Home Subjects Placement Papers

Placement Papers

TCS, Infosys, Wipro, Cognizant actual papers

654 Q 10 Topics Take Test
Advertisement
Difficulty: All Easy Medium Hard 461–470 of 654
Topics in Placement Papers
Q.461 Medium Infosys Questions
An Infosys developer needs to optimize a SQL query that joins 4 tables. The query currently takes 8 seconds to execute. Which indexing strategy would be most effective?
A Index only the primary key columns
B Create composite indexes on join columns and filter conditions
C Index all columns in the tables
D Remove all existing indexes
Correct Answer:  B. Create composite indexes on join columns and filter conditions
EXPLANATION

Composite indexes on join columns and WHERE clause conditions significantly improve query performance by reducing the number of rows scanned.

Take Test
Q.462 Easy Infosys Questions
What is the primary purpose of Docker containerization technology used by Infosys developers?
A To increase application size
B To ensure consistency between development and production environments
C To reduce network bandwidth
D To eliminate the need for databases
Correct Answer:  B. To ensure consistency between development and production environments
EXPLANATION

Docker containerization ensures that applications run consistently across different environments by packaging the application with all its dependencies.

Take Test
Q.463 Medium Infosys Questions
In Infosys' microservices architecture, which design pattern is used to manage distributed transactions across multiple services?
A Saga Pattern
B Factory Pattern
C Singleton Pattern
D Observer Pattern
Correct Answer:  A. Saga Pattern
EXPLANATION

The Saga pattern is used in microservices to manage distributed transactions by breaking them into local transactions coordinated through event-driven communication.

Take Test
Q.464 Hard Infosys Questions
In a HashMap implementation used at Infosys, what happens when the load factor exceeds the threshold?
A The HashMap is locked and becomes read-only
B The HashMap is rehashed with a larger capacity
C All entries are deleted automatically
D The oldest entries are removed
Correct Answer:  B. The HashMap is rehashed with a larger capacity
EXPLANATION

When the load factor (ratio of entries to capacity) exceeds the threshold, the HashMap is rehashed with approximately double the capacity to maintain performance.

Take Test
Q.465 Easy Infosys Questions
What is the time complexity of the binary search algorithm when searching in a sorted array of n elements?
A O(n)
B O(n log n)
C O(log n)
D O(n²)
Correct Answer:  C. O(log n)
EXPLANATION

Binary search has O(log n) time complexity as it divides the search space in half with each iteration, making it highly efficient for sorted data.

Take Test
Q.466 Easy Infosys Questions
In Infosys' commitment to sustainability 2024-25, what is the target for renewable energy adoption?
A 25% of total energy consumption
B 50% of total energy consumption
C 75% of total energy consumption
D 100% of total energy consumption
Correct Answer:  C. 75% of total energy consumption
EXPLANATION

Infosys has committed to achieving 75% renewable energy consumption by 2025 as part of its sustainability and ESG initiatives.

Take Test
Q.467 Medium Infosys Questions
Which HTTP status code should a REST API return when a resource is successfully created?
A 200 OK
B 201 Created
C 202 Accepted
D 204 No Content
Correct Answer:  B. 201 Created
EXPLANATION

HTTP status code 201 Created is the correct response when a new resource is successfully created via POST request, typically including the resource location in the response header.

Take Test
Q.468 Easy Infosys Questions
In Infosys' Agile methodology, what is a Sprint typically limited to in terms of duration?
A 1-2 weeks
B 2-4 weeks
C 4-8 weeks
D 8-12 weeks
Correct Answer:  B. 2-4 weeks
EXPLANATION

In Scrum-based Agile methodology used by Infosys, a Sprint typically lasts 2-4 weeks, allowing for regular feedback and iterations.

Take Test
Q.469 Medium Infosys Questions
What does OWASP Top 10, which Infosys developers must follow, primarily address?
A Database performance optimization
B The most critical web application security risks
C Cloud infrastructure best practices
D Mobile app development frameworks
Correct Answer:  B. The most critical web application security risks
EXPLANATION

OWASP Top 10 lists the most critical web application security vulnerabilities that developers must understand and mitigate.

Take Test
Q.470 Medium Infosys Questions
In Infosys' cybersecurity protocols, which encryption standard is mandated for data at rest?
A DES (Data Encryption Standard)
B AES-256 (Advanced Encryption Standard)
C ROT13
D Base64 encoding
Correct Answer:  B. AES-256 (Advanced Encryption Standard)
EXPLANATION

AES-256 is the industry-standard encryption for data at rest, providing 256-bit key strength and is mandated in Infosys' security policies.

Take Test
IGET
iget AI
Online · Ask anything about exams
Hi! 👋 I'm your iget AI assistant.

Ask me anything about exam prep, MCQ solutions, study tips, or strategies! 🎯
UPSC strategy SSC CGL syllabus Improve aptitude NEET Biology tips