Capgemini Interview Questions
Capgemini Interview Questions
interviewbit.com/capgemini-interview-questions
Capgemini is a global leader in partnering with businesses to help them transform and
manage their operations using technology. Every day, the Group is guided by its mission
of unleashing human potential via technology for a more inclusive and sustainable future.
With around 290,000 team members in approximately 50 countries, it is a responsible
and diversified organization. Capgemini is trusted by its clients to address the entire
breadth of their business needs, from strategy and design to operations, fueled by the
fast-evolving and innovative world of cloud, data, AI, connectivity, software, digital
engineering, and platforms, due to its strong 50-year heritage and deep industry
expertise.
When you join Capgemini India, you join a dynamic organisation and become a member
of a worldwide community of free-thinkers, entrepreneurs, and industry experts who are
all determined to utilise technology to rethink what is possible. You work together to
transform the world's most successful companies while sharing information and
challenging ourselves to be better. It's how we cultivate exceptional careers and give
innovation the personal touch it requires.
If you have the desire, talent, and aptitude to work with cutting-edge technology,
Capgemini is the place for you. Please see the eligibility requirements listed below.
1/15
Capgemini Technical Interview Questions: Freshers and
Experienced
Download PDF
2/15
To aggregate the results of two or more SQL SELECT queries, we use the SQL UNION
method. In the union operation, the number of data types and columns in both tables on
which the UNION action is performed must be the same. Duplicate rows are removed
from the result set by the UNION operation. Union ALL operation is the same as a Union
operation. It returns the set without sorting the data or deleting duplicates.
DataSet.Copy() copies the entire code and structure of an existing DataSet object.
Both these C functions read characters from the keyboard, the only difference being:
getch() is a function that reads characters from the keyboard without using any
buffers. As a result, no data is presented on the screen.
getche() uses a buffer to read characters from the keyboard. As a result,
information is displayed on the screen.
#include<stdio.h>
#include<conio.h>
int main()
{
char c;
printf("Enter a character here: ");
c = getch();
printf("nYou entered the character: %c",c);
printf("nEnter another character: ");
c = getche();
printf("nYour new entered character is: %c",c);
return 0;
}
Output:
getch() immediately returns the character without waiting for the enter key to be pressed
and the character is not displayed on the screen. getche() displays the character on the
screen without waiting for the enter key to be pressed.
Real-Life Problems
Detailed reports
Attempt Now
3/15
6. What do you know about #pragma directive?
#pragma is a preprocessor directive for turning on or off specific functionalities. #pragma
startup, #pragma exit, and #pragma warn are its three types.
We can use #pragma startup to provide functions that are called when the script
starts working.
#pragma exit allows us to specify functions that are executed when the code
terminates.
#pragma warn tells the computer whether or not to suppress any warnings.
8. What is the drawback of scanf() and how can it be avoided (if any)?
With a string of characters, scanf() will fail. A multi-word string cannot be entered into a
single variable using scanf(). The gets( ) function is used to avoid this. When the enter
key is pushed, it gets a string from the keyboard and ends it. As part of the input string,
spaces and tabs are permitted.
The entry point for any Java code is called main() and is always written as a public static
void main (String[] args).
public: The term "public" refers to an access modifier. It's used to specify who has
access to use this method. This method is public, which implies that it can be
accessed by any class.
4/15
static: This is a keyword that indicates that it is a class-based system. In Java,
main() is made static so that it can be accessed without having to create a class
instance; however if main is not made static, the compiler will throw an error
because main() is called by the JVM before any objects are created, and only static
methods can be directly invoked via the class.
void: The return type of a method is void, and it defines a method that does not
return any value.
main: It's the name of the method that JVM looks for when it's searching for a
starting point for an application with a specific signature, and it's the method where
the main execution happens.
String args[]: The parameter passed to the main method is String args[]. args[] is
an array of arguments with each element as a string.
As a result, whenever a new object is created, the String pool first checks to see if the
object has previously been generated in the pool, and if it has, the same reference is
returned to the variable. Otherwise, a new object in the String pool will be created and the
reference will be returned.
They wanted to use sharing to reduce the size of the temporary String object. To make
sharing easier, an immutable class is required. It is not possible to share mutable
structures with two unknown parties. As a result, immutable Java Strings aid in the
implementation of the String Pool concept.
4.5
100K+
Play Store
5/15
Because String objects are often cached in the String pool, Java String objects are
immutable. Because String literals are frequently shared among numerous clients, one
client's action may have an impact on the others. It improves the application's security,
caching, synchronization, and performance by doing so.
To begin, we've developed a string literal “Python” that runs in the pool. The string “Data
Science” is then formed, and it is also used in the pool. Finally, we've constructed the
“Python” string once more. However, JVM checks for the string at this point and finds that
the string literal is indeed present. Instead of creating a new String pool instance, it
returns the pooled instance's reference, i.e. str1.
Similarly, if we use the new keyword to produce string literals, we're using the String pool.
Three string literals have been created: “Java”, “C++”, and “Data Science”. We can see
that string literals in “Java” and “C++” are new. However, there is already a “Data
Science” literal in the pool. JVM now allocates space in the Java heap for the literal “Data
Science”. It's important to remember that all String literals formed with the new keyword
are stored in the Java heap, not the String pool.
The method of copying an object that is used by default in cloning is a shallow copy. The
fields of an old object X are copied to a new object Y in this procedure. The reference is
duplicated to Y while copying the object type field, i.e. object Y will point to the same
location as X. If the field value is a primitive type, the primitive type's value is copied. As a
result, any changes made in object X or Y's linked objects will be reflected in other
objects.
6/15
// Java
// An object reference of this class is
// contained by IBS
class IB {
int a, b;
}
// Driver class
public class Main {
public static void main(String args[])
throws CloneNotSupportedException
{
IBS t1 = new IBS();
t1.x = 1;
t1.y = 2;
t1.z.a = 3;
t1.z.b = 4;
IBS t2 = (IBS)t1.clone();
Output:
1 2 30 4
10 2 30 4
7/15
In the above program, t1.clone returns a shallow copy of the object t1. After receiving the
copy, specific modifications to the clone technique must be applied in order to acquire a
deep copy of the object.
A deep copy duplicates all fields as well as the dynamically allocated memory that the
fields point to. When an item is copied together with the objects to which it refers, it is
called a deep copy.
8/15
// Java
// An object reference of this
// class is contained by IBS
class IB {
int a, b;
}
IB z = new IB();
IBS t3 = (IBS)t1.clone();
t3.x = 10;
9/15
}
}
Output:
1 2 3 4
10 2 30 4
We can see how a new object for the IB class has been designated to replicate an object
that will be delivered to the clone method in the preceding example. As a result, t3 will
acquire a deep copy of t1's object. As a result, any changes made by t3 to the ‘z' object
properties will not be reflected in t1.
Python's private heap space is in charge of memory management. The private heap
contains all Python objects and data structures, but the programmer does not have
access to it. The Python interpreter, on the other hand, takes care of this.
The memory manager in Python is in charge of allocating heap space for Python
objects. The core API then gives the programmer access to a few programming
tools.
It also contains an integrated garbage collector, which, as the name implies,
recycles all unused memory and makes it available to the heap space.
xrange and range are nearly identical in terms of functionality. They both allow you to
generate a list of integers that you may use whatever you want. The only difference
between range and xrange is that xrange produces an xrange object while range provides
a Python list object.
This implies that, unlike range, xrange does not create a static list during execution. It
generates the values as needed using a technique known as yielding. Generators, which
are a type of object, are employed with this technique. That is, if you have a large range
and want to construct a list for a billion people, you should use xrange.
This is particularly the case if you're working with a system that demands a lot of memory,
such as a cell phone, because range will utilise as much RAM as it can to build your array
of numbers, causing a memory problem and crashing your app.
15. What are the advantages of NumPy arrays over Python lists?
The following are some advantages of NumPy arrays over Python lists:
NumPy arrays store data in a sequential manner, unlike Python lists, making data
processing simpler.
10/15
NumPy is not just more efficient, but it's also easier to use. We get a lot of vector
and matrix operations for free, allowing us to avoid doing unnecessary work.
They're also put to good use.
NumPy arrays are faster, and NumPy has a lot of useful features like FFTs,
convolutions, quick searching, simple statistics, linear algebra, histograms, and so
forth.
Even if the queue is empty, if it has a significant number of enqueue and dequeue
operations, we may not be able to insert entries at some time (as in the case of
linear increment of front and rear indices) (this problem is solved by using circular
queue).
When using an array to construct a queue, there may be occasions where we need
to extend the queue to insert additional elements. Because it is nearly impossible to
extend the array size when using an array to implement a queue, determining the
suitable array size is always an issue.
17. Is there a good reason to choose BSTs over AVLs in the first place?
If you wish to compare the two: an AVL tree to a simple binary search tree (BST) without
balancing it, then AVL:
will require additional memory (each node must keep track of its balance factor) and
Each operation has the potential to be slower (because you need to maintain the
balance factor and sometimes perform rotations).
The worst-case for BST without balancing is quite terrible (linear). However, if you are
confident that this worst-case scenario will not occur, or if you don't mind if the process is
slow in rare circumstances, BST without balancing may be preferable to AVL.
18. List the advantages of using Tries over Binary Search Trees (BSTs).
The advantages of Tries over binary search trees (BSTs) are as follows:
It's quicker to lookup keys. In the worst-case scenario, looking up a key of length m
takes O(m) time. Because lockups are dependent on the depth of the tree, which is
logarithmic in the number of keys if the tree is balanced, a BST does O(log n) key
comparisons, where n is the number of items in the tree. As a result, a BST takes
O(m log n) time in the worst scenario. Furthermore, log(n) will approach m in the
worst-case scenario. Also, on real processors, the simple actions Tries utilize during
lookup, such as array indexing with a character, are quick.
Because nodes are shared between keys with common starting sub-sequences,
tries with a large number of short keys are more space-efficient.
11/15
Tries facilitate longest-prefix matching, assisting in the discovery of the key with the
longest possible prefix of characters, all of which are unique.
The length of the key is equal to the number of internal nodes from root to leaf. As a
result, balancing the tree isn't an issue.
When creating a structure from a class or another structure, the base class or
structure's default access specifier is public. When deriving a class, on the other
hand, the default access specifier is private.
The members of a structure are always public, but the members of a class are
always private.
The variables of a structure are stored in the stack memory while those of the class
are stored in the heap memory.
Class supports inheritance whereas structures do not.
The type of class is reference type whereas the type of structure is a value type.
A virtual function is a member function that is declared in a base class and overridden by
a derived class. When we are using a pointer or a reference to the base class to refer to a
derived class object, we can invoke a virtual function for that object and have it run the
derived class's version of the function.
Regardless of the type of reference (or pointer) used for a function call, virtual
functions make sure the right function is called for an object.
They're mostly implemented to accomplish polymorphism at runtime.
12/15
The virtual keyword is used to declare functions in base classes.
Run-time resolution of function calls is performed.
Functions that are only declared in the base class are known as pure virtual functions or
abstract functions. This indicates that they have no definition in the base class and must
be redefined in the subclass.
A DNS forwarder is a DNS server that forwards DNS queries for external DNS names to
DNS servers outside the network. A forwarder is used with a DNS server when it receives
DNS queries that cannot be resolved quickly. Therefore, it forwards these requests to
external DNS servers for resolution.
A DNS server that is configured as a forwarder behaves differently than a DNS server
that is not configured as a forwarder.
When the query is received by the DNS server, it resolves it using a cache.
If the DNS server is not able to resolve the request, it forwards it to another DNS
server.
If the forwarder is not available, it tries to resolve the query using a root hint.
23. How does the dynamic host configuration protocol help with network
management?
The network administrator uses the dynamic host configuration protocol to create a pool
of IP addresses instead of going to each client computer to configure a static IP address.
This group is known as an area that can be dynamically assigned to clients.
24. What do you know about anonymous FTP (File Transfer Protocol)?
Users can access public data through anonymous FTP. The server does not need the
user to identify himself, and the login is anonymous. As a result, while utilizing
anonymous FTP, you must substitute 'anonymous' for the user id. Anonymous FTPs allow
you to send large files to a large number of individuals without having to give out a large
number of password and username combinations.
Any two consecutive (one after the other) Fibonacci Numbers have a ratio that is very
close to the Golden Ratio, which is equal to 1.618034.... (approx). In fact, the larger the
pair of Fibonacci Numbers, the closer the approximation. Let's have a look at a few:
3/2 = 1.5
5/3 = 1.666666666...
...
233/377 = 1.618055556...
13/15
This also works when we start the sequence with two random whole numbers.
Java
Automation Testing
API Testing
SQL
“Self Confidence” is the first stage in nailing any interview. You've already completed
half of the task if you're confident enough. Always keep a cheerful attitude and a
smile on your face.
Read about the company. Understand the company's services and product lines, as
well as its mission and philosophy. Employers expect you to know who the company
is, what it does, and how it relates to your professional goals. These types of
questions about the company can be asked during the HR round.
The more you prepare for the interview, the easier it will be to pass. Acquire
sufficient understanding of, among other things, interview stages, rounds, and
questions. Practice your responses to common HR and management interview
questions. Study your technical subjects and final project carefully. Above all,
remain calm and confident, and you'll have a good chance of surviving.
Answers should be short and to the point. Use no word arts to explain the core
solution. Don't waste time offering ineffective responses or asking irrelevant
inquiries. Any interviewer who observes you doing this will automatically deduct
points from your score.
Ensure you're up to date on the most recent technological developments. You
should have a basic awareness of contemporary technological trends like artificial
intelligence (AI), big data, and so on.
Speak confidently. Listening to the interviewer is more crucial than responding.
Make sure you fully comprehend a question before attempting to respond. Don't be
scared to ask for clarification if you don't understand something.
For employees with less than one year of experience to two years of experience, the
average Capgemini Fresher salary in India is 3.4 lakhs per year.
14/15
2. Why Capgemini?
Capgemini is a great place to work. Your abilities will be valued here. The organization's
policies and opportunities are excellent, and it works in a variety of domains and nations.
Once you're in, you'll have a plethora of options dependent on your abilities. Without a
doubt, Capgemini's infrastructure and team management are top-notch.
Capgemini visits numerous college campuses in their final placements, conducts walk-
ins, and mega placement drives for fresher hiring. You can also apply to Capgemini in a
variety of ways, including through employment sites, registering on the company’s
website(www.capgemini.com), attending recruiting drives, using the employee referral
system, or consulting with placement experts.
It doesn't matter whether the Capgemini interview is challenging or easy. The truth is that
the more you prepare for the interview, the easier it will be to pass. Acquire sufficient
understanding of, among other things, interview stages, rounds, and questions.
Programming languages, logical thinking, and products/software/projects on which the
candidate has recently or previously worked are among the topics covered.
Capgemini gives you the opportunity to reach your full potential at every level of your
career. Capgemini's work culture is generally positive. Job security is excellent too. You
can take advantage of a flexible working environment that allows you to precisely blend
your professional and personal lives.
15/15