i
HCLTech
Filter interviews by
I applied via Naukri.com and was interviewed before May 2021. There were 3 interview rounds.
What people are saying about HCLTech
I applied via Approached by Company
My framework is a comprehensive set of tools, libraries, and best practices that I use to streamline the development process and ensure high-quality deliverables.
Utilizes design patterns such as MVC for structuring code
Includes libraries for common tasks like data manipulation and networking
Emphasizes unit testing and continuous integration for code quality
Integrates with popular tools like Git for version control
Suppo...
Types of Selenium waits include implicit, explicit, and fluent waits.
Implicit wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit wait: Waits for a certain condition to occur before proceeding further.
Fluent wait: Waits for a condition to be true with a defined polling frequency.
Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);
XPath is used to navigate through XML documents, while CSS is used to style HTML elements.
XPath is more powerful and flexible for navigating XML documents
CSS is more commonly used for styling HTML elements
XPath uses path expressions to select nodes in an XML document
CSS uses selectors to target specific HTML elements
posted on 21 May 2024
I applied via Approached by Company
Talk about one of three topics for 2 mins
DHCP is a network protocol that automatically assigns IP addresses to devices, DNS translates domain names to IP addresses, routers connect networks, gateways connect networks with different protocols, booting into safe mode allows troubleshooting.
DHCP automatically assigns IP addresses to devices on a network
DNS translates domain names to IP addresses for easier access
Routers connect different networks together to ena...
IP address is a unique identifier assigned to each device connected to a network. Classes of IP include A, B, C, D, and E. Workgroup and domain are network organization structures. BSOD is Blue Screen of Death.
IP address is a unique numerical label assigned to each device on a network
Classes of IP include A, B, C, D, and E with different ranges of addresses
Workgroup is a peer-to-peer network where each computer has its...
I applied via Approached by Company and was interviewed in Oct 2023. There were 4 interview rounds.
I applied via Job Portal and was interviewed in Aug 2023. There were 3 interview rounds.
Code for linked list duplicate removal
I applied via campus placement at SMSG College, Sharghati and was interviewed in Aug 2022. There was 1 interview round.
A vernier caliper is a measuring instrument used to accurately measure the dimensions of an object.
It consists of a main scale and a sliding vernier scale.
The main scale provides the whole number measurements, while the vernier scale provides the fractional measurements.
The vernier scale slides along the main scale and is used to determine the precise measurement by aligning the markings on both scales.
Vernier calipers...
A micrometer is a precision measuring instrument used to measure small distances or thicknesses. A screw gauge is a type of micrometer that uses a screw mechanism for measurement.
A micrometer is commonly used in engineering and manufacturing industries for precise measurements.
It consists of a calibrated screw and a scale that allows for accurate readings.
Micrometers are capable of measuring dimensions as small as a fe...
A CNC machine, or Computer Numerical Control machine, is a device that uses computer programming to control the movement and operation of machine tools.
CNC machines are used in various industries, such as manufacturing, automotive, aerospace, and woodworking.
They are capable of performing precise and complex operations, such as cutting, drilling, milling, and shaping materials.
CNC machines eliminate the need for manual...
G-code and M-code are programming languages used in CNC machines to control their movements and functions.
G-code is used to control the movement of the machine, such as speed, direction, and position.
M-code is used to control the machine's auxiliary functions, such as turning on/off the spindle or coolant.
Both G-code and M-code are written in a specific format and are executed by the machine's controller.
Examples of G-...
Design thinking is a problem-solving approach that involves empathy, creativity, and iteration.
Design thinking involves understanding the user's needs and perspectives
It emphasizes creativity and brainstorming to generate multiple solutions
Prototyping and testing are used to refine and improve the solutions
Design thinking can be applied to a wide range of fields, from product design to business strategy
Examples of comp...
I applied via Naukri.com and was interviewed before Mar 2020. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Jan 2022. There was 1 interview round.
IOC Container is a core feature of Spring Framework that manages the dependencies between objects.
IOC stands for Inversion of Control
It is used to achieve loose coupling between objects
It allows objects to be created and wired together by an external framework
It reduces the amount of code needed for configuration and maintenance
Examples of IOC Containers in Spring are ApplicationContext and BeanFactory
We use @Value in Spring Boot to inject values from properties files or environment variables.
Allows for external configuration of application properties
Values can be injected from properties files or environment variables
Can be used to inject values into fields, constructors, or methods
Example: @Value("${my.property}") private String myProperty;
SQL databases are relational and use structured data, while NoSQL databases are non-relational and use unstructured data.
SQL databases use tables with predefined schema, while NoSQL databases use documents, key-value pairs, or graphs.
SQL databases are better for complex queries and data analysis, while NoSQL databases are better for scalability and flexibility.
Examples of SQL databases include MySQL, Oracle, and Postgr...
Abstract classes and interfaces are used to achieve abstraction and provide a blueprint for classes to implement.
Used abstract class to create a base class for different types of vehicles, with common properties and methods.
Used interface to define a contract for different payment methods, with each method implementing its own logic.
Abstract classes are used when we want to provide a default implementation for some met...
Authentication and authorization were handled using a combination of technologies and protocols.
Used OAuth 2.0 for authentication
Implemented role-based access control for authorization
Stored user credentials securely using bcrypt hashing algorithm
Used JSON Web Tokens (JWT) for session management
Implemented two-factor authentication for sensitive operations
Customer information will be encrypted using industry-standard encryption algorithms and stored securely.
Use industry-standard encryption algorithms such as AES or RSA
Ensure that encryption keys are securely stored and managed
Implement secure storage mechanisms such as hashing and salting
Regularly review and update encryption protocols to ensure they remain secure
Serialization is used to convert complex data structures into a format that can be easily transmitted or stored.
Serialization allows data to be sent over a network or saved to a file.
It enables objects to be stored in a database or memory.
Serialization is used in web services, messaging systems, and distributed computing.
Examples include JSON, XML, and binary formats like Protocol Buffers and Apache Avro.
Yes, I have experience with Jenkins and Cloud Deployment.
I have used Jenkins for continuous integration and continuous deployment.
I have experience with setting up Jenkins pipelines for automated deployment.
I have worked with cloud platforms like AWS and Azure for deploying applications.
I have used tools like Ansible and Terraform for infrastructure automation.
I have experience with containerization using Docker and Ku...
Yes, logging is an essential part of software development.
Logging helps in debugging and troubleshooting issues.
It provides a record of events and actions taken by the system.
It helps in monitoring system performance and identifying bottlenecks.
Examples of logging mechanisms include log4j, syslog, and ELK stack.
We are using multiple services in AWS.
We are using EC2 for hosting our application servers.
We are using S3 for storing our static files and backups.
We are using RDS for our database needs.
We are using CloudFront for content delivery.
We are using Lambda for serverless computing.
We are using Route 53 for DNS management.
We are using CloudWatch for monitoring and logging.
We are using IAM for access management.
We are using ...
I applied via Referral and was interviewed in Sep 2021. There were 3 interview rounds.
Interview experience
based on 52 reviews
Rating in categories
Software Engineer
22.7k
salaries
| ₹1.2 L/yr - ₹8 L/yr |
Technical Lead
20.9k
salaries
| ₹6.9 L/yr - ₹25 L/yr |
Senior Software Engineer
15.6k
salaries
| ₹4 L/yr - ₹16.5 L/yr |
Lead Engineer
14.9k
salaries
| ₹4.2 L/yr - ₹14 L/yr |
Analyst
14.1k
salaries
| ₹1.2 L/yr - ₹6.7 L/yr |
TCS
Wipro
Accenture
Cognizant