i
LTIMindtree
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
Function to reverse a given string
Create an empty string to store the reversed string
Iterate through the input string in reverse order and append each character to the new string
Return the reversed string
Binary search function to find target value in sorted array
Define function that takes sorted array and target value as input
Initialize variables for start, end, and middle indices
Use while loop to iterate until start is less than or equal to end
SOLID principles are a set of five design principles that help developers create more maintainable and scalable software.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses...
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing and swapping of dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
What people are saying about LTIMindtree
Create a generic method to add string or integer to List<Integer> or List<String>
Create a generic method that takes a List and an element as input
Use Java generics to specify the type of List and element
Check the type of List and element, then add the element to the List
ConcurrentHashMap is a thread-safe implementation of the HashMap class in Java.
ConcurrentHashMap allows multiple threads to read and write to the map concurrently without causing any data corruption.
It achieves thread-safety by dividing the map into segments, each of which can be locked independently.
ConcurrentHashMap is more efficient than using synchronized collections for concurrent access.
Example: ConcurrentHa...
No, you will not see 2 objects in the set. To insert unique objects to a set, you can override the equals() and hashCode() methods in the object class.
In a set, each element must be unique based on the equals() method. If you add 2 objects with the same attribute values, only one will be stored in the set.
To ensure uniqueness, override the equals() and hashCode() methods in the object class. This will define how o...
Dependency injection is a design pattern where dependencies are provided to a class from the outside, while dependency inversion is a principle that states high-level modules should not depend on low-level modules, but both should depend on abstractions.
Dependency injection is a technique to achieve dependency inversion.
Dependency injection involves providing dependencies to a class from the outside, typically thr...
Serialisation is the process of converting an object into a format that can be easily stored or transmitted. Externalisation is a way to customize the serialization process. Serializable is an interface in Java that allows objects to be serialized.
Serialisation is the process of converting an object into a format that can be easily stored or transmitted
Externalisation is a way to customize the serialization proces...
I applied via Campus Placement
General aptitude, computer science fundamentals multiple-choice questions, and data structures and algorithms multiple-choice questions were asked.
Function to reverse a given string
Create an empty string to store the reversed string
Iterate through the input string in reverse order and append each character to the new string
Return the reversed string
Binary search function to find target value in sorted array
Define function that takes sorted array and target value as input
Initialize variables for start, end, and middle indices
Use while loop to iterate until start is less than or equal to end
Graduating with honors, winning a hackathon, volunteering in a developing country
Graduated with honors from university with a degree in Computer Science
Won first place in a hackathon competition by developing a unique and innovative software solution
Volunteered in a developing country to help build schools and provide education to underprivileged children
ConcurrentHashMap is a thread-safe implementation of the HashMap class in Java.
ConcurrentHashMap allows multiple threads to read and write to the map concurrently without causing any data corruption.
It achieves thread-safety by dividing the map into segments, each of which can be locked independently.
ConcurrentHashMap is more efficient than using synchronized collections for concurrent access.
Example: ConcurrentHashMap...
Dependency injection is a design pattern where dependencies are provided to a class from the outside, while dependency inversion is a principle that states high-level modules should not depend on low-level modules, but both should depend on abstractions.
Dependency injection is a technique to achieve dependency inversion.
Dependency injection involves providing dependencies to a class from the outside, typically through ...
No, you will not see 2 objects in the set. To insert unique objects to a set, you can override the equals() and hashCode() methods in the object class.
In a set, each element must be unique based on the equals() method. If you add 2 objects with the same attribute values, only one will be stored in the set.
To ensure uniqueness, override the equals() and hashCode() methods in the object class. This will define how object...
Serialisation is the process of converting an object into a format that can be easily stored or transmitted. Externalisation is a way to customize the serialization process. Serializable is an interface in Java that allows objects to be serialized.
Serialisation is the process of converting an object into a format that can be easily stored or transmitted
Externalisation is a way to customize the serialization process
Seri...
Create a generic method to add string or integer to List<Integer> or List<String>
Create a generic method that takes a List and an element as input
Use Java generics to specify the type of List and element
Check the type of List and element, then add the element to the List
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing and swapping of dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
SOLID principles are a set of five design principles that help developers create more maintainable and scalable software.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses with...
I applied via Naukri.com
I applied via Naukri.com and was interviewed in May 2022. There were 2 interview rounds.
Oops concept, basic javascript and react js coding question
posted on 17 Dec 2020
I applied via Walk-in and was interviewed in Nov 2020. There were 5 interview rounds.
Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.
Streams in C++ are objects that allow reading from or writing to external sources or destinations.
cin is the standard input stream used for reading input from the user.
cout is the standard output stream used for printing output to the console.
cerr is the standard error stream used for printing error mess...
RDBMS stands for Relational Database Management System.
It is a type of database management system that stores data in tables with relationships between them.
It uses SQL (Structured Query Language) to manipulate and retrieve data.
Examples include MySQL, Oracle, and Microsoft SQL Server.
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves breaking down a table into smaller tables and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, with each level having specific rules to follow.
Examples of normalization include converting repeating gr...
INDEX is generally created on columns that are frequently used in WHERE, JOIN, and ORDER BY clauses.
INDEX improves the performance of SELECT queries.
INDEX should be created on columns with high selectivity.
INDEX should not be created on columns with low selectivity.
Examples of columns to create INDEX on are primary keys, foreign keys, and columns used in search queries.
Object oriented model is a programming paradigm that uses objects to represent real-world entities.
Objects have properties and methods that define their behavior
Encapsulation, inheritance, and polymorphism are key concepts in OOP
Examples of OOP languages include Java, C++, and Python
DML is provided to manipulate data in a database.
DML stands for Data Manipulation Language.
It is used to insert, update, delete, and retrieve data from a database.
DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and maintaining data in a database.
Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.
Reference variables are declared using an ampersand (&) symbol.
They must be initialized when declared and cannot be reassigned to refer to a different variable.
Changes made to a reference variable affect the original variable it refers to.
They are commonly used to pass variables by reference to funct...
Normalization is a process of organizing data in a database to eliminate redundancy and improve data integrity.
First Normal Form (1NF) - Eliminate duplicate data by separating them into multiple tables.
Second Normal Form (2NF) - Remove partial dependencies by creating separate tables for sets of attributes.
Third Normal Form (3NF) - Eliminate transitive dependencies by creating separate tables for related attributes.
Boy...
Scope rules in C++ determine the visibility and accessibility of variables and functions within a program.
Variables declared within a block have local scope and are only accessible within that block.
Global variables have file scope and can be accessed from any function within the file.
Function parameters have function scope and are only accessible within that function.
Nested blocks can have their own scope, and variabl...
BCNF is not necessarily better than 2NF & 3NF, it depends on the specific requirements of the database.
BCNF is the highest normal form and ensures that there are no non-trivial functional dependencies between any subset of candidate keys.
2NF and 3NF are also important and should be used when appropriate.
For example, if a database has a composite primary key and non-key attributes that depend on only one part of the key...
An operating system is a software that manages computer hardware and software resources.
It acts as an interface between the user and the computer hardware.
It provides services to applications and manages system resources.
Examples include Windows, macOS, Linux, Android, and iOS.
Exclusive lock is used when a resource is being modified and prevents other processes from accessing it. Shared lock allows multiple processes to read a resource simultaneously.
Exclusive lock is used for write operations, while shared lock is used for read operations.
Exclusive lock blocks other processes from acquiring both exclusive and shared locks on the same resource.
Shared lock allows multiple processes to acquire...
rand() generates a random number, srand() seeds the random number generator.
rand() generates a pseudo-random number between 0 and RAND_MAX
srand() sets the seed for the random number generator used by rand()
srand() should be called before rand() to ensure different sequences of random numbers
Example: srand(time(NULL)) sets the seed to the current time, ensuring a different sequence each time the program is run
Linked List is a linear data structure. Stack and Queue are abstract data types.
Linked List: A collection of nodes where each node points to the next node.
Stack: A data structure where elements are added and removed from the top only.
Queue: A data structure where elements are added at the rear and removed from the front only.
Example: Browser history can be implemented using a Linked List.
Example: Undo/Redo functionalit...
Triggers are events that initiate an action or set of actions. They are commonly used in databases and automation systems.
Triggers are used in databases to automatically execute a set of actions when a certain event occurs, such as inserting or updating data.
They can also be used in automation systems to initiate a process or workflow when a specific event occurs, such as receiving an email or a file upload.
Triggers ca...
Semaphore and monitor are synchronization tools used in concurrent programming.
Semaphore is a signaling mechanism that allows multiple threads to access a shared resource simultaneously.
Monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block) for a certain condition to become true.
Semaphore is a lower-level primitive, while monitor is a higher-level abstra...
Transparent DBMS allows users to see and control the underlying database operations.
Transparent DBMS provides visibility into the database operations and allows users to monitor and control them.
It enables users to see how data is being stored, accessed, and manipulated in real-time.
Examples include Oracle Transparent Data Encryption and Microsoft SQL Server Transparent Data Encryption.
Transparent DBMS can improve secu...
RDBMS KERNEL is not a commonly used term in the industry.
There is no widely accepted definition of RDBMS KERNEL.
It may refer to the core components of a relational database management system.
It could also be a term used by a specific company or product.
Without more context, it is difficult to provide a specific answer.
Good morning sir have a you sir my name is hemant Ramchandra narkhede
Java script simple frame
JavaScript has several data types including string, number, boolean, object, function, undefined, and null.
String: 'hello', '123'
Number: 123, 3.14
Boolean: true, false
Object: { key: 'value' }
Function: function() { }
Undefined: undefined
Null: null
var is function-scoped while let is block-scoped in JavaScript.
var keyword is function-scoped, meaning it is accessible throughout the function it is declared in.
let keyword is block-scoped, meaning it is only accessible within the block it is declared in.
Using var can lead to variable hoisting issues, while let provides more predictable behavior.
let allows for better variable scoping and reduces the risk of unintended...
Pair programming promotes collaboration, knowledge sharing, and code quality.
Enhances code quality through immediate code review and feedback
Promotes knowledge sharing and learning from each other
Fosters collaboration and teamwork
Reduces the likelihood of bugs and errors
Increases productivity by leveraging two minds on the same problem
Helps in breaking down complex problems into smaller tasks
Improves communication skil...
I use a combination of manual testing, unit testing, and debugging tools to identify bugs in my code.
Perform manual testing by running the code and checking for any unexpected behavior or errors.
Write unit tests to verify the functionality of individual components and catch any issues early on.
Utilize debugging tools like breakpoints, logging, and stack traces to track down the root cause of bugs.
Collaborate with team ...
I have been coding primarily in Python for 5 years.
I started learning Python in college and have been using it extensively in my professional career.
I have worked on various projects using Python, including web development, data analysis, and automation.
I am proficient in Python libraries such as NumPy, Pandas, and Django.
HR round full stack developer experience
Best atitude round questions
I applied via Company Website
It was javascript and reactjs. multiple choices and coding test
I applied via Naukri.com and was interviewed in Jul 2023. There were 4 interview rounds.
Quantitive aptitude, reasoning
Some of the top questions asked at the LTIMindtree Full Stack Software Developer interview -
based on 3 interview experiences
based on 3 reviews
Rating in categories
Senior Software Engineer
22k
salaries
| ₹7.4 L/yr - ₹21.6 L/yr |
Software Engineer
16.3k
salaries
| ₹3.9 L/yr - ₹8.8 L/yr |
Technical Lead
6.4k
salaries
| ₹16.4 L/yr - ₹28.3 L/yr |
Module Lead
5.7k
salaries
| ₹11.8 L/yr - ₹20.4 L/yr |
Senior Engineer
4.4k
salaries
| ₹5.8 L/yr - ₹14 L/yr |
Cognizant
Capgemini
Accenture
TCS