Add office photos
Mphasis logo
Engaged Employer

Mphasis

Verified
3.4
based on 8.3k Reviews
Video summary
Filter interviews by

500+ Mphasis Interview Questions and Answers

Updated 3 Mar 2025
Popular Designations

Q101. Can you describe two complex JIRA issues you have worked on?

Ans.

Resolved a critical bug causing data loss and implemented a new feature for better user experience.

  • Identified root cause of data loss bug by analyzing database queries and logs

  • Collaborated with cross-functional teams to prioritize and implement a fix

  • Designed and implemented a new feature based on user feedback to enhance usability

Add your answer
right arrow

Q102. What steps did you take to perform root cause analysis in your project?

Ans.

I conducted thorough analysis by reviewing code, logs, and discussing with team members.

  • Reviewed code to identify potential issues

  • Analyzed logs for error messages and patterns

  • Discussed with team members to gather insights and perspectives

  • Used debugging tools to trace the root cause

Add your answer
right arrow
Mphasis Interview Questions and Answers for Freshers
illustration image

Q103. What is a trigger in database management, and what are its different types?

Ans.

A trigger in database management is a special type of stored procedure that is automatically executed when certain events occur in a database.

  • Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.

  • There are two main types of triggers: row-level triggers and statement-level triggers.

  • Row-level triggers are fired for each row affected by a triggering statement, while statement-level triggers are fired once for each triggerin...read more

Add your answer
right arrow

Q104. What are the locators in selenium, Write xpath for given element Diff between find element and findelements What is smoke sanity and regression testing Black box and white box testing difference Defect life cyc...

read more
Ans.

Answers to common interview questions for Software Test Engineer position

  • Locators in Selenium are used to locate elements on a web page, such as ID, name, class name, tag name, link text, and XPath

  • Example of XPath for an element: //input[@id='username']

  • findElement() is used to find a single element on a web page, while findElements() is used to find multiple elements

  • Smoke testing is a preliminary testing to check if the software build is stable enough for further testing, San...read more

Add your answer
right arrow
Discover Mphasis interview dos and don'ts from real experiences

Q105. Write the program to find smaller value from 3 input

Ans.

Program to find the smallest value from 3 inputs.

  • Compare the first two inputs and store the smaller value.

  • Compare the stored value with the third input and update if smaller.

  • Return the final stored value as the smallest value.

Add your answer
right arrow

Q106. What is Liskov Principle?

Ans.

Liskov Principle is a principle of object-oriented programming that states that objects of a superclass should be replaceable with objects of its subclasses without affecting the correctness of the program.

  • Named after Barbara Liskov, a computer scientist who introduced the principle in 1987

  • Also known as Liskov Substitution Principle (LSP)

  • Helps in designing classes that are easy to extend and maintain

  • Violation of LSP can lead to unexpected behavior in the program

  • Example: If a ...read more

Add your answer
right arrow
Are these interview questions helpful?

Q107. As per OFAC list what are the sanctioned countries

Ans.

The sanctioned countries as per OFAC list include Iran, North Korea, Syria, Cuba, and Venezuela.

  • Iran

  • North Korea

  • Syria

  • Cuba

  • Venezuela

View 1 answer
right arrow

Q108. What are the agile metrics you used in your previous project?

Ans.

Agile metrics used in previous project included velocity, burndown charts, and cycle time.

  • Velocity - measuring the amount of work completed in a sprint

  • Burndown charts - tracking the remaining work in a sprint

  • Cycle time - measuring the time taken for a task to be completed

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q109. What is inheritance and types of inheritance

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.

  • Hierarchical inheritance involves one class serving as a parent for multiple child classes.

  • Multilevel inheritance involves a chain of inheritance where a derived class serves as t...read more

Add your answer
right arrow

Q110. 1.Difference between findElement and findElements. 2. What is interface?

Ans.

Explaining the difference between findElement and findElements and defining interface.

  • findElement returns the first matching element on the page while findElements returns a list of all matching elements.

  • Both methods are used to locate web elements on a page using locators such as ID, class name, name, etc.

  • An interface is a collection of abstract methods that can be implemented by a class. It defines a contract that the implementing class must follow.

  • In Java, interfaces are u...read more

View 1 answer
right arrow

Q111. 3. How will you pick the product backlog items for particular sprint?

Ans.

Product backlog items are picked for a sprint based on priority, value, dependencies, and team capacity.

  • Prioritize backlog items based on business value and urgency

  • Consider dependencies between backlog items

  • Take into account team capacity and velocity

  • Collaborate with stakeholders to ensure alignment on priorities

  • Use techniques like MoSCoW method or Kano model for prioritization

Add your answer
right arrow

Q112. What are different data types and it's features

Ans.

Data types are categories of data items that determine the operations that can be performed on them.

  • Numeric types: int, float, complex

  • Sequence types: list, tuple, range

  • Text type: str

  • Mapping type: dict

  • Set types: set, frozenset

  • Boolean type: bool

  • Binary types: bytes, bytearray, memoryview

Add your answer
right arrow

Q113. how many types of constructor are there? ---told

Ans.

There are three types of constructors in Java: default, parameterized, and copy constructors.

  • Default constructor: no arguments passed

  • Parameterized constructor: arguments passed

  • Copy constructor: creates a new object as a copy of an existing object

  • Example: public class Person { public Person() {} public Person(String name) { this.name = name; } public Person(Person person) { this.name = person.name; } }

Add your answer
right arrow

Q114. what is meant by polymorphism? abstarction code

Ans.

Polymorphism in programming refers to the ability of a function or method to behave differently based on the object it is called with.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example: Inheritance in Java allows a subclass to override a method of its superclass, exhibiting polymorphic behavior.

Add your answer
right arrow

Q115. how to implement exception handling and filters in .net core web api

Ans.

Exception handling and filters in .NET Core Web API

  • Use try-catch blocks to handle exceptions in the code

  • Implement global exception handling middleware to catch unhandled exceptions

  • Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection

  • Create custom exception filters by implementing IExceptionFilter interface

Add your answer
right arrow
Q116. What is a JIT compiler?
Ans.

JIT compiler stands for Just-In-Time compiler, which compiles code during runtime instead of ahead of time.

  • JIT compiler translates bytecode into machine code on-the-fly

  • Improves performance by optimizing frequently executed code

  • Examples include Java HotSpot, .NET CLR, V8 JavaScript engine

Add your answer
right arrow
Q117. What is dependency injection?
Ans.

Dependency injection is a design pattern where components are provided with their dependencies rather than creating them internally.

  • Allows for easier testing by providing mock dependencies

  • Promotes loose coupling between components

  • Improves code reusability and maintainability

  • Examples: Constructor injection, Setter injection, Interface injection

Add your answer
right arrow
Q118. What is an interface?
Ans.

An interface in software engineering is a contract that defines the methods that a class must implement.

  • Defines a set of methods that a class must implement

  • Helps achieve abstraction and loose coupling

  • Allows for multiple classes to implement the same interface

  • Example: Java interfaces define method signatures that classes must implement

Add your answer
right arrow

Q119. How do you recover from a disk consolidation needed warning.

Ans.

To recover from disk consolidation warning, run a disk consolidation process.

  • Run a disk consolidation process to resolve the warning.

  • Ensure that there is enough free space on the datastore before running the consolidation process.

  • Check for any snapshots on the virtual machine and delete them if not required.

  • If the warning persists, check for any disk or storage-related issues and resolve them.

Add your answer
right arrow

Q120. Can you walk me through a application migration scenario from onprem to cloud

Ans.

Application migration scenario from onprem to cloud

  • Assess current on-premises application architecture and dependencies

  • Select appropriate cloud provider and services based on requirements

  • Plan for data migration, security, compliance, and performance considerations

  • Test the migration process in a non-production environment

  • Execute the migration with minimal downtime and monitor for any issues

  • Optimize the application for cloud-native features and scalability

Add your answer
right arrow

Q121. What are sub files, types of sub files, difference, which one is used in which conditions.

Add your answer
right arrow

Q122. how to convert rows to columns

Ans.

To convert rows to columns, use the PIVOT function in SQL or transpose function in Excel.

  • Identify the column to be transposed as the new row header

  • Identify the column to be used as the new column header

  • Use PIVOT function in SQL or transpose function in Excel

  • Example: SELECT * FROM table_name PIVOT (MAX(column_to_be_transposed) FOR column_to_be_used AS new_column_header)

  • Example: Select the data to be transposed in Excel, copy it, select a new cell, right-click and select 'Trans...read more

Add your answer
right arrow

Q123. What do you know about Mphasis?

Ans.

Mphasis is an IT services company providing digital solutions to clients globally.

  • Founded in 2000 and headquartered in Bangalore, India

  • Offers services in application development, infrastructure management, and business process outsourcing

  • Has a presence in over 30 countries and serves clients in industries such as banking, insurance, and healthcare

Add your answer
right arrow

Q124. What are the steps you follow as part of BRD documentation?

Ans.

Steps followed in BRD documentation include gathering requirements, analyzing data, documenting specifications, and obtaining approval.

  • Gather requirements from stakeholders

  • Analyze data to understand current processes and identify gaps

  • Document specifications including functional and non-functional requirements

  • Obtain approval from stakeholders before moving to the next phase

Add your answer
right arrow

Q125. What is your view on the industry with the advent of Gen AI and Blockchain?

Ans.

Gen AI and Blockchain are revolutionizing the industry by enhancing automation, security, and transparency.

  • Gen AI is transforming data analysis and decision-making processes through advanced algorithms and machine learning.

  • Blockchain technology is revolutionizing data security and transparency by creating decentralized and immutable ledgers.

  • The combination of Gen AI and Blockchain is leading to more efficient and secure business operations across various industries.

  • For exampl...read more

Add your answer
right arrow

Q126. What are the events of scrum? How do you carry them out?

Ans.

The events of Scrum are Sprint, Sprint Planning, Daily Standup, Sprint Review, and Sprint Retrospective.

  • Sprint: Time-boxed iteration where work is completed and reviewed.

  • Sprint Planning: Meeting to plan the work to be done in the Sprint.

  • Daily Standup: Daily meeting for the team to synchronize and plan the day's work.

  • Sprint Review: Meeting at the end of the Sprint to review the work completed.

  • Sprint Retrospective: Meeting at the end of the Sprint to reflect on what went well a...read more

Add your answer
right arrow

Q127. Write java program to count the number of repeated characters in the string

Ans.

Java program to count the number of repeated characters in a string

  • Create a HashMap to store characters and their counts

  • Iterate through the string and update the counts in the HashMap

  • Print the characters with counts greater than 1

Add your answer
right arrow

Q128. What is Shallow copy and deep copy

Ans.

Shallow copy creates a new object with the same reference as the original, while deep copy creates a new object with a new reference.

  • Shallow copy only copies the top-level object, while deep copy copies all nested objects.

  • Shallow copy can be done using slicing or the copy() method, while deep copy requires the copy module.

  • Modifying the original object will affect the shallow copy, but not the deep copy.

  • Example: x = [[1, 2], [3, 4]]; y = x[:] # shallow copy; z = copy.deepcopy(...read more

Add your answer
right arrow

Q129. 1.How to write an user stories? Is it mandatory to follow any standard?

Ans.

User stories are written to capture requirements from the perspective of an end user. It is not mandatory to follow a specific standard, but it is recommended to include key elements.

  • Start with a simple template: As a [role], I want [feature], so that [benefit].

  • Include acceptance criteria to define when the user story is complete.

  • Prioritize user stories based on business value and dependencies.

  • Collaborate with stakeholders to refine and validate user stories.

  • Use tools like JI...read more

Add your answer
right arrow

Q130. Explain the difference b/w WebService vs WebApi

Ans.

WebService is a software system designed to support interoperable machine-to-machine interaction over a network. WebApi is a framework for building HTTP services that can be consumed by a broad range of clients.

  • WebService uses SOAP protocol for communication while WebApi uses HTTP protocol.

  • WebService is platform-independent while WebApi is platform-dependent.

  • WebService supports only XML format while WebApi supports XML, JSON, and other formats.

  • WebService is used for enterpris...read more

Add your answer
right arrow

Q131. Write an unit test test case for atm withdraw Remove duplicates from a string Write a post request using rest sharper

Ans.

Unit test case for ATM withdraw and removing duplicates from a string, and writing a post request using RestSharper.

  • For ATM withdraw, test if the correct amount is deducted from the account balance

  • For removing duplicates from a string, test if the output string has no duplicate characters

  • For writing a post request using RestSharper, test if the request is successful and returns the expected response

Add your answer
right arrow

Q132. which Microservice communication pattern you have used?

Ans.

I have used the asynchronous messaging pattern for Microservice communication.

  • Implemented messaging queues like RabbitMQ or Kafka for decoupled communication

  • Used message brokers to enable communication between Microservices

  • Leveraged event-driven architecture for real-time updates and scalability

Add your answer
right arrow

Q133. What is a constructor and it's purpose?

Ans.

A constructor is a special type of method in a class that is automatically called when an object of that class is created.

  • Constructors have the same name as the class they belong to

  • They are used to initialize the object's state or perform any necessary setup

  • Constructors can have parameters to customize the initialization process

  • Example: public class Car { public Car(String color) { this.color = color; } }

Add your answer
right arrow

Q134. Can you override a Static Method?

Ans.

Yes, a static method can be overridden in Java using the concept of method hiding.

  • In Java, static methods cannot be overridden in the traditional sense like instance methods.

  • When a subclass defines a static method with the same signature as a static method in the superclass, it is called method hiding.

  • Method hiding does not follow polymorphism and is resolved at compile time based on the reference type.

  • Example: class Parent { static void display() { System.out.println("Parent...read more

Add your answer
right arrow

Q135. What is the Parent class of Java?

Ans.

The parent class of Java is the Object class.

  • All classes in Java are directly or indirectly derived from the Object class.

  • The Object class is the root class in Java's class hierarchy.

  • It provides methods that are common to all objects in Java, such as toString(), equals(), and hashCode().

Add your answer
right arrow

Q136. What is Window Handles in Selenium?

Ans.

Window Handles in Selenium are unique identifiers used to handle multiple browser windows in a Selenium test script.

  • Window Handles are unique alphanumeric strings assigned to each browser window opened by Selenium.

  • They are used to switch between different browser windows during a test script execution.

  • Window Handles can be obtained using getWindowHandles() method in Selenium.

  • Example: Set handles = driver.getWindowHandles();

Add your answer
right arrow

Q137. An anagram of string is another string contains the same character only the order of character can be different

Ans.

An anagram of a string is a rearrangement of its characters to form a new string with the same set of characters.

  • Anagrams can be formed by rearranging the letters of a word or phrase.

  • Anagrams can be used in cryptography and word games.

  • Examples of anagrams include 'listen' and 'silent', 'debit card' and 'bad credit'.

Add your answer
right arrow

Q138. what scenarios would you choose nosql over sql database?

Ans.

NoSQL databases are preferred for scenarios requiring high scalability, flexibility, and unstructured data.

  • When dealing with large amounts of unstructured data

  • When scalability and performance are key requirements

  • When flexibility in data model is needed

  • For real-time analytics and IoT applications

Add your answer
right arrow

Q139. What is the full form of KYc, CDD , AML

Ans.

KYC stands for Know Your Customer, CDD stands for Customer Due Diligence, and AML stands for Anti-Money Laundering.

  • KYC is a process of verifying the identity of customers to prevent fraud and money laundering.

  • CDD is a process of assessing the risk of a customer and verifying their identity before establishing a business relationship.

  • AML refers to the laws, regulations, and procedures aimed at preventing criminals from disguising illegally obtained funds as legitimate income.

  • E...read more

Add your answer
right arrow

Q140. Select alternate rows from SQL

Ans.

Select alternate rows from SQL

  • Use the modulo operator to filter alternate rows

  • Add a WHERE clause with the modulo operator

  • Example: SELECT * FROM table WHERE id % 2 = 0

  • Example: SELECT * FROM table WHERE MOD(id, 2) = 0

View 1 answer
right arrow
Q141. What are Java 8 streams?
Ans.

Java 8 streams are a sequence of elements that support functional-style operations.

  • Streams allow for processing collections of data in a declarative way.

  • They can be used to perform operations like filter, map, reduce, and collect.

  • Streams are lazy, meaning they only perform operations when necessary.

  • Example: List<String> names = Arrays.asList("Alice", "Bob", "Charlie"); Stream<String> stream = names.stream();

Add your answer
right arrow

Q142. 7. Marker interfaces, Singleton design pattern, why string is immutable

Ans.

Explaining marker interfaces, Singleton design pattern, and immutability of strings

  • Marker interfaces are interfaces with no methods, used to mark a class as having a certain behavior or capability

  • Singleton design pattern ensures only one instance of a class is created and provides a global point of access to it

  • Strings are immutable in Java to ensure their values cannot be changed once created, which improves security and performance

  • Immutable objects are thread-safe and can be...read more

Add your answer
right arrow

Q143. Tell me about how to call a web service from front end

Ans.

To call a web service from front end, use AJAX or fetch API to send HTTP requests to the web service endpoint.

  • Identify the web service endpoint URL

  • Use AJAX or fetch API to send HTTP requests to the endpoint

  • Specify the HTTP method (GET, POST, PUT, DELETE) and request headers

  • Handle the response from the web service in the front end code

Add your answer
right arrow

Q144. What is capital market and types, what is share and bond

Ans.

Capital market is a financial market where long-term securities like shares and bonds are bought and sold.

  • Capital market is a part of the financial system where long-term securities are traded

  • It provides a platform for companies and governments to raise funds for their operations and projects

  • Shares represent ownership in a company and give the shareholder voting rights and a share in profits

  • Bonds are debt instruments issued by companies or governments to raise capital, and th...read more

Add your answer
right arrow

Q145. You have three developers working on same powerapps application how do you merge their code while upgrading.

Add your answer
right arrow

Q146. 5.Can you do debugging while performing testing

Ans.

Yes, debugging is an integral part of testing.

  • Debugging helps identify and fix issues in the code.

  • Debugging can be done using tools like breakpoints, logs, and debuggers.

  • Debugging should be done in a separate environment to avoid affecting the testing environment.

  • Debugging should be done in a systematic manner to ensure all issues are identified and resolved.

Add your answer
right arrow

Q147. What are Db2 utilities, meaning of various SQL Codes, cursor application.

Ans.

Db2 utilities are tools used for database management, SQL Codes indicate status of SQL operations, and cursors are used for navigating through query results.

  • Db2 utilities are programs used for managing Db2 databases, such as LOAD, REORG, and RUNSTATS.

  • SQL Codes are numeric values that indicate the success or failure of SQL operations, with negative values indicating errors.

  • Cursors are used in database applications to navigate through query results row by row, allowing for proc...read more

Add your answer
right arrow

Q148. How do you feel about policies and location constraints?

Ans.

I am comfortable with policies but prefer flexibility in location constraints.

  • I believe policies are necessary for maintaining order and consistency in a work environment.

  • I am open to following company policies and procedures to ensure smooth operations.

  • I prefer flexibility in location constraints as it allows for a better work-life balance and increased productivity.

  • For example, remote work options can be beneficial for employees who may have personal commitments or prefer w...read more

Add your answer
right arrow

Q149. What is the difference between procedures and functions in programming?

Ans.

Procedures are used to perform an action, while functions return a value.

  • Procedures do not return a value, while functions do.

  • Functions can be used in SQL queries, while procedures cannot.

  • Functions can be called from within SQL statements, while procedures cannot.

  • Procedures can have OUT parameters to return multiple values, while functions can only return a single value.

Add your answer
right arrow

Q150. Have you designed architecture solution for large proposals? If so give insights on that.

Ans.

Yes, I have designed architecture solutions for large proposals.

  • I have experience designing architecture solutions for large-scale projects that require high availability, scalability, and security.

  • I have worked on proposals for enterprise clients where the architecture needed to support thousands of users and handle large amounts of data.

  • I have expertise in designing cloud-based solutions using AWS, Azure, or Google Cloud to meet the specific requirements of the proposal.

  • I h...read more

Add your answer
right arrow

Q151. What were some of the libraries that you used in Selenium using python for Backend testing?

Add your answer
right arrow

Q152. Write a program for differentiate odd and even nos

Ans.

Program to differentiate odd and even numbers

  • Use modulus operator to check if number is divisible by 2

  • If remainder is 0, number is even else odd

  • Print the result accordingly

Add your answer
right arrow

Q153. How do you determine if a string is a palidrome

Ans.

A palindrome is a string that reads the same forwards and backwards.

  • Compare the first character with the last character, the second character with the second-to-last character, and so on.

  • If any pair of characters doesn't match, the string is not a palindrome.

  • Ignore spaces and punctuation marks when comparing characters.

  • Convert the string to lowercase or uppercase to make the comparison case-insensitive.

View 1 answer
right arrow

Q154. What do you know about Capital Market

Ans.

Capital market refers to the financial market where long-term securities such as stocks and bonds are traded.

  • Capital market is a market for long-term securities such as stocks and bonds

  • It is a platform for companies to raise capital by issuing stocks and bonds

  • Investors can buy and sell securities in the capital market

  • Capital market is regulated by government bodies such as SEC in the US

  • Examples of capital markets include NYSE, NASDAQ, and London Stock Exchange

Add your answer
right arrow

Q155. Explain about OSI model

Ans.

The OSI model is a conceptual model that describes how data is transmitted over a network.

  • OSI stands for Open Systems Interconnection.

  • It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the adjacent layers.

  • Example: When you send an email, the Application layer sends it to the Presentation layer, which formats the data, and then sends it to the Session layer.

  • The Session layer ...read more

Add your answer
right arrow

Q156. what is Authentication, how to achieve it

Ans.

Authentication is the process of verifying the identity of a user or system.

  • Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.

  • Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).

  • Authentication can be achieved through protocols like OAuth, OpenID, SAML, and JWT.

  • Implementing secure authentication practices is ...read more

Add your answer
right arrow

Q157. 2. What's the difference between Functional and Non-Functional requirements?

Ans.

Functional requirements describe what the system should do, while non-functional requirements describe how the system should perform.

  • Functional requirements focus on specific behaviors or functions of the system.

  • Non-functional requirements focus on qualities such as performance, security, and usability.

  • Functional requirements are typically documented in use cases or user stories.

  • Non-functional requirements are often documented in a separate section of the requirements documen...read more

Add your answer
right arrow

Q158. Concurrent modification exception.how to avoid it

Ans.

To avoid concurrent modification exception, use synchronized blocks or data structures like ConcurrentHashMap.

  • Use synchronized blocks to ensure only one thread can modify the data at a time

  • Use data structures like ConcurrentHashMap which are designed to handle concurrent modifications

  • Consider using immutable objects to prevent modification conflicts

Add your answer
right arrow

Q159. What documents needs to be post closing

Ans.

Documents required post-closing include title deed, mortgage note, and closing disclosure.

  • Title deed

  • Mortgage note

  • Closing disclosure

Add your answer
right arrow

Q160. Difference between functional and non functional testing

Ans.

Functional testing checks if the software functions as expected, while non-functional testing checks other aspects like performance and usability.

  • Functional testing focuses on the specific functions of the software.

  • Non-functional testing focuses on aspects like performance, usability, security, and scalability.

  • Examples of functional testing include unit testing, integration testing, and system testing.

  • Examples of non-functional testing include load testing, stress testing, an...read more

Add your answer
right arrow

Q161. Can you handle 3teams, how you overcome silos

Ans.

Yes, I can handle 3 teams and overcome silos through effective communication and collaboration.

  • Establish regular meetings with all teams to ensure alignment and identify any potential issues

  • Encourage cross-functional collaboration and knowledge sharing

  • Implement a shared project management tool to track progress and ensure transparency

  • Celebrate team successes together to foster a sense of unity

  • Address any conflicts or misunderstandings promptly and openly

Add your answer
right arrow

Q162. 2. Microservice architecture, benefits, and their disadvantages

Ans.

Microservice architecture is a software design pattern where an application is divided into small, independent services.

  • Benefits of microservice architecture:

  • - Scalability: Each service can be scaled independently, allowing for better performance and resource utilization.

  • - Flexibility: Services can be developed, deployed, and updated independently, enabling faster development cycles.

  • - Fault isolation: If one service fails, it doesn't affect the entire application.

  • - Technology...read more

View 1 answer
right arrow

Q163. mysql to gcs ,how to move 10 tables at a time?

Ans.

Use Apache Sqoop to move 10 tables from MySQL to Google Cloud Storage.

  • Use Apache Sqoop to import data from MySQL to HDFS

  • Use Google Cloud Storage connector for Hadoop to move data from HDFS to GCS

  • Create a script to automate the process for all 10 tables

Add your answer
right arrow

Q164. Which single sign on technology/Mechanism is used in project

Ans.

We are using OAuth 2.0 for single sign on in the project.

  • OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.

  • It allows users to log in once and access multiple applications without having to log in again.

  • OAuth 2.0 provides secure delegated access to resources without sharing user credentials.

Add your answer
right arrow

Q165. What factors would you consider before deploying services to kubernetes

Ans.

Factors to consider before deploying services to Kubernetes

  • Resource requirements of the services

  • Networking considerations

  • Security measures

  • Monitoring and logging capabilities

  • High availability and scalability needs

Add your answer
right arrow

Q166. Investment banking What is investment banking and top companies

Ans.

Investment banking involves helping companies and governments raise capital by underwriting and selling securities.

  • Investment banks provide financial advisory services to clients

  • They help clients raise capital by underwriting and selling securities

  • Top investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley

Add your answer
right arrow

Q167. Code for sum of n natural numbers

Ans.

Code for sum of n natural numbers

  • Use a loop to iterate from 1 to n and add each number to a sum variable

  • Return the sum variable

Add your answer
right arrow

Q168. Can we change the order for dictionary

Ans.

Yes, we can change the order of a dictionary in Python.

  • Use OrderedDict to maintain the order of insertion

  • Sort the dictionary based on keys or values

  • Convert the dictionary to a list of tuples and sort them

  • Use the sorted() function to sort the dictionary

Add your answer
right arrow

Q169. What is investment banking

Ans.

Investment banking is a type of financial service that helps companies and governments raise capital by underwriting and selling securities.

  • Investment banks act as intermediaries between issuers of securities and investors.

  • They provide services such as underwriting, mergers and acquisitions, and securities trading.

  • Examples of investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley.

  • Investment banking is a highly competitive and lucrative industry.

  • It plays a ...read more

View 1 answer
right arrow

Q170. How a reverse string in java

Ans.

Reverse a string in Java

  • Convert the string to a character array

  • Use two pointers, one at the start and one at the end of the array

  • Swap the characters at the two pointers and move the pointers towards each other

  • Repeat until the pointers meet in the middle

View 1 answer
right arrow

Q171. What is the difference between Regression testing and Retesting?

Ans.

Regression testing is testing the entire system after making changes, while retesting is testing a specific bug fix.

  • Regression testing ensures that changes made to the system do not affect existing functionality.

  • Retesting ensures that a specific bug or issue has been resolved.

  • Regression testing is done after every change, while retesting is done after a bug fix.

  • Regression testing is time-consuming, while retesting is relatively quick.

  • Example of regression testing: testing the...read more

Add your answer
right arrow

Q172. What steps you perform to increase velociity

Ans.

To increase velocity, I focus on improving team communication, removing impediments, and continuously refining our processes.

  • Encourage open communication and collaboration within the team

  • Identify and remove any obstacles or impediments that are slowing down progress

  • Regularly review and refine our processes to optimize efficiency

  • Ensure that the team is properly trained and equipped with the necessary tools and resources

  • Encourage a culture of continuous improvement and learning

Add your answer
right arrow

Q173. What are the troubleshooting steps for resolving Wi-Fi connectivity issues?

Ans.

Troubleshooting steps for resolving Wi-Fi connectivity issues

  • Check if Wi-Fi is enabled on the device

  • Restart the device and the Wi-Fi router

  • Forget and reconnect to the Wi-Fi network

  • Check for any software updates on the device

  • Move closer to the Wi-Fi router to improve signal strength

Add your answer
right arrow

Q174. What is purpose for TILA RESPA

Ans.

TILA RESPA is a federal law that aims to protect consumers by providing them with clear and accurate information about mortgage loans.

  • TILA RESPA stands for Truth in Lending Act and Real Estate Settlement Procedures Act.

  • The purpose of TILA RESPA is to promote transparency and prevent predatory lending practices in the mortgage industry.

  • It requires lenders to provide borrowers with clear and easy-to-understand information about loan terms, costs, and risks.

  • TILA RESPA also manda...read more

View 1 answer
right arrow

Q175. What are the reports that a QA has to prepare?

Ans.

QA prepares various reports to track and analyze quality metrics.

  • Test execution report

  • Defect report

  • Test summary report

  • Test coverage report

  • Test trend report

Add your answer
right arrow

Q176. Wap in java to reverse string, exceptional handling, waits in selenium,

Ans.

Java code to reverse a string with exception handling and waits in Selenium

  • Use StringBuilder to reverse the string

  • Use try-catch block for exception handling

  • Use implicit or explicit waits in Selenium for synchronization

  • Example: String originalString = "hello"; StringBuilder reversedString = new StringBuilder(originalString).reverse();

  • Example: try { // code that may throw exception } catch (Exception e) { // handle exception }

Add your answer
right arrow

Q177. What is the waterfall model in software development?

Ans.

Waterfall model is a linear sequential software development process where progress flows in one direction like a waterfall.

  • Involves distinct phases such as requirements, design, implementation, testing, and maintenance.

  • Each phase must be completed before moving on to the next.

  • Changes are difficult to implement once a phase is completed.

  • Example: Traditional software development approach.

  • Example: Construction projects.

Add your answer
right arrow

Q178. Linear and binary search algorithm

Ans.

Linear search checks each element in a list sequentially, while binary search divides the list in half at each step.

  • Linear search has a time complexity of O(n), while binary search has a time complexity of O(log n).

  • Linear search is used for unsorted lists, while binary search is used for sorted lists.

  • Example: Linear search - searching for a name in a phone book. Binary search - searching for a word in a dictionary.

Add your answer
right arrow
Q179. What are views in SQL?
Ans.

Views in SQL are virtual tables that are generated based on the result set of a SELECT query.

  • Views are not stored physically in the database, but are dynamically generated when queried.

  • They can be used to simplify complex queries by encapsulating logic and joining multiple tables.

  • Views can also be used to restrict access to certain columns or rows of a table.

  • Example: CREATE VIEW vw_employee AS SELECT emp_id, emp_name FROM employees;

Add your answer
right arrow

Q180. Interconnect between microservices

Ans.

Interconnect between microservices involves communication protocols, service discovery, load balancing, and fault tolerance.

  • Use communication protocols like HTTP, gRPC, or messaging queues for inter-service communication

  • Implement service discovery mechanisms to locate and connect to other microservices dynamically

  • Utilize load balancing techniques to distribute incoming requests evenly across multiple instances of a service

  • Implement fault tolerance strategies such as circuit b...read more

Add your answer
right arrow

Q181. which Application Insight tool you have used?

Ans.

I have used Application Insights for monitoring and analyzing the performance of .NET applications.

  • Used Application Insights to track application performance metrics

  • Analyzed telemetry data to identify performance bottlenecks

  • Set up alerts and notifications for critical issues

  • Integrated Application Insights with Azure DevOps for continuous monitoring

Add your answer
right arrow

Q182. What is PIR and when it is used

Ans.

PIR stands for Post Implementation Review. It is used to evaluate the success of a change initiative and identify areas for improvement.

  • PIR is conducted after a change has been implemented to assess its impact and effectiveness.

  • It involves gathering feedback from stakeholders and analyzing data to determine if the change achieved its objectives.

  • PIR helps identify any issues or challenges faced during the implementation and provides recommendations for future improvements.

  • Exam...read more

View 1 answer
right arrow

Q183. GD-one time use plastic should be banned r not

Ans.

Yes, GD-one time use plastic should be banned.

  • One-time use plastic is harmful to the environment and wildlife.

  • Alternatives like reusable bags and containers are readily available.

  • Many countries and cities have already implemented bans on single-use plastics.

  • Reducing plastic waste is crucial for the health of our planet.

Add your answer
right arrow

Q184. What are the steps followed to gather requirements?

Ans.

Steps followed to gather requirements include identifying stakeholders, conducting interviews, analyzing existing documentation, and documenting the requirements.

  • Identify stakeholders involved in the project

  • Conduct interviews with stakeholders to understand their needs and expectations

  • Analyze existing documentation such as business processes, system requirements, and user manuals

  • Document the requirements in a clear and concise manner

Add your answer
right arrow

Q185. Micro services design pattern and example

Ans.

Microservices design pattern involves breaking down a large application into smaller, independent services.

  • Each microservice is responsible for a specific function or feature

  • Communication between microservices is typically done through APIs

  • Microservices can be deployed independently, allowing for easier scalability and maintenance

  • Examples include Netflix (uses microservices for different functionalities like recommendation, user management) and Amazon (uses microservices for ...read more

Add your answer
right arrow

Q186. Find the most booking rooms from a Resort which is having multiple floors

Add your answer
right arrow

Q187. Tell me something about Capital Market

Ans.

Capital market is a financial market where long-term securities like stocks, bonds, and mutual funds are traded.

  • It is a market for raising long-term funds

  • It includes stock exchanges, bond markets, and mutual fund markets

  • It facilitates the transfer of funds from savers to borrowers

  • It is regulated by the Securities and Exchange Board of India (SEBI)

  • Examples include BSE, NSE, NYSE, NASDAQ, etc.

Add your answer
right arrow

Q188. Architecture of previous assignments . Explain deployment pattern as well as interaction between components and Database

Ans.

Utilized microservices architecture with containerization for deployment. Components interacted through REST APIs with database.

  • Implemented microservices architecture for modularity and scalability

  • Utilized containerization (e.g. Docker) for easy deployment and management

  • Components communicated through REST APIs for decoupling and flexibility

  • Database interactions handled through ORM (Object-Relational Mapping) for data access

  • Ensured data consistency and integrity through trans...read more

Add your answer
right arrow

Q189. Clustered Index vs Non-clustered Index

Ans.

Clustered index determines physical order of data while non-clustered index has separate structure.

  • Clustered index determines the physical order of data in a table while non-clustered index has a separate structure.

  • Clustered index is faster for retrieval of data while non-clustered index is faster for retrieval of specific data.

  • A table can have only one clustered index while multiple non-clustered indexes can be created.

  • Clustered index is created on the primary key by default...read more

Add your answer
right arrow

Q190. What is a recursive query?

Ans.

A recursive query is a query that refers to itself in order to retrieve data from a database.

  • A recursive query is used to retrieve hierarchical data such as organizational structures or family trees.

  • It typically involves a common table expression (CTE) in SQL.

  • The query continues to execute until a specific condition is met, such as reaching the root node in a tree structure.

  • Example: Finding all employees and their managers in a company hierarchy.

Add your answer
right arrow

Q191. oops concepts with real time examples

Ans.

Object-oriented programming concepts with real-life examples

  • Encapsulation: A car's engine is encapsulated and hidden from the user, who only interacts with the car's interface.

  • Inheritance: A cat is a subclass of the animal class, inheriting its properties and methods.

  • Polymorphism: A shape class can have different methods for calculating area depending on the shape, such as circle or rectangle.

  • Abstraction: A TV remote control abstracts the complex inner workings of the TV and ...read more

Add your answer
right arrow

Q192. What are the built-in functions available in SQL?

Ans.

Some built-in functions in SQL include AVG, COUNT, MAX, MIN, SUM, and CONCAT.

  • AVG: Calculates the average value of a numeric column

  • COUNT: Counts the number of rows in a result set

  • MAX: Returns the maximum value in a column

  • MIN: Returns the minimum value in a column

  • SUM: Calculates the sum of values in a column

  • CONCAT: Concatenates two or more strings together

Add your answer
right arrow

Q193. What you know about capital markets and explain.

Ans.

Capital markets are financial markets where long-term debt or equity-backed securities are bought and sold.

  • Capital markets are where companies and governments raise long-term funds through debt or equity securities.

  • Investors can buy and sell stocks, bonds, and other financial instruments in capital markets.

  • Capital markets play a crucial role in allocating financial resources efficiently in the economy.

  • Examples of capital markets include stock exchanges like NYSE and NASDAQ, a...read more

Add your answer
right arrow

Q194. Can you use same static method in two different interface

Ans.

No, static methods cannot be overridden in interfaces.

  • Static methods in interfaces are implicitly public and abstract, so they cannot be overridden.

  • If two interfaces have the same static method signature, it will not cause any conflict.

  • Implementing classes will have to provide their own implementation of the static method.

View 1 answer
right arrow

Q195. How do you perform upgrades of ESXi and vCenter.

Ans.

Upgrades are performed by following a well-planned process that includes compatibility checks, backups, and testing.

  • Check compatibility of new version with existing hardware and software

  • Take backups of all critical data and configurations

  • Test the upgrade in a non-production environment before applying to production

  • Upgrade ESXi hosts first, followed by vCenter

  • Monitor the upgrade process and troubleshoot any issues that arise

Add your answer
right arrow

Q196. What is vMotion, what is a Snapshot and others.

Ans.

vMotion is a feature in VMware that allows live migration of virtual machines between hosts. Snapshot is a point-in-time copy of a VM.

  • vMotion enables workload mobility, load balancing, and zero-downtime maintenance.

  • Snapshot captures the state of a VM at a specific point in time and allows for easy restoration if needed.

  • Other related terms in VMware include vSphere, ESXi, and vCenter.

  • vMotion and Snapshot are commonly used in virtualization environments to improve flexibility a...read more

Add your answer
right arrow

Q197. What do you mean by continuous integration?

Ans.

Continuous integration is the practice of frequently integrating code changes into a shared repository to detect and fix integration errors early.

  • Automating the process of building, testing, and integrating code changes multiple times a day

  • Helps in identifying and fixing integration errors quickly

  • Ensures that the codebase is always in a deployable state

  • Promotes collaboration and communication among team members

Add your answer
right arrow

Q198. What is SDLC?

Ans.

SDLC stands for Software Development Life Cycle.

  • It is a process used to design, develop, test, and deploy software.

  • It consists of several phases such as planning, analysis, design, implementation, testing, and maintenance.

  • It helps to ensure that the software is developed efficiently, on time, and within budget.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

Add your answer
right arrow

Q199. Explain commands related to file management

Ans.

File management commands are used to interact with files and directories on a computer system.

  • ls - list files and directories in the current directory

  • cd - change directory

  • mkdir - create a new directory

  • rm - remove files or directories

  • cp - copy files or directories

  • mv - move files or directories

  • touch - create a new file

  • chmod - change file permissions

Add your answer
right arrow

Q200. Explain commands related to process management

Ans.

Commands related to process management include ps, top, kill, and nice.

  • ps - displays information about currently running processes

  • top - provides a dynamic real-time view of a running system

  • kill - terminates a process by sending a signal to its PID

  • nice - sets the priority of a process

Add your answer
right arrow
Previous
1
2
3
4
5
6
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Mphasis

based on 667 interviews
Interview experience
4.0
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Teleperformance Logo
3.9
 • 537 Interview Questions
Kotak Mahindra Bank Logo
3.8
 • 376 Interview Questions
Walmart Logo
3.8
 • 302 Interview Questions
DE Shaw Logo
3.8
 • 181 Interview Questions
TVS Motor Logo
4.0
 • 137 Interview Questions
State Street Corporation Logo
3.7
 • 134 Interview Questions
View all
Recently Viewed
REVIEWS
Mphasis
No Reviews
INTERVIEWS
WNS
No Interviews
INTERVIEWS
WNS
No Interviews
INTERVIEWS
Mphasis
No Interviews
LIST OF COMPANIES
GlobalLogic
Locations
INTERVIEWS
KAR Freight & Forwarding
No Interviews
INTERVIEWS
WNS
No Interviews
LIST OF COMPANIES
TELUS Digital
Locations
REVIEWS
Mphasis
No Reviews
SALARIES
Cognizant
Top Mphasis Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter