i
HCLTech
Filter interviews by
I applied via Naukri.com and was interviewed in Jan 2024. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Oct 2023. There were 2 interview rounds.
OOPS concepts in Java refer to the principles of Object-Oriented Programming such as Inheritance, Polymorphism, Encapsulation, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class B extends class A.
Polymorphism: Allows objects to be treated as instances of their parent class. Example: Animal class with different subclasses like Dog, Cat.
Encapsulation: Bundlin...
I want to join the company because of its reputation for innovation and commitment to quality.
Impressed by company's track record of successful projects
Excited about opportunities for professional growth and development
Aligned with company values and culture
Interested in working with talented and diverse team members
What people are saying about HCLTech
I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.
I applied via Referral and was interviewed before Mar 2021. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Aug 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Apr 2021. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
I appeared for an interview in Dec 2020.
I applied via Job Portal and was interviewed before Nov 2020. There were 3 interview rounds.
Volatile keyword is used to indicate that a variable's value can be changed unexpectedly.
It ensures that the variable is always read from memory, not from cache
It is useful in multi-threaded environments where multiple threads may access the same variable
It is not recommended to use volatile for synchronization purposes
Example: volatile int count = 0;
I applied via Company Website and was interviewed before Feb 2021. There were 2 interview rounds.
based on 2 interviews
Interview experience
based on 74 reviews
Rating in categories
Software Engineer
23.6k
salaries
| ₹1.9 L/yr - ₹8 L/yr |
Technical Lead
21.6k
salaries
| ₹7 L/yr - ₹28 L/yr |
Senior Software Engineer
16.1k
salaries
| ₹4.5 L/yr - ₹17 L/yr |
Lead Engineer
15.8k
salaries
| ₹4.1 L/yr - ₹14 L/yr |
Analyst
14.8k
salaries
| ₹0.8 L/yr - ₹6.6 L/yr |
TCS
Wipro
Accenture
Cognizant