
Mphasis


500+ Mphasis Interview Questions and Answers
Q101. Can you describe two complex JIRA issues you have worked on?
Resolved a critical bug causing data loss and implemented a new feature for better user experience.
Identified root cause of data loss bug by analyzing database queries and logs
Collaborated with cross-functional teams to prioritize and implement a fix
Designed and implemented a new feature based on user feedback to enhance usability
Q102. What steps did you take to perform root cause analysis in your project?
I conducted thorough analysis by reviewing code, logs, and discussing with team members.
Reviewed code to identify potential issues
Analyzed logs for error messages and patterns
Discussed with team members to gather insights and perspectives
Used debugging tools to trace the root cause
Q103. What is a trigger in database management, and what are its different types?
A trigger in database management is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
There are two main types of triggers: row-level triggers and statement-level triggers.
Row-level triggers are fired for each row affected by a triggering statement, while statement-level triggers are fired once for each triggerin...read more
Q104. What are the locators in selenium, Write xpath for given element Diff between find element and findelements What is smoke sanity and regression testing Black box and white box testing difference Defect life cyc...
read moreAnswers to common interview questions for Software Test Engineer position
Locators in Selenium are used to locate elements on a web page, such as ID, name, class name, tag name, link text, and XPath
Example of XPath for an element: //input[@id='username']
findElement() is used to find a single element on a web page, while findElements() is used to find multiple elements
Smoke testing is a preliminary testing to check if the software build is stable enough for further testing, San...read more
Q105. Write the program to find smaller value from 3 input
Program to find the smallest value from 3 inputs.
Compare the first two inputs and store the smaller value.
Compare the stored value with the third input and update if smaller.
Return the final stored value as the smallest value.
Q106. What is Liskov Principle?
Liskov Principle is a principle of object-oriented programming that states that objects of a superclass should be replaceable with objects of its subclasses without affecting the correctness of the program.
Named after Barbara Liskov, a computer scientist who introduced the principle in 1987
Also known as Liskov Substitution Principle (LSP)
Helps in designing classes that are easy to extend and maintain
Violation of LSP can lead to unexpected behavior in the program
Example: If a ...read more
Q107. As per OFAC list what are the sanctioned countries
The sanctioned countries as per OFAC list include Iran, North Korea, Syria, Cuba, and Venezuela.
Iran
North Korea
Syria
Cuba
Venezuela
Q108. What are the agile metrics you used in your previous project?
Agile metrics used in previous project included velocity, burndown charts, and cycle time.
Velocity - measuring the amount of work completed in a sprint
Burndown charts - tracking the remaining work in a sprint
Cycle time - measuring the time taken for a task to be completed
Q109. What is inheritance and types of inheritance
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.
Hierarchical inheritance involves one class serving as a parent for multiple child classes.
Multilevel inheritance involves a chain of inheritance where a derived class serves as t...read more
Q110. 1.Difference between findElement and findElements. 2. What is interface?
Explaining the difference between findElement and findElements and defining interface.
findElement returns the first matching element on the page while findElements returns a list of all matching elements.
Both methods are used to locate web elements on a page using locators such as ID, class name, name, etc.
An interface is a collection of abstract methods that can be implemented by a class. It defines a contract that the implementing class must follow.
In Java, interfaces are u...read more
Q111. 3. How will you pick the product backlog items for particular sprint?
Product backlog items are picked for a sprint based on priority, value, dependencies, and team capacity.
Prioritize backlog items based on business value and urgency
Consider dependencies between backlog items
Take into account team capacity and velocity
Collaborate with stakeholders to ensure alignment on priorities
Use techniques like MoSCoW method or Kano model for prioritization
Q112. What are different data types and it's features
Data types are categories of data items that determine the operations that can be performed on them.
Numeric types: int, float, complex
Sequence types: list, tuple, range
Text type: str
Mapping type: dict
Set types: set, frozenset
Boolean type: bool
Binary types: bytes, bytearray, memoryview
Q113. how many types of constructor are there? ---told
There are three types of constructors in Java: default, parameterized, and copy constructors.
Default constructor: no arguments passed
Parameterized constructor: arguments passed
Copy constructor: creates a new object as a copy of an existing object
Example: public class Person { public Person() {} public Person(String name) { this.name = name; } public Person(Person person) { this.name = person.name; } }
Q114. what is meant by polymorphism? abstarction code
Polymorphism in programming refers to the ability of a function or method to behave differently based on the object it is called with.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Inheritance in Java allows a subclass to override a method of its superclass, exhibiting polymorphic behavior.
Q115. how to implement exception handling and filters in .net core web api
Exception handling and filters in .NET Core Web API
Use try-catch blocks to handle exceptions in the code
Implement global exception handling middleware to catch unhandled exceptions
Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection
Create custom exception filters by implementing IExceptionFilter interface
JIT compiler stands for Just-In-Time compiler, which compiles code during runtime instead of ahead of time.
JIT compiler translates bytecode into machine code on-the-fly
Improves performance by optimizing frequently executed code
Examples include Java HotSpot, .NET CLR, V8 JavaScript engine
Dependency injection is a design pattern where components are provided with their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
An interface in software engineering is a contract that defines the methods that a class must implement.
Defines a set of methods that a class must implement
Helps achieve abstraction and loose coupling
Allows for multiple classes to implement the same interface
Example: Java interfaces define method signatures that classes must implement
Q119. How do you recover from a disk consolidation needed warning.
To recover from disk consolidation warning, run a disk consolidation process.
Run a disk consolidation process to resolve the warning.
Ensure that there is enough free space on the datastore before running the consolidation process.
Check for any snapshots on the virtual machine and delete them if not required.
If the warning persists, check for any disk or storage-related issues and resolve them.
Q120. Can you walk me through a application migration scenario from onprem to cloud
Application migration scenario from onprem to cloud
Assess current on-premises application architecture and dependencies
Select appropriate cloud provider and services based on requirements
Plan for data migration, security, compliance, and performance considerations
Test the migration process in a non-production environment
Execute the migration with minimal downtime and monitor for any issues
Optimize the application for cloud-native features and scalability
Q121. What are sub files, types of sub files, difference, which one is used in which conditions.
Q122. how to convert rows to columns
To convert rows to columns, use the PIVOT function in SQL or transpose function in Excel.
Identify the column to be transposed as the new row header
Identify the column to be used as the new column header
Use PIVOT function in SQL or transpose function in Excel
Example: SELECT * FROM table_name PIVOT (MAX(column_to_be_transposed) FOR column_to_be_used AS new_column_header)
Example: Select the data to be transposed in Excel, copy it, select a new cell, right-click and select 'Trans...read more
Q123. What do you know about Mphasis?
Mphasis is an IT services company providing digital solutions to clients globally.
Founded in 2000 and headquartered in Bangalore, India
Offers services in application development, infrastructure management, and business process outsourcing
Has a presence in over 30 countries and serves clients in industries such as banking, insurance, and healthcare
Q124. What are the steps you follow as part of BRD documentation?
Steps followed in BRD documentation include gathering requirements, analyzing data, documenting specifications, and obtaining approval.
Gather requirements from stakeholders
Analyze data to understand current processes and identify gaps
Document specifications including functional and non-functional requirements
Obtain approval from stakeholders before moving to the next phase
Q125. What is your view on the industry with the advent of Gen AI and Blockchain?
Gen AI and Blockchain are revolutionizing the industry by enhancing automation, security, and transparency.
Gen AI is transforming data analysis and decision-making processes through advanced algorithms and machine learning.
Blockchain technology is revolutionizing data security and transparency by creating decentralized and immutable ledgers.
The combination of Gen AI and Blockchain is leading to more efficient and secure business operations across various industries.
For exampl...read more
Q126. What are the events of scrum? How do you carry them out?
The events of Scrum are Sprint, Sprint Planning, Daily Standup, Sprint Review, and Sprint Retrospective.
Sprint: Time-boxed iteration where work is completed and reviewed.
Sprint Planning: Meeting to plan the work to be done in the Sprint.
Daily Standup: Daily meeting for the team to synchronize and plan the day's work.
Sprint Review: Meeting at the end of the Sprint to review the work completed.
Sprint Retrospective: Meeting at the end of the Sprint to reflect on what went well a...read more
Q127. Write java program to count the number of repeated characters in the string
Java program to count the number of repeated characters in a string
Create a HashMap to store characters and their counts
Iterate through the string and update the counts in the HashMap
Print the characters with counts greater than 1
Q128. What is Shallow copy and deep copy
Shallow copy creates a new object with the same reference as the original, while deep copy creates a new object with a new reference.
Shallow copy only copies the top-level object, while deep copy copies all nested objects.
Shallow copy can be done using slicing or the copy() method, while deep copy requires the copy module.
Modifying the original object will affect the shallow copy, but not the deep copy.
Example: x = [[1, 2], [3, 4]]; y = x[:] # shallow copy; z = copy.deepcopy(...read more
Q129. 1.How to write an user stories? Is it mandatory to follow any standard?
User stories are written to capture requirements from the perspective of an end user. It is not mandatory to follow a specific standard, but it is recommended to include key elements.
Start with a simple template: As a [role], I want [feature], so that [benefit].
Include acceptance criteria to define when the user story is complete.
Prioritize user stories based on business value and dependencies.
Collaborate with stakeholders to refine and validate user stories.
Use tools like JI...read more
Q130. Explain the difference b/w WebService vs WebApi
WebService is a software system designed to support interoperable machine-to-machine interaction over a network. WebApi is a framework for building HTTP services that can be consumed by a broad range of clients.
WebService uses SOAP protocol for communication while WebApi uses HTTP protocol.
WebService is platform-independent while WebApi is platform-dependent.
WebService supports only XML format while WebApi supports XML, JSON, and other formats.
WebService is used for enterpris...read more
Q131. Write an unit test test case for atm withdraw Remove duplicates from a string Write a post request using rest sharper
Unit test case for ATM withdraw and removing duplicates from a string, and writing a post request using RestSharper.
For ATM withdraw, test if the correct amount is deducted from the account balance
For removing duplicates from a string, test if the output string has no duplicate characters
For writing a post request using RestSharper, test if the request is successful and returns the expected response
Q132. which Microservice communication pattern you have used?
I have used the asynchronous messaging pattern for Microservice communication.
Implemented messaging queues like RabbitMQ or Kafka for decoupled communication
Used message brokers to enable communication between Microservices
Leveraged event-driven architecture for real-time updates and scalability
Q133. What is a constructor and it's purpose?
A constructor is a special type of method in a class that is automatically called when an object of that class is created.
Constructors have the same name as the class they belong to
They are used to initialize the object's state or perform any necessary setup
Constructors can have parameters to customize the initialization process
Example: public class Car { public Car(String color) { this.color = color; } }
Q134. Can you override a Static Method?
Yes, a static method can be overridden in Java using the concept of method hiding.
In Java, static methods cannot be overridden in the traditional sense like instance methods.
When a subclass defines a static method with the same signature as a static method in the superclass, it is called method hiding.
Method hiding does not follow polymorphism and is resolved at compile time based on the reference type.
Example: class Parent { static void display() { System.out.println("Parent...read more
Q135. What is the Parent class of Java?
The parent class of Java is the Object class.
All classes in Java are directly or indirectly derived from the Object class.
The Object class is the root class in Java's class hierarchy.
It provides methods that are common to all objects in Java, such as toString(), equals(), and hashCode().
Q136. What is Window Handles in Selenium?
Window Handles in Selenium are unique identifiers used to handle multiple browser windows in a Selenium test script.
Window Handles are unique alphanumeric strings assigned to each browser window opened by Selenium.
They are used to switch between different browser windows during a test script execution.
Window Handles can be obtained using getWindowHandles() method in Selenium.
Example: Set
handles = driver.getWindowHandles();
Q137. An anagram of string is another string contains the same character only the order of character can be different
An anagram of a string is a rearrangement of its characters to form a new string with the same set of characters.
Anagrams can be formed by rearranging the letters of a word or phrase.
Anagrams can be used in cryptography and word games.
Examples of anagrams include 'listen' and 'silent', 'debit card' and 'bad credit'.
Q138. what scenarios would you choose nosql over sql database?
NoSQL databases are preferred for scenarios requiring high scalability, flexibility, and unstructured data.
When dealing with large amounts of unstructured data
When scalability and performance are key requirements
When flexibility in data model is needed
For real-time analytics and IoT applications
Q139. What is the full form of KYc, CDD , AML
KYC stands for Know Your Customer, CDD stands for Customer Due Diligence, and AML stands for Anti-Money Laundering.
KYC is a process of verifying the identity of customers to prevent fraud and money laundering.
CDD is a process of assessing the risk of a customer and verifying their identity before establishing a business relationship.
AML refers to the laws, regulations, and procedures aimed at preventing criminals from disguising illegally obtained funds as legitimate income.
E...read more
Q140. Select alternate rows from SQL
Select alternate rows from SQL
Use the modulo operator to filter alternate rows
Add a WHERE clause with the modulo operator
Example: SELECT * FROM table WHERE id % 2 = 0
Example: SELECT * FROM table WHERE MOD(id, 2) = 0
Java 8 streams are a sequence of elements that support functional-style operations.
Streams allow for processing collections of data in a declarative way.
They can be used to perform operations like filter, map, reduce, and collect.
Streams are lazy, meaning they only perform operations when necessary.
Example: List<String> names = Arrays.asList("Alice", "Bob", "Charlie"); Stream<String> stream = names.stream();
Q142. 7. Marker interfaces, Singleton design pattern, why string is immutable
Explaining marker interfaces, Singleton design pattern, and immutability of strings
Marker interfaces are interfaces with no methods, used to mark a class as having a certain behavior or capability
Singleton design pattern ensures only one instance of a class is created and provides a global point of access to it
Strings are immutable in Java to ensure their values cannot be changed once created, which improves security and performance
Immutable objects are thread-safe and can be...read more
Q143. Tell me about how to call a web service from front end
To call a web service from front end, use AJAX or fetch API to send HTTP requests to the web service endpoint.
Identify the web service endpoint URL
Use AJAX or fetch API to send HTTP requests to the endpoint
Specify the HTTP method (GET, POST, PUT, DELETE) and request headers
Handle the response from the web service in the front end code
Q144. What is capital market and types, what is share and bond
Capital market is a financial market where long-term securities like shares and bonds are bought and sold.
Capital market is a part of the financial system where long-term securities are traded
It provides a platform for companies and governments to raise funds for their operations and projects
Shares represent ownership in a company and give the shareholder voting rights and a share in profits
Bonds are debt instruments issued by companies or governments to raise capital, and th...read more
Q145. You have three developers working on same powerapps application how do you merge their code while upgrading.
Q146. 5.Can you do debugging while performing testing
Yes, debugging is an integral part of testing.
Debugging helps identify and fix issues in the code.
Debugging can be done using tools like breakpoints, logs, and debuggers.
Debugging should be done in a separate environment to avoid affecting the testing environment.
Debugging should be done in a systematic manner to ensure all issues are identified and resolved.
Q147. What are Db2 utilities, meaning of various SQL Codes, cursor application.
Db2 utilities are tools used for database management, SQL Codes indicate status of SQL operations, and cursors are used for navigating through query results.
Db2 utilities are programs used for managing Db2 databases, such as LOAD, REORG, and RUNSTATS.
SQL Codes are numeric values that indicate the success or failure of SQL operations, with negative values indicating errors.
Cursors are used in database applications to navigate through query results row by row, allowing for proc...read more
Q148. How do you feel about policies and location constraints?
I am comfortable with policies but prefer flexibility in location constraints.
I believe policies are necessary for maintaining order and consistency in a work environment.
I am open to following company policies and procedures to ensure smooth operations.
I prefer flexibility in location constraints as it allows for a better work-life balance and increased productivity.
For example, remote work options can be beneficial for employees who may have personal commitments or prefer w...read more
Q149. What is the difference between procedures and functions in programming?
Procedures are used to perform an action, while functions return a value.
Procedures do not return a value, while functions do.
Functions can be used in SQL queries, while procedures cannot.
Functions can be called from within SQL statements, while procedures cannot.
Procedures can have OUT parameters to return multiple values, while functions can only return a single value.
Q150. Have you designed architecture solution for large proposals? If so give insights on that.
Yes, I have designed architecture solutions for large proposals.
I have experience designing architecture solutions for large-scale projects that require high availability, scalability, and security.
I have worked on proposals for enterprise clients where the architecture needed to support thousands of users and handle large amounts of data.
I have expertise in designing cloud-based solutions using AWS, Azure, or Google Cloud to meet the specific requirements of the proposal.
I h...read more
Q151. What were some of the libraries that you used in Selenium using python for Backend testing?
Q152. Write a program for differentiate odd and even nos
Program to differentiate odd and even numbers
Use modulus operator to check if number is divisible by 2
If remainder is 0, number is even else odd
Print the result accordingly
Q153. How do you determine if a string is a palidrome
A palindrome is a string that reads the same forwards and backwards.
Compare the first character with the last character, the second character with the second-to-last character, and so on.
If any pair of characters doesn't match, the string is not a palindrome.
Ignore spaces and punctuation marks when comparing characters.
Convert the string to lowercase or uppercase to make the comparison case-insensitive.
Q154. What do you know about Capital Market
Capital market refers to the financial market where long-term securities such as stocks and bonds are traded.
Capital market is a market for long-term securities such as stocks and bonds
It is a platform for companies to raise capital by issuing stocks and bonds
Investors can buy and sell securities in the capital market
Capital market is regulated by government bodies such as SEC in the US
Examples of capital markets include NYSE, NASDAQ, and London Stock Exchange
Q155. Explain about OSI model
The OSI model is a conceptual model that describes how data is transmitted over a network.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the adjacent layers.
Example: When you send an email, the Application layer sends it to the Presentation layer, which formats the data, and then sends it to the Session layer.
The Session layer ...read more
Q156. what is Authentication, how to achieve it
Authentication is the process of verifying the identity of a user or system.
Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.
Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).
Authentication can be achieved through protocols like OAuth, OpenID, SAML, and JWT.
Implementing secure authentication practices is ...read more
Q157. 2. What's the difference between Functional and Non-Functional requirements?
Functional requirements describe what the system should do, while non-functional requirements describe how the system should perform.
Functional requirements focus on specific behaviors or functions of the system.
Non-functional requirements focus on qualities such as performance, security, and usability.
Functional requirements are typically documented in use cases or user stories.
Non-functional requirements are often documented in a separate section of the requirements documen...read more
Q158. Concurrent modification exception.how to avoid it
To avoid concurrent modification exception, use synchronized blocks or data structures like ConcurrentHashMap.
Use synchronized blocks to ensure only one thread can modify the data at a time
Use data structures like ConcurrentHashMap which are designed to handle concurrent modifications
Consider using immutable objects to prevent modification conflicts
Q159. What documents needs to be post closing
Documents required post-closing include title deed, mortgage note, and closing disclosure.
Title deed
Mortgage note
Closing disclosure
Q160. Difference between functional and non functional testing
Functional testing checks if the software functions as expected, while non-functional testing checks other aspects like performance and usability.
Functional testing focuses on the specific functions of the software.
Non-functional testing focuses on aspects like performance, usability, security, and scalability.
Examples of functional testing include unit testing, integration testing, and system testing.
Examples of non-functional testing include load testing, stress testing, an...read more
Q161. Can you handle 3teams, how you overcome silos
Yes, I can handle 3 teams and overcome silos through effective communication and collaboration.
Establish regular meetings with all teams to ensure alignment and identify any potential issues
Encourage cross-functional collaboration and knowledge sharing
Implement a shared project management tool to track progress and ensure transparency
Celebrate team successes together to foster a sense of unity
Address any conflicts or misunderstandings promptly and openly
Q162. 2. Microservice architecture, benefits, and their disadvantages
Microservice architecture is a software design pattern where an application is divided into small, independent services.
Benefits of microservice architecture:
- Scalability: Each service can be scaled independently, allowing for better performance and resource utilization.
- Flexibility: Services can be developed, deployed, and updated independently, enabling faster development cycles.
- Fault isolation: If one service fails, it doesn't affect the entire application.
- Technology...read more
Q163. mysql to gcs ,how to move 10 tables at a time?
Use Apache Sqoop to move 10 tables from MySQL to Google Cloud Storage.
Use Apache Sqoop to import data from MySQL to HDFS
Use Google Cloud Storage connector for Hadoop to move data from HDFS to GCS
Create a script to automate the process for all 10 tables
Q164. Which single sign on technology/Mechanism is used in project
We are using OAuth 2.0 for single sign on in the project.
OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.
It allows users to log in once and access multiple applications without having to log in again.
OAuth 2.0 provides secure delegated access to resources without sharing user credentials.
Q165. What factors would you consider before deploying services to kubernetes
Factors to consider before deploying services to Kubernetes
Resource requirements of the services
Networking considerations
Security measures
Monitoring and logging capabilities
High availability and scalability needs
Q166. Investment banking What is investment banking and top companies
Investment banking involves helping companies and governments raise capital by underwriting and selling securities.
Investment banks provide financial advisory services to clients
They help clients raise capital by underwriting and selling securities
Top investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley
Q167. Code for sum of n natural numbers
Code for sum of n natural numbers
Use a loop to iterate from 1 to n and add each number to a sum variable
Return the sum variable
Q168. Can we change the order for dictionary
Yes, we can change the order of a dictionary in Python.
Use OrderedDict to maintain the order of insertion
Sort the dictionary based on keys or values
Convert the dictionary to a list of tuples and sort them
Use the sorted() function to sort the dictionary
Q169. What is investment banking
Investment banking is a type of financial service that helps companies and governments raise capital by underwriting and selling securities.
Investment banks act as intermediaries between issuers of securities and investors.
They provide services such as underwriting, mergers and acquisitions, and securities trading.
Examples of investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley.
Investment banking is a highly competitive and lucrative industry.
It plays a ...read more
Q170. How a reverse string in java
Reverse a string in Java
Convert the string to a character array
Use two pointers, one at the start and one at the end of the array
Swap the characters at the two pointers and move the pointers towards each other
Repeat until the pointers meet in the middle
Q171. What is the difference between Regression testing and Retesting?
Regression testing is testing the entire system after making changes, while retesting is testing a specific bug fix.
Regression testing ensures that changes made to the system do not affect existing functionality.
Retesting ensures that a specific bug or issue has been resolved.
Regression testing is done after every change, while retesting is done after a bug fix.
Regression testing is time-consuming, while retesting is relatively quick.
Example of regression testing: testing the...read more
Q172. What steps you perform to increase velociity
To increase velocity, I focus on improving team communication, removing impediments, and continuously refining our processes.
Encourage open communication and collaboration within the team
Identify and remove any obstacles or impediments that are slowing down progress
Regularly review and refine our processes to optimize efficiency
Ensure that the team is properly trained and equipped with the necessary tools and resources
Encourage a culture of continuous improvement and learning
Q173. What are the troubleshooting steps for resolving Wi-Fi connectivity issues?
Troubleshooting steps for resolving Wi-Fi connectivity issues
Check if Wi-Fi is enabled on the device
Restart the device and the Wi-Fi router
Forget and reconnect to the Wi-Fi network
Check for any software updates on the device
Move closer to the Wi-Fi router to improve signal strength
Q174. What is purpose for TILA RESPA
TILA RESPA is a federal law that aims to protect consumers by providing them with clear and accurate information about mortgage loans.
TILA RESPA stands for Truth in Lending Act and Real Estate Settlement Procedures Act.
The purpose of TILA RESPA is to promote transparency and prevent predatory lending practices in the mortgage industry.
It requires lenders to provide borrowers with clear and easy-to-understand information about loan terms, costs, and risks.
TILA RESPA also manda...read more
Q175. What are the reports that a QA has to prepare?
QA prepares various reports to track and analyze quality metrics.
Test execution report
Defect report
Test summary report
Test coverage report
Test trend report
Q176. Wap in java to reverse string, exceptional handling, waits in selenium,
Java code to reverse a string with exception handling and waits in Selenium
Use StringBuilder to reverse the string
Use try-catch block for exception handling
Use implicit or explicit waits in Selenium for synchronization
Example: String originalString = "hello"; StringBuilder reversedString = new StringBuilder(originalString).reverse();
Example: try { // code that may throw exception } catch (Exception e) { // handle exception }
Q177. What is the waterfall model in software development?
Waterfall model is a linear sequential software development process where progress flows in one direction like a waterfall.
Involves distinct phases such as requirements, design, implementation, testing, and maintenance.
Each phase must be completed before moving on to the next.
Changes are difficult to implement once a phase is completed.
Example: Traditional software development approach.
Example: Construction projects.
Q178. Linear and binary search algorithm
Linear search checks each element in a list sequentially, while binary search divides the list in half at each step.
Linear search has a time complexity of O(n), while binary search has a time complexity of O(log n).
Linear search is used for unsorted lists, while binary search is used for sorted lists.
Example: Linear search - searching for a name in a phone book. Binary search - searching for a word in a dictionary.
Views in SQL are virtual tables that are generated based on the result set of a SELECT query.
Views are not stored physically in the database, but are dynamically generated when queried.
They can be used to simplify complex queries by encapsulating logic and joining multiple tables.
Views can also be used to restrict access to certain columns or rows of a table.
Example: CREATE VIEW vw_employee AS SELECT emp_id, emp_name FROM employees;
Q180. Interconnect between microservices
Interconnect between microservices involves communication protocols, service discovery, load balancing, and fault tolerance.
Use communication protocols like HTTP, gRPC, or messaging queues for inter-service communication
Implement service discovery mechanisms to locate and connect to other microservices dynamically
Utilize load balancing techniques to distribute incoming requests evenly across multiple instances of a service
Implement fault tolerance strategies such as circuit b...read more
Q181. which Application Insight tool you have used?
I have used Application Insights for monitoring and analyzing the performance of .NET applications.
Used Application Insights to track application performance metrics
Analyzed telemetry data to identify performance bottlenecks
Set up alerts and notifications for critical issues
Integrated Application Insights with Azure DevOps for continuous monitoring
Q182. What is PIR and when it is used
PIR stands for Post Implementation Review. It is used to evaluate the success of a change initiative and identify areas for improvement.
PIR is conducted after a change has been implemented to assess its impact and effectiveness.
It involves gathering feedback from stakeholders and analyzing data to determine if the change achieved its objectives.
PIR helps identify any issues or challenges faced during the implementation and provides recommendations for future improvements.
Exam...read more
Q183. GD-one time use plastic should be banned r not
Yes, GD-one time use plastic should be banned.
One-time use plastic is harmful to the environment and wildlife.
Alternatives like reusable bags and containers are readily available.
Many countries and cities have already implemented bans on single-use plastics.
Reducing plastic waste is crucial for the health of our planet.
Q184. What are the steps followed to gather requirements?
Steps followed to gather requirements include identifying stakeholders, conducting interviews, analyzing existing documentation, and documenting the requirements.
Identify stakeholders involved in the project
Conduct interviews with stakeholders to understand their needs and expectations
Analyze existing documentation such as business processes, system requirements, and user manuals
Document the requirements in a clear and concise manner
Q185. Micro services design pattern and example
Microservices design pattern involves breaking down a large application into smaller, independent services.
Each microservice is responsible for a specific function or feature
Communication between microservices is typically done through APIs
Microservices can be deployed independently, allowing for easier scalability and maintenance
Examples include Netflix (uses microservices for different functionalities like recommendation, user management) and Amazon (uses microservices for ...read more
Q186. Find the most booking rooms from a Resort which is having multiple floors
Q187. Tell me something about Capital Market
Capital market is a financial market where long-term securities like stocks, bonds, and mutual funds are traded.
It is a market for raising long-term funds
It includes stock exchanges, bond markets, and mutual fund markets
It facilitates the transfer of funds from savers to borrowers
It is regulated by the Securities and Exchange Board of India (SEBI)
Examples include BSE, NSE, NYSE, NASDAQ, etc.
Q188. Architecture of previous assignments . Explain deployment pattern as well as interaction between components and Database
Utilized microservices architecture with containerization for deployment. Components interacted through REST APIs with database.
Implemented microservices architecture for modularity and scalability
Utilized containerization (e.g. Docker) for easy deployment and management
Components communicated through REST APIs for decoupling and flexibility
Database interactions handled through ORM (Object-Relational Mapping) for data access
Ensured data consistency and integrity through trans...read more
Q189. Clustered Index vs Non-clustered Index
Clustered index determines physical order of data while non-clustered index has separate structure.
Clustered index determines the physical order of data in a table while non-clustered index has a separate structure.
Clustered index is faster for retrieval of data while non-clustered index is faster for retrieval of specific data.
A table can have only one clustered index while multiple non-clustered indexes can be created.
Clustered index is created on the primary key by default...read more
Q190. What is a recursive query?
A recursive query is a query that refers to itself in order to retrieve data from a database.
A recursive query is used to retrieve hierarchical data such as organizational structures or family trees.
It typically involves a common table expression (CTE) in SQL.
The query continues to execute until a specific condition is met, such as reaching the root node in a tree structure.
Example: Finding all employees and their managers in a company hierarchy.
Q191. oops concepts with real time examples
Object-oriented programming concepts with real-life examples
Encapsulation: A car's engine is encapsulated and hidden from the user, who only interacts with the car's interface.
Inheritance: A cat is a subclass of the animal class, inheriting its properties and methods.
Polymorphism: A shape class can have different methods for calculating area depending on the shape, such as circle or rectangle.
Abstraction: A TV remote control abstracts the complex inner workings of the TV and ...read more
Q192. What are the built-in functions available in SQL?
Some built-in functions in SQL include AVG, COUNT, MAX, MIN, SUM, and CONCAT.
AVG: Calculates the average value of a numeric column
COUNT: Counts the number of rows in a result set
MAX: Returns the maximum value in a column
MIN: Returns the minimum value in a column
SUM: Calculates the sum of values in a column
CONCAT: Concatenates two or more strings together
Q193. What you know about capital markets and explain.
Capital markets are financial markets where long-term debt or equity-backed securities are bought and sold.
Capital markets are where companies and governments raise long-term funds through debt or equity securities.
Investors can buy and sell stocks, bonds, and other financial instruments in capital markets.
Capital markets play a crucial role in allocating financial resources efficiently in the economy.
Examples of capital markets include stock exchanges like NYSE and NASDAQ, a...read more
Q194. Can you use same static method in two different interface
No, static methods cannot be overridden in interfaces.
Static methods in interfaces are implicitly public and abstract, so they cannot be overridden.
If two interfaces have the same static method signature, it will not cause any conflict.
Implementing classes will have to provide their own implementation of the static method.
Q195. How do you perform upgrades of ESXi and vCenter.
Upgrades are performed by following a well-planned process that includes compatibility checks, backups, and testing.
Check compatibility of new version with existing hardware and software
Take backups of all critical data and configurations
Test the upgrade in a non-production environment before applying to production
Upgrade ESXi hosts first, followed by vCenter
Monitor the upgrade process and troubleshoot any issues that arise
Q196. What is vMotion, what is a Snapshot and others.
vMotion is a feature in VMware that allows live migration of virtual machines between hosts. Snapshot is a point-in-time copy of a VM.
vMotion enables workload mobility, load balancing, and zero-downtime maintenance.
Snapshot captures the state of a VM at a specific point in time and allows for easy restoration if needed.
Other related terms in VMware include vSphere, ESXi, and vCenter.
vMotion and Snapshot are commonly used in virtualization environments to improve flexibility a...read more
Q197. What do you mean by continuous integration?
Continuous integration is the practice of frequently integrating code changes into a shared repository to detect and fix integration errors early.
Automating the process of building, testing, and integrating code changes multiple times a day
Helps in identifying and fixing integration errors quickly
Ensures that the codebase is always in a deployable state
Promotes collaboration and communication among team members
Q198. What is SDLC?
SDLC stands for Software Development Life Cycle.
It is a process used to design, develop, test, and deploy software.
It consists of several phases such as planning, analysis, design, implementation, testing, and maintenance.
It helps to ensure that the software is developed efficiently, on time, and within budget.
Examples of SDLC models include Waterfall, Agile, and DevOps.
Q199. Explain commands related to file management
File management commands are used to interact with files and directories on a computer system.
ls - list files and directories in the current directory
cd - change directory
mkdir - create a new directory
rm - remove files or directories
cp - copy files or directories
mv - move files or directories
touch - create a new file
chmod - change file permissions
Q200. Explain commands related to process management
Commands related to process management include ps, top, kill, and nice.
ps - displays information about currently running processes
top - provides a dynamic real-time view of a running system
kill - terminates a process by sending a signal to its PID
nice - sets the priority of a process
Top HR Questions asked in Mphasis
Interview Process at Mphasis

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

