i
Mphasis
Filter interviews by
I was interviewed before Feb 2024.
I have over 5 years of experience in technical support roles, troubleshooting hardware and software issues for various clients.
5+ years of experience in technical support roles
Proficient in troubleshooting hardware and software issues
Experience working with a variety of clients
Passion for problem-solving and helping others drove me to pursue a career in technical support.
Enjoy troubleshooting and finding solutions to complex issues
Desire to assist and educate customers on technical matters
Fascination with technology and desire to stay current with advancements
Satisfaction from successfully resolving technical challenges
Opportunity to work in a dynamic and fast-paced environment
Active Directory is a directory service used by organizations to manage users, computers, and resources in a network.
Centralized management of users, computers, and resources
Authentication and authorization of users
Group policy management for security and configuration settings
Single sign-on for users to access multiple resources
Integration with other services like DNS and DHCP
Example: User accounts, computer accounts,
Troubleshooting steps for resolving Wi-Fi connectivity issues
Check if Wi-Fi is enabled on the device
Restart the device and the Wi-Fi router
Forget and reconnect to the Wi-Fi network
Check for any software updates on the device
Move closer to the Wi-Fi router to improve signal strength
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
Some built-in functions in SQL include AVG, COUNT, MAX, MIN, SUM, and CONCAT.
AVG: Calculates the average value of a numeric column
COUNT: Counts the number of rows in a result set
MAX: Returns the maximum value in a column
MIN: Returns the minimum value in a column
SUM: Calculates the sum of values in a column
CONCAT: Concatenates two or more strings together
Types of cursors in database management systems include implicit, explicit, and parameterized cursors.
Implicit cursors are automatically created by the database when a SQL statement is executed.
Explicit cursors are defined by the programmer and give more control over the result set.
Parameterized cursors allow for dynamic SQL statements with parameters.
Examples: SELECT statement using implicit cursor, DECLARE, OPEN, FET...
Procedures are used to perform an action, while functions return a value.
Procedures do not return a value, while functions do.
Functions can be used in SQL queries, while procedures cannot.
Functions can be called from within SQL statements, while procedures cannot.
Procedures can have OUT parameters to return multiple values, while functions can only return a single value.
Use a subquery to find the third highest salary in a table.
Use the RANK() function to assign a rank to each salary in descending order.
Filter the results to only include rows with a rank of 3.
Consider handling ties in salaries appropriately.
A package is a collection of related procedures, functions, variables, and other PL/SQL constructs.
Packages help organize and encapsulate code for easier maintenance and reuse.
They can contain both public and private elements.
Packages can be used to group related functionality together, improving code modularity.
Example: CREATE PACKAGE my_package AS ... END my_package;
Resolved a critical bug causing data loss and implemented a new feature for better user experience.
Identified root cause of data loss bug by analyzing database queries and logs
Collaborated with cross-functional teams to prioritize and implement a fix
Designed and implemented a new feature based on user feedback to enhance usability
Different types of indexes include B-tree, Bitmap, Function-based, and Reverse key indexes.
B-tree indexes are the most common type and are suitable for most indexing needs.
Bitmap indexes are used for columns with low cardinality, such as gender or status columns.
Function-based indexes are created based on expressions or functions applied to columns.
Reverse key indexes store keys in reverse order to reduce contention in
Analytical functions in SQL are used to perform calculations across a set of rows related to the current row.
Analytical functions operate on a group of rows and return a single result for each row.
They can be used to calculate running totals, moving averages, rank, percentiles, etc.
Examples include ROW_NUMBER(), RANK(), DENSE_RANK(), SUM() OVER(), AVG() OVER().
Aggregate functions in SQL are functions that operate on a set of values and return a single value as output.
Aggregate functions include functions like SUM, AVG, COUNT, MIN, and MAX.
They are used with the GROUP BY clause to perform calculations on groups of rows.
Examples: SELECT SUM(salary) FROM employees; SELECT AVG(age) FROM students GROUP BY class;
I identified and optimized slow-performing SQL queries by analyzing execution plans and indexing strategies.
Identified slow-performing SQL queries using tools like Oracle SQL Developer or TOAD.
Analyzed execution plans to understand query performance bottlenecks.
Optimized queries by rewriting SQL code, adding indexes, or restructuring data.
Used tools like Explain Plan or SQL Tuning Advisor to improve query performance.
R...
Data modeling is the process of creating a visual representation of data structures and relationships within a database.
Data modeling helps in organizing and understanding complex data systems.
It involves identifying entities, attributes, and relationships between them.
Examples include ER diagrams, UML diagrams, and relational data models.
I conducted thorough analysis by reviewing code, logs, and discussing with team members.
Reviewed code to identify potential issues
Analyzed logs for error messages and patterns
Discussed with team members to gather insights and perspectives
Used debugging tools to trace the root cause
A trigger in database management is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
There are two main types of triggers: row-level triggers and statement-level triggers.
Row-level triggers are fired for each row affected by a triggering statement, while ...
Agile methodology is a project management approach that emphasizes flexibility, collaboration, and incremental progress.
Agile focuses on delivering small, incremental releases and adapting to change quickly.
It promotes collaboration between cross-functional teams and encourages frequent communication.
Key principles include customer satisfaction, responding to change, and delivering working software.
Common agile framewo...
Waterfall model is a linear sequential software development process where progress flows in one direction like a waterfall.
Involves distinct phases such as requirements, design, implementation, testing, and maintenance.
Each phase must be completed before moving on to the next.
Changes are difficult to implement once a phase is completed.
Example: Traditional software development approach.
Example: Construction projects.
What people are saying about Mphasis
I was interviewed in Dec 2024.
Optimisation in PySpark involves improving performance and efficiency of Spark jobs.
Use partitioning to distribute data evenly across nodes
Avoid shuffling data between nodes as much as possible
Use broadcast variables for small lookup tables
Cache intermediate results to avoid recomputation
Optimize transformations and actions for better performance
Null handling in Spark involves handling missing or null values in data processing.
Use functions like coalesce, na.fill, na.drop to handle null values
Consider using when and otherwise functions for conditional null handling
Be cautious of potential null pointer exceptions when working with null values
Airflow operators are used to define the tasks to be executed in a workflow.
Operators are classes that define the logic to execute a task in Airflow.
There are various types of operators such as BashOperator, PythonOperator, and more.
Operators can be customized to suit specific task requirements.
Operators can be chained together to create complex workflows.
Example: BashOperator executes a bash command, PythonOperator ru
SQL coding for calculating average rolling, lead, and lag functions.
Use window functions like ROWS BETWEEN and ORDER BY for calculating rolling averages.
Use LEAD and LAG functions to access data from previous or next rows.
Example: SELECT col1, AVG(col2) OVER (ORDER BY col1 ROWS BETWEEN 3 PRECEDING AND CURRENT ROW) AS rolling_avg FROM table_name;
Use Apache Sqoop to move 10 tables from MySQL to Google Cloud Storage.
Use Apache Sqoop to import data from MySQL to HDFS
Use Google Cloud Storage connector for Hadoop to move data from HDFS to GCS
Create a script to automate the process for all 10 tables
Mphasis interview questions for popular designations
I was interviewed in Jan 2025.
Get interview-ready with Top Mphasis Interview Questions
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
10 min, simple question on programming skills
I have used the asynchronous messaging pattern for Microservice communication.
Implemented messaging queues like RabbitMQ or Kafka for decoupled communication
Used message brokers to enable communication between Microservices
Leveraged event-driven architecture for real-time updates and scalability
I have used Application Insights for monitoring and analyzing the performance of .NET applications.
Used Application Insights to track application performance metrics
Analyzed telemetry data to identify performance bottlenecks
Set up alerts and notifications for critical issues
Integrated Application Insights with Azure DevOps for continuous monitoring
We use in-memory caching technique in our project to improve performance and reduce database load.
In-memory caching is used to store frequently accessed data in memory for quick retrieval
Helps reduce database load and improve application performance
Examples: using MemoryCache in .NET, Redis caching, caching frequently accessed data like user profiles or product information
Yes, API Gateways are used in Microservices to manage and secure communication between services.
API Gateways act as a single entry point for clients to access multiple microservices
They handle authentication, authorization, rate limiting, logging, and monitoring
Examples of API Gateways include Kong, Apigee, and AWS API Gateway
We are using OAuth 2.0 for single sign on in the project.
OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.
It allows users to log in once and access multiple applications without having to log in again.
OAuth 2.0 provides secure delegated access to resources without sharing user credentials.
JWT token is a JSON Web Token used for secure transmission of information between parties.
JWT token is a compact and self-contained way to transmit information between parties.
It is digitally signed to verify its authenticity and integrity.
JWT tokens consist of three parts: header, payload, and signature.
They are commonly used for authentication and information exchange in web applications.
Example: JWT tokens are often
Exception handling and filters in .NET Core Web API
Use try-catch blocks to handle exceptions in the code
Implement global exception handling middleware to catch unhandled exceptions
Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection
Create custom exception filters by implementing IExceptionFilter interface
I applied via Campus Placement and was interviewed in Oct 2024. There were 4 interview rounds.
Online test -math & quants,verbal,puzzle,computer programming,logical
One program I know is a simple calculator program written in Python.
The program takes user input for two numbers and an operator (+, -, *, /).
It then performs the operation and displays the result.
Example: input 5, +, 3 -> output 8
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
A constructor is a special type of method in a class that is automatically called when an object of that class is created.
Constructors have the same name as the class they belong to
They are used to initialize the object's state or perform any necessary setup
Constructors can have parameters to customize the initialization process
Example: public class Car { public Car(String color) { this.color = color; } }
Yes, a static method can be overridden in Java using the concept of method hiding.
In Java, static methods cannot be overridden in the traditional sense like instance methods.
When a subclass defines a static method with the same signature as a static method in the superclass, it is called method hiding.
Method hiding does not follow polymorphism and is resolved at compile time based on the reference type.
Example: class...
Yes, a static local variable can be created inside a static method.
Yes, a static local variable can be declared inside a static method in programming languages like C++.
Static local variables retain their values between function calls.
Example: static void myStaticMethod() { static int count = 0; count++; }
String memory allocation is dynamic and depends on the length of the string.
String memory allocation is dynamic and can change based on the length of the string.
In Java, a String object is stored in the heap memory.
Each character in a String typically takes up 2 bytes of memory.
String objects in Java are immutable, meaning once a String object is created, it cannot be changed.
Yes, you can create a static method inside an abstract class or interface.
Static methods can be defined in interfaces since Java 8.
Static methods in interfaces are used for providing utility methods that are not tied to any specific instance of the interface.
Static methods in abstract classes can be used for common functionality that does not require an instance of the class.
The parent class of Java is the Object class.
All classes in Java are directly or indirectly derived from the Object class.
The Object class is the root class in Java's class hierarchy.
It provides methods that are common to all objects in Java, such as toString(), equals(), and hashCode().
Window Handles in Selenium are unique identifiers used to handle multiple browser windows in a Selenium test script.
Window Handles are unique alphanumeric strings assigned to each browser window opened by Selenium.
They are used to switch between different browser windows during a test script execution.
Window Handles can be obtained using getWindowHandles() method in Selenium.
Example: Set
I was interviewed in Jan 2025.
Some of the top questions asked at the Mphasis interview -
The duration of Mphasis interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 666 interviews
Interview experience
based on 8.3k reviews
Rating in categories
Bangalore / Bengaluru
1-4 Yrs
₹ 1-5 LPA
Software Engineer
6.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
5.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Software Engineer
4.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Module Lead
2.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Transaction Processing Officer
2.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Cognizant
Wipro
Accenture
TCS