i
Kyndryl
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed in Apr 2024. There was 1 interview round.
Abstraction is the concept of hiding complex implementation details and showing only the necessary features to the outside world.
Abstraction allows us to focus on what an object does rather than how it does it
Achieved through abstract classes and interfaces in object-oriented programming
Example: A car dashboard abstracts the internal workings of the car and provides only essential information to the driver
Hashtable is synchronized, while hashmap is not. Hashtable does not allow null keys or values, while hashmap does.
Hashtable is synchronized, while hashmap is not
Hashtable does not allow null keys or values, while hashmap does
Hashtable is a legacy class, while hashmap is a newer class
The get() method in HashMap retrieves the value associated with a specified key.
get() method takes a key as input and returns the value associated with that key in the HashMap.
Internally, get() uses the hash code of the key to find the corresponding bucket in the HashMap.
If multiple keys have the same hash code, get() uses the equals() method to find the correct key-value pair.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization helps in minimizing data redundancy by dividing the database into multiple tables and defining relationships between them.
It ensures data integrity by avoiding update anomalies and inconsistencies.
There are different normal forms such as 1NF, 2NF, 3NF, BCNF, and 4NF, each with specific rules to fo...
Constraints are limitations or restrictions placed on a system or process.
Constraints define the boundaries within which a system must operate.
They can include limitations on resources, time, or functionality.
Examples of constraints in software engineering include memory limitations, processing speed, and input/output requirements.
Query to retrieve the 3rd highest salary from the employee table
Use the ORDER BY clause to sort salaries in descending order
Use the LIMIT clause to retrieve the 3rd highest salary
Traverse the linked list to find the 2nd last node and return its value.
Traverse the linked list while keeping track of the current and previous nodes.
Once at the end of the list, return the value of the previous node.
Use two variables to keep track of the smallest and second smallest numbers in the array.
Iterate through the array and update the variables accordingly.
Initialize the variables with the maximum possible integer value to start with.
Example: array = [5, 2, 8, 1, 3], smallest = 1, secondSmallest = 2.
What people are saying about Kyndryl
posted on 12 Jun 2021
Computer networking is the practice of connecting devices together to share resources and communicate with each other.
Computer networking involves the use of hardware and software to connect devices together, such as computers, printers, and servers.
Networking protocols, such as TCP/IP, are used to facilitate communication between devices.
Examples of computer networks include local area networks (LANs), wide area netwo...
I applied via Naukri.com and was interviewed in Aug 2020. There were 5 interview rounds.
Interfaces define a contract for classes to implement certain methods and properties.
Interfaces allow for polymorphism and loose coupling.
Classes can implement multiple interfaces.
Interfaces cannot be instantiated on their own.
Interfaces can have default method implementations.
Interfaces can be used to enforce design patterns like the adapter pattern.
I applied via Campus Placement and was interviewed in Dec 2020. There were 5 interview rounds.
Program to print a pattern and implement bubble sort on an array of strings.
For pattern printing, use nested loops to print the desired pattern.
For bubble sort, compare adjacent elements and swap if necessary.
Use a loop to iterate through the array until no more swaps are needed.
posted on 9 Feb 2015
SQL command for creating a table
Use CREATE TABLE statement
Specify table name and column names with data types
Add any constraints or indexes as needed
SQL commands for inserting, updating, and deleting data from a table.
INSERT INTO table_name (column1, column2, column3) VALUES (value1, value2, value3);
UPDATE table_name SET column1 = new_value1 WHERE condition;
DELETE FROM table_name WHERE condition;
Truncate and drop are SQL commands used to remove data from a table.
Truncate removes all data from a table but keeps the structure intact.
Drop removes the entire table and its structure.
Truncate is faster than drop as it only removes data.
Drop cannot be undone while truncate can be rolled back.
Truncate resets the identity of the table while drop does not.
Examples: TRUNCATE TABLE table_name; DROP TABLE table_name;
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance.
C++ has a standard template library (STL) while C does not.
C++ allows function overloading while C does not.
C++ has exception handling while C does not.
I am a software developer with experience in Java and Python.
I have a Bachelor's degree in Computer Science.
I have worked on various projects involving web development and data analysis.
I am proficient in Java and Python programming languages.
I have experience with frameworks such as Spring and Django.
I am familiar with databases such as MySQL and MongoDB.
I have always been fascinated by technology and its ability to solve complex problems.
I enjoy problem-solving and logical thinking
I have a natural curiosity for how things work
I see the potential for technology to make a positive impact on society
I have experience in programming and find it rewarding
I am excited about the constant innovation and evolution in the IT industry
My strengths include problem-solving, adaptability, and teamwork. My weakness is public speaking.
Strengths: problem-solving, adaptability, teamwork
Examples: I have successfully solved complex coding problems, adapted to new technologies quickly, and collaborated effectively with team members.
Weakness: public speaking
Examples: I get nervous when speaking in front of large groups, but I am working on improving my present
I have the technical skills, experience, and passion to excel in this role.
I have a strong background in software development, with expertise in multiple programming languages and frameworks.
I have experience working on complex projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in the industry.
I am a quick learner and adaptable to new ...
posted on 16 Aug 2015
Network layers are a hierarchical way of organizing communication protocols.
Network layers provide a modular approach to networking.
Each layer has a specific function and communicates with adjacent layers.
The OSI model has 7 layers, while the TCP/IP model has 4 layers.
Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded/multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating s...
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
Some of the top questions asked at the Kyndryl Software Engineer interview for freshers -
based on 1 interview
Interview experience
based on 13 reviews
Rating in categories
System Administrator
1.3k
salaries
| ₹2.9 L/yr - ₹12 L/yr |
Project Manager
620
salaries
| ₹7.1 L/yr - ₹28.5 L/yr |
Associate Technical Engineer
590
salaries
| ₹3.5 L/yr - ₹6.5 L/yr |
Infrastructure Specialist
579
salaries
| ₹4.7 L/yr - ₹23 L/yr |
SME
419
salaries
| ₹7.5 L/yr - ₹25.5 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions