
Tech Mahindra


200+ Tech Mahindra Interview Questions and Answers for Freshers
Q1. How many projects or process you implemented in RE framework?
I have implemented RE framework in 3 projects.
Implemented RE framework in 3 projects
Used RE framework for automating end-to-end processes
Leveraged RE framework's modular structure for easy maintenance
Examples: Invoice processing, Order management, HR onboarding
Q2. 1) What is NullPointerExceprion and give me a example?
NullPointerException is a runtime exception that occurs when a program tries to access or use an object reference that is null.
It is a common exception in Java programming.
It is thrown when a program attempts to use an object reference that has not been initialized.
It indicates that there is an attempt to access or invoke a method on an object that is null.
Example: String str = null; str.length();
Q3. 2) Can you call the base class method without creating an instance?
Yes, by using the super() method in the derived class.
super() method calls the base class method
Derived class must inherit from the base class
Example: class Derived(Base): def method(self): super().method()
Q4. 5) What are access specifiers and what is their significance?
Access specifiers define the level of access to class members. They ensure encapsulation and data hiding in object-oriented programming.
Access specifiers are keywords used in class definitions to specify the access level of class members.
There are three access specifiers in C++: public, private, and protected.
Public members can be accessed from anywhere in the program, while private members can only be accessed within the class.
Protected members can be accessed within the cla...read more
Q5. What do you do incase of bot execution failure
In case of bot execution failure, I would identify the root cause and fix it as soon as possible.
Check the logs to identify the error message and the point of failure
Analyze the code to identify the root cause of the failure
Fix the issue and test the bot again to ensure it is working as expected
Implement measures to prevent similar failures in the future
Q6. 3) What is call by value and call hy refarance?
Call by value and call by reference are two ways of passing arguments to a function.
Call by value passes a copy of the argument value to the function.
Call by reference passes a reference to the memory location of the argument.
Call by value is used for simple data types like int, float, etc.
Call by reference is used for complex data types like arrays, structures, etc.
Q7. 4) How does C++ support Polymorphism?
C++ supports polymorphism through virtual functions and inheritance.
Polymorphism allows objects of different classes to be treated as if they were of the same class.
Virtual functions are declared in the base class and overridden in the derived class.
Dynamic binding is used to determine which function to call at runtime.
Examples include function overriding, templates, and operator overloading.
Q8. What is oops concepts
OOPs concepts are the principles of Object-Oriented Programming that focus on encapsulation, inheritance, and polymorphism.
Encapsulation: bundling of data and methods that manipulate the data within a single unit
Inheritance: ability of a class to inherit properties and methods from a parent class
Polymorphism: ability of objects to take on multiple forms or behaviors
Abstraction: hiding the implementation details of a class from the outside world
Example: A car is an object that...read more
Q9. What is opps nd briefly about oops and variables
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs is a way of organizing and designing code around objects
Variables are used to store data within an object
In OOPs, variables are also known as properties or attributes
Variables can have different access modifiers like public, private, protected
Example: A car object can have properties like color, model, and speed
Q10. what is the difference between java and c++
Java is a high-level, object-oriented programming language, while C++ is a low-level, multi-paradigm language.
Java is platform-independent, while C++ is platform-dependent.
Java uses automatic garbage collection, while C++ requires manual memory management.
Java does not support pointers, while C++ does.
Java has a simpler syntax compared to C++.
Java is more secure due to its strong type checking and exception handling mechanisms.
Q11. Conversion operation in string
Conversion operation in string
String conversion can be done using built-in functions like parseInt(), parseFloat(), toString(), etc.
Conversion can also be done using regular expressions and string manipulation techniques.
It is important to handle errors and edge cases while performing string conversion.
Q12. How would you handle an irated CX and what is the meaning of emotions according to you ?.
Handling irate customers and understanding emotions
Listen actively and empathize with the customer's situation
Apologize for the inconvenience caused and assure them of a solution
Offer a solution or escalate the issue to a higher authority if necessary
Understand that emotions are subjective and can vary from person to person
Emotions are a natural response to a situation and should be acknowledged and respected
Q13. What is BPO and why it is important for the company?
BPO stands for Business Process Outsourcing. It is important for companies to outsource non-core business functions to focus on core competencies.
BPO involves contracting non-core business functions to a third-party service provider.
It helps companies to reduce costs, increase efficiency, and focus on core competencies.
Examples of BPO services include customer support, accounting, human resources, and IT services.
BPO can be onshore, nearshore, or offshore depending on the loc...read more
Q14. 1. what is a technical interview?
A technical interview is a job interview for positions in the technology industry where candidates are evaluated on their technical skills and knowledge.
Technical interviews typically involve coding challenges, problem-solving exercises, and discussions about technical concepts.
Candidates may be asked to write code on a whiteboard, solve algorithmic problems, or explain their approach to solving a technical challenge.
Interviewers may also ask questions about the candidate's e...read more
Q15. What is a difference between router and modem?
A router connects multiple devices to a network and directs traffic, while a modem connects a network to the internet.
A router is used to create a local area network (LAN) and connect multiple devices to it.
A modem is used to connect a network to the internet.
A router directs traffic between devices on the network and manages the flow of data.
A modem converts digital signals from the network into analog signals that can be transmitted over a phone or cable line.
Examples of ro...read more
Q16. How will you handle irrated customers?
I will listen to their concerns, empathize with them, and offer a solution to their problem.
Listen actively to their complaints without interrupting them
Empathize with their situation and show understanding
Offer a solution to their problem and follow up to ensure their satisfaction
Remain calm and professional throughout the interaction
Apologize for any inconvenience caused and take responsibility for the issue
Provide options to resolve the issue and let the customer choose th...read more
Q17. Diff between single inheritance and multiple inheritance
Single inheritance allows a class to inherit from only one parent class, while multiple inheritance allows a class to inherit from multiple parent classes.
Single inheritance: class A can inherit from class B.
Multiple inheritance: class A can inherit from class B and class C.
Single inheritance is simpler and easier to understand.
Multiple inheritance can lead to ambiguity and complexity, known as the diamond problem.
Languages like Java support single inheritance, while language...read more
Q18. What is IOT, angular js, give some live examples
IOT is the interconnection of physical devices, while AngularJS is a JavaScript framework for web development.
IOT enables devices to communicate and exchange data, leading to automation and efficiency in various industries.
Examples of IOT include smart homes, wearable devices, and industrial automation.
AngularJS simplifies web development by providing a framework for building dynamic and responsive web applications.
Examples of AngularJS include Google Analytics, PayPal, and T...read more
Q19. Which stream you are working
I am currently working in the software development stream.
Working in software development stream
Experience in coding and programming
Familiar with various programming languages
Q20. Which programming language you are comfortable with?
I am comfortable with multiple programming languages including Java, Python, and JavaScript.
Proficient in Java for backend development
Experienced in Python for data analysis and machine learning
Skilled in JavaScript for frontend development
Familiar with SQL for database management
Comfortable with C++ for competitive programming
Q21. Discribe regarding SQL?
SQL is a programming language used to manage and manipulate relational databases.
SQL stands for Structured Query Language
It is used to create, modify, and query databases
SQL is used in various industries including finance, healthcare, and e-commerce
Common SQL commands include SELECT, INSERT, UPDATE, and DELETE
Q22. Difference between regression, sanity and smoke
Regression, sanity, and smoke testing are different types of software testing.
Regression testing is done to ensure that new code changes do not negatively impact existing functionality.
Sanity testing is a narrow and focused testing to quickly determine if a new functionality is working as expected.
Smoke testing is a preliminary testing to check if the software build is stable enough for further testing.
Regression testing is comprehensive and time-consuming, sanity testing is ...read more
Q23. What is the difference between hubs and switches?
Hubs broadcast data to all connected devices, while switches only send data to the intended recipient.
Hubs operate at the physical layer of the OSI model, while switches operate at the data link layer.
Hubs are less expensive than switches, but switches offer better performance and security.
Hubs are often used in small networks, while switches are used in larger networks.
Example of a hub: Netgear 5-Port Fast Ethernet Unmanaged Switch
Example of a switch: Cisco Catalyst 2960 Ser...read more
Q24. How will you handle escalation calls?
I will listen to the customer's issue, empathize with them, and provide a solution that meets their needs.
Listen actively to the customer's issue and let them vent their frustration
Empathize with the customer and acknowledge their feelings
Provide a solution that meets the customer's needs and resolves the issue
If necessary, escalate the call to a supervisor or manager for further assistance
Follow up with the customer to ensure their issue has been resolved to their satisfacti...read more
Q25. It long form and definition
Long form refers to the complete or expanded version of an acronym or abbreviation.
Long form is used to provide clarity and avoid confusion.
It is commonly used in technical fields and academia.
Examples include NASA (National Aeronautics and Space Administration) and AIDS (Acquired Immune Deficiency Syndrome).
Q26. Tell me something about cricket in English as well as Hindi language for 2 minutes each
Cricket is a popular sport played worldwide with a rich history and diverse culture.
Cricket originated in England in the 16th century and has since spread to many countries.
It is a bat-and-ball game played between two teams of eleven players each.
The objective is to score more runs than the opposing team while taking turns to bat and bowl.
Cricket has many formats including Test, One Day International, and Twenty20.
India is one of the biggest cricket-playing nations and has a ...read more
Q27. Suddenly how to take design when there is no one senior are present in his/her office that time, what you to do?
I would refer to the company's design guidelines and consult with other team members before making a decision.
Check the company's design guidelines for guidance
Consult with other team members for their input
Consider the project's goals and requirements
Make a decision based on the available information
Document the decision and reasoning for future reference
Q28. Do you have aadhaar card with phone number linked with it?
Yes, I have an Aadhaar card with a phone number linked to it.
I have linked my phone number to my Aadhaar card for easy verification and authentication.
Having a linked phone number helps in receiving important updates and notifications related to Aadhaar.
It also helps in availing various government services that require Aadhaar authentication.
I can provide my Aadhaar number and linked phone number for verification purposes.
Q29. 1.what is kyc 2. Why kyc is important 3.what is money laundering 4.what are the stages of money laundering 5. What do you mean by CDD and EDD 6. Finance related questions to check the subject knowledge 7. What...
read moreQuestions related to KYC, money laundering, CDD, EDD, and finance were asked for the Associate Analyst position.
KYC stands for Know Your Customer and is the process of verifying the identity of a customer.
KYC is important to prevent fraud, money laundering, and terrorist financing.
Money laundering is the process of making illegally obtained money appear legitimate.
The stages of money laundering include placement, layering, and integration.
CDD stands for Customer Due Diligence...read more
Q30. What is Mac address and can we change the Mac address.
MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment.
MAC stands for Media Access Control
It is a 48-bit address
It is used to identify devices on a network
It cannot be changed permanently, but can be spoofed temporarily
Example: 00:1A:C2:7B:00:47
Q31. 1) What is Difference between shared printer and network printer?
A shared printer is connected to a single computer and can be accessed by other computers on the same network. A network printer is directly connected to the network and can be accessed by multiple computers.
Shared printer is connected to a single computer, while network printer is directly connected to the network.
Shared printer can be accessed by other computers on the same network, while network printer can be accessed by multiple computers.
Shared printer requires the comp...read more
Q32. Delete Nodes with Greater Values On Right
You are given a singly linked list where each node contains an integer value and a reference to the next node or NULL if it is the last node. The task is to remove all ...read more
Remove nodes in a singly linked list with a greater value on the right.
Traverse the linked list and compare each node's value with the values of nodes to its right.
If a node has a greater value on the right, remove it from the linked list.
Update the references of the previous node to skip the removed node.
Q33. What is the difference b/w confidence and over confidence?
Confidence is having faith in one's abilities while overconfidence is having excessive faith in one's abilities.
Confidence is a positive trait that helps individuals achieve their goals while overconfidence can lead to complacency and mistakes.
Confidence is based on experience and knowledge while overconfidence is often based on assumptions and arrogance.
Confidence allows individuals to take calculated risks while overconfidence can lead to reckless behavior.
For example, a co...read more
Q34. What is your streight
My strength lies in my ability to empathize with customers and provide personalized solutions to their problems.
Strong communication skills
Active listening
Empathy
Problem-solving
Patience
Adaptability
Product knowledge
Conflict resolution
Time management
Q35. Child labour in India
Child labour is a prevalent issue in India.
India has the highest number of child labourers in the world.
Children are often forced to work in hazardous conditions.
Lack of education and poverty are major factors contributing to child labour.
The Indian government has implemented laws to combat child labour, but enforcement is weak.
Industries such as textiles, agriculture, and mining are known to employ child labourers.
Q36. 1)What was the introduced in c programming? 2
C introduced structured programming and allowed modular programming with functions.
C introduced the concept of structured programming with the use of control structures like if-else, for, while, and switch-case.
It also allowed modular programming with the use of functions, which could be reused in different parts of the program.
C also introduced the concept of pointers, which allowed direct manipulation of memory addresses.
Examples of C programs include operating systems, dev...read more
Q37. Counting Even and Odd Occurrences
You are provided with an array or list of integers named ARR
of size N
. The task is to determine two things:
- How many elements appear an odd number of times?
- How many elements...read more
Count the number of elements with odd and even occurrences in an array of integers.
Iterate through the array and use a hashmap to store the count of each element.
After counting, iterate through the hashmap to determine odd and even occurrences.
Return the counts of elements with odd and even occurrences.
Q38. What is the role of "Sorry" word in customer care executive job.
The word 'Sorry' plays a crucial role in customer care executive job as it helps in acknowledging mistakes, showing empathy, and resolving customer issues.
Apologizing for any inconvenience caused to the customer
Expressing empathy towards the customer's situation
Taking responsibility for any errors or misunderstandings
Resolving customer issues promptly and effectively
Using 'Sorry' as a tool to maintain positive customer relationships
Q39. 1. What is kyc? 2.Why kyc is important? 3. What is money laundering? 4. What are the stages of money laundering? 5.What do you mean by CDD and EDD? 6. Finance related questions to check the subject knowledge 7....
read moreAnswering questions related to KYC, money laundering, and finance
KYC stands for Know Your Customer and is the process of verifying the identity of a customer or client
KYC is important to prevent fraud, money laundering, and terrorist financing
Money laundering is the process of making illegally obtained money appear legitimate
The stages of money laundering include placement, layering, and integration
CDD stands for Customer Due Diligence and is the process of verifying the iden...read more
Q40. Uses of turbine and types of turbinew
Turbines are used to convert kinetic energy into mechanical energy. There are various types of turbines such as steam, gas, and hydraulic.
Turbines are used in power generation, aviation, and marine propulsion.
Steam turbines are used in thermal power plants to generate electricity.
Gas turbines are used in aircraft engines and power plants.
Hydraulic turbines are used in hydroelectric power plants.
Wind turbines are used to generate electricity from wind energy.
Turbines can be cl...read more
Q41. Explain operators in
Operators in programming are symbols that perform specific operations on one or more operands.
Operators can be arithmetic (+, -, *, /), assignment (=), comparison (==, !=, <, >), logical (&&, ||, !), bitwise (&, |, ^), etc.
Unary operators operate on a single operand, while binary operators operate on two operands.
Examples: 5 + 3 (addition), x = 10 (assignment), a == b (comparison), true && false (logical)
Q42. Tell me avkit yourslef
I am a dedicated and passionate software engineer with experience in Java, Python, and web development.
Experienced in Java, Python, and web development technologies
Strong problem-solving skills
Excellent communication and teamwork abilities
Q43. How would you deal with aged customer
I would provide patient and attentive service, taking into account any physical or cognitive limitations.
Speak clearly and slowly, allowing time for the customer to process information
Use simple language and avoid technical jargon
Be patient and understanding, allowing the customer to take their time
Offer assistance with any physical tasks, such as carrying bags or opening doors
Ensure the customer is comfortable and has access to any necessary amenities, such as seating or wat...read more
Q44. Different between empathy and sympathy
Empathy is feeling what someone else is feeling, while sympathy is feeling sorry for someone else's feelings.
Empathy is putting yourself in someone else's shoes and experiencing their emotions
Sympathy is acknowledging someone else's emotions and feeling sorry for them
Empathy is more active and involves understanding and sharing the emotions of others
Sympathy is more passive and involves acknowledging the emotions of others
Example: Empathy is feeling sad when your friend is go...read more
Q45. How you handle the problem of customer?
I handle customer problems by actively listening, empathizing, and finding a solution that meets their needs.
Listen actively to the customer's concerns and complaints
Empathize with the customer and acknowledge their frustration
Offer a solution that meets the customer's needs and resolves the issue
Follow up with the customer to ensure their satisfaction
Maintain a positive and professional attitude throughout the interaction
Q46. Poverty situation in India
Poverty is a major issue in India with a large percentage of the population living below the poverty line.
India has a poverty rate of around 21.9% as of 2020
Poverty is more prevalent in rural areas than in urban areas
Lack of access to education, healthcare, and basic amenities contribute to the poverty situation
Government initiatives like the National Rural Employment Guarantee Act (NREGA) and Pradhan Mantri Jan Dhan Yojana (PMJDY) aim to alleviate poverty
Q47. Explain about osi and its layers?
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers, each responsible for specific functions.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer interacts with the layer above a...read more
Q48. What is technical issue in Desktop support Engineer
Technical issues in Desktop Support Engineer involve hardware, software, network, and security problems.
Hardware issues such as malfunctioning components or peripherals
Software issues such as installation errors or compatibility problems
Network issues such as connectivity or configuration problems
Security issues such as malware infections or unauthorized access
Examples include printer not working, slow computer performance, and internet connection problems
Q49. How to a write a programming languages in software developer
To write a programming language as a software developer, one must understand the syntax, semantics, and design principles of programming languages.
Understand the syntax and grammar rules of the language.
Define the semantics of the language, including how statements and expressions are interpreted.
Design the language features and constructs based on the intended use cases.
Implement the language using a compiler or interpreter.
Test and debug the language implementation to ensur...read more
Q50. Terms and condition
Terms and conditions are rules and guidelines that users must agree to follow in order to use a service or product.
Terms and conditions outline the rights and responsibilities of both the user and the company providing the service.
They often include information about privacy policies, payment terms, and usage restrictions.
Users are typically required to agree to the terms and conditions before using a service or product.
Examples of terms and conditions can be found on website...read more
Q51. Lets say you have table 1 with values 1,2,3,5,null,null,0 and table 2 has null,2,4,7,3,5 What would be the output after inner join?
The output after inner join of table 1 and table 2 will be 2,3,5.
Inner join only includes rows that have matching values in both tables.
Values 2, 3, and 5 are present in both tables, so they will be included in the output.
Null values are not considered as matching values in inner join.
Q52. How do you design an effective ADF pipeline and what all metrics and considerations you should keep in mind while designing?
Designing an effective ADF pipeline involves considering various metrics and factors.
Understand the data sources and destinations
Identify the dependencies between activities
Optimize data movement and processing for performance
Monitor and track pipeline execution for troubleshooting
Consider security and compliance requirements
Use parameterization and dynamic content for flexibility
Implement error handling and retries for robustness
Q53. Difference between online and offline shopping
Online shopping is convenient and offers a wider range of products, while offline shopping allows for physical inspection and immediate gratification.
Online shopping can be done from anywhere with an internet connection.
Offline shopping allows for physical inspection of products before purchase.
Online shopping offers a wider range of products and often better prices.
Offline shopping allows for immediate gratification and eliminates shipping time.
Online shopping may require ad...read more
Q54. What is CX care'excutive
CX care executive is a customer support professional who provides assistance and resolves issues related to customer experience.
CX care executive is responsible for ensuring customer satisfaction and loyalty.
They handle customer queries, complaints, and feedback through various channels like phone, email, chat, etc.
They work towards improving the overall customer experience by identifying areas of improvement and suggesting solutions.
Examples of CX care executives include cus...read more
Q55. What is software and how to developing software
Software is a set of instructions that tells a computer how to perform specific tasks. Developing software involves designing, coding, testing, and maintaining programs.
Software is a collection of programs, data, and documentation that performs specific tasks on a computer.
Developing software involves analyzing user requirements, designing the software architecture, coding the program, testing for bugs, and maintaining the software.
Examples of software development tools inclu...read more
Q56. Tell me about Ai? Do you know about machine learning? Tell me some smart home devices how they does work?
AI stands for Artificial Intelligence, which involves the development of computer systems that can perform tasks that typically require human intelligence.
AI is a branch of computer science that aims to create intelligent machines capable of learning and problem-solving.
Machine learning is a subset of AI that involves training algorithms to learn from data and make predictions or decisions.
Smart home devices use AI and machine learning to automate tasks and improve efficiency...read more
Q57. What is difference between Sympathy and Empathy?
Sympathy is feeling sorry for someone, while empathy is understanding and sharing the feelings of another.
Sympathy is acknowledging someone's emotions without necessarily feeling them yourself
Empathy involves putting yourself in someone else's shoes and truly understanding their emotions
Sympathy is more surface-level, while empathy requires a deeper emotional connection
Example: Sympathy - 'I'm sorry you're going through a tough time.' Empathy - 'I can imagine how difficult th...read more
Q58. What is your typing speed and your fluency in English?
My typing speed is 70 words per minute and I am fluent in English.
Typing speed: 70 words per minute
Fluency in English: Fluent
Experience in customer support roles requiring strong typing and language skills
Q59. What is looping statement?
A looping statement is used to execute a block of code repeatedly until a certain condition is met.
Looping statements are used to automate repetitive tasks.
Common looping statements include for, while, and do-while loops.
For example, a for loop can be used to iterate through an array and perform a certain action on each element.
A while loop can be used to repeatedly execute a block of code as long as a certain condition is true.
A do-while loop is similar to a while loop, but ...read more
Q60. What is built in function?
Built-in functions are pre-defined functions in programming languages that can be used without defining them first.
Built-in functions are part of the language's standard library
They are designed to perform common tasks such as string manipulation, math operations, and input/output
Examples of built-in functions in Python include print(), len(), and range()
They can save time and effort by providing pre-written code for common tasks
Q61. What is aadhar card (because i am in aadhhar process)
Aadhaar card is a unique identification card issued by the Indian government to residents of India.
Aadhaar card is a 12-digit unique identification number issued by the Unique Identification Authority of India (UIDAI).
It serves as proof of identity and address for Indian residents.
Aadhaar card contains biometric and demographic information of the cardholder, including fingerprints and iris scans.
It is used for various purposes such as opening bank accounts, getting a SIM card...read more
Q62. What is Good CuStomEr service
Good customer service is providing prompt, efficient, and friendly assistance to customers.
Responding to customer inquiries and complaints in a timely manner
Being knowledgeable about the product or service being offered
Treating customers with respect and empathy
Going above and beyond to meet customer needs
Providing clear and concise communication
Following up with customers to ensure satisfaction
Offering solutions and alternatives to problems
Being proactive in addressing poten...read more
Q63. How Can You Ensure High Availability of the etcd Cluster Used by Kubernetes?
To ensure high availability of the etcd cluster used by Kubernetes, you can implement redundancy, monitoring, and disaster recovery strategies.
Implement a multi-node etcd cluster to ensure redundancy and fault tolerance.
Utilize monitoring tools like Prometheus and Grafana to track the health and performance of the etcd cluster.
Set up regular backups and implement disaster recovery plans to quickly recover from failures.
Use Kubernetes features like PodDisruptionBudgets to prev...read more
Q64. What are routers?
Routers are networking devices that forward data packets between computer networks.
Routers connect multiple devices to the internet or other networks
They use routing tables to determine the best path for data to travel
Routers can be wired or wireless, and can be used in homes, businesses, and data centers
Examples of popular router brands include Cisco, Netgear, and TP-Link
Q65. What is the another name of induction motor
Another name for induction motor is asynchronous motor.
Asynchronous motor is commonly used in industrial applications.
It operates at a slightly slower speed than the synchronous speed.
Examples include squirrel cage induction motor and wound rotor induction motor.
Q66. What is Subnet mask
Subnet mask is a 32-bit number used to divide an IP address into network and host addresses.
It is used to identify the network portion of an IP address
It is represented in decimal format or dotted decimal notation
It is used in conjunction with IP addresses to determine network and host addresses
Q67. 4) What is the difference between BPO and KPO?
BPO stands for Business Process Outsourcing, while KPO stands for Knowledge Process Outsourcing.
BPO involves outsourcing non-core business processes, such as customer support or data entry.
KPO involves outsourcing knowledge-based processes, such as research, analysis, or consulting.
BPO focuses on operational efficiency and cost reduction, while KPO focuses on value creation and knowledge-intensive tasks.
BPO typically requires basic skills and training, while KPO requires spec...read more
Q68. Can you explain defrance between Hardware & Software.
Hardware refers to physical components of a computer while software refers to programs and applications that run on the computer.
Hardware includes components such as the motherboard, CPU, RAM, and hard drive.
Software includes programs such as Microsoft Office, Adobe Photoshop, and web browsers.
Hardware is tangible and can be physically touched while software is intangible and cannot be physically touched.
Hardware can be upgraded or replaced while software can be updated or un...read more
Q69. Tell me self interdiction.
Self-introduction is a brief overview of your background, skills, and experiences.
Start with your name and current job title
Highlight your relevant skills and experiences
Mention your career goals and why you are interested in the position
Keep it concise and engaging
Example: Hi, I'm [Your Name], a Customer Service Representative with 3 years of experience in handling customer inquiries and resolving issues. I am passionate about providing excellent service and am excited about...read more
Q70. what is the difference between centripital and centrifugal force?
Centripetal force pulls an object towards the center of a circular path, while centrifugal force pushes an object away from the center.
Centripetal force is directed towards the center of rotation, while centrifugal force is directed away from the center.
Centripetal force is responsible for keeping an object in circular motion, while centrifugal force is experienced by the object moving in a circular path.
Centripetal force is a real force, while centrifugal force is a perceive...read more
Q71. How to learning software developer
Learning software development involves studying programming languages, practicing coding, building projects, and staying updated with industry trends.
Study programming languages like Java, Python, C++, etc.
Practice coding regularly on platforms like LeetCode, HackerRank, etc.
Build projects to apply your knowledge and gain practical experience.
Stay updated with industry trends by reading blogs, attending workshops, etc.
Q72. Views on current situaqyion
My views on the current situation
The current situation is challenging due to the ongoing pandemic
There is a need for empathy and understanding in customer care during these times
Remote work has become more prevalent, requiring adaptability and effective communication
Customer expectations have changed, with a greater emphasis on safety and convenience
Technology plays a crucial role in providing seamless customer support
Collaboration and teamwork are essential for addressing cu...read more
Q73. How Would You Implement Zero-Downtime Deployments in Kubernetes?
Implementing zero-downtime deployments in Kubernetes involves using rolling updates and readiness probes.
Use rolling updates to gradually replace old pods with new ones
Configure readiness probes to ensure new pods are ready before routing traffic to them
Utilize tools like Helm for managing releases and versioning
Q74. How Would You Approach Capacity Planning for a Kubernetes Cluster?
Capacity planning for a Kubernetes cluster involves analyzing resource usage, predicting future needs, and scaling infrastructure accordingly.
Monitor resource usage of pods and nodes using tools like Prometheus and Grafana
Analyze historical data to identify trends and patterns in resource consumption
Estimate future resource requirements based on application growth and workload changes
Scale the cluster by adding or removing nodes, adjusting resource limits, or using auto-scali...read more
Q75. 2) type of the array?
The question is incomplete and lacks context. Please provide more information.
Q76. 3) What is dora process?
DORA (Discover Offer Request Acknowledge) is a process used by DHCP to assign IP addresses to devices on a network.
DORA stands for Discover, Offer, Request, and Acknowledge.
It is a four-step process used by DHCP to assign IP addresses to devices on a network.
The Discover message is sent by the client to request an IP address.
The Offer message is sent by the server with an available IP address.
The Request message is sent by the client to request the offered IP address.
The Ackn...read more
Q77. Give us ur Introduction
I am a customer care executive with excellent communication skills and a passion for helping people.
I have experience in handling customer queries and complaints
I am proficient in using customer service software and tools
I am a good listener and can empathize with customers
I am a quick learner and can adapt to new situations easily
Q78. Introduction. Upselling a product
Upselling is a technique to persuade customers to buy a more expensive or upgraded version of a product.
Understand the customer's needs and preferences
Highlight the benefits of the upgraded product
Offer discounts or promotions to sweeten the deal
Use suggestive language to encourage the customer to upgrade
Provide excellent customer service to build trust and loyalty
Q79. Speak in English 2 minutes any topic?
The importance of effective communication in customer service
Effective communication is key in customer service to understand and address customer needs
Active listening is crucial to show empathy and provide appropriate solutions
Clear and concise language helps avoid misunderstandings and build trust
Non-verbal communication such as body language and tone of voice also play a significant role
Examples: handling a customer complaint, explaining product features, resolving billin...read more
Q80. What is data structures
Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.
Data structures are used to manage and manipulate data.
They can be implemented using arrays, linked lists, trees, graphs, and other methods.
Examples include stacks, queues, hash tables, and binary search trees.
Q81. What is anonymous FTP?
Anonymous FTP allows users to access files on a server without providing login credentials.
Users can download files without needing a username or password
Can be used for public file sharing or distribution
Can pose security risks if not properly configured
Example: ftp://ftp.debian.org/debian/
Q82. What is python and sql
Python is a high-level programming language known for its simplicity and readability. SQL is a language used for managing and querying databases.
Python is used for web development, data analysis, artificial intelligence, and more
SQL is used to retrieve and manipulate data stored in relational databases
Python has a large standard library and a vibrant community of developers
SQL can be used to create, read, update, and delete data in databases
Q83. What is B.P.O and customer service
B.P.O stands for Business Process Outsourcing. It involves outsourcing non-core business functions to a third-party service provider.
B.P.O is a cost-effective way for companies to handle non-core business functions such as customer service, technical support, and back-office operations.
Customer service is a crucial aspect of B.P.O as it involves handling customer queries, complaints, and providing support.
B.P.O companies use various channels such as phone, email, chat, and so...read more
Q84. Why we need Java ? What is Polymorphism Can we use return type in constructer
Java is a widely used programming language known for its platform independence and extensive libraries.
Java is platform independent, meaning it can run on any operating system
Java has a large standard library with pre-built classes and methods for common tasks
Java is object-oriented, allowing for modular and reusable code
Java supports multithreading, enabling concurrent execution of tasks
Java has automatic memory management through garbage collection
Java is widely used in ent...read more
Q85. Project description in detail
Developed a web-based project management tool for a construction company.
Used React for the frontend and Node.js for the backend
Implemented user authentication and authorization using JWT
Integrated with Google Maps API for location tracking
Allowed users to create and assign tasks, set deadlines, and track progress
Generated reports and analytics using Chart.js
Q86. how to remove duplicate rows from bigquery? find the month of a given date in bigquery.
To remove duplicate rows from BigQuery, use the DISTINCT keyword. To find the month of a given date, use the EXTRACT function.
To remove duplicate rows, use SELECT DISTINCT * FROM table_name;
To find the month of a given date, use SELECT EXTRACT(MONTH FROM date_column) AS month_name FROM table_name;
Make sure to replace 'table_name' and 'date_column' with the appropriate values in your query.
Q87. What motor run at high speed at no load conditions
Induction motors run at high speed at no load conditions
Induction motors
Asynchronous motors
Squirrel cage motors
Q88. What do you know about Google assistant?
Google Assistant is a virtual assistant developed by Google that can engage in two-way conversations, answer questions, make recommendations, and perform tasks.
Google Assistant is available on various devices such as smartphones, smart speakers, and smart displays.
It can help users with tasks like setting reminders, sending messages, playing music, and controlling smart home devices.
Google Assistant uses artificial intelligence and natural language processing to understand an...read more
Q89. Command to check ip address
Command to check IP address
Use 'ipconfig' command on Windows
Use 'ifconfig' command on Linux/Mac
Check 'ip addr show' on Ubuntu
Q90. What are the language you know
I am proficient in English and Spanish.
English
Spanish
Q91. How do you handle difficult customers?
I remain calm, listen actively, empathize, and find solutions to resolve the issue.
Remain calm and composed
Listen actively to understand the customer's concerns
Empathize with the customer's situation
Find solutions to resolve the issue, offering alternatives if necessary
Q92. What is the Data Store
A data store is a centralized location where data is stored and organized for easy retrieval and manipulation.
Data store is used to store and manage large amounts of data.
It can be a physical device like a hard drive or a virtual storage system.
Data can be stored in various formats such as databases, files, or cloud storage.
Data stores provide mechanisms for data access, retrieval, and modification.
Examples of data stores include databases like MySQL, file systems like NTFS, ...read more
Q93. Explain the Role and Functionality of the Control Plane Components in Kubernetes.
Control plane components in Kubernetes manage the cluster and make decisions about the state of the cluster.
Control Manager: Ensures that the desired state of the cluster matches the actual state.
Scheduler: Assigns workloads to nodes based on resource availability and constraints.
API Server: Acts as the front-end for the Kubernetes control plane and is the primary interface for users and other components.
etcd: Consistent and highly-available key-value store used as Kubernetes...read more
Q94. Speak on a topic for 2 minutes.
The importance of effective communication in customer service
Effective communication builds trust and rapport with customers
Active listening is key to understanding customer needs and concerns
Clear and concise communication helps to resolve issues efficiently
Using positive language and tone can enhance the customer experience
Providing timely updates and follow-ups shows commitment to customer satisfaction
Q95. what operator is used in composer to move data from gcs to bq
The operator used in Composer to move data from GCS to BigQuery is the GCS to BigQuery operator.
The GCS to BigQuery operator is used in Apache Airflow, which is the underlying technology of Composer.
This operator allows you to transfer data from Google Cloud Storage (GCS) to BigQuery.
You can specify the source and destination parameters in the operator to define the data transfer process.
Q96. What is the list and list are mutable or immutable?
Lists are a data structure in Python that can hold multiple items. They are mutable, meaning their elements can be changed.
Lists are enclosed in square brackets []
Elements in a list can be of different data types
Lists can be modified by adding, removing, or changing elements
Example: my_list = ['apple', 'banana', 'cherry']
Q97. Why database
Databases are essential for storing and managing large amounts of data efficiently.
Databases allow for easy organization and retrieval of data
They provide data security and integrity
Databases enable scalability and performance optimization
Examples include MySQL, Oracle, MongoDB, and SQL Server
Q98. All the Topologies?
Topologies refer to the way in which devices are connected in a network. There are several types of topologies.
Bus topology
Star topology
Ring topology
Mesh topology
Tree topology
Hybrid topology
Q99. 6) What you understand about BPO?
BPO stands for Business Process Outsourcing. It involves contracting specific business processes to a third-party service provider.
BPO is the practice of outsourcing non-core business functions to external vendors
It helps companies focus on their core competencies and reduce costs
Common BPO services include customer support, technical support, data entry, and back-office operations
BPO can be onshore, nearshore, or offshore depending on the location of the service provider
Exam...read more
Q100. How can the project be modified?
The project can be modified by identifying the areas that need improvement and implementing changes accordingly.
Identify the areas that need improvement
Analyze the impact of the proposed modifications
Ensure that the modifications align with the project goals
Communicate the modifications to all stakeholders
Implement the modifications and monitor their effectiveness
Top HR Questions asked in Tech Mahindra for Freshers
Interview Process at Tech Mahindra for Freshers

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

