i
LTIMindtree
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
Matrix multiplication code implementation in C++
Declare two matrices A and B of appropriate sizes
Iterate through rows and columns to calculate each element of the resulting matrix C
Use nested loops for efficient computation
Ensure the number of columns in matrix A is equal to the number of rows in matrix B
Example: A = {{1, 2}, {3, 4}}, B = {{5, 6}, {7, 8}}, C = A*B = {{19, 22}, {43, 50}}
Real-life examples of Object-Oriented Programming include modeling a car as an object with properties and methods.
Modeling a car as an object with properties like color, make, model, and methods like start, stop, accelerate
Creating a banking system where accounts are objects with properties like balance and methods like deposit, withdraw
Developing a video game where characters are objects with properties like heal...
Thread lifecycle in programming refers to the various stages a thread goes through from creation to termination.
Thread creation: A new thread is created using the 'Thread' class or by implementing the 'Runnable' interface.
Thread start: The thread transitions from 'new' to 'runnable' state when 'start()' method is called.
Thread running: The thread is executing its task in the 'running' state.
Thread waiting: The thr...
Collections in Java are used to store and manipulate groups of objects.
Collections provide a way to store, retrieve, and manipulate groups of objects in Java.
They offer various data structures like lists, sets, maps, etc. for different purposes.
Collections framework includes interfaces like List, Set, Map, and classes like ArrayList, HashSet, HashMap.
Collections provide methods for sorting, searching, and iteratin...
What people are saying about LTIMindtree
Key concepts of OOP include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability for objects to be treated as instances of their parent class or their own class.
Abstraction: Hiding complex implementation details and...
Cross site scripting (XSS) is a type of security vulnerability typically found in web applications where malicious scripts are injected into trusted websites.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or altering the website's content.
There are three main types of XSS: stored XSS, reflected XSS, and DOM-based XSS.
Preventing XSS involves input validat...
MITM stands for Man-in-the-Middle attack, where a third party intercepts communication between two parties without their knowledge.
MITM attack involves a hacker intercepting communication between two parties to steal information or manipulate data.
Common examples include eavesdropping on Wi-Fi networks or intercepting emails.
To prevent MITM attacks, encryption and secure communication protocols like HTTPS are used...
Agile methodology is a project management approach that emphasizes flexibility, collaboration, and iterative development.
Agile methodology involves breaking down projects into smaller tasks and completing them in short iterations.
It prioritizes customer feedback and collaboration among team members.
Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP).
DBMS stands for Database Management System. It is a software that manages databases and allows users to interact with data.
DBMS helps in storing, retrieving, and managing data efficiently.
It provides data security by allowing access control and data encryption.
DBMS ensures data integrity by enforcing constraints and maintaining consistency.
Examples of DBMS include MySQL, Oracle, SQL Server, and PostgreSQL.
Merge sort is a divide and conquer algorithm that recursively splits an array into halves, sorts them, and then merges them back together.
Divide the array into two halves
Recursively sort each half
Merge the sorted halves back together
I appeared for an interview in Aug 2024.
The aptitude test will be conducted online.
Thread lifecycle in programming refers to the various stages a thread goes through from creation to termination.
Thread creation: A new thread is created using the 'Thread' class or by implementing the 'Runnable' interface.
Thread start: The thread transitions from 'new' to 'runnable' state when 'start()' method is called.
Thread running: The thread is executing its task in the 'running' state.
Thread waiting: The thread c...
Collections in Java are used to store and manipulate groups of objects.
Collections provide a way to store, retrieve, and manipulate groups of objects in Java.
They offer various data structures like lists, sets, maps, etc. for different purposes.
Collections framework includes interfaces like List, Set, Map, and classes like ArrayList, HashSet, HashMap.
Collections provide methods for sorting, searching, and iterating ove...
Key concepts of OOP include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability for objects to be treated as instances of their parent class or their own class.
Abstraction: Hiding complex implementation details and show...
Real-life examples of Object-Oriented Programming include modeling a car as an object with properties and methods.
Modeling a car as an object with properties like color, make, model, and methods like start, stop, accelerate
Creating a banking system where accounts are objects with properties like balance and methods like deposit, withdraw
Developing a video game where characters are objects with properties like health, p...
Matrix multiplication code implementation in C++
Declare two matrices A and B of appropriate sizes
Iterate through rows and columns to calculate each element of the resulting matrix C
Use nested loops for efficient computation
Ensure the number of columns in matrix A is equal to the number of rows in matrix B
Example: A = {{1, 2}, {3, 4}}, B = {{5, 6}, {7, 8}}, C = A*B = {{19, 22}, {43, 50}}
Designed and implemented a smart irrigation system using IoT technology.
Researched various sensors and actuators suitable for monitoring soil moisture levels and controlling water flow.
Developed a mobile application to remotely monitor and control the irrigation system.
Implemented machine learning algorithms to optimize water usage based on weather forecasts and plant requirements.
I applied via Campus Placement
Questions on Logical Reasoning and all
It's good and we have to practice our skills
It's good and we need to focus on the coding skills
Lambda functions are anonymous functions in programming that can be used for short, one-time tasks.
Lambda functions are used for writing short, concise code without the need to define a separate function.
They are commonly used in functional programming languages like Python, JavaScript, and Ruby.
Lambda functions can be passed as arguments to higher-order functions.
They are useful for tasks like sorting, filtering, and ...
Your company is a leading engineering firm specializing in sustainable infrastructure projects.
Specializes in sustainable infrastructure projects
Known for innovative engineering solutions
Has a strong reputation in the industry
Works on projects globally
I applied via Campus Placement and was interviewed in Jun 2024. There were 3 interview rounds.
Coding Decoding, Data Interpretation
The project involved designing and implementing a new software system for tracking inventory in a manufacturing plant.
Developed a user-friendly interface for inputting and accessing inventory data
Implemented database management system to store and retrieve inventory information
Integrated barcode scanning technology for efficient tracking of items
Collaborated with cross-functional teams to gather requirements and ensure...
Agile methodology is a project management approach that emphasizes flexibility, collaboration, and iterative development.
Agile methodology involves breaking down projects into smaller tasks and completing them in short iterations.
It prioritizes customer feedback and collaboration among team members.
Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP).
Types of joins in SQL are inner join, left join, right join, and full outer join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full outer join: Returns rows when there is a match in either table.
TCP/IP is a connection-oriented protocol that ensures data delivery, while UDP is a connectionless protocol that prioritizes speed.
TCP/IP is reliable as it guarantees delivery of data packets in the correct order.
UDP is faster as it does not require a connection setup before transmitting data.
TCP/IP is used for applications that require high reliability, such as web browsing and email.
UDP is used for real-time applicat...
I applied via Campus Placement and was interviewed in Jun 2024. There were 3 interview rounds.
It was easy to solve
I am a recent graduate with a degree in engineering, passionate about problem-solving and eager to apply my skills in a professional setting.
Recent graduate with a degree in engineering
Passionate about problem-solving
Eager to apply skills in a professional setting
I want to choose Mindtree because of its reputation for innovation, strong company culture, and opportunities for growth.
Mindtree has a reputation for innovation and cutting-edge technology solutions.
The company has a strong focus on employee development and a positive company culture.
There are ample opportunities for growth and advancement within Mindtree.
I believe that working at Mindtree will provide me with the pla...
Mindtree is a global technology consulting and services company, specializing in IT services and digital transformation.
Founded in 1999 in Bangalore, India
Provides services in application development, maintenance, infrastructure management, and testing
Acquired by L&T (Larsen & Toubro) in 2019
Has offices in multiple countries including the USA, UK, and India
I applied via Campus Placement and was interviewed in Jun 2024. There were 4 interview rounds.
Basic aptitude questions
Questions from array, strings, sorting and searching. East to Medium level of Questions.
I applied via Campus Placement and was interviewed in Jun 2024. There were 3 interview rounds.
Several questions of english Apti coding
Cross site scripting (XSS) is a type of security vulnerability typically found in web applications where malicious scripts are injected into trusted websites.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or altering the website's content.
There are three main types of XSS: stored XSS, reflected XSS, and DOM-based XSS.
Preventing XSS involves input validation, ...
MITM stands for Man-in-the-Middle attack, where a third party intercepts communication between two parties without their knowledge.
MITM attack involves a hacker intercepting communication between two parties to steal information or manipulate data.
Common examples include eavesdropping on Wi-Fi networks or intercepting emails.
To prevent MITM attacks, encryption and secure communication protocols like HTTPS are used.
I am a recent graduate with a degree in engineering, passionate about problem-solving and eager to apply my skills in a professional setting.
Recent graduate with a degree in engineering
Passionate about problem-solving
Eager to apply skills in a professional setting
I address disputes amongst team members by promoting open communication, active listening, and facilitating constructive discussions.
Encourage open communication to address issues early on
Practice active listening to understand all perspectives
Facilitate constructive discussions to find mutually beneficial solutions
I applied via Campus Placement and was interviewed in Jun 2024. There were 3 interview rounds.
Asked basic aptitude questions.
MCQ on core cs subjects.
Merge sort is a divide and conquer algorithm that recursively splits an array into halves, sorts them, and then merges them back together.
Divide the array into two halves
Recursively sort each half
Merge the sorted halves back together
Merge sort has a time complexity of O(n log n) and a space complexity of O(n).
Time complexity of merge sort is O(n log n) where n is the number of elements in the array.
Space complexity of merge sort is O(n) as it requires additional space to store the temporary arrays during the merging process.
Merge sort is a divide and conquer algorithm that recursively divides the array into halves until each subarray contains only...
I applied via Campus Placement and was interviewed in Jun 2024. There were 3 interview rounds.
Various sessions on aptitude, advanced coding, and English.
I applied via Newspaper Ad and was interviewed in Jun 2024. There was 1 interview round.
DBMS stands for Database Management System. It is a software that manages databases and allows users to interact with data.
DBMS helps in storing, retrieving, and managing data efficiently.
It provides data security by allowing access control and data encryption.
DBMS ensures data integrity by enforcing constraints and maintaining consistency.
Examples of DBMS include MySQL, Oracle, SQL Server, and PostgreSQL.
DSA stands for Data Structures and Algorithms. Knapsack is a problem in combinatorial optimization.
DSA is a field of study that involves the design and analysis of data structures and algorithms.
Knapsack problem involves maximizing the value of items in a knapsack without exceeding its capacity.
There are two types of knapsack problems: 0/1 knapsack (where items cannot be broken) and fractional knapsack (where items can...
Some of the top questions asked at the LTIMindtree Graduate Engineer interview for freshers -
The duration of LTIMindtree Graduate Engineer interview process can vary, but typically it takes about 2-4 weeks to complete.
based on 17 interview experiences
Difficulty level
Duration
based on 409 reviews
Rating in categories
Senior Software Engineer
22k
salaries
| ₹7.3 L/yr - ₹21.6 L/yr |
Software Engineer
16.3k
salaries
| ₹3.9 L/yr - ₹8.8 L/yr |
Technical Lead
6.4k
salaries
| ₹16.4 L/yr - ₹28.3 L/yr |
Module Lead
5.7k
salaries
| ₹12 L/yr - ₹22 L/yr |
Senior Engineer
4.4k
salaries
| ₹5.8 L/yr - ₹14 L/yr |
Cognizant
Capgemini
Accenture
TCS