Softlogic Systems - Placement and Training Institute in Chennai

Easy way to IT Job

Infosys Interview Questions and Answers
Share on your Social Media

Infosys Interview Questions and Answers

Published On: July 22, 2024

Infosys Interview Questions and Answers

Infosys hires skilled professionals to develop solutions, enabling businesses to offer extremely potent, cutting-edge goods and services while maximizing their worldwide reach. Align your skills with our latest Infosys interview questions and answers and prepare for a promising future.

Infosys Interview Process

A candidate with a minimum of 60% is required for classes 10 and 12, and a degree is eligible for Infosys jobs. As with many MNCs and IT companies, Infosys also has the following interview process:

  • Online Assessment: It checks your skills based on logical and analytical reasoning, quantitative aptitude, and verbal ability.
  • Technical Round: It will be based on your resume. However, a strong understanding of at least one programming language, computer principles like operating systems, data structures, and algorithms, and familiarity with trending technologies will be helpful to ace this round.
  • HR Interview: The HR interview round aims to verify your suitability for the position.

Infosys Interview Questions and Answers for Freshers – Technical

1. In C++, how is encapsulation accomplished?

The concept of encapsulation involves combining many data elements into a single unit and concealing from end users how the data internally operates. 

The three access specifiers in C++—public, private, and protected—are used to do this. When data members are set to private, getters and setters are required in order to access them from outside of the class.

2. What distinguishes a superkey from a candidate key?

A super key is a set of one or more attributes that allows any tuple in a database to be uniquely identified. A candidate is a super key that is minimum. 

It is a collection of one or more characteristics required to identify a tuple exclusively. A super key’s lowest necessary subset is called a candidate key.  

3. What distinguishes ‘a’ from “a”?

In C++, a single-letter character is specified using single quotes, whereas a string consisting of a series of letters is specified using double quotations. Hence, in this case, “a” denotes a string, and ‘a’ denotes a character. 

4. What does the term “NULL pointer” mean to you?

In C++, a pointer that points to no memory location is called a null pointer. It indicates that there is nothing to be found in the memory address and that the pointer is empty. To initialize a pointer of the same type, use these.

5. What are the different levels of language?

Among the various levels of language proficiency are the following:

Low-level language: The language that machines can grasp the best is called low-level language. It’s a binary code consisting of 0 and 1. Humans find it challenging to write direct code in low-level languages.

Assembly language: Although various mnemonics are used to lessen the programs’ complexity, coding in them is still challenging.

Middle-level language: Though not as intricate as assembly language, it nevertheless necessitates an understanding of computer hardware. C and C++ are two examples of middle-level programming languages. 

High-level language: These are the programming languages that are most similar to human language at the highest level. It is relatively simpler to learn and comprehend, and knowledge of computer hardware is not necessary. Some examples are PHP, Java, and Python.

6. What is the Agile model?

Iterative and incremental software development are combined to create the Agile methodology. The agile methodology breaks down requirements into numerous sections, or iterations, and then develops them step-by-step.

In this strategy, every iteration is planned, designed, tested, and released to customers for input. During that iteration, any necessary adjustments are made, and the project is then carried out further. Errors in the project are not a problem because they may be rectified at every iteration.

7. What makes Java and C++ different from each other?

Java is utilized to facilitate network computing and is used as an interpreter for printing systems, while C++ was introduced for systems and application programming. 

Because Java is platform-neutral, it is easier for novices to understand. C++ depends on the platform. In their respective domains of use, both are incredibly pertinent, so it’s hard to say which is superior.

8. What kinds of memory regions does JVM allocate?

Class Memory: Stores, among other things, method codes, fields, and data.

Heap Memory: Objects are stored in this kind of memory.

Stack Memory: Space in memory is set aside for local variables and the stack’s method execution order.

Program Counter: The address of the presently running instruction is stored in this register (PC).

Native Method Stack: This is where all native methods are kept. 

9. Mention a few of OOPs’ limitations.

Some common OOP restrictions are as follows:

  • It is larger than other programs, making it more noticeable.
  • It required a lot of work to build and operated more slowly than other programs.
  • It is inappropriate for certain issues.
  • It requires some modification.

10. What is a constructor?

A new object’s constructors are used to initialize its data members. It uses member variables and keywords to get the object ready for run-time operations.

Infosys Interview Questions and Answers for Experienced – Technical

11. What benefits can a waterfall model offer?

The benefits of using a waterfall model are as follows:

  • It is easy to understand and utilize.
  • The phases don’t overlap in any way.
  • This type is perfect for modest projects.
  • It’s a linear sequence model. It functions in a sequential fashion.
  • There is a lot of visibility because each phase’s output is generated for the one after it.
  • It increases your range of choices.
  • Better documentation is one of this model’s benefits to employees.
  • It is reasonably priced.
  • It’s easy to follow along with. 

12. Which different subsets of SQL exist?

  • DDL: Among other things, Data Definition Language (DDL) lets you add, edit, and delete objects from databases.
  • DML: The Data Manipulation Language (DML) is used to access and manipulate data. It can be used to add, remove, update, and retrieve data from and into the database.
  • DCL: The Data Control Language (DCL) can be used to control database access. Example: authorization to give and take away access.

13. What distinguishes heap memory from stack memory?

Java While stack space is utilized for the method or methods that are now in use, heap space is utilized throughout the application.

Heap Space allocates memory dynamically, whereas Stack is used to store local variables while the program runs. 

14. What is a database schema?

A database’s schema is a representation of its overall logical structure. It is an abstract structure created in a formal language that the database accepts.

15. Create C# software that checks whether or not a positive integer is prime.

static void Main(string[] args) 

    if (FindPrime(47)) 

    { 

        Console.WriteLine(“Prime”); 

    } 

    else 

    { 

        Console.WriteLine(“Not Prime”); 

    } 

    Console.ReadLine(); 

}   

internal static bool FindPrime(int number) 

    if (number == 1) return false; 

    if (number == 2) return true; 

    if (number % 2 == 0) return false; 

     var squareRoot = (int)Math.Floor(Math.Sqrt(number)); 

     for (int i = 3; i <= squareRoot; i += 2) 

    { 

        if (number % i == 0) return false; 

    } 

     return true; 

}

16. Describe BCNF.

A normalization approach called Boyce-Codd Normal Form (BCNF) is used in database architecture to reduce redundancy and enhance data integrity. 

According to BCNF, every determinant in a table—that is, any characteristic or group of attributes that determines another attribute uniquely—must be a candidate key or a unique identifier for every row.

  • BCNF makes sure that every attribute in a table depends on the whole primary key and not just a subset of it. 
  • This ensures that every item of data in the table is only saved once and can be accessed effectively, reducing data redundancy and improving data integrity.
  • An expansion of the Third Normal Form (3NF), BCNF is useful when 3NF is not enough to remove every type of redundancy in a table. 

17. Explain OLAP and OLTP.

Two distinct types of database systems are utilized in data processing for various purposes: OLAP (online analytical processing) and OLTP (online transaction processing). 

OLTP: 

  • Real-time transaction processing and recording are the primary uses of OLTP systems. 
  • These transactions, which often entail updating, adding, or removing data from the database, are brief. 
  • OLTP systems are designed to support many concurrent transactions while maintaining availability, consistency, and accuracy of data.

OLAP: 

  • It entails advanced queries and data aggregation for business information and decision-making. 
  • Large volumes of historical data are often stored via OLAP systems, which also enable advanced data analysis techniques including trend analysis, forecasting, and data mining. 
  • Even with massive data loads, OLAP systems are built for fast query performance and data retrieval.

OLAP systems are utilized for sophisticated analysis of historical data to support corporate intelligence and decision-making, whereas OLTP systems are generally used for real-time transaction processing.

18. List a few benefits of MVC.

A software design pattern called Model View Controller divides the presentation layer, or user interface, from the business logic, or model. MVC lists a number of advantages. 

  • The application is split into three sections: controller, view, and model. The application’s development is facilitated by this.
  • The application is simple to maintain because faults and problems can be found and fixed with ease, making debugging easier.
  • Because of its scalability, it can manage heavy traffic.
  • Its testing features have been enhanced.

19. Which manual testing types are the most crucial?

Here are a few of the manual testing methods that are most frequently used:

User Acceptance Testing: The client or end user performs UAT to verify that the application complies with the specified requirements.

Behavioral testing, or “black box” testing, looks at an application’s functionality from the perspective of the end user.

White box testing, sometimes referred to as transparent box testing or structural testing, is a technique for examining the internal workings or structures of an application.

20. In what way would you utilize Selenium WebDriver to click on a hyperlink?

To mimic clicking on the hyperlink, we utilize the “click” method on the element.

import org.openqa.selenium.By;

import org.openqa.selenium.WebDriver;

import org.openqa.selenium.WebElement;

import org.openqa.selenium.chrome.ChromeDriver;

WebDriver driver = new ChromeDriver();

driver.get(“https://example.com”);

WebElement myLink = driver.findElement(By.id(“myLink”));

myLink.click();

Common Infosys Interview Questions and Answers

21. What is stopping you from making a career out of your hobby?

Tip to Answer: One way to apply your knowledge in the field and pursue your hobbies could be mentioned in the answers to the questions. Using computer science, for instance, to use your hobby to solve an issue that most people face. This demonstrates how combining your love of computers with your pastime is possible. 

22. What are your strengths and weaknesses?

Sample Answer: Provide examples to back up your response explaining why you believe you have these strengths and flaws. Avoid trying to sell too much and focus solely on your advantages. 

Talk about your shortcomings if they have no bearing on the job you’re interviewing for. Talk about your advantages that will benefit you in your role within the organization.

23. Describe a real-world scenario in which you demonstrated leadership.

Sample Answer: You can mention any occurrence when you showed initiative or any real-life scenario where you demonstrated your leadership abilities here. 

Conclusion

We hope that this article has given you a thorough understanding of some of the latest Infosys questions and answers that come up in interviews. Enjoy unlimited learning benefits through our placement training institute in Chennai.

Share on your Social Media

Just a minute!

If you have any questions that you did not find answers for, our counsellors are here to answer them. You can get all your queries answered before deciding to join SLA and move your career forward.

We are excited to get started with you

Give us your information and we will arange for a free call (at your convenience) with one of our counsellors. You can get all your queries answered before deciding to join SLA and move your career forward.