i
Infosys
Filter interviews by
I was interviewed in Nov 2024.
Control key in SAP is important for defining the behavior of a particular operation or transaction in the system.
Control key determines how a particular operation or transaction will be executed in SAP PP.
It helps in defining the scheduling parameters, lead time, and other relevant details for a specific task.
Examples of control keys include PP01 for standard production order, PP02 for production order with project sto
Different types of MRP in SAP include MRP, MRP Live, and MRP Areas.
MRP (Material Requirements Planning) is the traditional MRP functionality in SAP.
MRP Live is the new MRP functionality introduced in SAP S/4HANA.
MRP Areas allow for planning at a more detailed level within a plant or storage location.
Important configurations in SAP PP include work centers, routing, production versions, and material master data.
Work centers: Define where and how production operations are carried out.
Routing: Specifies the sequence of operations in production.
Production versions: Used to manage different versions of a product's BOM and routing.
Material master data: Contains all the information about materials used in production.
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
I am a highly motivated and experienced Senior Associate Consultant with a strong background in project management and client relations.
Over 5 years of experience in consulting industry
Managed multiple projects simultaneously, exceeding client expectations
Skilled in data analysis and presentation
Excellent communication and interpersonal skills
I am currently working on a project in the finance domain, specifically focusing on risk management for a large investment bank.
Developing risk models to assess potential losses in different market scenarios
Analyzing historical data to identify trends and patterns in market behavior
Collaborating with traders and portfolio managers to understand their risk appetite and constraints
Code logic to find duplicate numbers in an array
Iterate through the array and store each element in a hash set
If an element is already in the hash set, it is a duplicate
Return the set of duplicate numbers found
Conflicts in a git merge can be resolved by manually editing the conflicting files and then committing the changes.
Use 'git status' to identify the conflicting files
Open the conflicting files in a text editor and resolve the conflicts manually
Use 'git add' to stage the resolved files
Commit the changes using 'git commit'
Object creation is not possible for abstract classes because they cannot be instantiated directly.
Abstract classes are meant to be used as base classes for other classes to inherit from.
They contain abstract methods that must be implemented by the child classes.
Attempting to create an object of an abstract class will result in a compilation error.
Example: abstract class Shape { abstract void draw(); }
Exception handling in Java is used to handle runtime errors and prevent program crashes.
Purpose is to handle runtime errors and prevent program crashes
Allows for graceful handling of unexpected situations
Helps in separating error-handling code from regular code
Improves code readability and maintainability
Examples: try-catch blocks, throw keyword, finally block
LinkedList is a linear data structure that stores elements in a sequential order, while HashSet is a collection that does not allow duplicate elements.
LinkedList maintains the insertion order of elements, while HashSet does not guarantee any specific order.
LinkedList allows duplicate elements, while HashSet does not allow duplicates.
LinkedList uses pointers to connect elements, while HashSet uses a hash table for stori...
No, method overloading is not possible within a private class in Java.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Private methods are not visible outside the class, so overloading them would not be useful.
If you need to achieve method overloading, the methods should be public or protected.
Dependency injection is a design pattern in which an object receives other objects that it depends on.
Constructor injection: Dependencies are provided through a class constructor.
Setter injection: Dependencies are set through setter methods.
Interface injection: Dependencies are set through an interface.
Example: In constructor injection, a class may have a constructor that takes the dependencies as parameters.
Dependency injection in Spring Boot allows objects to be injected into a class, promoting loose coupling and easier testing.
In Spring Boot, dependency injection is achieved through @Autowired annotation.
Dependencies are managed by the Spring container and injected into classes at runtime.
Constructor injection, setter injection, and field injection are common ways to inject dependencies in Spring Boot.
Example: @Autowire...
You can call a private method in another class by using reflection in Java.
Use the getDeclaredMethod() method from the Class class to get the private method
Set the accessibility of the private method to true using the setAccessible() method
Invoke the private method using the invoke() method
TreeMap in Java uses Red-Black tree for implementation.
TreeMap in Java uses Red-Black tree for implementation
Red-Black tree is a self-balancing binary search tree
Red-Black tree ensures logarithmic time complexity for operations like get, put, remove
Inversion of control is a design principle where the control flow of a program is inverted, with the framework or container calling the code instead of the code calling the framework.
Inversion of control allows for decoupling of components, making the code more modular and easier to maintain.
Common examples of inversion of control include dependency injection and event-driven programming.
Inversion of control is often u...
Difference between @RestController and @RequestMapping
RestController is a specialized version of @Controller that includes @ResponseBody by default
@RequestMapping is used to map web requests to specific handler methods
RestController is typically used for RESTful web services, while @RequestMapping can be used for any type of web request handling
HTTP requests in Java backend flow from client to server through various layers like servlets, filters, and controllers.
Client sends HTTP request to server
Request is received by servlet container (e.g. Tomcat)
Servlet container forwards request to appropriate servlet based on URL mapping
Servlet processes request and generates response
Response is sent back to client
Multiple catch blocks can be used to handle different types of exceptions in a try-catch block.
Multiple catch blocks can be used to handle different types of exceptions separately.
Each catch block can specify a different type of exception to catch.
The catch blocks are evaluated in order, so the most specific exception types should be caught first.
Using multiple catch blocks can make the code more readable and maintaina
Inheritance in Java allows a class to inherit properties and behaviors from another class.
Create a new class using the 'extends' keyword followed by the name of the class you want to inherit from
Use super keyword to call the constructor of the parent class
Child class can override methods from the parent class
Dependency injection is a design pattern used to remove hard-coded dependencies and make components more reusable and testable.
Allows for easier testing by injecting dependencies rather than hard-coding them
Promotes reusability of components by decoupling them from their dependencies
Improves maintainability by making it easier to swap out dependencies without changing the component's code
Streams represent a sequence of elements and support functional-style operations, while collections are data structures that store and manipulate groups of objects.
Streams are used for processing sequences of elements, while collections are used for storing and manipulating groups of objects.
Streams support functional-style operations like filter, map, reduce, while collections provide methods like add, remove, get.
Str...
To create a Spring Boot application, you can use Spring Initializr to generate a project with necessary dependencies and configurations.
Go to https://start.spring.io/
Select the project metadata like group, artifact, dependencies, etc.
Click on 'Generate' to download the project zip file.
Extract the zip file and import the project into your IDE.
Start coding your application logic.
Starter dependencies in Spring Boot are pre-configured dependencies that help in quickly setting up a Spring Boot project.
Starter dependencies are included in the pom.xml file of a Spring Boot project to provide necessary dependencies for specific functionalities.
They help in reducing the manual configuration required to set up a Spring Boot application.
Examples of starter dependencies include spring-boot-starter-web f...
A B-tree index is a data structure used in databases to efficiently store and retrieve data in sorted order.
B-tree indexes are commonly used in database management systems to speed up data retrieval operations.
They are balanced tree data structures that allow for efficient insertion, deletion, and search operations.
B-tree indexes are particularly useful for range queries and sequential access.
Example: In a database tab...
A trigger in SQL is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
There are two main types of triggers in SQL: BEFORE triggers and AFTER triggers.
An example of a trigger is a BEFORE INSERT trigger that automatically sets a default value for a column if
ACID properties are a set of properties that guarantee the reliability of database transactions.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the concurrent execution of transac...
Types of joins in SQL include inner join, outer join (left, right, full), cross join, and self join.
Inner join: returns rows when there is a match in both tables based on the join condition.
Outer join: returns all rows from one table and only matching rows from the other table.
Left outer join: returns all rows from the left table and the matched rows from the right table.
Right outer join: returns all rows from the righ...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by eliminating duplicate data
Normalization ensures data integrity by enforcing relationships between tables
There are different levels of normalization such as 1NF, 2NF, 3NF, and BCNF
Query to print CustomerID, CustomerName, OrderStatus, and TotalAmount excluding orders placed in August.
Join Customer and Order tables on CustomerID
Filter out orders placed in August using WHERE clause
Select CustomerID, CustomerName, OrderStatus, and TotalAmount columns
Retrieve data from a given URL using Java and Angular code.
Use Java's HttpURLConnection class to make a GET request to the URL and retrieve the data.
In Angular, use HttpClient module to send a GET request to the URL and fetch the data.
Parse the retrieved data in both Java and Angular to extract the required information.
I applied via Company Website and was interviewed in Sep 2024. There were 2 interview rounds.
Implemented Spring Security for authentication and authorization in project.
Used Spring Security to handle user authentication and authorization
Configured security rules in XML or Java configuration file
Implemented custom authentication provider or user details service if needed
Secured endpoints with role-based access control
Utilized CSRF protection to prevent cross-site request forgery
I have fixed security vulnerabilities related to SQL injection, cross-site scripting, and insecure direct object references.
Implemented input validation to prevent SQL injection attacks
Escaped user input to prevent cross-site scripting attacks
Implemented access controls to prevent insecure direct object references
Regularly updated security patches and libraries
Challenges faced while migrating Java 8 to Java 17 include compatibility issues, deprecated APIs, and potential performance impacts.
Compatibility issues with third-party libraries and frameworks
Deprecated APIs in Java 8 that may have been removed or changed in Java 17
Potential performance impacts due to changes in the JVM or compiler optimizations
I switched very early in my career to explore different opportunities and gain diverse experience.
To gain diverse experience and skills
To explore different career opportunities
To find a better fit for my interests and strengths
I am currently earning $80,000 and I am expecting a competitive salary from Infosys based on my experience and skills.
Current salary: $80,000
Expecting competitive salary from Infosys based on experience and skills
Infosys interview questions for popular designations
I was interviewed in Sep 2024.
Demonstrate the flow of Spring MVC through code
Create a controller class with request mapping annotations
Define methods in the controller to handle different requests
Configure the dispatcher servlet in web.xml
Create a view resolver to map logical view names to actual views
Use stream api to find duplicates in an array of strings
Convert array to stream using Arrays.stream()
Use Collectors.groupingBy() to group elements by their occurrences
Filter the map to find elements with count > 1
Move all zeroes in an array to the end without changing the order of other elements.
Iterate through the array and keep track of the index where non-zero elements should be placed.
After the iteration, fill the remaining positions with zeroes.
Check if 2 strings are anagrams by comparing sorted characters
Sort the characters of both strings and compare if they are equal
Use a hashmap to store character frequencies and compare the maps
To check logs in an app, access log files or use logging frameworks like Log4j.
Access log files directly in the application directory
Use logging frameworks like Log4j to log messages at different levels
Analyze log files for errors or debugging information
Prioritize tasks, break down work into smaller chunks, communicate with team, utilize time management techniques
Prioritize tasks based on importance and urgency
Break down work into smaller, manageable chunks to make progress
Communicate with team members to ensure everyone is on the same page
Utilize time management techniques such as Pomodoro technique or Agile methodologies
Get interview-ready with Top Infosys Interview Questions
I applied via Company Website and was interviewed in Dec 2024. There was 1 interview round.
SCD type 1 overwrites existing data, while SCD type 2 maintains historical data
SCD type 1 updates existing records with new information, losing historical data
SCD type 2 creates new records for changes, preserving historical data with effective start and end dates
In Databricks, SCD type 1 can be implemented using overwrite function, while SCD type 2 can be implemented using merge function
Parameters can be passed from Azure Data Factory (ADF) to Azure Data Factory (ADB) using linked services and datasets.
Create a linked service in ADF to connect to ADB
Define parameters in ADF pipeline and pass them to ADB activities
Use dynamic content expressions to pass parameters between ADF and ADB
Example: Pass a parameter for a SQL query in ADB from ADF pipeline
I applied via Campus Placement and was interviewed in Dec 2024. There were 2 interview rounds.
Aptitude test consists of topics like percentages ,profits and loss like this they covered all the topics there is verbal ability also
The four pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in Java.
Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Subclass extending a superclass.
Polymorphism: Ability to present the same interface for different data types. Example: Method overl...
ListView is a legacy view for displaying lists in Android, while RecyclerView is a more flexible and efficient replacement.
ListView is less efficient in terms of memory and performance compared to RecyclerView.
RecyclerView provides better performance by recycling views and separating the responsibilities of layout and data management.
RecyclerView supports more advanced features like animations and item decorations.
List...
Services and work manager are components in software development that help manage background tasks and processes.
Services are components that run in the background to perform long-running operations without affecting the user interface.
Work manager is a library that helps manage background tasks efficiently, taking into account factors like battery life and network availability.
Services can be used for tasks like downl...
I applied via Job Portal and was interviewed in Dec 2024. There were 3 interview rounds.
I have over 5 years of experience managing projects in various industries, leading cross-functional teams to successful project completion.
Managed projects in IT, construction, and healthcare industries
Led cross-functional teams to meet project deadlines and deliverables
Utilized project management tools such as Gantt charts and Agile methodologies
Implemented process improvements to increase efficiency and reduce costs
I am seeking new challenges and opportunities for growth in a different environment.
Seeking new challenges and opportunities for growth
Interested in expanding my skill set in a different environment
Looking for a change in work culture or team dynamics
Topic for GD was AI in BPO.
Workflow techniques are methods used to streamline and optimize the flow of work within a project.
One popular workflow technique is Agile, which focuses on iterative development and collaboration.
Another technique is Waterfall, where tasks are completed sequentially in a linear fashion.
Kanban is a visual workflow technique that emphasizes limiting work in progress and continuous delivery.
Scrum is a framework that invol...
I applied via Company Website and was interviewed in Nov 2024. There were 2 interview rounds.
What people are saying about Infosys
Some of the top questions asked at the Infosys interview -
The duration of Infosys interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4.9k interviews
Interview experience
based on 39.5k reviews
Rating in categories
Hyderabad / Secunderabad,
Gurgaon / Gurugram
+13-8 Yrs
Not Disclosed
Technology Analyst
55.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Systems Engineer
50.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
System Engineer
39.5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
30.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Associate Consultant
27.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Cognizant
Accenture