i
Infosys
Filter interviews by
I applied via campus placement at Vellore Institute of Technology (VIT) and was interviewed in Oct 2024. There were 2 interview rounds.
Basic verbal abilitic and logical reasoning question ,pseudocode and essay writing
My area of interest is in network security and data encryption.
I have experience in implementing firewalls and intrusion detection systems.
I am familiar with encryption algorithms such as AES and RSA.
I enjoy staying up-to-date on the latest security threats and technologies.
I have worked on securing networks for financial institutions and government agencies.
I applied via Company Website and was interviewed in Oct 2024. There were 2 interview rounds.
Projects are specific tasks or assignments that require a team to work together to achieve a common goal.
Projects involve a defined scope, timeline, and budget.
They require a team of individuals with different skills and expertise.
Examples include developing a new software application, implementing a new system, or conducting a research study.
I have worked on a variety of tech stacks including Java Spring, React, Node.js, and MongoDB.
Java Spring
React
Node.js
MongoDB
All was apptitude question and was mcq.
Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.
Allows for code reusability and promotes the concept of 'is-a' relationship
Derived class inherits properties and behaviors of the base class
Can have multiple levels of inheritance (multi-level inheritance)
Example: Class 'Car' can inherit from class 'Vehicle', inheriting attributes like 'color' and
OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.
OOPS is a programming paradigm that uses objects to design applications.
It focuses on data encapsulation, inheritance, polymorphism, and abstraction.
Examples of OOPS languages include Java, C++, and Python.
Introduction is a brief overview of oneself, including background, experience, and skills.
Introduce yourself by stating your name and current position.
Provide a summary of your educational background and relevant experience.
Highlight key skills and accomplishments that are relevant to the position.
Conclude with your career goals and why you are interested in the role.
In five years, I see myself as a senior system engineer leading a team of talented professionals, implementing cutting-edge technologies, and contributing to the success of the organization.
Leading a team of system engineers
Implementing cutting-edge technologies
Contributing to the success of the organization
Infosys interview questions for popular designations
I was interviewed in Nov 2024.
Get interview-ready with Top Infosys Interview Questions
Control key in SAP is important for defining the behavior of a particular operation or transaction in the system.
Control key determines how a particular operation or transaction will be executed in SAP PP.
It helps in defining the scheduling parameters, lead time, and other relevant details for a specific task.
Examples of control keys include PP01 for standard production order, PP02 for production order with project sto
Different types of MRP in SAP include MRP, MRP Live, and MRP Areas.
MRP (Material Requirements Planning) is the traditional MRP functionality in SAP.
MRP Live is the new MRP functionality introduced in SAP S/4HANA.
MRP Areas allow for planning at a more detailed level within a plant or storage location.
Important configurations in SAP PP include work centers, routing, production versions, and material master data.
Work centers: Define where and how production operations are carried out.
Routing: Specifies the sequence of operations in production.
Production versions: Used to manage different versions of a product's BOM and routing.
Material master data: Contains all the information about materials used in production.
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
I am a highly motivated and experienced Senior Associate Consultant with a strong background in project management and client relations.
Over 5 years of experience in consulting industry
Managed multiple projects simultaneously, exceeding client expectations
Skilled in data analysis and presentation
Excellent communication and interpersonal skills
I am currently working on a project in the finance domain, specifically focusing on risk management for a large investment bank.
Developing risk models to assess potential losses in different market scenarios
Analyzing historical data to identify trends and patterns in market behavior
Collaborating with traders and portfolio managers to understand their risk appetite and constraints
Code logic to find duplicate numbers in an array
Iterate through the array and store each element in a hash set
If an element is already in the hash set, it is a duplicate
Return the set of duplicate numbers found
Conflicts in a git merge can be resolved by manually editing the conflicting files and then committing the changes.
Use 'git status' to identify the conflicting files
Open the conflicting files in a text editor and resolve the conflicts manually
Use 'git add' to stage the resolved files
Commit the changes using 'git commit'
Object creation is not possible for abstract classes because they cannot be instantiated directly.
Abstract classes are meant to be used as base classes for other classes to inherit from.
They contain abstract methods that must be implemented by the child classes.
Attempting to create an object of an abstract class will result in a compilation error.
Example: abstract class Shape { abstract void draw(); }
Exception handling in Java is used to handle runtime errors and prevent program crashes.
Purpose is to handle runtime errors and prevent program crashes
Allows for graceful handling of unexpected situations
Helps in separating error-handling code from regular code
Improves code readability and maintainability
Examples: try-catch blocks, throw keyword, finally block
LinkedList is a linear data structure that stores elements in a sequential order, while HashSet is a collection that does not allow duplicate elements.
LinkedList maintains the insertion order of elements, while HashSet does not guarantee any specific order.
LinkedList allows duplicate elements, while HashSet does not allow duplicates.
LinkedList uses pointers to connect elements, while HashSet uses a hash table for stori...
No, method overloading is not possible within a private class in Java.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Private methods are not visible outside the class, so overloading them would not be useful.
If you need to achieve method overloading, the methods should be public or protected.
Dependency injection is a design pattern in which an object receives other objects that it depends on.
Constructor injection: Dependencies are provided through a class constructor.
Setter injection: Dependencies are set through setter methods.
Interface injection: Dependencies are set through an interface.
Example: In constructor injection, a class may have a constructor that takes the dependencies as parameters.
Dependency injection in Spring Boot allows objects to be injected into a class, promoting loose coupling and easier testing.
In Spring Boot, dependency injection is achieved through @Autowired annotation.
Dependencies are managed by the Spring container and injected into classes at runtime.
Constructor injection, setter injection, and field injection are common ways to inject dependencies in Spring Boot.
Example: @Autowire...
You can call a private method in another class by using reflection in Java.
Use the getDeclaredMethod() method from the Class class to get the private method
Set the accessibility of the private method to true using the setAccessible() method
Invoke the private method using the invoke() method
TreeMap in Java uses Red-Black tree for implementation.
TreeMap in Java uses Red-Black tree for implementation
Red-Black tree is a self-balancing binary search tree
Red-Black tree ensures logarithmic time complexity for operations like get, put, remove
Inversion of control is a design principle where the control flow of a program is inverted, with the framework or container calling the code instead of the code calling the framework.
Inversion of control allows for decoupling of components, making the code more modular and easier to maintain.
Common examples of inversion of control include dependency injection and event-driven programming.
Inversion of control is often u...
Difference between @RestController and @RequestMapping
RestController is a specialized version of @Controller that includes @ResponseBody by default
@RequestMapping is used to map web requests to specific handler methods
RestController is typically used for RESTful web services, while @RequestMapping can be used for any type of web request handling
HTTP requests in Java backend flow from client to server through various layers like servlets, filters, and controllers.
Client sends HTTP request to server
Request is received by servlet container (e.g. Tomcat)
Servlet container forwards request to appropriate servlet based on URL mapping
Servlet processes request and generates response
Response is sent back to client
Multiple catch blocks can be used to handle different types of exceptions in a try-catch block.
Multiple catch blocks can be used to handle different types of exceptions separately.
Each catch block can specify a different type of exception to catch.
The catch blocks are evaluated in order, so the most specific exception types should be caught first.
Using multiple catch blocks can make the code more readable and maintaina
Inheritance in Java allows a class to inherit properties and behaviors from another class.
Create a new class using the 'extends' keyword followed by the name of the class you want to inherit from
Use super keyword to call the constructor of the parent class
Child class can override methods from the parent class
Dependency injection is a design pattern used to remove hard-coded dependencies and make components more reusable and testable.
Allows for easier testing by injecting dependencies rather than hard-coding them
Promotes reusability of components by decoupling them from their dependencies
Improves maintainability by making it easier to swap out dependencies without changing the component's code
Streams represent a sequence of elements and support functional-style operations, while collections are data structures that store and manipulate groups of objects.
Streams are used for processing sequences of elements, while collections are used for storing and manipulating groups of objects.
Streams support functional-style operations like filter, map, reduce, while collections provide methods like add, remove, get.
Str...
To create a Spring Boot application, you can use Spring Initializr to generate a project with necessary dependencies and configurations.
Go to https://start.spring.io/
Select the project metadata like group, artifact, dependencies, etc.
Click on 'Generate' to download the project zip file.
Extract the zip file and import the project into your IDE.
Start coding your application logic.
Starter dependencies in Spring Boot are pre-configured dependencies that help in quickly setting up a Spring Boot project.
Starter dependencies are included in the pom.xml file of a Spring Boot project to provide necessary dependencies for specific functionalities.
They help in reducing the manual configuration required to set up a Spring Boot application.
Examples of starter dependencies include spring-boot-starter-web f...
A B-tree index is a data structure used in databases to efficiently store and retrieve data in sorted order.
B-tree indexes are commonly used in database management systems to speed up data retrieval operations.
They are balanced tree data structures that allow for efficient insertion, deletion, and search operations.
B-tree indexes are particularly useful for range queries and sequential access.
Example: In a database tab...
A trigger in SQL is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
There are two main types of triggers in SQL: BEFORE triggers and AFTER triggers.
An example of a trigger is a BEFORE INSERT trigger that automatically sets a default value for a column if
ACID properties are a set of properties that guarantee the reliability of database transactions.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the concurrent execution of transac...
Types of joins in SQL include inner join, outer join (left, right, full), cross join, and self join.
Inner join: returns rows when there is a match in both tables based on the join condition.
Outer join: returns all rows from one table and only matching rows from the other table.
Left outer join: returns all rows from the left table and the matched rows from the right table.
Right outer join: returns all rows from the righ...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by eliminating duplicate data
Normalization ensures data integrity by enforcing relationships between tables
There are different levels of normalization such as 1NF, 2NF, 3NF, and BCNF
Query to print CustomerID, CustomerName, OrderStatus, and TotalAmount excluding orders placed in August.
Join Customer and Order tables on CustomerID
Filter out orders placed in August using WHERE clause
Select CustomerID, CustomerName, OrderStatus, and TotalAmount columns
Retrieve data from a given URL using Java and Angular code.
Use Java's HttpURLConnection class to make a GET request to the URL and retrieve the data.
In Angular, use HttpClient module to send a GET request to the URL and fetch the data.
Parse the retrieved data in both Java and Angular to extract the required information.
I applied via Company Website and was interviewed in Sep 2024. There were 2 interview rounds.
Implemented Spring Security for authentication and authorization in project.
Used Spring Security to handle user authentication and authorization
Configured security rules in XML or Java configuration file
Implemented custom authentication provider or user details service if needed
Secured endpoints with role-based access control
Utilized CSRF protection to prevent cross-site request forgery
I have fixed security vulnerabilities related to SQL injection, cross-site scripting, and insecure direct object references.
Implemented input validation to prevent SQL injection attacks
Escaped user input to prevent cross-site scripting attacks
Implemented access controls to prevent insecure direct object references
Regularly updated security patches and libraries
Challenges faced while migrating Java 8 to Java 17 include compatibility issues, deprecated APIs, and potential performance impacts.
Compatibility issues with third-party libraries and frameworks
Deprecated APIs in Java 8 that may have been removed or changed in Java 17
Potential performance impacts due to changes in the JVM or compiler optimizations
I switched very early in my career to explore different opportunities and gain diverse experience.
To gain diverse experience and skills
To explore different career opportunities
To find a better fit for my interests and strengths
I am currently earning $80,000 and I am expecting a competitive salary from Infosys based on my experience and skills.
Current salary: $80,000
Expecting competitive salary from Infosys based on experience and skills
I was interviewed in Sep 2024.
Demonstrate the flow of Spring MVC through code
Create a controller class with request mapping annotations
Define methods in the controller to handle different requests
Configure the dispatcher servlet in web.xml
Create a view resolver to map logical view names to actual views
Use stream api to find duplicates in an array of strings
Convert array to stream using Arrays.stream()
Use Collectors.groupingBy() to group elements by their occurrences
Filter the map to find elements with count > 1
Move all zeroes in an array to the end without changing the order of other elements.
Iterate through the array and keep track of the index where non-zero elements should be placed.
After the iteration, fill the remaining positions with zeroes.
Check if 2 strings are anagrams by comparing sorted characters
Sort the characters of both strings and compare if they are equal
Use a hashmap to store character frequencies and compare the maps
To check logs in an app, access log files or use logging frameworks like Log4j.
Access log files directly in the application directory
Use logging frameworks like Log4j to log messages at different levels
Analyze log files for errors or debugging information
Prioritize tasks, break down work into smaller chunks, communicate with team, utilize time management techniques
Prioritize tasks based on importance and urgency
Break down work into smaller, manageable chunks to make progress
Communicate with team members to ensure everyone is on the same page
Utilize time management techniques such as Pomodoro technique or Agile methodologies
I applied via Company Website and was interviewed in Dec 2024. There was 1 interview round.
What people are saying about Infosys
Some of the top questions asked at the Infosys interview -
The duration of Infosys interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4.8k interviews
Interview experience
based on 39.3k reviews
Rating in categories
Hyderabad / Secunderabad,
Chennai
+110-16 Yrs
₹ 26-35.55 LPA
Technology Analyst
55.6k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
50.6k
salaries
| ₹2.8 L/yr - ₹8 L/yr |
System Engineer
39.5k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
30.7k
salaries
| ₹5.1 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
27.9k
salaries
| ₹4.5 L/yr - ₹16.8 L/yr |
TCS
Wipro
Cognizant
Accenture