i
Zensar Technologies
Filter interviews by
I applied via Campus Placement and was interviewed in Dec 2021. There were 4 interview rounds.
General Aptitude question, logical reasoning, English grammar.
Concept related with string and function.
Questions related to OOP concepts, data structures, and algorithms for a software engineer position.
OOP feature: encapsulation, inheritance, polymorphism, abstraction
Function overloading: same function name with different parameters, compile-time polymorphism
Function overriding: same function name and parameters in parent and child class, runtime polymorphism
Constructor: special member function used to initialize objec...
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
Power Automate best practices involve proper planning, testing, and documentation.
Plan your flows before creating them to ensure they meet your requirements.
Test your flows thoroughly to identify and fix any issues before deployment.
Document your flows, including their purpose, inputs, outputs, and any dependencies.
Use naming conventions and comments to make your flows easier to understand and maintain.
Consider securit...
Different types of APIs include REST, SOAP, GraphQL, and gRPC.
REST API: Uses HTTP methods like GET, POST, PUT, DELETE for communication.
SOAP API: Uses XML for message format and WSDL for service description.
GraphQL API: Allows clients to request only the data they need.
gRPC API: Uses Protocol Buffers for serialization and supports bidirectional streaming.
Power Automate allows for multiple data sources to be used in a single flow.
Power Automate supports connecting to various data sources such as SharePoint, Excel, SQL Server, and more.
You can use multiple data sources in a single flow by adding multiple actions to connect to different sources.
For example, you can retrieve data from a SharePoint list and then update a SQL Server database in the same flow.
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
2nd round was about again Android but more focused on security features of android
3rd round was live coding . I was asked to make an app from scratch in 1 hour without even using google.
Zensar Technologies interview questions for popular designations
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
Experienced Java Developer with a passion for creating efficient and scalable applications.
Over 5 years of experience in Java development
Strong knowledge of object-oriented programming principles
Proficient in Spring framework and Hibernate
Experience with RESTful web services and microservices architecture
Familiar with Agile methodologies and version control systems like Git
Spring Boot simplifies the development of Java applications by providing a set of tools and conventions.
Spring Boot eliminates the need for manual configuration by providing defaults and auto-configuration.
It includes embedded servers like Tomcat, Jetty, or Undertow for easy deployment.
Spring Boot starters help in quickly setting up dependencies and configurations.
Annotations like @SpringBootApplication and @RestContro
Spring Security is used for authentication and authorization in Java projects.
Spring Security provides authentication and authorization support out of the box.
It can be configured using XML or Java configuration.
It supports various authentication mechanisms like form-based, basic, and OAuth.
Roles and permissions can be defined using annotations or configuration.
Example: @EnableWebSecurity annotation enables Spring Secu
Annotation used to mark a class as a Spring Boot application
Main annotation in Spring Boot to indicate the starting point of the application
Combines @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations
Used to enable the auto-configuration feature in Spring Boot
Reduces the need for XML configuration in Spring applications
Find frequency of all elements in a given string
Create a HashMap to store the frequency of each element in the string
Iterate through the string and update the frequency in the HashMap
Convert the HashMap to an array of strings for the final result
I am a Java Developer with 5 years of experience in developing web applications and implementing software solutions.
5 years of experience in Java development
Proficient in developing web applications
Skilled in implementing software solutions
Success is achieving personal goals, feeling fulfilled, and making a positive impact on others.
Success is subjective and can vary from person to person.
It is not just about achieving wealth or fame, but also about personal growth and happiness.
Success can be measured by the impact one has on others and the legacy they leave behind.
Examples of success include reaching career milestones, maintaining healthy relationships...
My strengths include strong problem-solving skills and attention to detail. My weakness is sometimes being too critical of my own work.
Strength: Strong problem-solving skills - I enjoy tackling complex problems and finding efficient solutions.
Strength: Attention to detail - I take pride in producing high-quality work and ensuring accuracy.
Weakness: Being too critical of my own work - I strive for perfection and sometim...
I come from a close-knit family with a strong emphasis on education and hard work.
Family is supportive and values education
Parents are both professionals
Have a sibling who is also in the tech industry
I approach problem-solving by breaking down the issue, researching possible solutions, and testing different approaches.
Identify the problem and gather all relevant information
Brainstorm potential solutions and evaluate their feasibility
Implement the chosen solution and test it to ensure it resolves the problem
Iterate on the solution if needed to improve its effectiveness
Get interview-ready with Top Zensar Technologies Interview Questions
Volatile variables are used to indicate that a variable's value can be changed unexpectedly, while atomic variables ensure that operations on the variable are executed as a single, indivisible unit.
Volatile variables are used when a variable's value can be changed by multiple threads or external factors, and the compiler should not optimize access to that variable.
Atomic variables ensure that operations on the variable...
Caching can be implemented by storing frequently accessed data in a temporary storage area to improve performance.
Use caching libraries like Redis or Memcached to store data in memory for quick access
Implement caching at different levels such as application-level caching, database query caching, and HTTP caching
Set expiration times for cached data to ensure freshness and prevent stale data
Use caching strategies like la...
I applied via Campus Placement and was interviewed in Dec 2024. There were 2 interview rounds.
The coding test consisted of easy to medium difficulty questions: 1. Find the Kth largest element. 2. Print an array based on the sequence specified in a different array. Additionally, there was a classical stack problem involving valid parentheses.
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
MCQ'S on Core Java, Java8, SQL, Microservices and Coding question in Java.
Use Java streams to filter prime numbers from a list, find highest employee salary, and demonstrate basic SQL joins.
Use Java streams to filter prime numbers from the list
Use streams to find the highest salary of employees
Demonstrate basic SQL queries for joins
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
Authorization determines what a user can access, while authentication verifies the user's identity.
Authorization controls access to resources based on user permissions
Authentication verifies the user's identity through credentials like passwords or biometrics
Authorization comes after authentication in the access control process
Example: After logging into a system (authentication), a user is authorized to view certain f
SSO stands for Single Sign-On, a method of access control that allows a user to log in with a single ID and password to access multiple applications.
SSO eliminates the need for users to remember multiple passwords for different applications.
It improves user experience by reducing the number of times a user has to log in.
SSO can be implemented using technologies like SAML, OAuth, or OpenID Connect.
Example: A user logs i...
I applied via Job Fair and was interviewed in Oct 2024. There was 1 interview round.
Top trending discussions
The duration of Zensar Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 193 interviews
Interview experience
based on 2.5k reviews
Rating in categories
Senior Software Engineer
3.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
3.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Specialist
1.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Softwaretest Engineer
830
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Technical Specialist
720
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech