LTIMindtree
10+ Mitra Industries Interview Questions and Answers
Q1. What are some real-life examples that illustrate the concepts of Object-Oriented Programming (OOP)?
Real-life examples of Object-Oriented Programming include modeling a car as an object with properties and methods.
Modeling a car as an object with properties like color, make, model, and methods like start, stop, accelerate
Creating a banking system where accounts are objects with properties like balance and methods like deposit, withdraw
Developing a video game where characters are objects with properties like health, position and methods like move, attack
Q2. What are the key concepts of Object-Oriented Programming (OOP)?
Key concepts of OOP include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability for objects to be treated as instances of their parent class or their own class.
Abstraction: Hiding complex implementation details and showing only the necessary features to the outside world.
Q3. What is the thread lifecycle in programming?
Thread lifecycle in programming refers to the various stages a thread goes through from creation to termination.
Thread creation: A new thread is created using the 'Thread' class or by implementing the 'Runnable' interface.
Thread start: The thread transitions from 'new' to 'runnable' state when 'start()' method is called.
Thread running: The thread is executing its task in the 'running' state.
Thread waiting: The thread can enter the 'waiting' state due to various reasons like w...read more
Q4. What is the purpose of collections in Java?
Collections in Java are used to store and manipulate groups of objects.
Collections provide a way to store, retrieve, and manipulate groups of objects in Java.
They offer various data structures like lists, sets, maps, etc. for different purposes.
Collections framework includes interfaces like List, Set, Map, and classes like ArrayList, HashSet, HashMap.
Collections provide methods for sorting, searching, and iterating over elements efficiently.
Q5. What is the use of lamba function?
Lambda functions are anonymous functions in programming that can be used for short, one-time tasks.
Lambda functions are used for writing short, concise code without the need to define a separate function.
They are commonly used in functional programming languages like Python, JavaScript, and Ruby.
Lambda functions can be passed as arguments to higher-order functions.
They are useful for tasks like sorting, filtering, and mapping data in a more compact way.
Example: In Python, a l...read more
Q6. write a code for matrix multiplication?
Matrix multiplication code implementation in C++
Declare two matrices A and B of appropriate sizes
Iterate through rows and columns to calculate each element of the resulting matrix C
Use nested loops for efficient computation
Ensure the number of columns in matrix A is equal to the number of rows in matrix B
Example: A = {{1, 2}, {3, 4}}, B = {{5, 6}, {7, 8}}, C = A*B = {{19, 22}, {43, 50}}
Q7. What is Agile methodology?
Agile methodology is a project management approach that emphasizes flexibility, collaboration, and iterative development.
Agile methodology involves breaking down projects into smaller tasks and completing them in short iterations.
It prioritizes customer feedback and collaboration among team members.
Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP).
Q8. what is dbms and its uses
DBMS stands for Database Management System. It is a software that manages databases and allows users to interact with data.
DBMS helps in storing, retrieving, and managing data efficiently.
It provides data security by allowing access control and data encryption.
DBMS ensures data integrity by enforcing constraints and maintaining consistency.
Examples of DBMS include MySQL, Oracle, SQL Server, and PostgreSQL.
Q9. Tell me abt ltimindtree
Mindtree is a global technology consulting and services company, specializing in IT services and digital transformation.
Founded in 1999 in Bangalore, India
Provides services in application development, maintenance, infrastructure management, and testing
Acquired by L&T (Larsen & Toubro) in 2019
Has offices in multiple countries including the USA, UK, and India
Q10. Time and space complexity of merge sort.
Merge sort has a time complexity of O(n log n) and a space complexity of O(n).
Time complexity of merge sort is O(n log n) where n is the number of elements in the array.
Space complexity of merge sort is O(n) as it requires additional space to store the temporary arrays during the merging process.
Merge sort is a divide and conquer algorithm that recursively divides the array into halves until each subarray contains only one element, then merges them in sorted order.
Q11. What is dsa, explain knapsack
DSA stands for Data Structures and Algorithms. Knapsack is a problem in combinatorial optimization.
DSA is a field of study that involves the design and analysis of data structures and algorithms.
Knapsack problem involves maximizing the value of items in a knapsack without exceeding its capacity.
There are two types of knapsack problems: 0/1 knapsack (where items cannot be broken) and fractional knapsack (where items can be broken).
Q12. What is cross site scripting
Cross site scripting (XSS) is a type of security vulnerability typically found in web applications where malicious scripts are injected into trusted websites.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or altering the website's content.
There are three main types of XSS: stored XSS, reflected XSS, and DOM-based XSS.
Preventing XSS involves input validation, output encoding, and implementing Content Security Policy ...read more
Q13. What is MITM
MITM stands for Man-in-the-Middle attack, where a third party intercepts communication between two parties without their knowledge.
MITM attack involves a hacker intercepting communication between two parties to steal information or manipulate data.
Common examples include eavesdropping on Wi-Fi networks or intercepting emails.
To prevent MITM attacks, encryption and secure communication protocols like HTTPS are used.
Q14. Types of Joins
Types of joins in SQL are inner join, left join, right join, and full outer join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full outer join: Returns rows when there is a match in either table.
Q15. TCP/IP vs UDP
TCP/IP is a connection-oriented protocol that ensures data delivery, while UDP is a connectionless protocol that prioritizes speed.
TCP/IP is reliable as it guarantees delivery of data packets in the correct order.
UDP is faster as it does not require a connection setup before transmitting data.
TCP/IP is used for applications that require high reliability, such as web browsing and email.
UDP is used for real-time applications like online gaming and video streaming.
TCP/IP include...read more
Q16. Write merge sort
Merge sort is a divide and conquer algorithm that recursively splits an array into halves, sorts them, and then merges them back together.
Divide the array into two halves
Recursively sort each half
Merge the sorted halves back together
More about working at LTIMindtree
Top HR Questions asked in Mitra Industries
Interview Process at Mitra Industries
Top Graduate Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month