Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Tech Mahindra Team. If you also belong to the team, you can get access from here

Tech Mahindra Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Tech Mahindra Full Stack Software Developer Interview Questions, Process, and Tips for Experienced

Updated 7 Feb 2024

Tech Mahindra Full Stack Software Developer Interview Experiences for Experienced

1 interview found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(5 Questions)

  • Q1. What is closures in JS ?
  • Ans. 

    Closures in JavaScript are functions that have access to variables from their outer scope, even after the outer function has finished executing.

    • Closures are created when a function is defined inside another function.

    • The inner function has access to the outer function's variables, parameters, and even the outer function's return value.

    • Closures are useful for creating private variables and data encapsulation.

    • They can be ...

  • Answered by AI
  • Q2. Diff props and state ?
  • Ans. 

    Props and state are both used in React to manage and pass data, but they have different purposes and behaviors.

    • Props are read-only and passed from parent components to child components.

    • State is mutable and managed within a component.

    • Props are used to pass data from a parent component to a child component.

    • State is used to manage and update data within a component.

    • Props are passed as attributes to a component in JSX.

    • Stat...

  • Answered by AI
  • Q3. How to optimise the performance ?
  • Ans. 

    Performance optimization involves identifying and resolving bottlenecks to improve the efficiency of software.

    • Identify and analyze performance bottlenecks

    • Optimize algorithms and data structures

    • Improve database performance through indexing and query optimization

    • Use caching techniques to reduce database and network calls

    • Minimize network latency by optimizing network requests

    • Optimize front-end code by reducing DOM manipul...

  • Answered by AI
  • Q4. Diff between class based or function based component ?
  • Ans. 

    Class-based components are ES6 classes that extend React.Component, while function-based components are functions that return JSX.

    • Class-based components are more feature-rich and have access to lifecycle methods.

    • Function-based components are simpler and easier to read and test.

    • Class-based components can have state and use lifecycle methods like componentDidMount and componentDidUpdate.

    • Function-based components can use ...

  • Answered by AI
  • Q5. What is es6 features ?
  • Ans. 

    ES6 (ECMAScript 2015) introduced several new features to JavaScript, enhancing its functionality and making it more efficient.

    • Arrow functions: concise syntax for writing functions

    • Let and const: block-scoped variables

    • Template literals: easier string interpolation

    • Destructuring assignment: extracting values from arrays or objects

    • Spread syntax: expanding elements in arrays or objects

    • Classes: syntactical sugar for creating ...

  • Answered by AI

Skills evaluated in this interview

Interview questions from similar companies

I applied via Recruitment Consultant and was interviewed in May 2021. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. Abstract class vs interface, cte vs temp table, dependency injection , delete and truncate, action filters , primary , unique key , foreign key , oops concepts.

Interview Preparation Tips

Interview preparation tips for other job seekers - It is easy process.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Good morning sir have a you sir my name is hemant Ramchandra narkhede

Round 2 - Coding Test 

Java script simple frame

Round 3 - HR 

(2 Questions)

  • Q1. What are the different data types present in javascript?
  • Ans. 

    JavaScript has several data types including string, number, boolean, object, function, undefined, and null.

    • String: 'hello', '123'

    • Number: 123, 3.14

    • Boolean: true, false

    • Object: { key: 'value' }

    • Function: function() { }

    • Undefined: undefined

    • Null: null

  • Answered by AI
  • Q2. Difference between var and let keyword in javascript.
  • Ans. 

    var is function-scoped while let is block-scoped in JavaScript.

    • var keyword is function-scoped, meaning it is accessible throughout the function it is declared in.

    • let keyword is block-scoped, meaning it is only accessible within the block it is declared in.

    • Using var can lead to variable hoisting issues, while let provides more predictable behavior.

    • let allows for better variable scoping and reduces the risk of unintended

  • Answered by AI
Round 4 - One-on-one 

(2 Questions)

  • Q1. What are the advantages of pair programming?
  • Ans. 

    Pair programming promotes collaboration, knowledge sharing, and code quality.

    • Enhances code quality through immediate code review and feedback

    • Promotes knowledge sharing and learning from each other

    • Fosters collaboration and teamwork

    • Reduces the likelihood of bugs and errors

    • Increases productivity by leveraging two minds on the same problem

    • Helps in breaking down complex problems into smaller tasks

    • Improves communication skil

  • Answered by AI
  • Q2. How do you handle constructive feedback about your full-stack development projects?
Round 5 - Technical 

(2 Questions)

  • Q1. How do you identify bugs in your code?
  • Ans. 

    I use a combination of manual testing, unit testing, and debugging tools to identify bugs in my code.

    • Perform manual testing by running the code and checking for any unexpected behavior or errors.

    • Write unit tests to verify the functionality of individual components and catch any issues early on.

    • Utilize debugging tools like breakpoints, logging, and stack traces to track down the root cause of bugs.

    • Collaborate with team ...

  • Answered by AI
  • Q2. How long have you been coding primarily in Python?
  • Ans. 

    I have been coding primarily in Python for 5 years.

    • I started learning Python in college and have been using it extensively in my professional career.

    • I have worked on various projects using Python, including web development, data analysis, and automation.

    • I am proficient in Python libraries such as NumPy, Pandas, and Django.

  • Answered by AI
Round 6 - Case Study 

HR round full stack developer experience

Round 7 - Group Discussion 

Best atitude round questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Another source of career guidance is to consult a career counselor or coach. These are trained professionals who can help you with various aspects of your career development, such as exploring your options, setting your goals, making your plans, overcoming your challenges, and enhancing your skills.24 Aug

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
-

I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Check whether a given graph is cyclic
  • Ans. 

    To check if a graph is cyclic, use depth-first search to detect back edges.

    • Perform a depth-first search on the graph and keep track of visited nodes and parent nodes.

    • If a visited node is encountered with a parent different from the current node, then the graph contains a cycle.

    • Example: For a graph with edges (A, B), (B, C), (C, A), the graph is cyclic.

  • Answered by AI
  • Q2. Factory design pattern question

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Apr 2022. There were 5 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Coding Test 

Main command on JAVA script and python

Round 3 - Assignment 

What assignments and projects you had done before share that experience

Round 4 - Case Study 

Your theories on what topics you had done your best

Round 5 - One-on-one 

(2 Questions)

  • Q1. That some personal questions and their your preference answers that suitable for your job
  • Q2. Give us the reasons why we should not select for the job
  • Ans. 

    Lack of relevant experience and skills

    • Limited experience in full stack development

    • Lack of proficiency in required programming languages and frameworks

    • Inadequate knowledge of database management systems

    • Weak problem-solving and analytical skills

    • Poor communication and collaboration abilities

  • Answered by AI

Interview Preparation Tips

Topics to prepare for IBM Full Stack Software Developer interview:
  • Backend
  • Full Stack
Interview preparation tips for other job seekers - Be confident, honest and value your words

I applied via Naukri.com and was interviewed in May 2022. There were 2 interview rounds.

Round 1 - Coding Test 

Oops concept, basic javascript and react js coding question

Round 2 - One-on-one 

(1 Question)

  • Q1. React js and asp.net basic interview questions

Interview Preparation Tips

Interview preparation tips for other job seekers - React js, asp.net
Prepare basic, oops concept, coding practice
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jul 2023. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

Quantitive aptitude, reasoning

Round 3 - HR 

(3 Questions)

  • Q1. Tell me about yourself
  • Q2. What is your weakness and strength?
  • Q3. Why should I hire you
Round 4 - Technical 

(1 Question)

  • Q1. Programming related questions

I applied via Walk-in and was interviewed in Nov 2020. There were 5 interview rounds.

Interview Questionnaire 

25 Questions

  • Q1. Briefly explain the method you will use to execute an array linked list?
  • Ans. 

    An array linked list can be executed using a loop to traverse through the array and access the linked nodes.

    • Create an array to store the linked nodes

    • Assign the first node to the first element of the array

    • Use a loop to traverse through the array and access the linked nodes

    • To access the next node, use the index of the current node as the index of the next node in the array

    • Stop the loop when the last node is reached

  • Answered by AI
  • Q2. What are character constants in C++?
  • Ans. 

    Character constants are fixed values represented by a single character in C++.

    • They are enclosed in single quotes (' ')

    • Examples include 'a', 'B', '5', '$'

    • They are also known as character literals

  • Answered by AI
  • Q3. Define the terms OSI, TCP & IP.
  • Ans. 

    OSI, TCP & IP are networking protocols used for communication between devices on a network.

    • OSI (Open Systems Interconnection) is a conceptual model that defines how data is transmitted over a network.

    • TCP (Transmission Control Protocol) is a protocol that ensures reliable transmission of data between devices.

    • IP (Internet Protocol) is a protocol that handles the addressing and routing of data packets between devices on a...

  • Answered by AI
  • Q4. What are streams in C++? What are predefined streams in C++?
  • Ans. 

    Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.

    • Streams in C++ are objects that allow reading from or writing to external sources or destinations.

    • cin is the standard input stream used for reading input from the user.

    • cout is the standard output stream used for printing output to the console.

    • cerr is the standard error stream used for printing error mess...

  • Answered by AI
  • Q5. Define RDBMS.
  • Ans. 

    RDBMS stands for Relational Database Management System.

    • It is a type of database management system that stores data in tables with relationships between them.

    • It uses SQL (Structured Query Language) to manipulate and retrieve data.

    • Examples include MySQL, Oracle, and Microsoft SQL Server.

  • Answered by AI
  • Q6. What do you mean by normalisation?
  • Ans. 

    Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.

    • It involves breaking down a table into smaller tables and defining relationships between them.

    • Normalization helps to eliminate data inconsistencies and anomalies.

    • There are different levels of normalization, with each level having specific rules to follow.

    • Examples of normalization include converting repeating gr...

  • Answered by AI
  • Q7. Where do we generally create INDEX?
  • Ans. 

    INDEX is generally created on columns that are frequently used in WHERE, JOIN, and ORDER BY clauses.

    • INDEX improves the performance of SELECT queries.

    • INDEX should be created on columns with high selectivity.

    • INDEX should not be created on columns with low selectivity.

    • Examples of columns to create INDEX on are primary keys, foreign keys, and columns used in search queries.

  • Answered by AI
  • Q8. What is object oriented model?
  • Ans. 

    Object oriented model is a programming paradigm that uses objects to represent real-world entities.

    • Objects have properties and methods that define their behavior

    • Encapsulation, inheritance, and polymorphism are key concepts in OOP

    • Examples of OOP languages include Java, C++, and Python

  • Answered by AI
  • Q9. What is the "top-n analysis" in DBMS?
  • Ans. 

    Top-n analysis is a technique used in DBMS to retrieve the top n records based on a specific criteria.

    • Used to retrieve top n records

    • Based on specific criteria

    • Commonly used in data analysis and reporting

  • Answered by AI
  • Q10. Why is DML provided?
  • Ans. 

    DML is provided to manipulate data in a database.

    • DML stands for Data Manipulation Language.

    • It is used to insert, update, delete, and retrieve data from a database.

    • DML commands include INSERT, UPDATE, DELETE, and SELECT.

    • DML is essential for managing and maintaining data in a database.

  • Answered by AI
  • Q11. What are reference variables and how is it defined in C++?
  • Ans. 

    Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.

    • Reference variables are declared using an ampersand (&) symbol.

    • They must be initialized when declared and cannot be reassigned to refer to a different variable.

    • Changes made to a reference variable affect the original variable it refers to.

    • They are commonly used to pass variables by reference to funct...

  • Answered by AI
  • Q12. Differentiate RDBMS and DBMS.
  • Ans. 

    RDBMS is a type of DBMS that stores data in a structured manner using tables with relationships.

    • RDBMS stands for Relational Database Management System

    • Data is stored in tables with predefined relationships

    • Data is accessed using SQL (Structured Query Language)

    • Examples include MySQL, Oracle, and SQL Server

    • DBMS is a broader term that includes all types of database management systems

    • Examples of DBMS include MongoDB, Cassand

  • Answered by AI
  • Q13. What are the various forms of normalisation?
  • Ans. 

    Normalization is a process of organizing data in a database to eliminate redundancy and improve data integrity.

    • First Normal Form (1NF) - Eliminate duplicate data by separating them into multiple tables.

    • Second Normal Form (2NF) - Remove partial dependencies by creating separate tables for sets of attributes.

    • Third Normal Form (3NF) - Eliminate transitive dependencies by creating separate tables for related attributes.

    • Boy...

  • Answered by AI
  • Q14. Can you tell us something about scope rules in C++?
  • Ans. 

    Scope rules in C++ determine the visibility and accessibility of variables and functions within a program.

    • Variables declared within a block have local scope and are only accessible within that block.

    • Global variables have file scope and can be accessed from any function within the file.

    • Function parameters have function scope and are only accessible within that function.

    • Nested blocks can have their own scope, and variabl...

  • Answered by AI
  • Q15. Do you think BCNF is better than 2NF & 3NF? Why?
  • Ans. 

    BCNF is not necessarily better than 2NF & 3NF, it depends on the specific requirements of the database.

    • BCNF is the highest normal form and ensures that there are no non-trivial functional dependencies between any subset of candidate keys.

    • 2NF and 3NF are also important and should be used when appropriate.

    • For example, if a database has a composite primary key and non-key attributes that depend on only one part of the key...

  • Answered by AI
  • Q16. What is Operating System?
  • Ans. 

    An operating system is a software that manages computer hardware and software resources.

    • It acts as an interface between the user and the computer hardware.

    • It provides services to applications and manages system resources.

    • Examples include Windows, macOS, Linux, Android, and iOS.

  • Answered by AI
  • Q17. Differentiate exclusive lock and shared lock.
  • Ans. 

    Exclusive lock is used when a resource is being modified and prevents other processes from accessing it. Shared lock allows multiple processes to read a resource simultaneously.

    • Exclusive lock is used for write operations, while shared lock is used for read operations.

    • Exclusive lock blocks other processes from acquiring both exclusive and shared locks on the same resource.

    • Shared lock allows multiple processes to acquire...

  • Answered by AI
  • Q18. What is difference between rand() and srand()?
  • Ans. 

    rand() generates a random number, srand() seeds the random number generator.

    • rand() generates a pseudo-random number between 0 and RAND_MAX

    • srand() sets the seed for the random number generator used by rand()

    • srand() should be called before rand() to ensure different sequences of random numbers

    • Example: srand(time(NULL)) sets the seed to the current time, ensuring a different sequence each time the program is run

  • Answered by AI
  • Q19. Define subquery.
  • Ans. 

    A subquery is a query within another query used to retrieve data that will be used in the main query.

    • Subqueries are enclosed in parentheses and placed within the WHERE clause of the main query.

    • They can be used to filter results based on a condition that involves data from another table.

    • Subqueries can also be used in the SELECT, FROM, and HAVING clauses.

    • Examples include finding the average salary of employees in a depar...

  • Answered by AI
  • Q20. Explain these terms - Linked List, Stack, Queue.
  • Ans. 

    Linked List is a linear data structure. Stack and Queue are abstract data types.

    • Linked List: A collection of nodes where each node points to the next node.

    • Stack: A data structure where elements are added and removed from the top only.

    • Queue: A data structure where elements are added at the rear and removed from the front only.

    • Example: Browser history can be implemented using a Linked List.

    • Example: Undo/Redo functionalit...

  • Answered by AI
  • Q21. Define triggers. Give its applications.
  • Ans. 

    Triggers are events that initiate an action or set of actions. They are commonly used in databases and automation systems.

    • Triggers are used in databases to automatically execute a set of actions when a certain event occurs, such as inserting or updating data.

    • They can also be used in automation systems to initiate a process or workflow when a specific event occurs, such as receiving an email or a file upload.

    • Triggers ca...

  • Answered by AI
  • Q22. What is the difference between a "semaphore" and a "monitor"?
  • Ans. 

    Semaphore and monitor are synchronization tools used in concurrent programming.

    • Semaphore is a signaling mechanism that allows multiple threads to access a shared resource simultaneously.

    • Monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block) for a certain condition to become true.

    • Semaphore is a lower-level primitive, while monitor is a higher-level abstra...

  • Answered by AI
  • Q23. Discuss transparent DBMS.
  • Ans. 

    Transparent DBMS allows users to see and control the underlying database operations.

    • Transparent DBMS provides visibility into the database operations and allows users to monitor and control them.

    • It enables users to see how data is being stored, accessed, and manipulated in real-time.

    • Examples include Oracle Transparent Data Encryption and Microsoft SQL Server Transparent Data Encryption.

    • Transparent DBMS can improve secu...

  • Answered by AI
  • Q24. What is RDBMS KERNEL?
  • Ans. 

    RDBMS KERNEL is not a commonly used term in the industry.

    • There is no widely accepted definition of RDBMS KERNEL.

    • It may refer to the core components of a relational database management system.

    • It could also be a term used by a specific company or product.

    • Without more context, it is difficult to provide a specific answer.

  • Answered by AI
  • Q25. What is the difference between primary key, foreign key, candidate key & super key?
  • Ans. 

    Primary key uniquely identifies a record, foreign key links tables, candidate key can be primary key, super key is a set of attributes.

    • Primary key: Unique identifier for a record in a table

    • Foreign key: Links tables together by referencing the primary key of another table

    • Candidate key: A set of attributes that can be used as a primary key

    • Super key: A set of attributes that can uniquely identify a record

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Re-examine and Apply your Past Experience to the IT Industry.
Get Industry Certifications.
Your Degree in Another Field May Be a Huge Asset.
Be Open to Starting at the Bottom.
Don't Forget the Power of Networking.
Teach Yourself Relevant Tech Skills.
Look for Crossover Positions.
Network with the Right People.
Find the Right Internship.
Create an Effective Resume.

Skills evaluated in this interview

I applied via Naukri.com

Round 1 - Technical 

(2 Questions)

  • Q1. I applied online for the post of software developer, interview was conducted by First IPO on behalf of Mindtree.
  • Q2. Basics of OOPs, program o find out prime number, basic coding problem asks for output, closure, arrays in JavaScript

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare basic of oops like static and instance member, polymorphism, inheritance.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is dependency injection
  • Ans. 

    Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.

    • Dependency injection helps in achieving loose coupling between classes.

    • It allows for easier testing and swapping of dependencies.

    • There are three types of dependency injection: constructor injection, setter injection, and interface injection.

  • Answered by AI
  • Q2. What is solid principles
  • Ans. 

    SOLID principles are a set of five design principles that help developers create more maintainable and scalable software.

    • S - Single Responsibility Principle: A class should have only one reason to change.

    • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

    • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses with...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Since it's a full stack they asked angular , .net , sql , c# questions
What is pipes, Life cycle hooks , dependency injection, routers

Skills evaluated in this interview

Tech Mahindra Interview FAQs

How many rounds are there in Tech Mahindra Full Stack Software Developer interview for experienced candidates?
Tech Mahindra interview process for experienced candidates usually has 1 rounds. The most common rounds in the Tech Mahindra interview process for experienced candidates are Technical.
How to prepare for Tech Mahindra Full Stack Software Developer interview for experienced candidates?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Tech Mahindra. The most common topics and skills that interviewers at Tech Mahindra expect are React.Js, Automation Testing, Azure, CSS and HTML.
What are the top questions asked in Tech Mahindra Full Stack Software Developer interview for experienced candidates?

Some of the top questions asked at the Tech Mahindra Full Stack Software Developer interview for experienced candidates -

  1. Diff between class based or function based componen...read more
  2. How to optimise the performanc...read more
  3. What is closures in J...read more

Tell us how to improve this page.

Tech Mahindra Full Stack Software Developer Interview Process for Experienced

based on 1 interview

Interview experience

4
  
Good
View more
Tech Mahindra Full Stack Software Developer Salary
based on 32 salaries
₹3.9 L/yr - ₹12.6 L/yr
5% less than the average Full Stack Software Developer Salary in India
View more details
Software Engineer
26.3k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Software Engineer
21.4k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Technical Lead
11.7k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Associate Software Engineer
5.5k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Team Lead
5k salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Tech Mahindra with

Infosys

3.6
Compare

Cognizant

3.7
Compare

Accenture

3.8
Compare

Wipro

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview