i
Infosys
Filter interviews by
I applied via Campus Placement and was interviewed in Mar 2020. There was 1 interview round.
To get the second to last element from a SQL table, use the OFFSET-FETCH clause.
Use the ORDER BY clause to sort the table in descending order.
Use the OFFSET-FETCH clause to skip the last row and fetch the second to last row.
Example: SELECT column_name FROM table_name ORDER BY column_name DESC OFFSET 1 ROWS FETCH NEXT 1 ROWS ONLY;
It was good . 3 question
It was hard, 5 questions
It was good I gave my best
Difficult it much to learn
Infosys interview questions for designations
Microservices are a software architecture design where applications are broken down into small, independent services that communicate with each other.
Microservices are independently deployable and scalable.
Each microservice focuses on a specific business function.
Communication between microservices is typically done through APIs.
Examples of companies using microservices include Netflix, Amazon, and Uber.
A panagram is a sentence containing every letter of the alphabet at least once.
Create a function that takes a string as input
Convert the input string to lowercase for case-insensitivity
Iterate through each letter of the alphabet and check if it exists in the input string
Load balancers distribute incoming network traffic across multiple servers to ensure no single server is overwhelmed.
Set up multiple servers to handle incoming traffic
Use a load balancer to distribute traffic evenly among servers
Monitor server health and adjust load balancing algorithms as needed
Get interview-ready with Top Infosys Interview Questions
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
A record in C# is a data structure that contains a fixed number of fields of different data types.
Records are similar to classes but are immutable by default
They are used to group related data together
Records are value types and are compared by value rather than by reference
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and only exposing necessary functionalities.
It allows for better control over the data by preventing direct access from outside the object.
Example: In a class representing a car, the variables like speed and fuel level can be encapsulated along with methods
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs focuses on creating objects that interact with each other to solve a problem
Key concepts include encapsulation, inheritance, polymorphism, and abstraction
Encapsulation: bundling data and methods that operate on the data into a single unit
Inheritance: allows a class to inherit properties and...
Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics
Authorization determines the permissions and access levels a user has within a system
Examples include logging in with a username and password (authentication) and being able to view/edit specific files based
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There was 1 interview round.
I applied via Campus Placement and was interviewed in Oct 2024. There were 2 interview rounds.
59 aptitude questions
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by eliminating duplicate data
Normalization ensures data integrity by enforcing relationships between tables
There are different normal forms such as 1NF, 2NF, 3NF, BCNF, etc.
Boxing is the process of converting a value type to a reference type, while unboxing is the process of converting a reference type to a value type.
Boxing is implicit, while unboxing is explicit.
Boxing involves wrapping a value type in an object, while unboxing involves extracting the value type from the object.
Boxing can lead to performance overhead due to memory allocation, while unboxing can lead to runtime errors if
Access modifiers in .NET are keywords used to specify the accessibility of classes, methods, and other members.
Access modifiers include public, private, protected, internal, protected internal, and private protected.
Public - accessible from any other code in the same assembly or another assembly.
Private - accessible only within the containing type.
Protected - accessible within the containing type and by derived types.
I...
What people are saying about Infosys
6 Interview rounds
based on 419 reviews
Rating in categories
Technology Analyst
56k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
50.1k
salaries
| ₹2.8 L/yr - ₹6.4 L/yr |
System Engineer
39.2k
salaries
| ₹2.5 L/yr - ₹6 L/yr |
Technical Lead
30.6k
salaries
| ₹5.2 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
27.5k
salaries
| ₹6.2 L/yr - ₹16.8 L/yr |
TCS
Wipro
Cognizant
Accenture