Tech Mahindra
1500+ Interview Questions and Answers
Q1. Tell me something about yourself. Define encapsulation. What is inheritance. What is constructor. What is method overloading. Can we overload a constructor. What is overriding. Difference between overloading an...
read moreThe interview questions cover topics like encapsulation, inheritance, constructors, method overloading, overriding, exception handling, and hobbies.
Encapsulation is the process of hiding the internal details of an object and providing access through methods.
Inheritance is a mechanism in which one class inherits the properties and behaviors of another class.
A constructor is a special method used to initialize objects.
Method overloading is the ability to define multiple methods...read more
You are given an integer ‘N’. You have to print the value of Factorial of ‘N’. The Factorial of a number ‘N’ is defined as the product of all numbers from 1 to ‘N’.
For Example:
Consi...read more
Given an array of numbers, find the maximum sum of any contiguous subarray of the array.
For example, given the array [34, -50, 42, 14, -5, 86], the maximum sum would be 137, since we would ...read more
Q4. If the customer is not satisfied with your answer so what will you do to satisfied him with your answer?
I would apologize for not providing a satisfactory answer and ask the customer to explain their concern in detail.
Listen actively to the customer's concern
Empathize with the customer's situation
Offer alternative solutions or escalate the issue to a supervisor if necessary
Ensure the customer feels heard and valued
You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.
For example:
If the given string is: STR = "abcde". You hav...read more
You are given a string ‘S’. You are also given ‘M’ integers in an array ‘A’. You perform ‘M’ operations on this string. The operations are given in an array ‘A’ of size ‘M’.
You perform the operat...read more
Q7. What do you understand by customer care service?
Customer care service is the provision of assistance and support to customers before, during, and after a purchase.
Customer care service involves addressing customer queries, complaints, and concerns promptly and efficiently.
It also involves providing customers with relevant information about products and services.
Customer care service aims to build and maintain positive relationships with customers, leading to customer loyalty and repeat business.
Examples of customer care se...read more
Q8. Quaries regarding the issues of customer suppose customer had ordered 2 or 3 items but in parcel there is only one item delivered so I was there to resolve that problem of customer and give them 100 percent cha...
read moreAs a customer service executive, I would address the issue of missing items in the parcel and ensure customer satisfaction.
Listen to the customer's complaint and apologize for the inconvenience caused.
Ask for the order number and details of the missing item.
Check the inventory and shipping records to identify the issue.
Offer a solution such as sending the missing item or refunding the amount.
Ensure that the customer is satisfied with the resolution and thank them for their pa...read more
Q9. Which programming language you are comfortable with?
I am comfortable with multiple programming languages including Java, Python, and JavaScript.
Proficient in Java for backend development
Experienced in Python for data analysis and machine learning
Skilled in JavaScript for frontend development
Familiar with SQL for database management
Comfortable with C++ for competitive programming
Q10. What is BPO and why it is important for the company?
BPO stands for Business Process Outsourcing. It is important for companies to outsource non-core business functions to focus on core competencies.
BPO involves contracting non-core business functions to a third-party service provider.
It helps companies to reduce costs, increase efficiency, and focus on core competencies.
Examples of BPO services include customer support, accounting, human resources, and IT services.
BPO can be onshore, nearshore, or offshore depending on the loc...read more
Q11. Why customer care service is important for a company?
Customer care service is crucial for a company's success as it helps in retaining customers and building brand loyalty.
Customer care service ensures customer satisfaction and helps in resolving their issues and concerns.
It helps in building a positive brand image and reputation.
Good customer service leads to repeat business and referrals.
It helps in identifying areas of improvement and enhancing the overall customer experience.
Examples of companies with excellent customer ser...read more
Q12. How to apply SOLID principle and what is dependency injection and why to use it and scenarios on where to use
SOLID principles ensure maintainable and scalable code. Dependency Injection helps in achieving loose coupling and testability.
SOLID principles are Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion
Dependency Injection is a design pattern that allows objects to be loosely coupled and easily testable
Use Dependency Injection to reduce tight coupling between classes and make them more modular
Use SOLID principles to ensure mai...read more
Q13. How do you test a web application? What is CSRF and SSRF? What is LDAP injection? How does namp work while port scanning? (Result - open/filtered/closed) How does ssl work? Suppose a proxy server(Burpsuite) is ...
read moreA Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.
Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.
CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.
SSRF (Server-Side Request Forgery) is an attack that allows an attacker to make ...read more
Q14. Understanding customer problems,whT i know about BPO nd how they work,how i will handle a difficult nd angry customer,i can satisfied my client.
I have a good understanding of customer problems and BPO operations. I can handle difficult and angry customers by empathizing, actively listening, and finding solutions to their issues.
I have a strong understanding of customer problems and their needs.
I am familiar with BPO operations and how they work.
To handle difficult and angry customers, I empathize with their frustrations and actively listen to their concerns.
I remain calm and composed, ensuring that I do not escalate ...read more
What are the features of Java 8?
You are given a string 'S' of length 'N', you need to find the frequency of each of the characters from ‘a’ to ‘z’ in the given string.
Example :
Giv...read more
You are given an array 'ARR' of the 'N' element. Your task is to find the maximum difference between any of the two elements from 'ARR'.
If the maximum difference is even print “EVEN” without ...read more
Q18. Suddenly how to take design when there is no one senior are present in his/her office that time, what you to do?
I would refer to the company's design guidelines and consult with other team members before making a decision.
Check the company's design guidelines for guidance
Consult with other team members for their input
Consider the project's goals and requirements
Make a decision based on the available information
Document the decision and reasoning for future reference
Q19. What do you understand by customer service? How would you handel an irritate customer? Where do you see in 5 years? What was the reason to leage your previous job? Are you flexible with Shift timings and Rotati...
read moreCustomer service is the act of providing assistance and support to customers before, during, and after a purchase.
Active listening and empathy are key skills in handling an irritated customer
Apologize for the inconvenience caused and offer a solution to their problem
Stay calm and professional, even if the customer is being rude or aggressive
In 5 years, I see myself in a leadership role within the company
I left my previous job to pursue new opportunities and challenges
Yes, I a...read more
You are given a linked list of integers where each node has two fields: data field which contains a value, 'next' field which points to its adjacent node to ...read more
You are given an array of strings. Your task is to find the number of unique strings.
A string is considered unique if it cannot be formed from any other strin...read more
Q22. Do you have medical facilities in office?
NO
Our office does not have medical facilities.
We do not provide medical services to our customers or employees.
If you require medical assistance, we recommend seeking help from a nearby medical facility.
Q23. What is a difference between router and modem?
A router connects multiple devices to a network and directs traffic, while a modem connects a network to the internet.
A router is used to create a local area network (LAN) and connect multiple devices to it.
A modem is used to connect a network to the internet.
A router directs traffic between devices on the network and manages the flow of data.
A modem converts digital signals from the network into analog signals that can be transmitted over a phone or cable line.
Examples of ro...read more
Q24. 1.what is kyc 2. Why kyc is important 3.what is money laundering 4.what are the stages of money laundering 5. What do you mean by CDD and EDD 6. Finance related questions to check the subject knowledge 7. What ...
read moreQuestions related to KYC, money laundering, CDD, EDD, and finance were asked for the Associate Analyst position.
KYC stands for Know Your Customer and is the process of verifying the identity of a customer.
KYC is important to prevent fraud, money laundering, and terrorist financing.
Money laundering is the process of making illegally obtained money appear legitimate.
The stages of money laundering include placement, layering, and integration.
CDD stands for Customer Due Diligence...read more
Q25. What are the Drawing softwares you're aware of And How much relevant experience you have in for each software
I am proficient in AutoCAD, SolidWorks, and CATIA with over 3 years of experience in each software.
Proficient in AutoCAD, SolidWorks, and CATIA
Over 3 years of experience in each software
Able to create 2D and 3D models, assemblies, and drawings
Familiar with GD&T and ANSI standards
Experience in designing mechanical components and systems
Ability to work with large assemblies and complex geometries
Q26. How can you tackle your customer in real time scenario?
To tackle a customer in real-time scenario, active listening, empathy, and problem-solving skills are crucial.
Listen actively to the customer's concerns and acknowledge their emotions
Show empathy and understanding towards their situation
Offer solutions or alternatives to resolve their issue
Remain calm and professional, even in difficult situations
Follow up with the customer to ensure their satisfaction
Provide clear and concise communication throughout the interaction
Q27. Is this a product based or service based company?
This is a service-based company.
The company provides services to its customers.
The focus is on delivering quality customer service.
Examples of services provided may include technical support, consulting, or maintenance.
The company may also sell products, but the primary focus is on the services offered.
Q28. In azure data factory how would you implement the functionality of tumbling window without actually using that feature already available?
Implementing tumbling window in Azure Data Factory without using the feature
Create a pipeline with a trigger that runs at the desired interval
Use a lookup activity to retrieve the data for the current window
Use a foreach activity to iterate over the retrieved data
Perform the required operations on the data within the foreach activity
Write the output to the desired destination
Q29. 1) What is NullPointerExceprion and give me a example?
NullPointerException is a runtime exception that occurs when a program tries to access or use an object reference that is null.
It is a common exception in Java programming.
It is thrown when a program attempts to use an object reference that has not been initialized.
It indicates that there is an attempt to access or invoke a method on an object that is null.
Example: String str = null; str.length();
Q30. What if there is no internet.......is there any back up for these type of companies who are completely dependent on this internet completely
Companies should have a backup plan in case of internet outage.
Companies can have a secondary internet connection from a different provider.
They can also have offline customer service options such as phone or in-person support.
Having a contingency plan in place can prevent major disruptions to customer service.
Examples of backup plans include using mobile hotspots, satellite internet, or even a backup generator to power internet equipment.
Regular testing and maintenance of ba...read more
Q31. How would you handle an irated CX and what is the meaning of emotions according to you ?.
Handling irate customers and understanding emotions
Listen actively and empathize with the customer's situation
Apologize for the inconvenience caused and assure them of a solution
Offer a solution or escalate the issue to a higher authority if necessary
Understand that emotions are subjective and can vary from person to person
Emotions are a natural response to a situation and should be acknowledged and respected
Q32. 2) Can you call the base class method without creating an instance?
Yes, by using the super() method in the derived class.
super() method calls the base class method
Derived class must inherit from the base class
Example: class Derived(Base): def method(self): super().method()
Q33. 1. What is kyc? 2.Why kyc is important? 3. What is money laundering? 4. What are the stages of money laundering? 5.What do you mean by CDD and EDD? 6. Finance related questions to check the subject knowledge 7....
read moreAnswering questions related to KYC, money laundering, and finance
KYC stands for Know Your Customer and is the process of verifying the identity of a customer or client
KYC is important to prevent fraud, money laundering, and terrorist financing
Money laundering is the process of making illegally obtained money appear legitimate
The stages of money laundering include placement, layering, and integration
CDD stands for Customer Due Diligence and is the process of verifying the iden...read more
You have been given an array/list of integers 'ARR' of size 'N'. Your task is to find two things-
1. The number of elements that are occurring an Odd number of times.
2. The number of elements tha...read more
Q35. 1) What is Difference between shared printer and network printer?
A shared printer is connected to a single computer and can be accessed by other computers on the same network. A network printer is directly connected to the network and can be accessed by multiple computers.
Shared printer is connected to a single computer, while network printer is directly connected to the network.
Shared printer can be accessed by other computers on the same network, while network printer can be accessed by multiple computers.
Shared printer requires the comp...read more
Q36. Why customer care service is important during this COVID-19 pandemic?
Customer care service is crucial during COVID-19 pandemic to ensure customer satisfaction and safety.
Customers may have concerns or questions about safety measures and policies
Customers may need assistance with online ordering or delivery options
Customers may be experiencing financial difficulties and need flexible payment options
Providing excellent customer service can help build trust and loyalty during uncertain times
Examples: Offering contactless delivery, providing clear...read more
Q37. What is the difference between hubs and switches?
Hubs broadcast data to all connected devices, while switches only send data to the intended recipient.
Hubs operate at the physical layer of the OSI model, while switches operate at the data link layer.
Hubs are less expensive than switches, but switches offer better performance and security.
Hubs are often used in small networks, while switches are used in larger networks.
Example of a hub: Netgear 5-Port Fast Ethernet Unmanaged Switch
Example of a switch: Cisco Catalyst 2960 Ser...read more
Q38. 5) What are access specifiers and what is their significance?
Access specifiers define the level of access to class members. They ensure encapsulation and data hiding in object-oriented programming.
Access specifiers are keywords used in class definitions to specify the access level of class members.
There are three access specifiers in C++: public, private, and protected.
Public members can be accessed from anywhere in the program, while private members can only be accessed within the class.
Protected members can be accessed within the cla...read more
Q39. How will you handle irrated customers?
I will listen to their concerns, empathize with them, and offer a solution to their problem.
Listen actively to their complaints without interrupting them
Empathize with their situation and show understanding
Offer a solution to their problem and follow up to ensure their satisfaction
Remain calm and professional throughout the interaction
Apologize for any inconvenience caused and take responsibility for the issue
Provide options to resolve the issue and let the customer choose th...read more
Q40. What is REST API? And the difference between GET, PUT, POST, DELETE, MERGE, PATCH methods. Also, differences in various response codes like 200,203,204
REST API is a web service that uses HTTP methods to interact with resources. GET, PUT, POST, DELETE, MERGE, PATCH are different methods.
REST API is a stateless architecture that uses HTTP methods to interact with resources.
GET method is used to retrieve data from a server.
PUT method is used to update an existing resource on the server.
POST method is used to create a new resource on the server.
DELETE method is used to delete a resource from the server.
MERGE method is used to u...read more
Q41. Why do we Go for Flat Process in Sheet Metal fabrication
Flat process is preferred in sheet metal fabrication for ease of manufacturing and cost-effectiveness.
Flat process involves cutting and bending sheet metal in a single plane, reducing the need for complex tooling and machinery.
It also allows for easier handling and transportation of the sheet metal.
Flat process is more cost-effective than other processes like deep drawing or hydroforming.
Examples of products made using flat process include metal cabinets, enclosures, and pane...read more
Q42. How u upsell to the same customer the same service he is using?
To upsell the same service to a customer, focus on highlighting the additional benefits and features, offering discounts or promotions, and providing personalized recommendations.
Emphasize the added value and benefits of the upgraded service.
Offer discounts or promotions to incentivize the customer to upgrade.
Provide personalized recommendations based on the customer's usage and needs.
Highlight any new features or improvements in the upgraded service.
Address any concerns or o...read more
Q43. How to release previous IP which assign to your device?
To release previous IP assigned to a device, use the command 'ipconfig /release' in Windows or 'sudo dhclient -r' in Linux.
Open Command Prompt or Terminal
Type 'ipconfig /release' for Windows or 'sudo dhclient -r' for Linux
Press Enter
Wait for the command to complete
The previous IP address will be released
Q44. How can G/L account for MM account determinations be verified?
G/L account for MM account determinations can be verified through configuration settings and testing.
Verify the account determination configuration in transaction code OBYC.
Check the account determination procedure and account assignment category settings.
Test the account determination by creating a purchase order and checking the G/L account assignment.
Review the accounting documents and postings to ensure the correct G/L accounts are being used.
Q45. How this COVID-19 pandemic has been infected our economy?
COVID-19 pandemic has severely impacted the global economy.
Many businesses have shut down or faced significant losses.
Unemployment rates have increased.
Supply chains have been disrupted.
Tourism and travel industries have been hit hard.
Governments have had to provide financial aid to individuals and businesses.
Remote work has become more common.
E-commerce and online services have seen a surge in demand.
Stock markets have been volatile.
The pandemic has highlighted existing ineq...read more
How do we pass data from one component to another in React?
Q47. 1)Val a = Array(1,2,1,3,4) Need output as (1,2) (2,1) (1,3) (3,4)
Print pairs of adjacent elements in an array
Loop through the array and print each pair of adjacent elements
Use a for loop and access the elements using their indices
Example: for i in 0 until a.length-1 print (a[i], a[i+1])
Q49. What is the biggest challenge you faced in developing azure solution?
The biggest challenge in developing Azure solution was managing the complexity of the cloud environment.
Managing the complexity of the cloud environment
Ensuring scalability and reliability
Integrating with existing systems
Securing the solution
Optimizing cost
Example: Migrating a legacy application to Azure
Q50. Advantages and disadvantages of Online shopping
Online shopping offers convenience and a wide variety of options, but it also has drawbacks such as potential security risks and lack of physical interaction.
Advantages of online shopping:
- Convenience: Shop from anywhere and at any time without leaving your home.
- Wide variety: Access to a vast range of products and services from different sellers.
- Competitive prices: Online retailers often offer discounts and deals.
- Time-saving: Avoid long queues and save time on commutin...read more
Difference between malloc and calloc
Q52. How to speed up request response? What is caching? Which cache you are using?
Caching can speed up request response. Popular caches include Redis, Memcached, and browser caching.
Caching stores frequently accessed data in memory for faster retrieval
Browser caching stores static assets like images and CSS files
Redis and Memcached are popular in-memory caching solutions for web applications
Cache invalidation is important to ensure data consistency
Q53. Which is the most important gadget in your life without which life will be difficult for you
My smartphone is the most important gadget in my life.
My smartphone helps me stay connected with family and friends
I use it for work-related communication and tasks
It serves as a source of entertainment during leisure time
I can access important information and services through it
It also serves as a camera for capturing memories
Examples: iPhone, Samsung Galaxy, Google Pixel
Q54. What? Jobs Rules And How Customer Support
Customer support jobs involve following rules and providing assistance to customers.
Customer support jobs require following company policies and procedures.
Customer support representatives must have good communication and problem-solving skills.
They should be knowledgeable about the products or services they are supporting.
Customer support agents need to be patient, empathetic, and able to handle difficult customers.
They should be able to multitask and manage their time effec...read more
How does React works in the background when the state changes?
Q56. How would you handle an angry customer?
I would listen to their concerns, empathize with their situation, and offer a solution to their problem.
Remain calm and professional
Listen actively to the customer's concerns
Empathize with their situation and apologize for any inconvenience
Offer a solution to their problem, and if necessary, escalate the issue to a supervisor
Follow up with the customer to ensure their satisfaction
Q57. How to secure endpoints in REST APIs? What is JWT Token?
JWT token is used to secure endpoints in REST APIs by providing authentication and authorization.
JWT stands for JSON Web Token
It is a compact, URL-safe means of representing claims to be transferred between two parties
It is used for authentication and authorization
It contains three parts: header, payload, and signature
The header contains the algorithm used to sign the token
The payload contains the claims or information about the user
The signature is used to verify the authent...read more
Q58. If you found/ raise a bug on the bug tracking tool and the developer review the bug and sends it back to you on the same day. What is the reason. Explain.
The developer reviewed and sent back the bug on the same day.
The developer may have fixed the bug quickly.
The developer may have found the bug to be invalid or not reproducible.
The developer may have requested more information or clarification.
The developer may have sent the bug back for further testing or verification.
The developer may have sent the bug back for a second opinion or review.
Q59. What do you understand by women impowerment?
Women empowerment refers to the process of providing women with the power and resources to make their own decisions and control their own lives.
It involves promoting gender equality and ensuring that women have access to education, healthcare, and economic opportunities.
It also involves challenging traditional gender roles and stereotypes that limit women's potential.
Examples of women empowerment initiatives include providing microfinance loans to women entrepreneurs, promoti...read more
Q60. What are the Thickness used to Manufacture In your Industry
The thickness used to manufacture in the mechanical engineering design industry varies depending on the specific application and materials involved.
The thickness of components can range from very thin, such as sheet metal with thicknesses measured in millimeters, to thick structures like heavy machinery components with thicknesses measured in centimeters or even meters.
The choice of thickness is determined by factors such as the mechanical strength requirements, material prop...read more
Q61. Please tell me about the pf deduction criteria?
The PF deduction criteria refers to the rules and regulations for deducting Provident Fund contributions from an employee's salary.
PF deduction is mandatory for employees earning a basic salary of Rs. 15,000 or more per month.
The contribution is calculated as a percentage of the employee's basic salary and dearness allowance.
Both the employee and employer contribute to the PF account.
The current contribution rate is 12% of the basic salary and dearness allowance.
The employer ...read more
What are the phases of each component of React lifecycle?
Q63. What is Mac address and can we change the Mac address.
MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment.
MAC stands for Media Access Control
It is a 48-bit address
It is used to identify devices on a network
It cannot be changed permanently, but can be spoofed temporarily
Example: 00:1A:C2:7B:00:47
Q65. 3) What is call by value and call hy refarance?
Call by value and call by reference are two ways of passing arguments to a function.
Call by value passes a copy of the argument value to the function.
Call by reference passes a reference to the memory location of the argument.
Call by value is used for simple data types like int, float, etc.
Call by reference is used for complex data types like arrays, structures, etc.
Q66. what do you know about SQL , Unix , explain in brief
SQL is a database language used to manage data. Unix is an operating system used for servers and workstations.
SQL is used to create, modify, and query databases.
Unix is a command-line interface used for file management, process control, and networking.
SQL can be used with various database management systems like MySQL, Oracle, and SQL Server.
Unix commands include ls, cd, grep, and chmod.
SQL and Unix are commonly used in web development and data analysis.
Q67. Which are the operations performed on sheet metal to increase the strength of it without changing thickness?
Operations like bending, folding, and crimping can increase the strength of sheet metal without changing its thickness.
Bending: This process involves bending the sheet metal along a straight line to increase its strength.
Folding: Folding the sheet metal creates multiple layers, increasing its strength.
Crimping: Crimping involves creating small indentations or folds in the sheet metal to increase its rigidity.
Rolling: Rolling the sheet metal can also increase its strength by c...read more
Q68. Can you describe “method overloading” versus “method overriding”? Does it happen at compile time or runtime?
Method overloading is when multiple methods have the same name but different parameters. Method overriding is when a subclass provides a different implementation of a method from its superclass.
Method overloading allows a class to have multiple methods with the same name but different parameters.
Method overriding occurs when a subclass provides a different implementation of a method that is already defined in its superclass.
Method overloading is resolved at compile time based...read more
Q69. What would be your suggestion for implementation in azure data factory v2?
My suggestion for implementation in Azure Data Factory v2 is to use the Mapping Data Flow feature.
Utilize Mapping Data Flow for complex data transformations
Take advantage of the visual interface to design and debug data flows
Leverage the built-in data integration capabilities with other Azure services
Use data flow parameters and expressions for dynamic transformations
Monitor and optimize data flow performance using data flow debug and profiling
Q70. What is router and modem the difference?
A router is a device that connects multiple networks and directs traffic between them, while a modem is a device that connects a computer or network to the internet.
A router is used to create and manage a local area network (LAN) by directing data packets between devices.
A modem is used to connect a computer or network to an internet service provider (ISP) to access the internet.
Routers can be wired or wireless, while modems are typically wired.
Routers have multiple Ethernet ...read more
Q71. What do you think about this pandemic affect on world ?
The pandemic has had a significant impact on the world.
The pandemic has caused widespread illness and death.
It has also led to economic downturns and job losses.
Many countries have implemented lockdowns and other measures to slow the spread of the virus.
The pandemic has highlighted existing inequalities and disparities in healthcare systems.
It has also led to increased use of technology for remote work and communication.
Vaccines have been developed and distributed to combat t...read more
Q72. How to repair PST and how can you access mails in PST?
To repair PST, use the built-in scanpst.exe tool and to access mails in PST, use Microsoft Outlook.
To repair PST, locate and run the scanpst.exe tool which is usually found in the Microsoft Office folder.
Follow the prompts to select the PST file and initiate the repair process.
To access mails in PST, open Microsoft Outlook and select 'Open Outlook Data File' from the File menu.
Navigate to the location of the PST file and select it to open and access the mails.
Ensure that the ...read more
Q73. What are the components of customer satisfaction?
Components of customer satisfaction include quality of product/service, responsiveness, empathy, communication, and problem-solving.
Quality of product/service
Responsiveness
Empathy
Communication
Problem-solving
Q74. 1. Fundamentals of estimation techniques. 2. Which all pm tools have you worked on? 3. How do you handle critical but resisting key stakeholders?
Fundamentals of estimation techniques, PM tools used, and handling critical stakeholders.
For estimation techniques, use historical data, expert judgment, and three-point estimation.
I have worked on tools like JIRA, Trello, and Asana.
To handle critical stakeholders, identify their concerns and address them, involve them in decision-making, and communicate regularly.
Example: In a project, a key stakeholder was resistant to a change in the project scope. I scheduled a meeting wi...read more
Q75. How do you select a Flanges and where is it used
Flanges are selected based on factors like pressure rating, material compatibility, and application requirements.
Flanges are selected based on the pressure rating required for the specific application.
Material compatibility is crucial in selecting flanges to ensure they can withstand the intended environment.
Application requirements such as temperature, fluid type, and pipe size also influence flange selection.
Common types of flanges include weld neck, slip-on, socket weld, a...read more
Q76. what is the difference between call by value and call by reference?
Call by value passes a copy of the value while call by reference passes a reference to the value.
Call by value passes a copy of the value to the function while call by reference passes a reference to the value.
In call by value, any changes made to the parameter inside the function do not affect the original value outside the function.
In call by reference, any changes made to the parameter inside the function affect the original value outside the function.
Call by value is used...read more
Q77. How will you handle escalation calls?
I will listen to the customer's issue, empathize with them, and provide a solution that meets their needs.
Listen actively to the customer's issue and let them vent their frustration
Empathize with the customer and acknowledge their feelings
Provide a solution that meets the customer's needs and resolves the issue
If necessary, escalate the call to a supervisor or manager for further assistance
Follow up with the customer to ensure their issue has been resolved to their satisfacti...read more
Q78. Do you have aadhaar card with phone number linked with it?
Yes, I have an Aadhaar card with a phone number linked to it.
I have linked my phone number to my Aadhaar card for easy verification and authentication.
Having a linked phone number helps in receiving important updates and notifications related to Aadhaar.
It also helps in availing various government services that require Aadhaar authentication.
I can provide my Aadhaar number and linked phone number for verification purposes.
Given a string S, remove consecutive duplicates from it recursively.
Input Format :
String S
Output Format :
Output string
Constraints :
1 <= |S| <= 10^3 where |S| represents the length of s...read more
1. Benefits of Learning Data Structures ?
2. Can you explain the difference between file structure and storage structure?
3. What is a multidimensional array?
4. What is a stack? What are the applicat...read more
Q81. Tell us something about Indian farming? What is customer service, What is resolution? What is more convenient work from home or work from the office?
Indian farming is an integral part of the country's economy, with diverse crops and farming practices.
Indian farming is characterized by a wide variety of crops grown across different regions.
The country is known for its production of rice, wheat, sugarcane, cotton, and spices.
Farming practices in India range from traditional methods to modern techniques, depending on the region and crop.
The Green Revolution in the 1960s brought significant advancements in agricultural produc...read more
Q82. What is adf_publish, what if data factory deleted, what if trigger executed and pipeline execution failed. How to know and how to handle, and also on transformations like which IR is used.
adf_publish is a command to publish data factory artifacts. Handling deletion, trigger execution, pipeline failure, and IR usage can be done through monitoring and logging.
adf_publish is used to publish data factory artifacts such as pipelines, datasets, and linked services
If data factory is deleted, all artifacts will be deleted as well. It is important to have backups and version control in place
Trigger execution can be monitored through the Trigger Runs tab in the Azure po...read more
Q84. Tell me something about cricket in English as well as Hindi language for 2 minutes each
Cricket is a popular sport played worldwide with a rich history and diverse culture.
Cricket originated in England in the 16th century and has since spread to many countries.
It is a bat-and-ball game played between two teams of eleven players each.
The objective is to score more runs than the opposing team while taking turns to bat and bowl.
Cricket has many formats including Test, One Day International, and Twenty20.
India is one of the biggest cricket-playing nations and has a ...read more
Q85. Write a code in angular to fetch JSON response from given URL and display in tabular format.
Angular code to fetch and display JSON response in tabular format.
Use HttpClient module to make an HTTP GET request to the given URL.
Subscribe to the response and extract the JSON data.
Create an Angular component to display the data in a tabular format using HTML and CSS.
Q86. Can you see the door behind you. How much force is required to open it if wind velocity if 20km per hour outside.
The force required to open the door depends on various factors such as the size of the door, the type of handle, and the direction of the wind.
The size and weight of the door will determine the force required to open it.
The type of handle or knob on the door can also affect the force needed to open it.
The direction of the wind can make it easier or harder to open the door.
Without knowing the specific details of the door, it is impossible to accurately determine the force requ...read more
How can you find the largest or smallest number in an array of integers?
What is an AVL Tree?
What is the difference between tree and graph data structure?
Oops concepts with principal.
Basic ...read more
Q88. Draw shear for and Bending Moment Diagram for the Given Drawing (Cantilever Beam)
Draw shear and bending moment diagrams for a cantilever beam.
Calculate reactions at the support
Determine the equation of the shear force diagram
Determine the equation of the bending moment diagram
Plot the diagrams using the equations
Check for accuracy and consistency
Q89. How do you deal with customers through email, Do you have any experience handling this?
Yes
I have extensive experience dealing with customers through email
I prioritize clear and concise communication to address customer inquiries and concerns
I ensure prompt responses and follow-ups to maintain customer satisfaction
I have successfully resolved complex issues and provided technical guidance via email
I maintain a professional and empathetic tone in all customer interactions
Q90. Difference between accounts payable and receivable, Debit and credit note, Real, nominal account Accounts Payable cycle
Accounts payable is money owed by a company to its suppliers, while accounts receivable is money owed to a company by its customers.
Accounts payable refers to the money a company owes to its suppliers for goods or services received.
Accounts receivable refers to the money owed to a company by its customers for goods or services provided.
Debit note is a document issued by a buyer to a seller to request a credit against an overpayment or return of goods.
Credit note is a document...read more
Q91. What is you know about customer service. Tell us about online shopping apps. Are you buying anything from online shopping. If yes ,then how was your experience.
Customer service is about providing assistance and support to customers. Online shopping apps are platforms that allow customers to purchase products and services online.
Customer service involves addressing customer needs and concerns in a timely and effective manner.
Online shopping apps provide convenience and accessibility for customers to shop from anywhere at any time.
My experience with online shopping has been positive overall, with fast delivery and easy returns.
However...read more
Q92. What is technical issue in Desktop support Engineer
Technical issues in Desktop Support Engineer involve hardware, software, network, and security problems.
Hardware issues such as malfunctioning components or peripherals
Software issues such as installation errors or compatibility problems
Network issues such as connectivity or configuration problems
Security issues such as malware infections or unauthorized access
Examples include printer not working, slow computer performance, and internet connection problems
Q93. 4) How does C++ support Polymorphism?
C++ supports polymorphism through virtual functions and inheritance.
Polymorphism allows objects of different classes to be treated as if they were of the same class.
Virtual functions are declared in the base class and overridden in the derived class.
Dynamic binding is used to determine which function to call at runtime.
Examples include function overriding, templates, and operator overloading.
Q95. What do you know about class loading? Explain Java class loaders? If you have a class in a package, what do you need to do to run it? Explain dynamic class loading?
Explanation of Java class loading and dynamic class loading.
Java class loaders are responsible for loading classes into the JVM.
There are three types of class loaders: bootstrap, extension, and application.
To run a class in a package, you need to specify the fully qualified name of the class.
Dynamic class loading allows classes to be loaded at runtime instead of compile time.
This can be useful for plugins or modules that are not known at compile time.
Q97. How many projects or process you implemented in RE framework?
I have implemented RE framework in 3 projects.
Implemented RE framework in 3 projects
Used RE framework for automating end-to-end processes
Leveraged RE framework's modular structure for easy maintenance
Examples: Invoice processing, Order management, HR onboarding
Q98. Tell about the best tourist place in UP
Taj Mahal, a UNESCO World Heritage Site, is the best tourist place in Uttar Pradesh (UP).
Taj Mahal is a magnificent white marble mausoleum located in Agra, UP.
It was built by Mughal Emperor Shah Jahan in memory of his wife Mumtaz Mahal.
The architectural beauty, intricate carvings, and stunning gardens make it a must-visit destination.
Taj Mahal is considered one of the Seven Wonders of the World.
Tourists can explore the grandeur of the main mausoleum, visit the beautiful mosqu...read more
Q99. Lets say you have table 1 with values 1,2,3,5,null,null,0 and table 2 has null,2,4,7,3,5 What would be the output after inner join?
The output after inner join of table 1 and table 2 will be 2,3,5.
Inner join only includes rows that have matching values in both tables.
Values 2, 3, and 5 are present in both tables, so they will be included in the output.
Null values are not considered as matching values in inner join.
Q100. How do you design an effective ADF pipeline and what all metrics and considerations you should keep in mind while designing?
Designing an effective ADF pipeline involves considering various metrics and factors.
Understand the data sources and destinations
Identify the dependencies between activities
Optimize data movement and processing for performance
Monitor and track pipeline execution for troubleshooting
Consider security and compliance requirements
Use parameterization and dynamic content for flexibility
Implement error handling and retries for robustness
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month