i
Infosys
Work with us
Filter interviews by
DevOps methodology integrates development and operations to enhance collaboration, efficiency, and software delivery speed.
Focuses on collaboration between development and operations teams.
Utilizes automation tools like Jenkins for continuous integration and delivery.
Emphasizes monitoring and feedback loops to improve processes.
Encourages a culture of shared responsibility and accountability.
Adopts Agile practices...
OOP is a programming paradigm based on objects, encapsulating data and behavior for modular and reusable code.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class using properties and methods of an existing class (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present the same interface for di...
Fundamental coding concepts include syntax, data structures, algorithms, and debugging, essential for effective programming.
Syntax: The set of rules that defines the combinations of symbols that are considered to be correctly structured programs. Example: In Python, indentation is crucial.
Data Structures: Ways to organize and store data for efficient access and modification. Example: Arrays, linked lists, and hash...
Language is a structured system of communication using symbols, sounds, or gestures to convey meaning.
Language can be spoken, written, or signed, such as English, Spanish, or American Sign Language.
It consists of grammar, vocabulary, and syntax that govern how words are combined.
Language evolves over time, adapting to cultural and societal changes, like the emergence of slang.
It serves various functions, including...
The strategy involves analyzing data patterns to derive actionable insights for decision-making.
Identify key data points: Focus on metrics that directly impact outcomes, such as user engagement or system performance.
Utilize data visualization: Tools like graphs and charts can help reveal trends and anomalies in the data.
Apply statistical analysis: Techniques like regression analysis can uncover relationships betwe...
Encapsulation is a fundamental concept in OOP that restricts direct access to an object's data and methods.
Encapsulation combines data and methods that operate on that data into a single unit called a class.
It restricts access to certain components, which is achieved using access modifiers like private, protected, and public.
For example, a class 'Car' can have private attributes like 'speed' and 'fuelLevel', and p...
Deep copy creates a new object with copies of nested objects, while shallow copy copies references to nested objects.
Shallow copy: Uses the same references for nested objects. Example: `list2 = list1.copy()`.
Deep copy: Creates entirely new objects for nested structures. Example: `import copy; list2 = copy.deepcopy(list1)`.
Modifying a nested object in a shallow copy affects the original. In deep copy, it does not.
S...
Python uses automatic memory management with a built-in garbage collector to handle memory allocation and deallocation.
Python uses a private heap space to store all its objects and data structures.
Memory allocation is handled by the Python memory manager, which manages the allocation of memory blocks.
Python employs reference counting to keep track of the number of references to an object. When the reference count ...
Python decorators are functions that modify the behavior of other functions or methods.
A decorator is a function that takes another function as an argument and extends its behavior without modifying it.
They are often used for logging, enforcing access control, instrumentation, and caching.
Syntax: Use the '@decorator_name' syntax above the function definition.
Example: @app.route('/') defines a route in Flask web ap...
MVC architecture separates application logic into three interconnected components: Model, View, and Controller.
Model: Represents the data and business logic (e.g., a User class in a web application).
View: Displays the data to the user (e.g., HTML/CSS templates).
Controller: Handles user input and updates the Model and View accordingly (e.g., a servlet in Java).
Promotes separation of concerns, making applications ea...
I appeared for an interview in Jan 2025.
The exam consists of seven sections, and the cutoff score is quite high; it is essential to complete the exam thoroughly.
I completed a 6-month internship at a tech company, where I worked on network infrastructure projects.
Assisted in setting up and configuring network devices such as routers and switches
Troubleshooted network issues and implemented solutions
Collaborated with team members on various IT projects
Participated in meetings with clients to discuss project requirements
I have worked on various major projects including designing and implementing network infrastructure, developing automation scripts, and optimizing system performance.
Designed and implemented a new network infrastructure for a large company, improving network speed and reliability
Developed automation scripts to streamline system monitoring and maintenance tasks, saving time and reducing errors
Optimized system performanc...
The latest news I heard regarding technology is the release of the new iPhone 13 with improved camera features.
Apple recently announced the release of the iPhone 13 series with upgraded camera capabilities.
The new iPhone 13 models come with improved low-light performance and cinematic mode for videos.
Apple also introduced the A15 Bionic chip for enhanced performance and battery life.
I appeared for an interview in Feb 2025, where I was asked the following questions.
Java supports two main categories of data types: primitive types and reference types, each serving different purposes.
Primitive Data Types: These include int, char, double, boolean, etc. Example: int age = 30;
Reference Data Types: These include objects and arrays. Example: String name = 'John';
Primitive types are stored directly in memory, while reference types store references to objects.
Java has 8 primitive data type...
Java Collections Framework provides a set of classes and interfaces for storing and manipulating groups of objects.
Collection Interface: The root interface for the collection hierarchy. Example: List, Set, Queue.
List Interface: An ordered collection (also known as a sequence). Example: ArrayList, LinkedList.
Set Interface: A collection that does not allow duplicate elements. Example: HashSet, TreeSet.
Queue Interface: A ...
HashMap stores key-value pairs using a hash table, allowing for efficient data retrieval and storage.
Uses an array of buckets to store entries.
Each key is hashed to determine its bucket index.
Handles collisions using linked lists or trees (Java 8+).
Resizes when the load factor exceeds a threshold (default 0.75).
Example: Inserting (key: 'A', value: 1) hashes 'A' to index 0.
Use the transient keyword in Java to prevent a variable from being serialized.
Declare the variable with the transient keyword: `private transient int myVar;`
Transient variables are ignored during serialization, meaning they won't be saved.
Useful for sensitive data like passwords or large objects that can be recreated.
Example: `private transient String password;` will not be serialized.
Java exceptions are categorized into checked and unchecked exceptions, each serving different error handling purposes.
Checked Exceptions: Must be declared or handled (e.g., IOException, SQLException).
Unchecked Exceptions: Do not need to be declared (e.g., NullPointerException, ArrayIndexOutOfBoundsException).
Errors: Serious issues that applications should not catch (e.g., OutOfMemoryError, StackOverflowError).
Custom Ex...
In Java, if both try and catch have return statements, the catch block's return executes first if an exception occurs.
The try block executes first; if no exception occurs, its return statement is used.
If an exception is thrown, the catch block executes, and its return statement takes precedence.
Example: In a try-catch with return in both, if an exception occurs, the catch's return is returned, ignoring the try's return...
Encapsulation in Java is the bundling of data and methods that operate on that data within a single unit, typically a class.
Encapsulation restricts direct access to some of an object's components, which is a means of preventing unintended interference.
It is achieved using access modifiers: private, protected, and public.
Example: A class 'Person' with private fields 'name' and 'age', accessed via public methods.
Encapsul...
The super keyword in Java is used to refer to the superclass's methods and constructors, enabling access to inherited properties.
Access superclass methods: super.methodName();
Access superclass constructors: super();
Resolve name conflicts: super.variableName;
Example: class A { void display() { System.out.println('A'); } } class B extends A { void display() { super.display(); System.out.println('B'); } }
Yes, constructors can call each other using 'this()' in Java, enabling constructor chaining.
Constructor chaining allows one constructor to call another within the same class.
Use 'this(parameters)' to invoke another constructor from a constructor.
Example: 'this(5)' in a constructor can call another constructor that takes an int parameter.
Chaining helps reduce code duplication and improves readability.
Private static methods cannot be overridden in Java due to their access level and static nature.
Private methods are not visible to subclasses, hence cannot be overridden.
Static methods belong to the class, not instances, preventing polymorphism.
Example: A private static method in class A cannot be overridden in class B if B extends A.
Java's exception inheritance rules dictate how exceptions can be caught and declared in methods.
1. Checked exceptions must be declared in the method signature or handled within the method.
2. Unchecked exceptions (RuntimeExceptions) do not need to be declared or caught.
3. Subclasses of Exception are checked exceptions; subclasses of RuntimeException are unchecked.
4. A method can throw multiple exceptions, but must decla...
JSP filters are components that allow developers to intercept requests and responses in JavaServer Pages.
Filters can modify request and response objects before they reach the JSP or servlet.
They are defined in the web.xml file or using annotations in Java.
Common use cases include logging, authentication, and input validation.
Example: A logging filter can log the details of incoming requests.
Filters can be chained, allo...
Java Design Patterns are reusable solutions to common software design problems, enhancing code maintainability and scalability.
Creational Patterns: Deal with object creation. Example: Singleton pattern ensures a class has only one instance.
Structural Patterns: Focus on composition of classes. Example: Adapter pattern allows incompatible interfaces to work together.
Behavioral Patterns: Concerned with object interaction....
I appeared for an interview in Jan 2025.
They gave a case study where the candidate had to showcase the audience segmentation, create a brochure design with content and showcase the writing skills based on a product that they gave.
To plan a brochure layout, consider the target audience, key message, visual hierarchy, branding, and call-to-action.
Identify the target audience and tailor the design to appeal to their preferences and needs.
Determine the key message or information that needs to be communicated clearly.
Establish a visual hierarchy to guide the reader's eye through the content.
Ensure consistent branding elements such as colors, fonts, ...
I would schedule regular meetings with stakeholders to discuss information needs and establish clear communication channels.
Schedule regular meetings with stakeholders to discuss information needs
Establish clear communication channels to ensure timely and accurate information collection
Utilize project management tools to track progress and deadlines
Provide stakeholders with updates on information collection process
I applied via Company Website
Deleting a child table column linked by a foreign key requires careful consideration of referential integrity.
Foreign keys enforce referential integrity between parent and child tables.
You cannot directly delete a column from a child table if it is part of a foreign key constraint.
To delete the column, first drop the foreign key constraint using: ALTER TABLE child_table DROP CONSTRAINT fk_name;
After dropping the constr...
No, we cannot use commit or roll back within a trigger.
Triggers are automatically committed or rolled back as part of the transaction that fired them.
Using commit or rollback within a trigger can lead to unpredictable behavior and is not recommended.
Materialized views store the results of a query and can be refreshed to update the data.
Materialized views store the results of a query in a table-like structure
They can be refreshed manually or automatically based on a schedule
Refresh options include full, fast, and force refresh
Example: CREATE MATERIALIZED VIEW mv_name AS SELECT * FROM table_name;
Use CONNECT BY LEVEL to print numbers from 1 to 10 in Oracle SQL
Use CONNECT BY LEVEL to generate rows from 1 to 10
Select the generated numbers in the query
Context switching is the process of storing and restoring the state of a CPU so that multiple processes can share the same CPU.
Context switching allows the CPU to switch from one process to another, enabling multitasking.
In Oracle PLSQL, collection types are used to store multiple values in a single variable.
Examples of collection types in PLSQL include arrays, nested tables, and associative arrays.
Analytical functions are used to perform calculations across a set of rows related to the current row.
Analytical functions are used to calculate aggregate values based on a group of rows.
They can be used to calculate running totals, moving averages, rank, percentiles, etc.
Examples include functions like ROW_NUMBER(), RANK(), DENSE_RANK(), LAG(), LEAD(), SUM() OVER(), AVG() OVER().
Set operators are used to combine the result sets of two or more SELECT statements. UNION ALL keeps duplicates.
Set operators include UNION, UNION ALL, INTERSECT, and MINUS
UNION ALL retains duplicate rows from the result sets
Example: SELECT column1 FROM table1 UNION ALL SELECT column1 FROM table2
I applied via Referral and was interviewed in Nov 2024. There were 2 interview rounds.
I am a passionate Angular Developer with 5 years of experience in building responsive web applications.
5 years of experience in Angular development
Strong knowledge of HTML, CSS, and JavaScript
Experience in building responsive web applications
Familiarity with RESTful APIs and version control systems like Git
Attributes in HTML provide additional information about an element and are defined within the element's start tag.
Attributes are used to modify the behavior or appearance of an HTML element.
They are specified within the opening tag of an element using name-value pairs.
Examples include 'href' in an anchor tag (<a href='https://www.example.com'>) and 'src' in an image tag (<img src='image.jpg'>).
Flexbox is a layout model in CSS that allows for dynamic and responsive design of web pages.
Flexbox is used to create flexible layouts that can adapt to different screen sizes and orientations.
It allows for easy alignment and distribution of elements within a container.
Flexbox properties include display: flex, flex-direction, justify-content, align-items, and flex-grow.
Example: display: flex; justify-content: center; a...
Developed a web application for managing inventory and sales for a retail store.
Used Angular framework for front-end development
Implemented CRUD operations for managing products and sales
Integrated with backend APIs for data retrieval and storage
Methods to transfer data between components in Angular include Input and Output properties, ViewChild, Services, and Event Emitters.
Using Input and Output properties to pass data from parent to child components and emit events from child to parent components.
Using ViewChild to access child components and their properties directly from the parent component.
Using Services to create a shared service that can be injected i...
I am a passionate Angular Developer with 5 years of experience in building responsive web applications.
5 years of experience in Angular development
Strong knowledge of HTML, CSS, and JavaScript
Experience in building responsive web applications
Familiarity with RESTful APIs and version control systems like Git
I appeared for an interview in Feb 2025.
Sorting algorithms arrange data in a specific order, crucial for efficient data processing and retrieval.
Types of sorting algorithms include: Bubble Sort, Quick Sort, Merge Sort, and Heap Sort.
Bubble Sort is simple but inefficient for large datasets; it repeatedly steps through the list.
Quick Sort is efficient for large datasets, using a divide-and-conquer approach to sort elements.
Merge Sort divides the array into hal...
The Software Development Lifecycle (SDLC) is a structured process for developing software applications through various stages.
1. Requirements Gathering: Identify user needs and system requirements.
2. Design: Create architecture and design specifications for the software.
3. Implementation: Write and compile the code based on design documents.
4. Testing: Validate the software through various testing methods (e.g., unit t...
Out is used for returning multiple values from a method, while ref is used for passing a variable by reference.
Out parameters must be assigned a value inside the method before it returns.
Ref parameters must be initialized before passing them to a method.
Out parameters are used when a method needs to return multiple values.
Ref parameters are used when a method needs to modify the value of the parameter.
Example: int.TryP...
Use a SQL query with ORDER BY and LIMIT to find the 2nd last student marks.
Use ORDER BY clause to sort the marks in descending order
Use LIMIT 1,1 to skip the last row and fetch the 2nd last row
Create a global exception handler to manage all unhandled exceptions in the application.
Implement a global exception handler class that extends ExceptionHandler.
Override the uncaughtException method to handle all unhandled exceptions.
Log the exception details and notify the user about the error.
Consider implementing different strategies for handling different types of exceptions.
Test the global exception handler thorou...
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I am a Senior Android Developer with 5+ years of experience in developing mobile applications for various industries.
Developed and maintained multiple Android applications from concept to deployment
Proficient in Java, Kotlin, and Android SDK
Experience with RESTful APIs, third-party libraries, and version control systems like Git
Strong problem-solving skills and ability to work in a team environment
Familiar with Agile d...
Higher order function is a function that can take other functions as parameters or return functions as results.
Higher order functions can be passed as arguments to other functions.
Higher order functions can return functions as results.
Examples include map, filter, and reduce functions in functional programming.
The inline keyword is used in Kotlin to suggest that a function should be inlined at the call site.
Used to eliminate the overhead of function calls by copying the function code directly at the call site
Helps in improving performance by reducing the function call overhead
Should be used for small functions or lambdas to avoid unnecessary function call overhead
Agile methodology is a project management approach that emphasizes flexibility, collaboration, and iterative development.
Agile methodology focuses on delivering working software in short, iterative cycles called sprints.
It values customer collaboration and responding to change over following a strict plan.
Key principles include individuals and interactions over processes and tools, working software over comprehensive d...
I appeared for an interview in Jan 2025, where I was asked the following questions.
Boxing is the process of converting a value type to a reference type, while unboxing is the process of converting a reference type to a value type.
Boxing is done implicitly by the compiler when a value type is assigned to a reference type variable.
Unboxing requires an explicit cast from the reference type to the value type.
Boxing and unboxing can impact performance as they involve memory allocation and copying of data.
...
Garbage collection is a process in programming where the system automatically reclaims memory occupied by objects that are no longer in use.
Garbage collection helps prevent memory leaks by automatically freeing up memory that is no longer needed.
It is commonly used in languages like Java, C#, and Python.
Garbage collection can be either automatic or manual, with automatic being the most common approach.
Examples of garba...
MVC stands for Model-View-Controller, a software architectural pattern. Razor is a markup syntax used in ASP.NET MVC.
MVC is a design pattern that separates an application into three main components: Model, View, and Controller
Razor is a markup syntax used in ASP.NET MVC to create dynamic web pages
MVC helps in organizing code and separating concerns, making it easier to maintain and test applications
Software development is the process of creating, designing, testing, and maintaining software applications.
Involves writing code to create software applications
Includes designing the user interface and user experience
Testing the software for bugs and errors
Maintaining and updating the software as needed
What people are saying about Infosys
Some of the top questions asked at the Infosys interview for freshers -
The duration of Infosys interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 421 interview experiences
Difficulty level
Duration
based on 43.1k reviews
Rating in categories
Technology Analyst
55.8k
salaries
| ₹4.8 L/yr - ₹11.1 L/yr |
Senior Systems Engineer
53.8k
salaries
| ₹2.5 L/yr - ₹6.3 L/yr |
Technical Lead
35.1k
salaries
| ₹9.4 L/yr - ₹16.4 L/yr |
System Engineer
32.5k
salaries
| ₹2.4 L/yr - ₹5.3 L/yr |
Senior Associate Consultant
31.1k
salaries
| ₹8.1 L/yr - ₹15 L/yr |
TCS
Wipro
Cognizant
Accenture