i
Infosys
Filter interviews by
I applied via Campus Placement and was interviewed before Feb 2020. There were 4 interview rounds.
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has built-in support for polymorphism and inheritance.
C++ has a standard template library (STL) while C does not.
C++ allows function overloading while C does not.
C++ has exception handling while C does not.
If and Switch Case statements are used for conditional branching in programming.
If statements are used for simple conditional branching.
Switch Case statements are used for multiple conditional branching.
If statements are more flexible than Switch Case statements.
Switch Case statements are more efficient than If statements for large number of conditions.
If statements can be nested, but Switch Case statements cannot.
Exam...
Yes, algorithms and pseudocodes are still important in IT Services.
Algorithms are used in various fields of IT such as machine learning, data analysis, and cryptography.
Pseudocodes are used to plan and design algorithms before coding them.
Understanding algorithms and pseudocodes is essential for software engineers to write efficient and optimized code.
Examples of algorithms include sorting algorithms, search algorithms
Yes, I am comfortable using both CLIs and IDEs for my daily tasks.
I have experience using various CLIs such as Git Bash, Windows Command Prompt, and Terminal on macOS.
I am proficient in using IDEs such as Visual Studio Code, Eclipse, and IntelliJ IDEA.
I understand the benefits and drawbacks of both CLIs and IDEs and can choose the appropriate tool for the task at hand.
Yes, I am willing to learn front end and back end technologies and have a learning strategy in place.
I believe in continuous learning and growth as a developer.
I have experience in learning new technologies quickly and efficiently.
My learning strategy involves breaking down concepts into smaller parts and practicing regularly.
I also utilize online resources and seek guidance from experienced colleagues.
Examples of tech...
It was good . 3 question
It was hard, 5 questions
It was good I gave my best
Difficult it much to learn
Infosys interview questions for designations
Microservices are a software architecture design where applications are broken down into small, independent services that communicate with each other.
Microservices are independently deployable and scalable.
Each microservice focuses on a specific business function.
Communication between microservices is typically done through APIs.
Examples of companies using microservices include Netflix, Amazon, and Uber.
A panagram is a sentence containing every letter of the alphabet at least once.
Create a function that takes a string as input
Convert the input string to lowercase for case-insensitivity
Iterate through each letter of the alphabet and check if it exists in the input string
Load balancers distribute incoming network traffic across multiple servers to ensure no single server is overwhelmed.
Set up multiple servers to handle incoming traffic
Use a load balancer to distribute traffic evenly among servers
Monitor server health and adjust load balancing algorithms as needed
Get interview-ready with Top Infosys Interview Questions
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
A record in C# is a data structure that contains a fixed number of fields of different data types.
Records are similar to classes but are immutable by default
They are used to group related data together
Records are value types and are compared by value rather than by reference
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and only exposing necessary functionalities.
It allows for better control over the data by preventing direct access from outside the object.
Example: In a class representing a car, the variables like speed and fuel level can be encapsulated along with methods
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs focuses on creating objects that interact with each other to solve a problem
Key concepts include encapsulation, inheritance, polymorphism, and abstraction
Encapsulation: bundling data and methods that operate on the data into a single unit
Inheritance: allows a class to inherit properties and...
Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics
Authorization determines the permissions and access levels a user has within a system
Examples include logging in with a username and password (authentication) and being able to view/edit specific files based
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There was 1 interview round.
I applied via Campus Placement and was interviewed in Oct 2024. There were 2 interview rounds.
59 aptitude questions
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by eliminating duplicate data
Normalization ensures data integrity by enforcing relationships between tables
There are different normal forms such as 1NF, 2NF, 3NF, BCNF, etc.
Boxing is the process of converting a value type to a reference type, while unboxing is the process of converting a reference type to a value type.
Boxing is implicit, while unboxing is explicit.
Boxing involves wrapping a value type in an object, while unboxing involves extracting the value type from the object.
Boxing can lead to performance overhead due to memory allocation, while unboxing can lead to runtime errors if
Access modifiers in .NET are keywords used to specify the accessibility of classes, methods, and other members.
Access modifiers include public, private, protected, internal, protected internal, and private protected.
Public - accessible from any other code in the same assembly or another assembly.
Private - accessible only within the containing type.
Protected - accessible within the containing type and by derived types.
I...
What people are saying about Infosys
Some of the top questions asked at the Infosys Software Engineer interview -
The duration of Infosys Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 125 interviews
6 Interview rounds
based on 430 reviews
Rating in categories
Technology Analyst
55.8k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
50.6k
salaries
| ₹2.8 L/yr - ₹9 L/yr |
System Engineer
39.5k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
30.8k
salaries
| ₹5.2 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
27.8k
salaries
| ₹4.5 L/yr - ₹17 L/yr |
TCS
Wipro
Cognizant
Accenture