i
Infosys
Filter interviews by
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
I am a highly motivated and experienced Senior Associate Consultant with a strong background in project management and client relations.
Over 5 years of experience in consulting industry
Managed multiple projects simultaneously, exceeding client expectations
Skilled in data analysis and presentation
Excellent communication and interpersonal skills
I am currently working on a project in the finance domain, specifically focusing on risk management for a large investment bank.
Developing risk models to assess potential losses in different market scenarios
Analyzing historical data to identify trends and patterns in market behavior
Collaborating with traders and portfolio managers to understand their risk appetite and constraints
Code logic to find duplicate numbers in an array
Iterate through the array and store each element in a hash set
If an element is already in the hash set, it is a duplicate
Return the set of duplicate numbers found
Conflicts in a git merge can be resolved by manually editing the conflicting files and then committing the changes.
Use 'git status' to identify the conflicting files
Open the conflicting files in a text editor and resolve the conflicts manually
Use 'git add' to stage the resolved files
Commit the changes using 'git commit'
Object creation is not possible for abstract classes because they cannot be instantiated directly.
Abstract classes are meant to be used as base classes for other classes to inherit from.
They contain abstract methods that must be implemented by the child classes.
Attempting to create an object of an abstract class will result in a compilation error.
Example: abstract class Shape { abstract void draw(); }
Exception handling in Java is used to handle runtime errors and prevent program crashes.
Purpose is to handle runtime errors and prevent program crashes
Allows for graceful handling of unexpected situations
Helps in separating error-handling code from regular code
Improves code readability and maintainability
Examples: try-catch blocks, throw keyword, finally block
LinkedList is a linear data structure that stores elements in a sequential order, while HashSet is a collection that does not allow duplicate elements.
LinkedList maintains the insertion order of elements, while HashSet does not guarantee any specific order.
LinkedList allows duplicate elements, while HashSet does not allow duplicates.
LinkedList uses pointers to connect elements, while HashSet uses a hash table for stori...
No, method overloading is not possible within a private class in Java.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Private methods are not visible outside the class, so overloading them would not be useful.
If you need to achieve method overloading, the methods should be public or protected.
Dependency injection is a design pattern in which an object receives other objects that it depends on.
Constructor injection: Dependencies are provided through a class constructor.
Setter injection: Dependencies are set through setter methods.
Interface injection: Dependencies are set through an interface.
Example: In constructor injection, a class may have a constructor that takes the dependencies as parameters.
Dependency injection in Spring Boot allows objects to be injected into a class, promoting loose coupling and easier testing.
In Spring Boot, dependency injection is achieved through @Autowired annotation.
Dependencies are managed by the Spring container and injected into classes at runtime.
Constructor injection, setter injection, and field injection are common ways to inject dependencies in Spring Boot.
Example: @Autowire...
You can call a private method in another class by using reflection in Java.
Use the getDeclaredMethod() method from the Class class to get the private method
Set the accessibility of the private method to true using the setAccessible() method
Invoke the private method using the invoke() method
TreeMap in Java uses Red-Black tree for implementation.
TreeMap in Java uses Red-Black tree for implementation
Red-Black tree is a self-balancing binary search tree
Red-Black tree ensures logarithmic time complexity for operations like get, put, remove
Inversion of control is a design principle where the control flow of a program is inverted, with the framework or container calling the code instead of the code calling the framework.
Inversion of control allows for decoupling of components, making the code more modular and easier to maintain.
Common examples of inversion of control include dependency injection and event-driven programming.
Inversion of control is often u...
Difference between @RestController and @RequestMapping
RestController is a specialized version of @Controller that includes @ResponseBody by default
@RequestMapping is used to map web requests to specific handler methods
RestController is typically used for RESTful web services, while @RequestMapping can be used for any type of web request handling
HTTP requests in Java backend flow from client to server through various layers like servlets, filters, and controllers.
Client sends HTTP request to server
Request is received by servlet container (e.g. Tomcat)
Servlet container forwards request to appropriate servlet based on URL mapping
Servlet processes request and generates response
Response is sent back to client
Multiple catch blocks can be used to handle different types of exceptions in a try-catch block.
Multiple catch blocks can be used to handle different types of exceptions separately.
Each catch block can specify a different type of exception to catch.
The catch blocks are evaluated in order, so the most specific exception types should be caught first.
Using multiple catch blocks can make the code more readable and maintaina
Inheritance in Java allows a class to inherit properties and behaviors from another class.
Create a new class using the 'extends' keyword followed by the name of the class you want to inherit from
Use super keyword to call the constructor of the parent class
Child class can override methods from the parent class
Dependency injection is a design pattern used to remove hard-coded dependencies and make components more reusable and testable.
Allows for easier testing by injecting dependencies rather than hard-coding them
Promotes reusability of components by decoupling them from their dependencies
Improves maintainability by making it easier to swap out dependencies without changing the component's code
Streams represent a sequence of elements and support functional-style operations, while collections are data structures that store and manipulate groups of objects.
Streams are used for processing sequences of elements, while collections are used for storing and manipulating groups of objects.
Streams support functional-style operations like filter, map, reduce, while collections provide methods like add, remove, get.
Str...
To create a Spring Boot application, you can use Spring Initializr to generate a project with necessary dependencies and configurations.
Go to https://start.spring.io/
Select the project metadata like group, artifact, dependencies, etc.
Click on 'Generate' to download the project zip file.
Extract the zip file and import the project into your IDE.
Start coding your application logic.
Starter dependencies in Spring Boot are pre-configured dependencies that help in quickly setting up a Spring Boot project.
Starter dependencies are included in the pom.xml file of a Spring Boot project to provide necessary dependencies for specific functionalities.
They help in reducing the manual configuration required to set up a Spring Boot application.
Examples of starter dependencies include spring-boot-starter-web f...
A B-tree index is a data structure used in databases to efficiently store and retrieve data in sorted order.
B-tree indexes are commonly used in database management systems to speed up data retrieval operations.
They are balanced tree data structures that allow for efficient insertion, deletion, and search operations.
B-tree indexes are particularly useful for range queries and sequential access.
Example: In a database tab...
A trigger in SQL is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
There are two main types of triggers in SQL: BEFORE triggers and AFTER triggers.
An example of a trigger is a BEFORE INSERT trigger that automatically sets a default value for a column if
ACID properties are a set of properties that guarantee the reliability of database transactions.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the concurrent execution of transac...
Types of joins in SQL include inner join, outer join (left, right, full), cross join, and self join.
Inner join: returns rows when there is a match in both tables based on the join condition.
Outer join: returns all rows from one table and only matching rows from the other table.
Left outer join: returns all rows from the left table and the matched rows from the right table.
Right outer join: returns all rows from the righ...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by eliminating duplicate data
Normalization ensures data integrity by enforcing relationships between tables
There are different levels of normalization such as 1NF, 2NF, 3NF, and BCNF
Query to print CustomerID, CustomerName, OrderStatus, and TotalAmount excluding orders placed in August.
Join Customer and Order tables on CustomerID
Filter out orders placed in August using WHERE clause
Select CustomerID, CustomerName, OrderStatus, and TotalAmount columns
Retrieve data from a given URL using Java and Angular code.
Use Java's HttpURLConnection class to make a GET request to the URL and retrieve the data.
In Angular, use HttpClient module to send a GET request to the URL and fetch the data.
Parse the retrieved data in both Java and Angular to extract the required information.
I applied via infosys official website and was interviewed in Jul 2024. There were 3 interview rounds.
Developed a mobile app for tracking daily water intake and setting hydration goals.
Designed user interface for easy input of water consumption
Implemented reminder notifications to encourage regular hydration
Integrated with health tracking apps to sync data
Conducted user testing to gather feedback for improvements
Routing is the process of selecting the best path for data packets to travel from one network to another.
Routing involves determining the optimal path for data packets to reach their destination
Routers use routing tables to make decisions on how to forward packets
Routing protocols like OSPF and BGP help routers communicate and update routing information
Examples of routing protocols include RIP, EIGRP, and IS-IS
MVC is a design pattern for structuring web applications, while Web API is a framework for building HTTP services.
MVC stands for Model-View-Controller and is used for organizing code in web applications.
Web API is a framework for building HTTP services that can be accessed by various clients, not just browsers.
MVC is typically used for server-side rendering of web pages, while Web API is used for providing data and fun...
A class is a blueprint for creating objects, while an object is an instance of a class.
A class defines the properties and behaviors of objects, while an object is a specific instance of a class.
Classes can be used to create multiple objects with similar characteristics.
Objects can interact with each other by calling methods defined in their class.
Example: Class 'Car' defines properties like 'color' and 'model', while a...
No, we cannot create an object of a constructor directly.
Constructors are used to initialize objects of a class, not to create objects of the constructor itself.
To create an object, we use the 'new' keyword followed by the constructor function.
Example: function Person(name) { this.name = name; } var person1 = new Person('John');
SQL joins are used to combine rows from two or more tables based on a related column between them. The default join is an INNER JOIN.
SQL joins are used to retrieve data from multiple tables based on a related column between them
The default join in SQL is an INNER JOIN, which returns rows when there is at least one match in both tables
Other types of joins include LEFT JOIN, RIGHT JOIN, and FULL JOIN
Deployment in our project is done using automated scripts and tools to ensure consistency and efficiency.
Deployment scripts are written to automate the process of deploying code to different environments.
We use tools like Jenkins, Ansible, and Docker for continuous integration and deployment.
Each deployment goes through a series of automated tests to ensure stability and functionality.
Rollback procedures are in place i...
I applied via Campus Placement and was interviewed before Mar 2023. There was 1 interview round.
I applied via Referral and was interviewed in Sep 2021. There were 2 interview rounds.
Consulting approach involves analyzing problems, providing solutions and implementing them.
Understand client's needs and goals
Analyze data and identify key insights
Develop recommendations and solutions
Implement solutions and monitor progress
Factors to consider when choosing between Power BI and Tableau include cost, ease of use, data visualization capabilities, and integration with other tools
Resume should highlight re...
Infosys interview questions for designations
I applied via Referral and was interviewed in Apr 2021. There was 1 interview round.
Get interview-ready with Top Infosys Interview Questions
What people are saying about Infosys
I applied via Referral and was interviewed in Sep 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2021. There was 1 interview round.
Steps for Azure migration from onprem to cloud and Hyper V migration using VMWARE tool.
Assess on-premises environment
Choose appropriate migration method
Prepare Azure environment
Migrate data and applications
Optimize and secure migrated resources
VMware tool used for migration: VMware vCenter Converter
Hyper-V migration can be done using Azure Site Recovery
I applied via Campus Placement and was interviewed before Nov 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed in Aug 2020. There was 1 interview round.
Some of the top questions asked at the Infosys Senior Associate Consultant interview for freshers -
The duration of Infosys Senior Associate Consultant interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 3 interviews
1 Interview rounds
based on 1.7k reviews
Rating in categories
Technology Analyst
55.4k
salaries
| ₹3 L/yr - ₹11.1 L/yr |
Senior Systems Engineer
51.3k
salaries
| ₹2.5 L/yr - ₹8 L/yr |
Technical Lead
34.2k
salaries
| ₹5.1 L/yr - ₹20 L/yr |
System Engineer
31.7k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Senior Associate Consultant
28.9k
salaries
| ₹6.2 L/yr - ₹17 L/yr |
TCS
Wipro
Cognizant
Accenture