Add office photos
Engaged Employer

Tech Mahindra

3.6
based on 33k Reviews
Filter interviews by

1500+ Interview Questions and Answers

Updated 16 Dec 2024
Popular Designations

Q1. Tell me something about yourself. Define encapsulation. What is inheritance. What is constructor. What is method overloading. Can we overload a constructor. What is overriding. Difference between overloading an...

read more
Ans.

The interview questions cover topics like encapsulation, inheritance, constructors, method overloading, overriding, exception handling, and hobbies.

  • Encapsulation is the process of hiding the internal details of an object and providing access through methods.

  • Inheritance is a mechanism in which one class inherits the properties and behaviors of another class.

  • A constructor is a special method used to initialize objects.

  • Method overloading is the ability to define multiple methods...read more

View 67 more answers
Q2. Find Factorial of a Number.

You are given an integer ‘N’. You have to print the value of Factorial of ‘N’. The Factorial of a number ‘N’ is defined as the product of all numbers from 1 to ‘N’.

For Example:
Consi...read more
View 6 more answers
Q3. Maximum Sum Subarray

Given an array of numbers, find the maximum sum of any contiguous subarray of the array.

For example, given the array [34, -50, 42, 14, -5, 86], the maximum sum would be 137, since we would ...read more

View 7 more answers

Q4. If the customer is not satisfied with your answer so what will you do to satisfied him with your answer?

Ans.

I would apologize for not providing a satisfactory answer and ask the customer to explain their concern in detail.

  • Listen actively to the customer's concern

  • Empathize with the customer's situation

  • Offer alternative solutions or escalate the issue to a supervisor if necessary

  • Ensure the customer feels heard and valued

View 18 more answers
Discover null interview dos and don'ts from real experiences
Q5. Reverse a string

You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.

For example:

 If the given string is: STR = "abcde". You hav...read more
View 2 more answers
Q6. Reverse String

You are given a string ‘S’. You are also given ‘M’ integers in an array ‘A’. You perform ‘M’ operations on this string. The operations are given in an array ‘A’ of size ‘M’.

You perform the operat...read more

View 2 more answers
Are these interview questions helpful?

Q7. What do you understand by customer care service?

Ans.

Customer care service is the provision of assistance and support to customers before, during, and after a purchase.

  • Customer care service involves addressing customer queries, complaints, and concerns promptly and efficiently.

  • It also involves providing customers with relevant information about products and services.

  • Customer care service aims to build and maintain positive relationships with customers, leading to customer loyalty and repeat business.

  • Examples of customer care se...read more

View 86 more answers

Q8. Quaries regarding the issues of customer suppose customer had ordered 2 or 3 items but in parcel there is only one item delivered so I was there to resolve that problem of customer and give them 100 percent cha...

read more
Ans.

As a customer service executive, I would address the issue of missing items in the parcel and ensure customer satisfaction.

  • Listen to the customer's complaint and apologize for the inconvenience caused.

  • Ask for the order number and details of the missing item.

  • Check the inventory and shipping records to identify the issue.

  • Offer a solution such as sending the missing item or refunding the amount.

  • Ensure that the customer is satisfied with the resolution and thank them for their pa...read more

View 6 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. Which programming language you are comfortable with?

Ans.

I am comfortable with multiple programming languages including Java, Python, and JavaScript.

  • Proficient in Java for backend development

  • Experienced in Python for data analysis and machine learning

  • Skilled in JavaScript for frontend development

  • Familiar with SQL for database management

  • Comfortable with C++ for competitive programming

View 246 more answers

Q10. What is BPO and why it is important for the company?

Ans.

BPO stands for Business Process Outsourcing. It is important for companies to outsource non-core business functions to focus on core competencies.

  • BPO involves contracting non-core business functions to a third-party service provider.

  • It helps companies to reduce costs, increase efficiency, and focus on core competencies.

  • Examples of BPO services include customer support, accounting, human resources, and IT services.

  • BPO can be onshore, nearshore, or offshore depending on the loc...read more

View 3 more answers

Q11. Why customer care service is important for a company?

Ans.

Customer care service is crucial for a company's success as it helps in retaining customers and building brand loyalty.

  • Customer care service ensures customer satisfaction and helps in resolving their issues and concerns.

  • It helps in building a positive brand image and reputation.

  • Good customer service leads to repeat business and referrals.

  • It helps in identifying areas of improvement and enhancing the overall customer experience.

  • Examples of companies with excellent customer ser...read more

View 24 more answers

Q12. How to apply SOLID principle and what is dependency injection and why to use it and scenarios on where to use

Ans.

SOLID principles ensure maintainable and scalable code. Dependency Injection helps in achieving loose coupling and testability.

  • SOLID principles are Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion

  • Dependency Injection is a design pattern that allows objects to be loosely coupled and easily testable

  • Use Dependency Injection to reduce tight coupling between classes and make them more modular

  • Use SOLID principles to ensure mai...read more

View 3 more answers

Q13. How do you test a web application? What is CSRF and SSRF? What is LDAP injection? How does namp work while port scanning? (Result - open/filtered/closed) How does ssl work? Suppose a proxy server(Burpsuite) is ...

read more
Ans.

A Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.

  • Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.

  • CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.

  • SSRF (Server-Side Request Forgery) is an attack that allows an attacker to make ...read more

View 1 answer

Q14. Understanding customer problems,whT i know about BPO nd how they work,how i will handle a difficult nd angry customer,i can satisfied my client.

Ans.

I have a good understanding of customer problems and BPO operations. I can handle difficult and angry customers by empathizing, actively listening, and finding solutions to their issues.

  • I have a strong understanding of customer problems and their needs.

  • I am familiar with BPO operations and how they work.

  • To handle difficult and angry customers, I empathize with their frustrations and actively listen to their concerns.

  • I remain calm and composed, ensuring that I do not escalate ...read more

View 19 more answers
Q15. Java Question

What are the features of Java 8?

View 4 more answers
Q16. Print characters and their frequencies in order of occurrence

You are given a string 'S' of length 'N', you need to find the frequency of each of the characters from ‘a’ to ‘z’ in the given string.

Example :

Giv...read more
View 2 more answers
Q17. Maximum difference

You are given an array 'ARR' of the 'N' element. Your task is to find the maximum difference between any of the two elements from 'ARR'.

If the maximum difference is even print “EVEN” without ...read more

View 2 more answers

Q18. Suddenly how to take design when there is no one senior are present in his/her office that time, what you to do?

Ans.

I would refer to the company's design guidelines and consult with other team members before making a decision.

  • Check the company's design guidelines for guidance

  • Consult with other team members for their input

  • Consider the project's goals and requirements

  • Make a decision based on the available information

  • Document the decision and reasoning for future reference

View 15 more answers

Q19. What do you understand by customer service? How would you handel an irritate customer? Where do you see in 5 years? What was the reason to leage your previous job? Are you flexible with Shift timings and Rotati...

read more
Ans.

Customer service is the act of providing assistance and support to customers before, during, and after a purchase.

  • Active listening and empathy are key skills in handling an irritated customer

  • Apologize for the inconvenience caused and offer a solution to their problem

  • Stay calm and professional, even if the customer is being rude or aggressive

  • In 5 years, I see myself in a leadership role within the company

  • I left my previous job to pursue new opportunities and challenges

  • Yes, I a...read more

View 1 answer
Q20. Delete Nodes Which Have A Greater Value On Right Side

You are given a linked list of integers where each node has two fields: data field which contains a value, 'next' field which points to its adjacent node to ...read more

View 3 more answers
Q21. Distinct Strings With Odd and Even Swapping Allowed

You are given an array of strings. Your task is to find the number of unique strings.

A string is considered unique if it cannot be formed from any other strin...read more

View 2 more answers

Q22. Do you have medical facilities in office?

Ans.

NO

  • Our office does not have medical facilities.

  • We do not provide medical services to our customers or employees.

  • If you require medical assistance, we recommend seeking help from a nearby medical facility.

View 68 more answers

Q23. What is a difference between router and modem?

Ans.

A router connects multiple devices to a network and directs traffic, while a modem connects a network to the internet.

  • A router is used to create a local area network (LAN) and connect multiple devices to it.

  • A modem is used to connect a network to the internet.

  • A router directs traffic between devices on the network and manages the flow of data.

  • A modem converts digital signals from the network into analog signals that can be transmitted over a phone or cable line.

  • Examples of ro...read more

View 30 more answers

Q24. 1.what is kyc 2. Why kyc is important 3.what is money laundering 4.what are the stages of money laundering 5. What do you mean by CDD and EDD 6. Finance related questions to check the subject knowledge 7. What ...

read more
Ans.

Questions related to KYC, money laundering, CDD, EDD, and finance were asked for the Associate Analyst position.

  • KYC stands for Know Your Customer and is the process of verifying the identity of a customer.

  • KYC is important to prevent fraud, money laundering, and terrorist financing.

  • Money laundering is the process of making illegally obtained money appear legitimate.

  • The stages of money laundering include placement, layering, and integration.

  • CDD stands for Customer Due Diligence...read more

View 4 more answers

Q25. What are the Drawing softwares you're aware of And How much relevant experience you have in for each software

Ans.

I am proficient in AutoCAD, SolidWorks, and CATIA with over 3 years of experience in each software.

  • Proficient in AutoCAD, SolidWorks, and CATIA

  • Over 3 years of experience in each software

  • Able to create 2D and 3D models, assemblies, and drawings

  • Familiar with GD&T and ANSI standards

  • Experience in designing mechanical components and systems

  • Ability to work with large assemblies and complex geometries

View 2 more answers

Q26. How can you tackle your customer in real time scenario?

Ans.

To tackle a customer in real-time scenario, active listening, empathy, and problem-solving skills are crucial.

  • Listen actively to the customer's concerns and acknowledge their emotions

  • Show empathy and understanding towards their situation

  • Offer solutions or alternatives to resolve their issue

  • Remain calm and professional, even in difficult situations

  • Follow up with the customer to ensure their satisfaction

  • Provide clear and concise communication throughout the interaction

View 30 more answers

Q27. Is this a product based or service based company?

Ans.

This is a service-based company.

  • The company provides services to its customers.

  • The focus is on delivering quality customer service.

  • Examples of services provided may include technical support, consulting, or maintenance.

  • The company may also sell products, but the primary focus is on the services offered.

View 21 more answers

Q28. In azure data factory how would you implement the functionality of tumbling window without actually using that feature already available?

Ans.

Implementing tumbling window in Azure Data Factory without using the feature

  • Create a pipeline with a trigger that runs at the desired interval

  • Use a lookup activity to retrieve the data for the current window

  • Use a foreach activity to iterate over the retrieved data

  • Perform the required operations on the data within the foreach activity

  • Write the output to the desired destination

View 1 answer

Q29. 1) What is NullPointerExceprion and give me a example?

Ans.

NullPointerException is a runtime exception that occurs when a program tries to access or use an object reference that is null.

  • It is a common exception in Java programming.

  • It is thrown when a program attempts to use an object reference that has not been initialized.

  • It indicates that there is an attempt to access or invoke a method on an object that is null.

  • Example: String str = null; str.length();

View 2 more answers

Q30. What if there is no internet.......is there any back up for these type of companies who are completely dependent on this internet completely

Ans.

Companies should have a backup plan in case of internet outage.

  • Companies can have a secondary internet connection from a different provider.

  • They can also have offline customer service options such as phone or in-person support.

  • Having a contingency plan in place can prevent major disruptions to customer service.

  • Examples of backup plans include using mobile hotspots, satellite internet, or even a backup generator to power internet equipment.

  • Regular testing and maintenance of ba...read more

View 5 more answers

Q31. How would you handle an irated CX and what is the meaning of emotions according to you ?.

Ans.

Handling irate customers and understanding emotions

  • Listen actively and empathize with the customer's situation

  • Apologize for the inconvenience caused and assure them of a solution

  • Offer a solution or escalate the issue to a higher authority if necessary

  • Understand that emotions are subjective and can vary from person to person

  • Emotions are a natural response to a situation and should be acknowledged and respected

View 6 more answers

Q32. 2) Can you call the base class method without creating an instance?

Ans.

Yes, by using the super() method in the derived class.

  • super() method calls the base class method

  • Derived class must inherit from the base class

  • Example: class Derived(Base): def method(self): super().method()

View 2 more answers

Q33. 1. What is kyc? 2.Why kyc is important? 3. What is money laundering? 4. What are the stages of money laundering? 5.What do you mean by CDD and EDD? 6. Finance related questions to check the subject knowledge 7....

read more
Ans.

Answering questions related to KYC, money laundering, and finance

  • KYC stands for Know Your Customer and is the process of verifying the identity of a customer or client

  • KYC is important to prevent fraud, money laundering, and terrorist financing

  • Money laundering is the process of making illegally obtained money appear legitimate

  • The stages of money laundering include placement, layering, and integration

  • CDD stands for Customer Due Diligence and is the process of verifying the iden...read more

Add your answer
Q34. Count Even Odd

You have been given an array/list of integers 'ARR' of size 'N'. Your task is to find two things-

1. The number of elements that are occurring an Odd number of times.

2. The number of elements tha...read more

Add your answer

Q35. 1) What is Difference between shared printer and network printer?

Ans.

A shared printer is connected to a single computer and can be accessed by other computers on the same network. A network printer is directly connected to the network and can be accessed by multiple computers.

  • Shared printer is connected to a single computer, while network printer is directly connected to the network.

  • Shared printer can be accessed by other computers on the same network, while network printer can be accessed by multiple computers.

  • Shared printer requires the comp...read more

View 18 more answers

Q36. Why customer care service is important during this COVID-19 pandemic?

Ans.

Customer care service is crucial during COVID-19 pandemic to ensure customer satisfaction and safety.

  • Customers may have concerns or questions about safety measures and policies

  • Customers may need assistance with online ordering or delivery options

  • Customers may be experiencing financial difficulties and need flexible payment options

  • Providing excellent customer service can help build trust and loyalty during uncertain times

  • Examples: Offering contactless delivery, providing clear...read more

View 12 more answers

Q37. What is the difference between hubs and switches?

Ans.

Hubs broadcast data to all connected devices, while switches only send data to the intended recipient.

  • Hubs operate at the physical layer of the OSI model, while switches operate at the data link layer.

  • Hubs are less expensive than switches, but switches offer better performance and security.

  • Hubs are often used in small networks, while switches are used in larger networks.

  • Example of a hub: Netgear 5-Port Fast Ethernet Unmanaged Switch

  • Example of a switch: Cisco Catalyst 2960 Ser...read more

View 23 more answers

Q38. 5) What are access specifiers and what is their significance?

Ans.

Access specifiers define the level of access to class members. They ensure encapsulation and data hiding in object-oriented programming.

  • Access specifiers are keywords used in class definitions to specify the access level of class members.

  • There are three access specifiers in C++: public, private, and protected.

  • Public members can be accessed from anywhere in the program, while private members can only be accessed within the class.

  • Protected members can be accessed within the cla...read more

Add your answer

Q39. How will you handle irrated customers?

Ans.

I will listen to their concerns, empathize with them, and offer a solution to their problem.

  • Listen actively to their complaints without interrupting them

  • Empathize with their situation and show understanding

  • Offer a solution to their problem and follow up to ensure their satisfaction

  • Remain calm and professional throughout the interaction

  • Apologize for any inconvenience caused and take responsibility for the issue

  • Provide options to resolve the issue and let the customer choose th...read more

View 21 more answers

Q40. What is REST API? And the difference between GET, PUT, POST, DELETE, MERGE, PATCH methods. Also, differences in various response codes like 200,203,204

Ans.

REST API is a web service that uses HTTP methods to interact with resources. GET, PUT, POST, DELETE, MERGE, PATCH are different methods.

  • REST API is a stateless architecture that uses HTTP methods to interact with resources.

  • GET method is used to retrieve data from a server.

  • PUT method is used to update an existing resource on the server.

  • POST method is used to create a new resource on the server.

  • DELETE method is used to delete a resource from the server.

  • MERGE method is used to u...read more

View 1 answer

Q41. Why do we Go for Flat Process in Sheet Metal fabrication

Ans.

Flat process is preferred in sheet metal fabrication for ease of manufacturing and cost-effectiveness.

  • Flat process involves cutting and bending sheet metal in a single plane, reducing the need for complex tooling and machinery.

  • It also allows for easier handling and transportation of the sheet metal.

  • Flat process is more cost-effective than other processes like deep drawing or hydroforming.

  • Examples of products made using flat process include metal cabinets, enclosures, and pane...read more

View 2 more answers

Q42. How u upsell to the same customer the same service he is using?

Ans.

To upsell the same service to a customer, focus on highlighting the additional benefits and features, offering discounts or promotions, and providing personalized recommendations.

  • Emphasize the added value and benefits of the upgraded service.

  • Offer discounts or promotions to incentivize the customer to upgrade.

  • Provide personalized recommendations based on the customer's usage and needs.

  • Highlight any new features or improvements in the upgraded service.

  • Address any concerns or o...read more

View 3 more answers

Q43. How to release previous IP which assign to your device?

Ans.

To release previous IP assigned to a device, use the command 'ipconfig /release' in Windows or 'sudo dhclient -r' in Linux.

  • Open Command Prompt or Terminal

  • Type 'ipconfig /release' for Windows or 'sudo dhclient -r' for Linux

  • Press Enter

  • Wait for the command to complete

  • The previous IP address will be released

View 7 more answers

Q44. How can G/L account for MM account determinations be verified?

Ans.

G/L account for MM account determinations can be verified through configuration settings and testing.

  • Verify the account determination configuration in transaction code OBYC.

  • Check the account determination procedure and account assignment category settings.

  • Test the account determination by creating a purchase order and checking the G/L account assignment.

  • Review the accounting documents and postings to ensure the correct G/L accounts are being used.

View 2 more answers

Q45. How this COVID-19 pandemic has been infected our economy?

Ans.

COVID-19 pandemic has severely impacted the global economy.

  • Many businesses have shut down or faced significant losses.

  • Unemployment rates have increased.

  • Supply chains have been disrupted.

  • Tourism and travel industries have been hit hard.

  • Governments have had to provide financial aid to individuals and businesses.

  • Remote work has become more common.

  • E-commerce and online services have seen a surge in demand.

  • Stock markets have been volatile.

  • The pandemic has highlighted existing ineq...read more

View 7 more answers
Q46. React Question

How do we pass data from one component to another in React?

View 2 more answers

Q47. 1)Val a = Array(1,2,1,3,4) Need output as (1,2) (2,1) (1,3) (3,4)

Ans.

Print pairs of adjacent elements in an array

  • Loop through the array and print each pair of adjacent elements

  • Use a for loop and access the elements using their indices

  • Example: for i in 0 until a.length-1 print (a[i], a[i+1])

View 5 more answers
Q48. OOPS Question

What is a dangling pointer?

Add your answer

Q49. What is the biggest challenge you faced in developing azure solution?

Ans.

The biggest challenge in developing Azure solution was managing the complexity of the cloud environment.

  • Managing the complexity of the cloud environment

  • Ensuring scalability and reliability

  • Integrating with existing systems

  • Securing the solution

  • Optimizing cost

  • Example: Migrating a legacy application to Azure

Add your answer

Q50. Advantages and disadvantages of Online shopping

Ans.

Online shopping offers convenience and a wide variety of options, but it also has drawbacks such as potential security risks and lack of physical interaction.

  • Advantages of online shopping:

  • - Convenience: Shop from anywhere and at any time without leaving your home.

  • - Wide variety: Access to a vast range of products and services from different sellers.

  • - Competitive prices: Online retailers often offer discounts and deals.

  • - Time-saving: Avoid long queues and save time on commutin...read more

View 24 more answers
Q51. OOPS Question

Difference between malloc and calloc

Add your answer

Q52. How to speed up request response? What is caching? Which cache you are using?

Ans.

Caching can speed up request response. Popular caches include Redis, Memcached, and browser caching.

  • Caching stores frequently accessed data in memory for faster retrieval

  • Browser caching stores static assets like images and CSS files

  • Redis and Memcached are popular in-memory caching solutions for web applications

  • Cache invalidation is important to ensure data consistency

Add your answer

Q53. Which is the most important gadget in your life without which life will be difficult for you

Ans.

My smartphone is the most important gadget in my life.

  • My smartphone helps me stay connected with family and friends

  • I use it for work-related communication and tasks

  • It serves as a source of entertainment during leisure time

  • I can access important information and services through it

  • It also serves as a camera for capturing memories

  • Examples: iPhone, Samsung Galaxy, Google Pixel

Add your answer

Q54. What? Jobs Rules And How Customer Support

Ans.

Customer support jobs involve following rules and providing assistance to customers.

  • Customer support jobs require following company policies and procedures.

  • Customer support representatives must have good communication and problem-solving skills.

  • They should be knowledgeable about the products or services they are supporting.

  • Customer support agents need to be patient, empathetic, and able to handle difficult customers.

  • They should be able to multitask and manage their time effec...read more

View 29 more answers
Q55. React Question

How does React works in the background when the state changes?

Add your answer

Q56. How would you handle an angry customer?

Ans.

I would listen to their concerns, empathize with their situation, and offer a solution to their problem.

  • Remain calm and professional

  • Listen actively to the customer's concerns

  • Empathize with their situation and apologize for any inconvenience

  • Offer a solution to their problem, and if necessary, escalate the issue to a supervisor

  • Follow up with the customer to ensure their satisfaction

View 5 more answers

Q57. How to secure endpoints in REST APIs? What is JWT Token?

Ans.

JWT token is used to secure endpoints in REST APIs by providing authentication and authorization.

  • JWT stands for JSON Web Token

  • It is a compact, URL-safe means of representing claims to be transferred between two parties

  • It is used for authentication and authorization

  • It contains three parts: header, payload, and signature

  • The header contains the algorithm used to sign the token

  • The payload contains the claims or information about the user

  • The signature is used to verify the authent...read more

Add your answer

Q58. If you found/ raise a bug on the bug tracking tool and the developer review the bug and sends it back to you on the same day. What is the reason. Explain.

Ans.

The developer reviewed and sent back the bug on the same day.

  • The developer may have fixed the bug quickly.

  • The developer may have found the bug to be invalid or not reproducible.

  • The developer may have requested more information or clarification.

  • The developer may have sent the bug back for further testing or verification.

  • The developer may have sent the bug back for a second opinion or review.

Add your answer

Q59. What do you understand by women impowerment?

Ans.

Women empowerment refers to the process of providing women with the power and resources to make their own decisions and control their own lives.

  • It involves promoting gender equality and ensuring that women have access to education, healthcare, and economic opportunities.

  • It also involves challenging traditional gender roles and stereotypes that limit women's potential.

  • Examples of women empowerment initiatives include providing microfinance loans to women entrepreneurs, promoti...read more

View 9 more answers

Q60. What are the Thickness used to Manufacture In your Industry

Ans.

The thickness used to manufacture in the mechanical engineering design industry varies depending on the specific application and materials involved.

  • The thickness of components can range from very thin, such as sheet metal with thicknesses measured in millimeters, to thick structures like heavy machinery components with thicknesses measured in centimeters or even meters.

  • The choice of thickness is determined by factors such as the mechanical strength requirements, material prop...read more

View 2 more answers

Q61. Please tell me about the pf deduction criteria?

Ans.

The PF deduction criteria refers to the rules and regulations for deducting Provident Fund contributions from an employee's salary.

  • PF deduction is mandatory for employees earning a basic salary of Rs. 15,000 or more per month.

  • The contribution is calculated as a percentage of the employee's basic salary and dearness allowance.

  • Both the employee and employer contribute to the PF account.

  • The current contribution rate is 12% of the basic salary and dearness allowance.

  • The employer ...read more

View 23 more answers
Q62. React Question

What are the phases of each component of React lifecycle?

Add your answer

Q63. What is Mac address and can we change the Mac address.

Ans.

MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment.

  • MAC stands for Media Access Control

  • It is a 48-bit address

  • It is used to identify devices on a network

  • It cannot be changed permanently, but can be spoofed temporarily

  • Example: 00:1A:C2:7B:00:47

View 8 more answers
Q64. OOPS Question

What is a copy constructor?

Add your answer

Q65. 3) What is call by value and call hy refarance?

Ans.

Call by value and call by reference are two ways of passing arguments to a function.

  • Call by value passes a copy of the argument value to the function.

  • Call by reference passes a reference to the memory location of the argument.

  • Call by value is used for simple data types like int, float, etc.

  • Call by reference is used for complex data types like arrays, structures, etc.

Add your answer

Q66. what do you know about SQL , Unix , explain in brief

Ans.

SQL is a database language used to manage data. Unix is an operating system used for servers and workstations.

  • SQL is used to create, modify, and query databases.

  • Unix is a command-line interface used for file management, process control, and networking.

  • SQL can be used with various database management systems like MySQL, Oracle, and SQL Server.

  • Unix commands include ls, cd, grep, and chmod.

  • SQL and Unix are commonly used in web development and data analysis.

View 1 answer

Q67. Which are the operations performed on sheet metal to increase the strength of it without changing thickness?

Ans.

Operations like bending, folding, and crimping can increase the strength of sheet metal without changing its thickness.

  • Bending: This process involves bending the sheet metal along a straight line to increase its strength.

  • Folding: Folding the sheet metal creates multiple layers, increasing its strength.

  • Crimping: Crimping involves creating small indentations or folds in the sheet metal to increase its rigidity.

  • Rolling: Rolling the sheet metal can also increase its strength by c...read more

Add your answer

Q68. Can you describe “method overloading” versus “method overriding”? Does it happen at compile time or runtime?

Ans.

Method overloading is when multiple methods have the same name but different parameters. Method overriding is when a subclass provides a different implementation of a method from its superclass.

  • Method overloading allows a class to have multiple methods with the same name but different parameters.

  • Method overriding occurs when a subclass provides a different implementation of a method that is already defined in its superclass.

  • Method overloading is resolved at compile time based...read more

View 2 more answers

Q69. What would be your suggestion for implementation in azure data factory v2?

Ans.

My suggestion for implementation in Azure Data Factory v2 is to use the Mapping Data Flow feature.

  • Utilize Mapping Data Flow for complex data transformations

  • Take advantage of the visual interface to design and debug data flows

  • Leverage the built-in data integration capabilities with other Azure services

  • Use data flow parameters and expressions for dynamic transformations

  • Monitor and optimize data flow performance using data flow debug and profiling

Add your answer

Q70. What is router and modem the difference?

Ans.

A router is a device that connects multiple networks and directs traffic between them, while a modem is a device that connects a computer or network to the internet.

  • A router is used to create and manage a local area network (LAN) by directing data packets between devices.

  • A modem is used to connect a computer or network to an internet service provider (ISP) to access the internet.

  • Routers can be wired or wireless, while modems are typically wired.

  • Routers have multiple Ethernet ...read more

View 6 more answers

Q71. What do you think about this pandemic affect on world ?

Ans.

The pandemic has had a significant impact on the world.

  • The pandemic has caused widespread illness and death.

  • It has also led to economic downturns and job losses.

  • Many countries have implemented lockdowns and other measures to slow the spread of the virus.

  • The pandemic has highlighted existing inequalities and disparities in healthcare systems.

  • It has also led to increased use of technology for remote work and communication.

  • Vaccines have been developed and distributed to combat t...read more

View 2 more answers

Q72. How to repair PST and how can you access mails in PST?

Ans.

To repair PST, use the built-in scanpst.exe tool and to access mails in PST, use Microsoft Outlook.

  • To repair PST, locate and run the scanpst.exe tool which is usually found in the Microsoft Office folder.

  • Follow the prompts to select the PST file and initiate the repair process.

  • To access mails in PST, open Microsoft Outlook and select 'Open Outlook Data File' from the File menu.

  • Navigate to the location of the PST file and select it to open and access the mails.

  • Ensure that the ...read more

View 1 answer

Q73. What are the components of customer satisfaction?

Ans.

Components of customer satisfaction include quality of product/service, responsiveness, empathy, communication, and problem-solving.

  • Quality of product/service

  • Responsiveness

  • Empathy

  • Communication

  • Problem-solving

View 4 more answers

Q74. 1. Fundamentals of estimation techniques. 2. Which all pm tools have you worked on? 3. How do you handle critical but resisting key stakeholders?

Ans.

Fundamentals of estimation techniques, PM tools used, and handling critical stakeholders.

  • For estimation techniques, use historical data, expert judgment, and three-point estimation.

  • I have worked on tools like JIRA, Trello, and Asana.

  • To handle critical stakeholders, identify their concerns and address them, involve them in decision-making, and communicate regularly.

  • Example: In a project, a key stakeholder was resistant to a change in the project scope. I scheduled a meeting wi...read more

Add your answer

Q75. How do you select a Flanges and where is it used

Ans.

Flanges are selected based on factors like pressure rating, material compatibility, and application requirements.

  • Flanges are selected based on the pressure rating required for the specific application.

  • Material compatibility is crucial in selecting flanges to ensure they can withstand the intended environment.

  • Application requirements such as temperature, fluid type, and pipe size also influence flange selection.

  • Common types of flanges include weld neck, slip-on, socket weld, a...read more

View 2 more answers

Q76. what is the difference between call by value and call by reference?

Ans.

Call by value passes a copy of the value while call by reference passes a reference to the value.

  • Call by value passes a copy of the value to the function while call by reference passes a reference to the value.

  • In call by value, any changes made to the parameter inside the function do not affect the original value outside the function.

  • In call by reference, any changes made to the parameter inside the function affect the original value outside the function.

  • Call by value is used...read more

View 3 more answers

Q77. How will you handle escalation calls?

Ans.

I will listen to the customer's issue, empathize with them, and provide a solution that meets their needs.

  • Listen actively to the customer's issue and let them vent their frustration

  • Empathize with the customer and acknowledge their feelings

  • Provide a solution that meets the customer's needs and resolves the issue

  • If necessary, escalate the call to a supervisor or manager for further assistance

  • Follow up with the customer to ensure their issue has been resolved to their satisfacti...read more

View 8 more answers

Q78. Do you have aadhaar card with phone number linked with it?

Ans.

Yes, I have an Aadhaar card with a phone number linked to it.

  • I have linked my phone number to my Aadhaar card for easy verification and authentication.

  • Having a linked phone number helps in receiving important updates and notifications related to Aadhaar.

  • It also helps in availing various government services that require Aadhaar authentication.

  • I can provide my Aadhaar number and linked phone number for verification purposes.

View 10 more answers
Q79. Remove Duplicates

Given a string S, remove consecutive duplicates from it recursively.

Input Format :
String S 
Output Format :
Output string 
Constraints :
1 <= |S| <= 10^3 where |S| represents the length of s...read more
View 2 more answers
Q80. DSA Questions

1. Benefits of Learning Data Structures ?
2. Can you explain the difference between file structure and storage structure?
3. What is a multidimensional array?
4. What is a stack? What are the applicat...read more

Add your answer

Q81. Tell us something about Indian farming? What is customer service, What is resolution? What is more convenient work from home or work from the office?

Ans.

Indian farming is an integral part of the country's economy, with diverse crops and farming practices.

  • Indian farming is characterized by a wide variety of crops grown across different regions.

  • The country is known for its production of rice, wheat, sugarcane, cotton, and spices.

  • Farming practices in India range from traditional methods to modern techniques, depending on the region and crop.

  • The Green Revolution in the 1960s brought significant advancements in agricultural produc...read more

View 2 more answers

Q82. What is adf_publish, what if data factory deleted, what if trigger executed and pipeline execution failed. How to know and how to handle, and also on transformations like which IR is used.

Ans.

adf_publish is a command to publish data factory artifacts. Handling deletion, trigger execution, pipeline failure, and IR usage can be done through monitoring and logging.

  • adf_publish is used to publish data factory artifacts such as pipelines, datasets, and linked services

  • If data factory is deleted, all artifacts will be deleted as well. It is important to have backups and version control in place

  • Trigger execution can be monitored through the Trigger Runs tab in the Azure po...read more

View 2 more answers
Q83. OOPS Question

What are storage classes?

Add your answer

Q84. Tell me something about cricket in English as well as Hindi language for 2 minutes each

Ans.

Cricket is a popular sport played worldwide with a rich history and diverse culture.

  • Cricket originated in England in the 16th century and has since spread to many countries.

  • It is a bat-and-ball game played between two teams of eleven players each.

  • The objective is to score more runs than the opposing team while taking turns to bat and bowl.

  • Cricket has many formats including Test, One Day International, and Twenty20.

  • India is one of the biggest cricket-playing nations and has a ...read more

View 5 more answers

Q85. Write a code in angular to fetch JSON response from given URL and display in tabular format.

Ans.

Angular code to fetch and display JSON response in tabular format.

  • Use HttpClient module to make an HTTP GET request to the given URL.

  • Subscribe to the response and extract the JSON data.

  • Create an Angular component to display the data in a tabular format using HTML and CSS.

Add your answer

Q86. Can you see the door behind you. How much force is required to open it if wind velocity if 20km per hour outside.

Ans.

The force required to open the door depends on various factors such as the size of the door, the type of handle, and the direction of the wind.

  • The size and weight of the door will determine the force required to open it.

  • The type of handle or knob on the door can also affect the force needed to open it.

  • The direction of the wind can make it easier or harder to open the door.

  • Without knowing the specific details of the door, it is impossible to accurately determine the force requ...read more

View 1 answer
Q87. DSA and OOPS Questions

How can you find the largest or smallest number in an array of integers?
What is an AVL Tree?
What is the difference between tree and graph data structure?
Oops concepts with principal.
Basic ...read more

Add your answer

Q88. Draw shear for and Bending Moment Diagram for the Given Drawing (Cantilever Beam)

Ans.

Draw shear and bending moment diagrams for a cantilever beam.

  • Calculate reactions at the support

  • Determine the equation of the shear force diagram

  • Determine the equation of the bending moment diagram

  • Plot the diagrams using the equations

  • Check for accuracy and consistency

Add your answer

Q89. How do you deal with customers through email, Do you have any experience handling this?

Ans.

Yes

  • I have extensive experience dealing with customers through email

  • I prioritize clear and concise communication to address customer inquiries and concerns

  • I ensure prompt responses and follow-ups to maintain customer satisfaction

  • I have successfully resolved complex issues and provided technical guidance via email

  • I maintain a professional and empathetic tone in all customer interactions

Add your answer

Q90. Difference between accounts payable and receivable, Debit and credit note, Real, nominal account Accounts Payable cycle

Ans.

Accounts payable is money owed by a company to its suppliers, while accounts receivable is money owed to a company by its customers.

  • Accounts payable refers to the money a company owes to its suppliers for goods or services received.

  • Accounts receivable refers to the money owed to a company by its customers for goods or services provided.

  • Debit note is a document issued by a buyer to a seller to request a credit against an overpayment or return of goods.

  • Credit note is a document...read more

View 1 answer

Q91. What is you know about customer service. Tell us about online shopping apps. Are you buying anything from online shopping. If yes ,then how was your experience.

Ans.

Customer service is about providing assistance and support to customers. Online shopping apps are platforms that allow customers to purchase products and services online.

  • Customer service involves addressing customer needs and concerns in a timely and effective manner.

  • Online shopping apps provide convenience and accessibility for customers to shop from anywhere at any time.

  • My experience with online shopping has been positive overall, with fast delivery and easy returns.

  • However...read more

View 3 more answers

Q92. What is technical issue in Desktop support Engineer

Ans.

Technical issues in Desktop Support Engineer involve hardware, software, network, and security problems.

  • Hardware issues such as malfunctioning components or peripherals

  • Software issues such as installation errors or compatibility problems

  • Network issues such as connectivity or configuration problems

  • Security issues such as malware infections or unauthorized access

  • Examples include printer not working, slow computer performance, and internet connection problems

View 7 more answers

Q93. 4) How does C++ support Polymorphism?

Ans.

C++ supports polymorphism through virtual functions and inheritance.

  • Polymorphism allows objects of different classes to be treated as if they were of the same class.

  • Virtual functions are declared in the base class and overridden in the derived class.

  • Dynamic binding is used to determine which function to call at runtime.

  • Examples include function overriding, templates, and operator overloading.

Add your answer
Q94. Java Question

What is method hiding?

Add your answer

Q95. What do you know about class loading? Explain Java class loaders? If you have a class in a package, what do you need to do to run it? Explain dynamic class loading?

Ans.

Explanation of Java class loading and dynamic class loading.

  • Java class loaders are responsible for loading classes into the JVM.

  • There are three types of class loaders: bootstrap, extension, and application.

  • To run a class in a package, you need to specify the fully qualified name of the class.

  • Dynamic class loading allows classes to be loaded at runtime instead of compile time.

  • This can be useful for plugins or modules that are not known at compile time.

View 1 answer
Q96. Java Question

What is a string?

Add your answer

Q97. How many projects or process you implemented in RE framework?

Ans.

I have implemented RE framework in 3 projects.

  • Implemented RE framework in 3 projects

  • Used RE framework for automating end-to-end processes

  • Leveraged RE framework's modular structure for easy maintenance

  • Examples: Invoice processing, Order management, HR onboarding

Add your answer

Q98. Tell about the best tourist place in UP

Ans.

Taj Mahal, a UNESCO World Heritage Site, is the best tourist place in Uttar Pradesh (UP).

  • Taj Mahal is a magnificent white marble mausoleum located in Agra, UP.

  • It was built by Mughal Emperor Shah Jahan in memory of his wife Mumtaz Mahal.

  • The architectural beauty, intricate carvings, and stunning gardens make it a must-visit destination.

  • Taj Mahal is considered one of the Seven Wonders of the World.

  • Tourists can explore the grandeur of the main mausoleum, visit the beautiful mosqu...read more

View 12 more answers

Q99. Lets say you have table 1 with values 1,2,3,5,null,null,0 and table 2 has null,2,4,7,3,5 What would be the output after inner join?

Ans.

The output after inner join of table 1 and table 2 will be 2,3,5.

  • Inner join only includes rows that have matching values in both tables.

  • Values 2, 3, and 5 are present in both tables, so they will be included in the output.

  • Null values are not considered as matching values in inner join.

Add your answer

Q100. How do you design an effective ADF pipeline and what all metrics and considerations you should keep in mind while designing?

Ans.

Designing an effective ADF pipeline involves considering various metrics and factors.

  • Understand the data sources and destinations

  • Identify the dependencies between activities

  • Optimize data movement and processing for performance

  • Monitor and track pipeline execution for troubleshooting

  • Consider security and compliance requirements

  • Use parameterization and dynamic content for flexibility

  • Implement error handling and retries for robustness

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 1.2k interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 630 Interview Questions
4.0
 • 415 Interview Questions
4.0
 • 384 Interview Questions
4.1
 • 259 Interview Questions
4.1
 • 247 Interview Questions
4.1
 • 138 Interview Questions
View all
Top Tech Mahindra Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter