Interview_questions_Capgemini

pdf

School

New York University *

*We aren’t endorsed by this school

Course

MISC

Subject

Computer Science

Date

Jan 9, 2024

Type

pdf

Pages

21

Uploaded by ChefThunderIbis35

Report
Capgemini
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Placement paper 1. If (NM)2= RRM where N.M & R are distinct digits. Then possible values for R are (a) 1 (b) 2 (c) 3 (d) none of these Ans (b) -2 2. A man buys spirit at Rs. 60 per letter, adds water to it and then sells it at Rs. 75 per litter. What is the ratio of spirit to water if his profit in the feal is 37.5%? (a) 9:1 (b) 10:1 (c) 11:1 (d) None of these. Ans (b) 10.1 3. A certain quantity of petrol is found to be adulterated to the extent of 10%. What proportion of the adulterated petrol should be replaced with pure petrol to take the purity
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
level to 98%? (a) 80% (b) 32% (c) 66.67% (d) cannot be determined. Ans (a) 80% 4. Two trains are traveling from point A to point B such that the speed of first train is 65 kmps and the speed of 2 train is 29 kmph. Where is the distance b/w A&B such that the slower train reached 5 hrs late compared to the faster. 5. 45 grinders brought @ 2215/-.transpot expense 2190/-.2760/- on octroi . Find SP/piece to make profit of 20% 2585 2225 2670 3325 6. in a 2 digit no unit’s place is halved and tens place is doubled.diff bet the nos is 37.digit in unit’s place is 2 more than tens place. 24 46 42 none 7. if x-y + z = 19 , y + z =20 , x-z=3 , find d value of x+4y-5z 22 38 17 none 8. Find approx value of 39.987/0.8102+1.987*18.02 72 56 86 44 9. Asish was given Rs. 158 in denominations of Rs 1 each. He distributes these in diff bags, such that ne sum of money of denomination betn 1 and 158 can be given in bags. The min no. of such bags reqd : 10 17 15 none 10. There is a rectangular Garden whose length and width are 60m X 20m.There is a walkway of uniform width around garden. Area of walkway is 516m^2. Find width of walkway: 1 2 3 4 11. In a race from pt. X to pt Y and back, Jack averages 0 miles/hr to pt Y and 10 miles/hr back to pr X.Sandy averages 20 miles/hr in both directions. If Jack and Sandy start race at same tym, who’ll finish:
i. 1st Jack ii.Sandy iii.they tie iv.Impossible to tell 12. A man engaged a servant on a condn that he’ll pay Rs 90 and also give him a bag at the end of the yr. He served for 9 months and was given a turban and Rs 65. So the price of turban is i. Rs : 10 19 0 55 13. if a row dominated two dimensional array in the following which one is advantage and why? a) for(i=0;i<1000;i++) for(j=0;j<1000;j++) temp=temp+a[i][j]; b) for(j=0;j<1000;j++) for(i=0;i<1000;i++) temp=temp+a[i][j] 14. Consider the prog and select answer #include<stdio.h> void main ( ) { int k=4,j=0: switch (k) { case 3; j=300; case 4: j=400:
case 5: j=500; } printf (“%d \ n”,j); } A. 300 B. 400 C. 500 D. 0 15. Which fruit is not used by Mandy? aa a. Cherries b. Grapes c. Apples d. Bananas 16. Which is the combination by Erica? a. Apples, cherries, Bananas b. Apples, Cherries, Grapes c. Apples, Grapes, Bananas d. Cherries, Grapes, Bananas Direction for Qn 17-18 These qns are based on situations given below: 7 Uni crick players are to be honored at a special luncheon. The players will be seated on a dais along one side of a single rectangular table. A and G have to leave the luncheon early and must be seated at the extreme right end of table, which is closest to exit. B will receive Man of the Match and must be in the centre chair C and D who are bitter rivals for the position of Wicket keeper dislike one another and should be seated as far apart as possible E and F are best friends and want to seat together. 17. Which of the foll may not be seated at either end of the table? i. C ii. D iii. G iv. F
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
18. Which of the foll pairs may not be seated together? i. E & A ii. B & D iii. C & F iv. G & D Direction for Qn 19-20 Elle is 3 times older than Zaheer. Zaheer is ½ as old as Waheeda. Yogesh is elder than Zaheer. 19. What is sufficient to estimate Elle’s age? i. Zaheer is 10 yrs old ii. Yogesh and Waheeda are both older than Zaheer by the same no of yrs. iii. Both of the above iv. None of the above Placement paper 2 1. If Log2 x - 5 Log x + 6 = 0, then what would the value / values of x be? Ans.. x = e2 or e3. 2.A man ate 100 bananas in five days, each day eating 6 more than the previous day. How many bananas did he eat on the first day? Ans.. Eight. 2. If it takes five minutes to boil one egg, how long will it take to boil four eggs? Ans.. Five minutes. 3. Three pipes, A, B, & C are attached to a tank. A & B can fill it in 20 & 30 minutes respectively while C can empty it in 15 minutes. If A, B & C are kept open successively for 1 minute each, how soon will the tank be filled? Ans.167 minutes. 4.A person walking 5/6 of his usual rate is 40 minutes late. What is his usual time? Ans.. 3 hours 20 minutes. 5. Output of the following program is main() {int i=0; for(i=0;i<20;i++)
{switch(i) case 0:i+=5; case 1:i+=2; case 5:i+=5; default i+=4; break;} printf("%d,",i); } } a) 0,5,9,13,17 b) 5,9,13,17 c) 12,17,22 d) 16,21 e) Syntax error Ans. (d 6. What is the output in the following program main() {char c=-64; int i=-32 unsigned int u =-16; if(c>i) {printf("pass1,"); if(c printf("pass2"); else printf("Fail2"); } else printf("Fail1); if(i printf("pass2"); else printf("Fail2") } a) Pass1,Pass2 b) Pass1,Fail2 c) Fail1,Pass2 d) Fail1,Fail2 e) None of these Ans. (c) 7. In the process table entry for the kernel process, the process id value is (a) 0
(b) 1 (c) 2 (d) 255 (e) it does not have a process table entry Ans. (a) Capgemini Technical Interview Questions and Answers 1. Illustrate public static void main(String args[]) in Java. A. The entry point for any Java code is called main() and is always written as a public static void main (String[] args). public: The term "public" refers to an access modifier. It's used to specify who has access to use this method. This method is public, which implies that it can be accessed by any class static: This is a keyword that indicates that it is a class-based system. In Java, main() is made static so that it can be accessed without having to create a class instance; however if main is not made static, the compiler will throw an error because main() is called by the JVM before any objects are created, and only static methods can be directly invoked via the class void: The return type of a method is void, and it defines a method that does not return any value main: It's the name of the method that JVM looks for when it's searching for a starting point for an application with a specific signature, and it's the method where the main execution happens String args[]: The parameter passed to the main method is String args[]. args[] is an array of arguments with each element as a string https://www.freshersnow.com/ 2. How is memory managed in Python? A. Python's private heap space is in charge of memory management. The private heap contains all Python objects and data structures, but the programmer does not have access to it. The Python interpreter, on the other hand, takes care of this. The memory manager in Python is in charge of allocating heap space for Python objects. The core API then gives the programmer access to a few programming tools. It also contains an integrated garbage collector, which, as the name implies, recycles all unused memory and makes it available to the heap space. 3. What distinguishes a structure from a class in C++? A. There are a few distinctions between a class in C++ and a structure. These are the following:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
When creating a structure from a class or another structure, the base class or structure's default access specifier is public. When deriving a class, on the other hand, the default access specifier is private. The members of a structure are always public, but the members of a class are always private. The variables of a structure are stored in the stack memory while those of the class are stored in the heap memory. Class supports inheritance whereas structures do not. The type of class is reference type whereas the type of structure is a value type 4. What is the difference between new() and malloc()? A. In C++, both malloc() and new are used for memory allocation at runtime. The differences are listed below: Malloc() is a function, whereas new() is a pre-processor. When using new(), there is no requirement to allocate memory; nevertheless, when using malloc(), you must use sizeof (). new() sets the new memory to 0 and malloc() assigns a random value to the newly allocated memory. The new() operator allocates memory and invokes the constructor for object initialization, whereas the malloc() function allocates memory but does not invoke the constructor. Because the operator is faster than the function, the new() operator is faster than the malloc() function 5. What are virtual functions and pure virtual functions? A. A virtual function is a member function that is declared in a base class and overridden bya derived class. When we are using a pointer or a reference to the base class to refer to a derived class object, we can invoke a virtual function for that object and have it run the derived class's version of the function. Regardless of the type of reference (or pointer) used for a function call, virtual functions make sure the right function is called for an object. They're mostly implemented to accomplish polymorphism at runtime. The virtual keyword is used to declare functions in base classes. Run-time resolution of function calls is performed. Functions that are only declared in the base class are known as pure virtual functions or abstract functions. This indicates that they have no definition in the base class and must be redefined in the subclass https://www.freshersnow.com/ 6. What are the different validators in ASP.NET? A. The different validators in ASP.NET are: RequiredFieldValidator. RangeValidator.
CompareValidator. RegularExpressionValidator. CustomValidator. ValidationSummary. 7. What are the different Session state management options available in ASP.NET? A. The different Session state management options available in ASP.NET are: InProcMode. It is a default session mode and a value stored in web server memory. State Server Mode. In this mode session data is stored in a separate server. SQL Server Mode. In this session is stored in the database. Custom Mode. 8. What are the asp.net Security Controls? A. Asp.net Security Controls are: <asp:Login> Provides a standard login capability that allows the users to enter their credentials <asp:LoginName> Allows you to display the name of the logged-in user <asp:LoginStatus> Displays whether the user is authenticated or not <asp:LoginView> Provides various login views depending on the selected template <asp:PasswordRecovery> Provides the website administrators with the capability to email the users their lost password 9. Why is the use of DBMS recommended? Explain by listing any 4 of its major advantages. Reducing Data Redundancy: DBMS supports a mechanism to reduce the data redundancy inside the database by integrating all the data into a single database and as data is stored at only one place, the duplicity of data does not happen Sharing Data: Sharing data among multiple users can be done simultaneously in DBMS as the same database will also be shared among all the users and by different application programs Data Integrity: This means that the data is always accurate and consistent in the database. It is very important as there are multiple databases in a DBMS and all of these databases contain data that happens to be visible to multiple users. So it is vital to ensure that the data is correct and consistent in all the databases and for all the users
Data Security: In data security, only authorized users are allowed to access the database and their identity should be authenticated using a valid username and password. Unauthorized users are not be allowed to access the database under any circumstances as doing so violates the integrity constraints. https://www.freshersnow.com/ 10. What is normalization needed in DBMS? A. Normalization is the process of analyzing relational schemas which are based on their respective functional dependencies and the primary keys so that they fulfill certain properties. Properties: To minimize data redundancy. To minimize the anomalies of Insert, Delete and Update. 11. Explain the concepts of a Primary key and Foreign Key. A. Primary Key, uniquely identifies the records in a database table while Foreign Key, on the other hand, is used to link two or more tables together. Example: Consider 2 tables Employee and Department. Both have one common field/ column as „ID‟ where ID is the primary key of the Employee table while this happens to be the foreign key for the Department table. 12. What is the biggest difference between UNION and UNION ALL? A. They are both used to join the data from 2 or more tables but UNION removes duplicate rows and picks the rows which are distinct after combining the data from the tables whereas UNION ALL, unlike UNION, does not remove the duplicate rows, it just picks all the datafrom the tables. 13. What are constructors in Java? A. A constructor in Java refers to a block of code which is used to initialize an object and it must have the same name as that of the class. Also, a constructor does not have a return type and it is automatically called when an object is created. There are two types of constructors in Java. They are : Default Constructor: A default constructor does not take any inputs. In simple terms, default constructors are the no-argument constructors which will be created by default in case no other constructor is defined by the user. The main purpose of a default constructor is to initialize the instance variables with the default values. Also, it is majorly used for object creation Parameterized Constructor: A parameterized constructor, unlike the default constructor, is capable of initializing the instance variables with the provided values. In other words, the constructors which take the arguments are called parameterized constructors.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
14. Explain ‘this’ pointer? A. The „this‟ pointer could be referred to as a constant pointer that holds the memory address of the current object. It passed off as a hidden argument to all the nonstatic member function calls and is available as a local variable within the body of all the nonstatic functions. The static member functions can be called even without any object, i.e. with the class name, which is why the „this‟ pointer is not available for them. 15. Why do we need the Friend class and function? A. At times there is a need for allowing a particular class to access private or protected members of a class and to do so we make use of a friend class, that is capable of accessing the protected as well as the private members of the class in which it is declared as a friend. A friend function, on the other hand, can access private and protected class members. It could either be a global function or a method of some class. 16. What is a Dangling pointer? A. Dangling Pointer could be defined as a pointer that doesn‟t point to a valid memory location. Dangling pointers are created when an object is deleted or deallocated, without modifying the value of the pointer, so that the pointer still points to the memory location of the deallocated memory. 17. What is a NULL pointer? A. A NULL pointer is often used to indicate that the pointer doesn‟t point to a valid location. In an ideal situation, we should initialize pointers as NULL if we are not aware of their value at the time of declaration. Also, a pointer must be made NULL when memory pointed by it is deallocated in the middle of a program. 18. Write Python code to check the given sequence is a palindrome or not? number=int(input("Enter any number :")) #store a copy of this number temp=number #calculate reverse of this number reverse_num=0 while(number>0): #extract last digit of this number digit=number%10
#append this digit in reveresed number reverse_num=reverse_num*10+digit #floor divide the number leave out the last digit from number number=number//10 #compare reverse to original number if(temp==reverse_num): print("The number is palindrome!") else: print("Not a palindrome!") 19. What is JVM? How its run? A. JVM stands for Java Virtual Machine. JVM can be explained as an engine that is used by the Java Development Kit to provide a runtime environment to run java code or its applications. The main function of JVM is that it is used for converting Java bytecode into machine language. It is an integral part of the Java Runtime Environment. It works on “Write once, run anywhere” principle and manages the program memory. 20. Write a program to find the greatest of three numbers in Java? A program to find the greatest among three numbers is as follows: public class JavaExample{ public static void main(String[] args) { int num1 = 10, num2 = 20, num3 = 7; if( num1 >= num2 && num1 >= num3) System.out.println(num1+" is the largest Number"); else if (num2 >= num1 && num2 >= num3) System.out.println(num2+" is the largest Number"); else System.out.println(num3+" is the largest Number"); } } 21. What is an applet program? A. An applet is a Java application that could be installed into a web page and runs within the web browser and operates at the client-side. It is usually embedded in an HTML page using
the APPLET or OBJECT tag and treated on a web server. Applets are employed to make the web site more productive and entertaining. All applets are sub-classes (directly or indirectly) of java.applet. Applet class and are not stand-alone applications. Instead, they work in a web browser or an applet viewer. JDK provides a standard applet viewing tool known as applet viewer. In general, the working of an applet does not begin at the main() method. When an applet starts, the init(), start() and paint() methods are called in a sequence and when an applet is terminated, stop( )and destroy( ) method calls take place. 22. List the advantages of using Tries over Binary Search Trees (BSTs). A. The advantages of Tries over binary search trees (BSTs) are as follows: It's quicker to lookup keys. In the worst-case scenario, looking up a key of length m takes O(m) time. Because lockups are dependent on the depth of the tree, which is logarithmic in the number of keys if the tree is balanced, a BST does O(log n) key comparisons, where n is the number of items in the tree. As a result, a BST takes O(m log n) time in the worst scenario. Furthermore, log(n) will approach m in the worst- case scenario. Also, on real processors, the simple actions Tries utilize during lookup, such as array indexing with a character, are quick Because nodes are shared between keys with common starting sub-sequences, tries with a large number of short keys are more space-efficient Tries facilitate longest-prefix matching, assisting in the discovery of the key with the longest possible prefix of characters, all of which are unique The length of the key is equal to the number of internal nodes from root to leaf. As a result, balancing the tree isn't an issue 23. What do you know about anonymous FTP (File Transfer Protocol)? A. Users can access public data through anonymous FTP. The server does not need the user to identify himself, and the login is anonymous. As a result, while utilizing anonymous FTP, you must substitute 'anonymous' for the user id. Anonymous FTPs allow you to send large files to a large number of individuals without having to give out a large number of password and username combinations 24. What are Constraints in SQL? A. Constraints are used to specify the rules concerning data in the table. It can be applied for single or multiple fields in an SQL table during the creation of the table or after creating using the ALTER TABLE command. The constraints are: NOT NULL - Restricts NULL value from being inserted into a column. CHECK - Verifies that all values in a field satisfy a condition. DEFAULT - Automatically assigns a default value if no value has been specified forthe field. UNIQUE - Ensures unique values to be inserted into the field. INDEX - Indexes a field providing faster retrieval of records. PRIMARY KEY - Uniquely identifies each record in a table. FOREIGN KEY - Ensures referential integrity for a record in another table.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
25. What is Data Integrity? A. Data Integrity is the assurance of accuracy and consistency of data over its entire life-cycle and is a critical aspect of the design, implementation, and usage of any system which stores, processes, or retrieves data. It also defines integrity constraints to enforce business rules on the data when it is entered into an application or a database. Capgemini HR Interview Questions and Answers 1. Tell me about yourself. As a fresher, start with your educational qualification, projects you did, your role & and contribution to the project, achievements, and strengths. If the interviewer still wanted you to speak, go with your interests, family background, etc., Note that, your answer for the question lays the foundation for the rest of the questions which are to be asked by the panel. Deliver every single detail about yourself carefully before the panel. Be professional and insert some passion into your answer. 2. Why did you choose Capgemini? To answer this question, you have to have some knowledge about the company beforehand. So, before you appear for the interview, make sure you have searched about the company profile and the related things. Your answer will give the interviewer clarity on whether you fit for the job role or not. While answering this question, make sure that you are highlighting the reputation of the company, admiration of the services provided by the company, and the values of the company. 3. Did you work as a team leader? Give an example of where and when you have worked as a team leader. This will showcase your problem-solving skills, decision-making skills, and leadership skills. With your answer, the interviewer will come to know that you are a good communicator and motivator. You can mention as many examples as you have, thus, the interviewer will get to know even more about you easily. 4. What is your expectation with respect to this role? To contribute yourself more to the team, mention the things you were needed. However, the foremost thing that is needed is a good work environment. Moreover, as it is a challenging job, you can expect to learn new things on a daily basis. Also, helping work environment should be there to sustain in a job for a longer time. Other things like the application of knowledge, good salary and work-life balance, and Respect could be also expected. 5. What are you passionate about? Through this question, the employers will seek what is motivating you for the present interview. They want to know what kind of person you are and will make sure that you have passions and interests. They want to hire someone who is excited about the work-life and
who shows up their energy in the workplace. Thus, this is the best opportunity given to you to tell about your enthusiasm or what is important in your life. 6. What is your greatest strength? Listen to the question and think before you answer. The panel did not ask you about your strengths, they ask you about your greatest strength. Choose one among the greatest strengths you have and talk about it. You can talk about your greatest strength with an example which was happened recently. Keep your answer simple and short. It is good to prepare for this question before you appear for the interview. Go through the job description and find what is it that the job requires and have a clarity of what strength that you have will help for the wellness of the company. 7. What do you want to achieve in the next 5 years? This question is asked in order to know whether you have thoughts about your future goals, or not. The panel will make sure that you are an ambitious and goal-oriented person. While answering this question, mention your career/ future with the company. It is not a matter of whether your predictions on your future are accurate or not, and for it, nobody will check on you. So, tell the answer with all the confidence and get the job offer. Interview questions asked at Capgemini. 1 What did you feel when you heard that Capgemini is coming to your campus? 2. If you are given a chance to ask something to us, what would you ask? 3. You have no problem with your job location ? 4. What did you like the most in the pre-placement talk? 5. Do you know the services of Capgemini?(I said 'Yes') Then he asked, ”What are they?” 6. What do you want to be in your life? 7. Did you visit Capgemini's website? (I said 'Yes') Then he asked, ”What all did you read from the website?” 8. What are your extracurricular activities? 9. Have you studied C and C++? 10. Which is your favourite subject in IT? (I said 'Compiler Design') Then he asked, “What is Parsing?” 11. Have you studied database? (I said 'Yes') Then he asked, ”What is a foreign key?”
12. You are alone in a room. You are given multiple number of candles. You have no measuring aids with you. You have a match box with you. You have to accurately measure 45 minutes. The total time a candle takes to burn out completely is 30 minutes. How would you measure? 13. Do you know thermometer? 14. What is it used for? 15. Why mercury is used in thermometer? 16. Can thermometer be used to measure room temperature? 17. What is used to measure room temperature? 18. Are you basically from Trivandrum?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help