i
Infosys
Filter interviews by
Exception handling is crucial for robust software design.
Identify potential exceptions and handle them appropriately
Use try-catch blocks to catch exceptions
Throw exceptions when necessary
Design exception classes to provide meaningful information
Consider logging exceptions for debugging purposes
I applied via Naukri.com and was interviewed in Oct 2024. There were 3 interview rounds.
I am currently working on a project to implement a new customer relationship management system for our client.
Analyzing client requirements and designing a customized CRM solution
Collaborating with developers to build and test the system
Training client staff on how to use the new CRM system
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs focuses on creating objects that contain both data and methods to manipulate that data.
Encapsulation is a key principle in OOPs, where data is kept private and only accessible through public methods.
Inheritance allows classes to inherit attributes and methods from other classes.
Polymorphism allows objects to b...
SOLID principles are design principles used in software development to make software more maintainable, flexible, and scalable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasse...
Managing conflicting stakeholder priorities and tight deadlines
Balancing the needs and expectations of different stakeholders
Prioritizing tasks to meet project deadlines
Communicating effectively to manage expectations and resolve conflicts
I would immediately notify the appropriate team, document the bug, and work on a fix to deploy as soon as possible.
Notify the appropriate team or individual responsible for handling production issues
Document the bug thoroughly, including steps to reproduce and impact on system
Work on a fix or workaround to deploy as soon as possible
Communicate with stakeholders about the issue and resolution progress
I applied via Job Portal and was interviewed in Oct 2024. There were 2 interview rounds.
A functional predicate is a function that returns a boolean value based on input parameters.
Functional predicates are commonly used in programming to filter or sort data based on specific criteria.
They are often used in higher-order functions like filter, map, and reduce.
For example, a functional predicate could be used to check if a number is even or odd.
Another example could be a predicate that checks if a string con
Implementing logging functionality is optional in code
Implementing logging can help in debugging and monitoring the application
Use logging frameworks like Log4j or SLF4J to easily add logging to code
Example: Adding log statements before and after critical operations
Delete, drop, and truncate are SQL commands used to remove data from a table. Truncate can't be rollbacked.
DELETE command is used to remove specific rows from a table
DROP command is used to remove an entire table from the database
TRUNCATE command is used to remove all rows from a table
DELETE can be rollbacked using a transaction, while TRUNCATE cannot be rollbacked
To print something on browser using Spring Boot, you can create a controller method that returns a view or a response entity.
Create a controller class with a method that returns a view or a response entity
Use Thymeleaf or other template engine to render HTML views
Return a response entity with the content type set to text/html for plain text output
Agile ceremonies are regular meetings or events held within an agile framework to facilitate communication, collaboration, and alignment among team members.
Sprint Planning: Meeting at the start of a sprint to plan the work to be done.
Daily Stand-up: Short daily meeting for team members to discuss progress and plan for the day.
Sprint Review: Meeting at the end of a sprint to review and demonstrate the completed work.
Spr...
Yes, I have experience with frontend technologies such as HTML, CSS, and JavaScript, as well as cloud technologies like AWS and Azure.
Proficient in HTML, CSS, and JavaScript for frontend development
Experience with cloud technologies such as AWS and Azure
Familiarity with frontend frameworks like React and Angular
Knowledge of cloud services like EC2, S3, and Azure Functions
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
I am a highly motivated and experienced Senior Associate Consultant with a strong background in project management and client relations.
Over 5 years of experience in consulting industry
Managed multiple projects simultaneously, exceeding client expectations
Skilled in data analysis and presentation
Excellent communication and interpersonal skills
I am currently working on a project in the finance domain, specifically focusing on risk management for a large investment bank.
Developing risk models to assess potential losses in different market scenarios
Analyzing historical data to identify trends and patterns in market behavior
Collaborating with traders and portfolio managers to understand their risk appetite and constraints
Code logic to find duplicate numbers in an array
Iterate through the array and store each element in a hash set
If an element is already in the hash set, it is a duplicate
Return the set of duplicate numbers found
Conflicts in a git merge can be resolved by manually editing the conflicting files and then committing the changes.
Use 'git status' to identify the conflicting files
Open the conflicting files in a text editor and resolve the conflicts manually
Use 'git add' to stage the resolved files
Commit the changes using 'git commit'
Object creation is not possible for abstract classes because they cannot be instantiated directly.
Abstract classes are meant to be used as base classes for other classes to inherit from.
They contain abstract methods that must be implemented by the child classes.
Attempting to create an object of an abstract class will result in a compilation error.
Example: abstract class Shape { abstract void draw(); }
Exception handling in Java is used to handle runtime errors and prevent program crashes.
Purpose is to handle runtime errors and prevent program crashes
Allows for graceful handling of unexpected situations
Helps in separating error-handling code from regular code
Improves code readability and maintainability
Examples: try-catch blocks, throw keyword, finally block
LinkedList is a linear data structure that stores elements in a sequential order, while HashSet is a collection that does not allow duplicate elements.
LinkedList maintains the insertion order of elements, while HashSet does not guarantee any specific order.
LinkedList allows duplicate elements, while HashSet does not allow duplicates.
LinkedList uses pointers to connect elements, while HashSet uses a hash table for stori...
No, method overloading is not possible within a private class in Java.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Private methods are not visible outside the class, so overloading them would not be useful.
If you need to achieve method overloading, the methods should be public or protected.
Dependency injection is a design pattern in which an object receives other objects that it depends on.
Constructor injection: Dependencies are provided through a class constructor.
Setter injection: Dependencies are set through setter methods.
Interface injection: Dependencies are set through an interface.
Example: In constructor injection, a class may have a constructor that takes the dependencies as parameters.
Dependency injection in Spring Boot allows objects to be injected into a class, promoting loose coupling and easier testing.
In Spring Boot, dependency injection is achieved through @Autowired annotation.
Dependencies are managed by the Spring container and injected into classes at runtime.
Constructor injection, setter injection, and field injection are common ways to inject dependencies in Spring Boot.
Example: @Autowire...
You can call a private method in another class by using reflection in Java.
Use the getDeclaredMethod() method from the Class class to get the private method
Set the accessibility of the private method to true using the setAccessible() method
Invoke the private method using the invoke() method
TreeMap in Java uses Red-Black tree for implementation.
TreeMap in Java uses Red-Black tree for implementation
Red-Black tree is a self-balancing binary search tree
Red-Black tree ensures logarithmic time complexity for operations like get, put, remove
Inversion of control is a design principle where the control flow of a program is inverted, with the framework or container calling the code instead of the code calling the framework.
Inversion of control allows for decoupling of components, making the code more modular and easier to maintain.
Common examples of inversion of control include dependency injection and event-driven programming.
Inversion of control is often u...
Difference between @RestController and @RequestMapping
RestController is a specialized version of @Controller that includes @ResponseBody by default
@RequestMapping is used to map web requests to specific handler methods
RestController is typically used for RESTful web services, while @RequestMapping can be used for any type of web request handling
HTTP requests in Java backend flow from client to server through various layers like servlets, filters, and controllers.
Client sends HTTP request to server
Request is received by servlet container (e.g. Tomcat)
Servlet container forwards request to appropriate servlet based on URL mapping
Servlet processes request and generates response
Response is sent back to client
Multiple catch blocks can be used to handle different types of exceptions in a try-catch block.
Multiple catch blocks can be used to handle different types of exceptions separately.
Each catch block can specify a different type of exception to catch.
The catch blocks are evaluated in order, so the most specific exception types should be caught first.
Using multiple catch blocks can make the code more readable and maintaina
Inheritance in Java allows a class to inherit properties and behaviors from another class.
Create a new class using the 'extends' keyword followed by the name of the class you want to inherit from
Use super keyword to call the constructor of the parent class
Child class can override methods from the parent class
Dependency injection is a design pattern used to remove hard-coded dependencies and make components more reusable and testable.
Allows for easier testing by injecting dependencies rather than hard-coding them
Promotes reusability of components by decoupling them from their dependencies
Improves maintainability by making it easier to swap out dependencies without changing the component's code
Streams represent a sequence of elements and support functional-style operations, while collections are data structures that store and manipulate groups of objects.
Streams are used for processing sequences of elements, while collections are used for storing and manipulating groups of objects.
Streams support functional-style operations like filter, map, reduce, while collections provide methods like add, remove, get.
Str...
To create a Spring Boot application, you can use Spring Initializr to generate a project with necessary dependencies and configurations.
Go to https://start.spring.io/
Select the project metadata like group, artifact, dependencies, etc.
Click on 'Generate' to download the project zip file.
Extract the zip file and import the project into your IDE.
Start coding your application logic.
Starter dependencies in Spring Boot are pre-configured dependencies that help in quickly setting up a Spring Boot project.
Starter dependencies are included in the pom.xml file of a Spring Boot project to provide necessary dependencies for specific functionalities.
They help in reducing the manual configuration required to set up a Spring Boot application.
Examples of starter dependencies include spring-boot-starter-web f...
A B-tree index is a data structure used in databases to efficiently store and retrieve data in sorted order.
B-tree indexes are commonly used in database management systems to speed up data retrieval operations.
They are balanced tree data structures that allow for efficient insertion, deletion, and search operations.
B-tree indexes are particularly useful for range queries and sequential access.
Example: In a database tab...
A trigger in SQL is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
There are two main types of triggers in SQL: BEFORE triggers and AFTER triggers.
An example of a trigger is a BEFORE INSERT trigger that automatically sets a default value for a column if
ACID properties are a set of properties that guarantee the reliability of database transactions.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the concurrent execution of transac...
Types of joins in SQL include inner join, outer join (left, right, full), cross join, and self join.
Inner join: returns rows when there is a match in both tables based on the join condition.
Outer join: returns all rows from one table and only matching rows from the other table.
Left outer join: returns all rows from the left table and the matched rows from the right table.
Right outer join: returns all rows from the righ...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by eliminating duplicate data
Normalization ensures data integrity by enforcing relationships between tables
There are different levels of normalization such as 1NF, 2NF, 3NF, and BCNF
Query to print CustomerID, CustomerName, OrderStatus, and TotalAmount excluding orders placed in August.
Join Customer and Order tables on CustomerID
Filter out orders placed in August using WHERE clause
Select CustomerID, CustomerName, OrderStatus, and TotalAmount columns
Retrieve data from a given URL using Java and Angular code.
Use Java's HttpURLConnection class to make a GET request to the URL and retrieve the data.
In Angular, use HttpClient module to send a GET request to the URL and fetch the data.
Parse the retrieved data in both Java and Angular to extract the required information.
Infosys interview questions for designations
I applied via Company Website and was interviewed in Sep 2024. There were 2 interview rounds.
Implemented Spring Security for authentication and authorization in project.
Used Spring Security to handle user authentication and authorization
Configured security rules in XML or Java configuration file
Implemented custom authentication provider or user details service if needed
Secured endpoints with role-based access control
Utilized CSRF protection to prevent cross-site request forgery
I have fixed security vulnerabilities related to SQL injection, cross-site scripting, and insecure direct object references.
Implemented input validation to prevent SQL injection attacks
Escaped user input to prevent cross-site scripting attacks
Implemented access controls to prevent insecure direct object references
Regularly updated security patches and libraries
Challenges faced while migrating Java 8 to Java 17 include compatibility issues, deprecated APIs, and potential performance impacts.
Compatibility issues with third-party libraries and frameworks
Deprecated APIs in Java 8 that may have been removed or changed in Java 17
Potential performance impacts due to changes in the JVM or compiler optimizations
I switched very early in my career to explore different opportunities and gain diverse experience.
To gain diverse experience and skills
To explore different career opportunities
To find a better fit for my interests and strengths
I am currently earning $80,000 and I am expecting a competitive salary from Infosys based on my experience and skills.
Current salary: $80,000
Expecting competitive salary from Infosys based on experience and skills
Get interview-ready with Top Infosys Interview Questions
I applied via Job Portal and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via Company Website and was interviewed in Sep 2024. There were 2 interview rounds.
Web API and REST API are communication protocols used for accessing and exchanging data over the internet.
Web API stands for Web Application Programming Interface, which allows communication between different software applications over the web.
REST API stands for Representational State Transfer, which is an architectural style for designing networked applications.
Web APIs can use various protocols like HTTP, SOAP, or X...
Relative path is a path that is relative to the current working directory, while absolute path is a full path starting from the root directory.
Relative path does not start with the root directory, but rather with the current working directory.
Absolute path starts from the root directory and includes all directories leading to the desired file or folder.
Example of relative path: 'folder/file.txt'
Example of absolute path
I faced challenges with front end technologies such as browser compatibility, responsive design, and performance optimization.
Browser compatibility issues with different versions of Internet Explorer, Firefox, Chrome, etc.
Struggles with creating responsive designs that work well on various screen sizes and devices.
Optimizing performance by reducing page load times and improving rendering speed.
Dealing with cross-browse...
Null pointer exceptions can be handled by checking for null values before accessing an object's properties or methods.
Always check for null values before accessing object properties or methods
Use conditional statements or null checks to prevent null pointer exceptions
Handle exceptions using try-catch blocks to gracefully manage errors
Avoid chaining method calls on potentially null objects
Agile Methodologies are a set of principles and practices that promote iterative development, collaboration, and flexibility.
Agile emphasizes delivering working software frequently, with a focus on customer satisfaction.
It values individuals and interactions over processes and tools.
Agile promotes responding to change over following a plan.
Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP).
I applied via infosys official website and was interviewed in Jul 2024. There were 3 interview rounds.
Developed a mobile app for tracking daily water intake and setting hydration goals.
Designed user interface for easy input of water consumption
Implemented reminder notifications to encourage regular hydration
Integrated with health tracking apps to sync data
Conducted user testing to gather feedback for improvements
Routing is the process of selecting the best path for data packets to travel from one network to another.
Routing involves determining the optimal path for data packets to reach their destination
Routers use routing tables to make decisions on how to forward packets
Routing protocols like OSPF and BGP help routers communicate and update routing information
Examples of routing protocols include RIP, EIGRP, and IS-IS
MVC is a design pattern for structuring web applications, while Web API is a framework for building HTTP services.
MVC stands for Model-View-Controller and is used for organizing code in web applications.
Web API is a framework for building HTTP services that can be accessed by various clients, not just browsers.
MVC is typically used for server-side rendering of web pages, while Web API is used for providing data and fun...
A class is a blueprint for creating objects, while an object is an instance of a class.
A class defines the properties and behaviors of objects, while an object is a specific instance of a class.
Classes can be used to create multiple objects with similar characteristics.
Objects can interact with each other by calling methods defined in their class.
Example: Class 'Car' defines properties like 'color' and 'model', while a...
No, we cannot create an object of a constructor directly.
Constructors are used to initialize objects of a class, not to create objects of the constructor itself.
To create an object, we use the 'new' keyword followed by the constructor function.
Example: function Person(name) { this.name = name; } var person1 = new Person('John');
SQL joins are used to combine rows from two or more tables based on a related column between them. The default join is an INNER JOIN.
SQL joins are used to retrieve data from multiple tables based on a related column between them
The default join in SQL is an INNER JOIN, which returns rows when there is at least one match in both tables
Other types of joins include LEFT JOIN, RIGHT JOIN, and FULL JOIN
Deployment in our project is done using automated scripts and tools to ensure consistency and efficiency.
Deployment scripts are written to automate the process of deploying code to different environments.
We use tools like Jenkins, Ansible, and Docker for continuous integration and deployment.
Each deployment goes through a series of automated tests to ensure stability and functionality.
Rollback procedures are in place i...
I applied via Naukri.com and was interviewed in Jun 2024. There were 3 interview rounds.
React JS is a popular JavaScript library for building user interfaces.
Efficiently updates and renders components with virtual DOM
Supports reusable components for faster development
Declarative syntax simplifies code readability and maintenance
Virtual DOM is a lightweight copy of the actual DOM that allows for efficient updates and rendering in web development.
Virtual DOM is a concept used in frameworks like React to improve performance by minimizing actual DOM manipulations.
Changes are first made to the virtual DOM, then compared to the actual DOM to determine the most efficient way to update the UI.
This process helps reduce the number of updates needed and...
Props are used to pass data from parent to child components, while state is used to manage data within a component.
Props are read-only and cannot be modified by the child component
State is mutable and can be changed by the component itself
Props are passed down from parent to child components, while state is managed within a component
Example: Passing a user's name as a prop to a child component vs storing the user's inp
Routing in React is the process of determining which components to display based on the URL.
React Router is a popular library used for routing in React applications.
Routes are defined using
Nested routes can be defined to render components within other components.
Route parameters can be accessed using props.match.params.
Redirects can be used to navigate users to different routes.
Private rout...
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Lambda expressions are anonymous functions used to create concise code in languages like Java.
Lambda expressions are used to create anonymous functions without a name.
They are commonly used in functional programming languages like Java.
Lambda expressions can be used to implement functional interfaces with a single abstract method.
Syntax: (parameters) -> expression or (parameters) -> { statements; }
Example: (int a, int
Comparator is used to define custom sorting order for objects, while Comparable is used to define natural ordering of objects.
Comparator is an external class used for custom sorting, while Comparable is implemented by the class itself for natural ordering.
Comparator can be used to sort objects based on multiple criteria, while Comparable can only define one natural ordering.
Example: Sorting a list of Employee objects b...
I applied via Company Website and was interviewed in Aug 2024. There were 3 interview rounds.
HashSet is a collection that stores unique elements, custom objects can be added by overriding equals() and hashCode() methods.
Override equals() and hashCode() methods in custom object class for proper comparison and hashing
Ensure immutability of custom object to maintain uniqueness in HashSet
Example: class CustomObject { private int id; private String name; }
I am a highly motivated and experienced professional with a background in consulting and a passion for problem-solving.
Over 5 years of experience in consulting roles
Strong analytical skills and ability to think critically
Proven track record of successfully managing client relationships
Excellent communication and presentation skills
Proficient in data analysis and project management
What people are saying about Infosys
Some of the top questions asked at the Infosys Senior Associate Consultant interview -
The duration of Infosys Senior Associate Consultant interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 142 interviews
5 Interview rounds
based on 1.6k reviews
Rating in categories
Technology Analyst
55.9k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
50.2k
salaries
| ₹2.8 L/yr - ₹8 L/yr |
System Engineer
39.3k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
30.7k
salaries
| ₹5.2 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
27.5k
salaries
| ₹6.2 L/yr - ₹16.8 L/yr |
TCS
Wipro
Cognizant
Accenture