i
Publicis
Sapient
Work with us
Filter interviews by
Monolithic architecture is a single unified unit, while microservices architecture breaks down the application into smaller, independent services.
Monolithic architecture is a single, indivisible unit where all components are interconnected and interdependent.
Microservices architecture breaks down the application into smaller, independent services that communicate with each other through APIs.
Monolithic application...
To make a class immutable, we can use final keyword for class, fields, and methods, make fields private, and avoid setters.
Use final keyword for class to prevent inheritance
Make fields private to restrict direct access
Avoid providing setter methods for fields
If fields are mutable objects, return a copy of the object instead of the original
I handle security in my application by implementing encryption, access controls, regular security audits, and staying updated on security best practices.
Implement encryption for sensitive data to protect it from unauthorized access
Use access controls to restrict user permissions and limit exposure of sensitive information
Conduct regular security audits to identify and address vulnerabilities
Stay updated on securit...
Memory management in Java involves automatic memory allocation and garbage collection.
Java uses automatic memory management through garbage collection to allocate and deallocate memory.
Memory is divided into stack and heap. Stack stores primitive types and references to objects, while heap stores objects.
Garbage collection in Java identifies and removes objects that are no longer needed, freeing up memory for new ...
I have used the Singleton, Factory, and Observer design patterns in my project.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and...
HashMap works internally by using a hash function to map keys to their corresponding values in an array of linked lists.
HashMap uses a hash function to determine the index of the array where the key-value pair will be stored.
In case of hash collisions, where multiple keys map to the same index, a linked list is used to store multiple entries at that index.
When retrieving a value, the hash function is used to find ...
A hashmap is a data structure that allows for efficient retrieval of values based on their associated keys.
A hashmap uses a hash function to convert keys into array indices.
Collisions can occur when multiple keys hash to the same index.
To handle collisions, a hashmap typically uses linked lists or other data structures to store multiple values at the same index.
When retrieving a value, the hashmap uses the hash fu...
I manage pressure by prioritizing tasks, staying organized, taking breaks, and seeking support when needed.
Prioritize tasks based on deadlines and importance
Stay organized with to-do lists and calendars
Take breaks to recharge and avoid burnout
Seek support from colleagues or supervisors when feeling overwhelmed
To enhance web performance of a page, optimize images, minify code, reduce server response time, use caching, and enable compression.
Optimize images by compressing them and using appropriate file formats.
Minify code by removing unnecessary characters and whitespace.
Reduce server response time by using a content delivery network (CDN) and optimizing database queries.
Use caching to store frequently accessed data and...
SSR and CSR websites refer to server-side rendering and client-side rendering respectively. SSR is used for better initial load performance and SEO, while CSR is suitable for dynamic and interactive content.
SSR (Server-Side Rendering) websites render the web pages on the server and send the fully rendered HTML to the client.
CSR (Client-Side Rendering) websites load a minimal HTML skeleton and then use JavaScript t...
I handle security in my application by implementing encryption, access controls, regular security audits, and staying updated on security best practices.
Implement encryption for sensitive data to protect it from unauthorized access
Use access controls to restrict user permissions and limit exposure of sensitive information
Conduct regular security audits to identify and address vulnerabilities
Stay updated on security bes...
To make a class immutable, we can use final keyword for class, fields, and methods, make fields private, and avoid setters.
Use final keyword for class to prevent inheritance
Make fields private to restrict direct access
Avoid providing setter methods for fields
If fields are mutable objects, return a copy of the object instead of the original
I have used the Singleton, Factory, and Observer design patterns in my project.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and upda...
Memory management in Java involves automatic memory allocation and garbage collection.
Java uses automatic memory management through garbage collection to allocate and deallocate memory.
Memory is divided into stack and heap. Stack stores primitive types and references to objects, while heap stores objects.
Garbage collection in Java identifies and removes objects that are no longer needed, freeing up memory for new objec...
Monolithic architecture is a single unified unit, while microservices architecture breaks down the application into smaller, independent services.
Monolithic architecture is a single, indivisible unit where all components are interconnected and interdependent.
Microservices architecture breaks down the application into smaller, independent services that communicate with each other through APIs.
Monolithic applications are...
I appeared for an interview before May 2024, where I was asked the following questions.
I applied via Referral and was interviewed before Jun 2023. There were 4 interview rounds.
I appeared for an interview before Nov 2023.
I applied via Recruitment Consulltant and was interviewed before Mar 2023. There were 2 interview rounds.
Singleton pattern in Spring ensures that a class has only one instance and provides a global point of access to it.
In Spring, singleton pattern is used by default for all beans created through the Spring container.
This means that by default, Spring beans are singletons and only one instance is created and shared throughout the application.
To connect to a database in Spring, you can use the JDBC template or ORM framewor...
HashMap works internally by using a hash function to map keys to their corresponding values in an array of linked lists.
HashMap uses a hash function to determine the index of the array where the key-value pair will be stored.
In case of hash collisions, where multiple keys map to the same index, a linked list is used to store multiple entries at that index.
When retrieving a value, the hash function is used to find the c...
I applied via Referral and was interviewed in Feb 2022. There were 3 interview rounds.
Basic Core Java Questions, Input output based, Spring, Hibernate & Sql query output
I applied via Referral and was interviewed before Feb 2023. There were 3 interview rounds.
Online MCQ test with mid level difficulty
A hashmap is a data structure that allows for efficient retrieval of values based on their associated keys.
A hashmap uses a hash function to convert keys into array indices.
Collisions can occur when multiple keys hash to the same index.
To handle collisions, a hashmap typically uses linked lists or other data structures to store multiple values at the same index.
When retrieving a value, the hashmap uses the hash functio...
What people are saying about Publicis Sapient
Some of the top questions asked at the Publicis Sapient Associate Technology L2 interview -
The duration of Publicis Sapient Associate Technology L2 interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 17 interview experiences
Difficulty level
Duration
based on 193 reviews
Rating in categories
Senior Associate
2.2k
salaries
| ₹16.7 L/yr - ₹32 L/yr |
Associate Technology L2
1.6k
salaries
| ₹9.2 L/yr - ₹18 L/yr |
Senior Associate Technology L1
1.4k
salaries
| ₹16.4 L/yr - ₹30 L/yr |
Senior Software Engineer
915
salaries
| ₹18 L/yr - ₹32 L/yr |
Senior Associate 2
666
salaries
| ₹23.8 L/yr - ₹42 L/yr |
Genpact
DXC Technology
Optum Global Solutions
Virtusa Consulting Services