extend Layer 2 networks over Layer 3 networks.
VTep is a software-based endpoint that terminates VXLAN tunnels.
It is used to extend Layer 2 networks over Layer 3 networks.
VXLAN header encapsulates the original Ethernet frame and adds a 24-bit VXLAN Network Identifier (VNI) to identify the virtual network.
The VLAN data is encapsulated with VXLAN header and fields like VN
Leaf and spine architecture is a network topology used in Cisco ACI for scalable and efficient data center networking.
Leaf switches connect to spine switches, which then connect to the core network.
Leaf switches handle traffic within their own pod, while spine switches handle traffic between pods.
ACI uses a 2-tier spine-leaf architecture for scalability and flexibility.
The spine switches act as the routing backbone, wh...
Nexus 9K hardware models used in Leaf and spine architecture.
Nexus 9372PX and 9372TX used as leaf switches
Nexus 9504, 9508, and 9516 used as spine switches
Nexus 93108TC-EX and 93180YC-EX also used as leaf switches
All models support VXLAN and ACI
Highly scalable and flexible architecture
L3 fabric is a network architecture that provides high-speed and low-latency connectivity between devices. COOP is a protocol used for failover and redundancy in networking.
L3 fabric is a type of network architecture that uses Layer 3 routing to provide high-speed and low-latency connectivity between devices.
It is designed to be scalable and flexible, allowing for easy expansion and modification of the network.
COOP (Cl...
EPG is Electronic Program Guide used for TV listings. Contract iOS is used for EPG communication due to its reliability and security.
EPG is a digital guide that provides information about TV programs and schedules.
Contract iOS is a secure and reliable way to communicate EPG data between devices.
EPG data can be accessed through set-top boxes, smart TVs, and mobile apps.
EPG data includes program titles, descriptions, sta
OTV mechanism refers to Orbital Transfer Vehicle mechanism used for transferring payloads from one orbit to another.
OTV mechanism is used for transferring payloads from one orbit to another
It is commonly used in space missions to transfer payloads between different orbits
OTV mechanism can be used to transfer payloads from low Earth orbit to geostationary orbit
It is also used for transferring payloads from one planet to
Administrative distances are values used by IGPs to determine the best path for routing.
Administrative distances are used to determine the trustworthiness of routing information received from different sources.
Lower administrative distances are preferred over higher ones.
Examples of IGPs and their default administrative distances include OSPF (110), IS-IS (115), and RIP (120).
OSPF should be priority over eBGP. Achieve this by manipulating administrative distance or metric.
OSPF should be preferred over eBGP as it is an interior gateway protocol while eBGP is an exterior gateway protocol
Manipulate administrative distance to make OSPF preferred over eBGP
Manipulate metric to make OSPF preferred over eBGP
Use route maps to manipulate the preference of OSPF over eBGP
Example: set the administrative...
I applied via Walk-in and was interviewed in Feb 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2022. There were 5 interview rounds.
Coding test is simple with lots of string, array, searching and sorting programs
What people are saying about HCLTech
Some of the top questions asked at the HCLTech Lead Engineer interview -
The duration of HCLTech Lead Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 112 interviews
5 Interview rounds
based on 1.6k reviews
Rating in categories
Software Engineer
23k
salaries
| ₹1.7 L/yr - ₹8 L/yr |
Technical Lead
21.2k
salaries
| ₹7 L/yr - ₹28 L/yr |
Senior Software Engineer
15.8k
salaries
| ₹4 L/yr - ₹16.5 L/yr |
Lead Engineer
14.9k
salaries
| ₹4.2 L/yr - ₹14 L/yr |
Analyst
14.4k
salaries
| ₹0.8 L/yr - ₹6.5 L/yr |
TCS
Wipro
Accenture
Cognizant