
Tech Mahindra


1500+ Tech Mahindra Interview Questions and Answers
Q101. What is Select class in Selenium. Write down syntax and explain the methods
Select class in Selenium is used to handle dropdowns and multi-select options on a web page.
Syntax: Select select = new Select(driver.findElement(By.id("dropdownId")));
Methods: selectByVisibleText(), selectByValue(), selectByIndex(), getOptions(), isMultiple(), getAllSelectedOptions(), deselectAll(), deselectByVisibleText(), deselectByValue(), deselectByIndex()
Select class is used to handle dropdowns and multi-select options on a web page.
It provides various methods to select...read more
Q102. Write a programs for exceptional handling, print prime numbers till given digit, print words of a sentence in reverse order. swapping 2 digits using 2 variables, any kind of searching algorithm and few more.
Answer to a technical interview question for Associate Software Engineer position.
For exceptional handling, use try-catch block
To print prime numbers till given digit, use a loop and check for prime numbers
To print words of a sentence in reverse order, split the sentence into words and print in reverse order
To swap 2 digits using 2 variables, use arithmetic operations
For searching algorithm, use linear search or binary search depending on the data
Provide additional examples o...read more
Call by value in Java means passing a copy of the actual value to a method.
In call by value, a copy of the actual value is passed to the method, so any changes made to the parameter inside the method do not affect the original value.
Primitive data types in Java (int, float, char, etc.) are passed by value.
Example: int num = 10; method(num); // num remains 10 after method execution
Q104. 3. Advantages and Disadvantages of E-Commerce
E-commerce has revolutionized the way we shop, but it also has its drawbacks.
Advantages: convenience, wider selection, lower prices, accessibility
Disadvantages: lack of personal touch, security concerns, potential for fraud, reliance on technology
Example: Amazon offers a vast selection of products at competitive prices, but customers may be wary of sharing personal and financial information online.
Example: Small businesses can reach a wider audience through e-commerce, but th...read more
Q105. How do you find the resources available on a server if it is on premise?
To find resources on a server on premise, you can use various methods such as accessing the server directly, using command-line tools, or utilizing server management software.
Access the server directly and navigate through its file system to locate the resources.
Use command-line tools like 'ls' or 'dir' to list the files and directories on the server.
Utilize server management software that provides a graphical interface to browse and search for resources.
Check the server docu...read more
Q106. What is vacuum? What is outgassing? What are the considerations taken while designing a vacuum chamber? What is virtual leak? Is virtual leak and outgassing the same? What is venting? What is purging? Why is a...
read moreAnswers to questions related to vacuum technology and design.
Vacuum is a space devoid of matter. Outgassing is the release of trapped gases from a material in a vacuum.
Considerations for designing a vacuum chamber include material selection, sealing methods, and pumping speed.
A virtual leak is a false indication of a leak caused by gas trapped in a chamber or system.
Virtual leak and outgassing are not the same.
Venting is the process of releasing gas from a chamber or system t...read more
A dangling pointer is a pointer that points to a memory location that has been deallocated, leading to undefined behavior.
Dangling pointers can occur when memory is freed but the pointer is not set to NULL.
Accessing a dangling pointer can result in crashes, data corruption, or security vulnerabilities.
Example: int *ptr = new int; delete ptr; // ptr is now a dangling pointer
Q108. WHAT IS GD&T IN MECHANICAL? DESCRIBLE ALL IN DETAILS .
GD&T stands for Geometric Dimensioning and Tolerancing, a system used in mechanical engineering to define and communicate engineering tolerances.
GD&T is a symbolic language used on engineering drawings to specify the allowable variation in form, size, and orientation of features.
It helps ensure that parts and assemblies will fit together and function properly.
GD&T uses symbols such as squares, circles, and triangles to define tolerances for features like flatness, straightnes...read more
Q109. Tell me about your self,what is bpo,what is data entry opetator,what is difference between inigrity and validation ,what is deo, how much a data entry operator earns
I am a customer service executive with knowledge of BPO, data entry operator, integrity and validation. DEO salary varies.
BPO stands for Business Process Outsourcing and involves contracting a third-party service provider to handle non-core business activities.
Data Entry Operator (DEO) is responsible for entering data into a computer system or database.
Integrity refers to the accuracy and consistency of data, while validation ensures that data is complete and meets specific r...read more
Q110. Common assignment type in SAP MM system ?
Common assignment types in SAP MM system include purchase requisitions, purchase orders, goods receipts, and invoice verification.
Purchase requisitions: Used to request the procurement of materials or services.
Purchase orders: Generated to procure materials or services from vendors.
Goods receipts: Documented when materials are received into the warehouse or stock.
Invoice verification: Process of verifying and approving vendor invoices for payment.
Q111. Child labour in India
Child labour is a prevalent issue in India.
India has the highest number of child labourers in the world.
Children are often forced to work in hazardous conditions.
Lack of education and poverty are major factors contributing to child labour.
The Indian government has implemented laws to combat child labour, but enforcement is weak.
Industries such as textiles, agriculture, and mining are known to employ child labourers.
Q112. How to check DNS, IP, & GATEWAY?
To check DNS, IP, and GATEWAY, you can use command line tools like ipconfig (Windows) or ifconfig (Linux/Mac).
For DNS, use the command 'ipconfig /all' on Windows or 'cat /etc/resolv.conf' on Linux/Mac.
For IP, use the command 'ipconfig' on Windows or 'ifconfig' on Linux/Mac.
For Gateway, use the command 'ipconfig' on Windows or 'netstat -nr' on Linux/Mac.
Q113. What is different between inbound or outbound process
Inbound process involves receiving calls from customers while outbound process involves making calls to customers.
Inbound process is reactive while outbound process is proactive.
Inbound process requires good listening and problem-solving skills while outbound process requires good communication and persuasion skills.
Examples of inbound process include customer service and technical support while examples of outbound process include telemarketing and sales calls.
Q114. What is polymorphism and explain with examples you used in your project
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as if they were the same type.
Polymorphism is achieved through method overriding and method overloading
Example: A parent class Animal has a method called makeSound(). Child classes like Dog, Cat, and Cow can override this method to make their own unique sound.
Another example is method overloading where a class can have multiple methods with the same name but di...read more
A string in Java is a sequence of characters used to represent text.
Strings in Java are objects of the String class.
Strings are immutable, meaning their values cannot be changed once they are created.
Strings can be concatenated using the '+' operator.
Example: String str = "Hello, World!";
Q116. can you tell something about python programming language
Python is a versatile, high-level programming language known for its simplicity and readability.
Python is an interpreted language, making it easy to write and test code quickly.
It has a large standard library with built-in modules for various tasks.
Python supports multiple programming paradigms, including procedural, object-oriented, and functional programming.
It is widely used in web development, data analysis, artificial intelligence, and automation.
Python code is often mor...read more
Q117. 4) What is the difference between BPO and KPO?
BPO stands for Business Process Outsourcing, while KPO stands for Knowledge Process Outsourcing.
BPO involves outsourcing non-core business processes, such as customer support or data entry.
KPO involves outsourcing knowledge-based processes, such as research, analysis, or consulting.
BPO focuses on operational efficiency and cost reduction, while KPO focuses on value creation and knowledge-intensive tasks.
BPO typically requires basic skills and training, while KPO requires spec...read more
Q118. What is the difference between static IP address and Dynamic IP address?
Static IP address is fixed and does not change, while Dynamic IP address changes frequently.
Static IP address is manually assigned to a device and remains the same until changed.
Dynamic IP address is automatically assigned by a DHCP server and changes each time the device connects to the network.
Static IP address is useful for servers, printers, and other devices that need a consistent IP address.
Dynamic IP address is more common for personal devices like laptops and smartpho...read more
Q119. How will you resolve the issue of delay of items?
I will investigate the cause of delay and communicate with the customer to find a solution.
Check the tracking information to identify where the delay occurred
Communicate with the shipping company to determine the reason for the delay
Offer the customer options such as expedited shipping or a refund
Follow up with the customer to ensure the issue has been resolved
Q120. What is aadhar card (because i am in aadhhar process)
Aadhaar card is a unique identification card issued by the Indian government to residents of India.
Aadhaar card is a 12-digit unique identification number issued by the Unique Identification Authority of India (UIDAI).
It serves as proof of identity and address for Indian residents.
Aadhaar card contains biometric and demographic information of the cardholder, including fingerprints and iris scans.
It is used for various purposes such as opening bank accounts, getting a SIM card...read more
Q121. Different Stock transfer type in SAP MM ?
There are several stock transfer types in SAP MM, including stock transfer between plants, stock transfer between storage locations, and stock transfer between company codes.
Stock transfer between plants: This involves transferring stock from one plant to another within the same company code.
Stock transfer between storage locations: This involves transferring stock from one storage location to another within the same plant.
Stock transfer between company codes: This involves t...read more
Q122. What is the difference between encapsulation and abstraction?
Encapsulation is hiding implementation details while abstraction is hiding unnecessary details.
Encapsulation is achieved through access modifiers like private, protected, and public.
Abstraction is achieved through abstract classes and interfaces.
Encapsulation is used to protect data from outside interference.
Abstraction is used to provide a simplified view of a complex system.
Example of encapsulation: Getters and setters in a class.
Example of abstraction: A car dashboard that...read more
Q123. What is bpo , customer service, e commerce, good qualities of customer services
BPO is Business Process Outsourcing, involving customer service and e-commerce. Good qualities include communication skills, problem-solving, and empathy.
BPO stands for Business Process Outsourcing, where companies outsource non-core business functions to third-party service providers.
Customer service in BPO involves handling customer inquiries, resolving issues, and providing support through various channels like phone, email, and chat.
E-commerce in BPO refers to providing c...read more
Q124. what you will do if application perform slow,
I will investigate the root cause of the slow performance and take appropriate actions.
Check server resources usage
Analyze application logs
Identify bottleneck areas
Optimize database queries
Implement caching mechanisms
Upgrade hardware or software if necessary
Q125. What are the phases involved in Software Testing Life Cycle? What are the different methods of testing? What are the different levels of testing? Explain Bug Life Cycle or Defect life cycle. What is a test case...
read moreSoftware Testing Life Cycle involves phases like planning, designing, executing, and reporting. Different methods and levels of testing are used.
Phases in Software Testing Life Cycle: Planning, Test Design, Test Execution, Test Reporting
Different methods of testing: Unit Testing, Integration Testing, System Testing, Acceptance Testing
Different levels of testing: Unit Testing, Integration Testing, System Testing, Acceptance Testing
Bug Life Cycle or Defect Life Cycle: New, Assi...read more
Q126. How to configure hibernate with spring framework?
Hibernate can be configured with Spring using LocalSessionFactoryBean and HibernateTransactionManager.
Add hibernate and spring dependencies in pom.xml
Configure datasource in application.properties
Create LocalSessionFactoryBean bean in Spring configuration
Configure hibernate properties in LocalSessionFactoryBean
Create HibernateTransactionManager bean in Spring configuration
Use @Transactional annotation for database transactions
Q127. Perl DBI module , how to connect to database, how to fetch data from table.
Perl DBI module is used to connect to databases and fetch data from tables.
Use DBI module to connect to database using appropriate driver, username, password, and database name
Prepare and execute SQL queries to fetch data from tables using DBI module
Use fetchrow_array() or fetchrow_hashref() methods to retrieve data from query results
Q128. How to create profile on Microsoft Outlook?
To create a profile on Microsoft Outlook, follow these steps:
Open Outlook and click on File
Select Info and click on Add Account
Enter your email address and click on Connect
Enter your password and click on Connect
Outlook will automatically configure your account settings
Click on Finish to complete the process
Q129. What is BQ and how you deal with BQ proformer. What is Facilitator Guid and Participant Guid. What Attrition and how can you control Shrinkage. And some questions on how you can handle Team.
Answering questions related to BQ, Facilitator/Participant Guid, Attrition, Shrinkage, and Team handling for Process Trainer role.
BQ stands for Business Quotient and refers to the ability to understand and analyze business situations. BQ proformer is a tool used to measure BQ.
Facilitator Guid is a set of guidelines for trainers to facilitate effective learning, while Participant Guid is a set of guidelines for learners to actively participate in the learning process.
Attrition...read more
Q130. How to handle a frustrated customer
Listen actively, empathize, apologize, offer solutions, and follow up.
Listen actively to their concerns and let them vent their frustration.
Empathize with their situation and acknowledge their feelings.
Apologize for any inconvenience caused and take responsibility for the issue.
Offer solutions to resolve the problem and ask for their input.
Follow up with the customer to ensure their satisfaction and build a positive relationship.
Example: 'I understand how frustrating it can b...read more
Q131. What do you know about customer care
Customer care is the process of providing assistance and support to customers before, during, and after a purchase.
Customer care involves listening to customers and addressing their concerns
It includes providing information about products or services
Customer care also involves resolving complaints and issues in a timely and satisfactory manner
It can be provided through various channels such as phone, email, chat, or in-person
Examples of good customer care include personalized...read more
Q132. How do we pass data from one component to another in React?
Data can be passed from one component to another in React using props.
Create a parent component that renders child components
Pass data as props from parent to child components
Use callback functions to pass data from child to parent components
Use context API to pass data to multiple levels of child components
Use Redux for global state management
Q133. how will you map efficacy of a project which you deployed
I will map efficacy of a project by setting clear goals, collecting data, analyzing results, and measuring impact.
Define clear goals and objectives for the project
Collect data through surveys, interviews, and other methods
Analyze the data to identify trends and patterns
Measure the impact of the project on the target audience
Use feedback from stakeholders to make improvements
Compare results to initial goals to determine efficacy
Q134. Which ORM is better and why
There is no one-size-fits-all answer to this question as it depends on the specific project requirements.
ORMs like Hibernate are popular for Java projects
Django ORM is widely used for Python projects
Entity Framework is commonly used for .NET projects
Consider factors like performance, ease of use, and community support when choosing an ORM
Ultimately, the best ORM is the one that fits the project's specific needs
Q135. What is opps nd briefly about oops and variables
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs is a way of organizing and designing code around objects
Variables are used to store data within an object
In OOPs, variables are also known as properties or attributes
Variables can have different access modifiers like public, private, protected
Example: A car object can have properties like color, model, and speed
Q136. what is the difference between centripital and centrifugal force?
Centripetal force pulls an object towards the center of a circular path, while centrifugal force pushes an object away from the center.
Centripetal force is directed towards the center of rotation, while centrifugal force is directed away from the center.
Centripetal force is responsible for keeping an object in circular motion, while centrifugal force is experienced by the object moving in a circular path.
Centripetal force is a real force, while centrifugal force is a perceive...read more
Q137. How Can You Ensure High Availability of the etcd Cluster Used by Kubernetes?
To ensure high availability of the etcd cluster used by Kubernetes, you can implement redundancy, monitoring, and disaster recovery strategies.
Implement a multi-node etcd cluster to ensure redundancy and fault tolerance.
Utilize monitoring tools like Prometheus and Grafana to track the health and performance of the etcd cluster.
Set up regular backups and implement disaster recovery plans to quickly recover from failures.
Use Kubernetes features like PodDisruptionBudgets to prev...read more
Q138. Give any advantages and disadvantages of online vs offline shopping
Online shopping offers convenience and variety, but lacks the tactile experience of offline shopping.
Advantages of online shopping: convenience, wider variety, easier price comparison
Disadvantages of online shopping: lack of tactile experience, potential for fraud or scams, shipping delays
Advantages of offline shopping: ability to physically see and touch products, immediate gratification, personalized customer service
Disadvantages of offline shopping: limited selection, high...read more
Q139. What are ICM component and their services?
ICM components are responsible for call routing, queuing, and reporting in Cisco Contact Center solutions.
ICM Router: routes calls based on business rules and agent availability
ICM Logger: records call data for reporting and analysis
ICM AW/HDS: manages agent state and availability
ICM PG: interfaces with peripheral devices such as IVRs and ACDs
ICM CCE: provides a web-based interface for administration and reporting
Q140. What is the another name of induction motor
Another name for induction motor is asynchronous motor.
Asynchronous motor is commonly used in industrial applications.
It operates at a slightly slower speed than the synchronous speed.
Examples include squirrel cage induction motor and wound rotor induction motor.
Q141. How to point to any other branch other than master in Jenkins
To point to any other branch in Jenkins, use the 'Branch specifier' field in the 'Source Code Management' section.
In the Jenkins job configuration, go to the 'Source Code Management' section
Select the appropriate SCM tool (e.g. Git, SVN)
In the 'Branch specifier' field, enter the name of the branch you want to point to (e.g. 'develop', 'feature/xyz')
Save the configuration and run the job
Q142. Steps needed to configure pricing procedure in SAP MM ?
To configure pricing procedure in SAP MM, follow these steps:
Define access sequence
Assign condition types to access sequence
Define condition tables
Assign condition tables to access sequence
Define calculation schema
Assign calculation schema to pricing procedure
Define pricing procedure determination
Assign pricing procedure to relevant document types
Q143. Tell me about Security incident response framework that you have worked on ?
Implemented a comprehensive security incident response framework to effectively detect, respond to, and recover from security incidents.
Developed incident response policies and procedures to outline roles, responsibilities, and escalation paths.
Established communication protocols for notifying stakeholders and coordinating response efforts.
Conducted regular tabletop exercises and simulations to test the effectiveness of the framework.
Integrated incident response tools and tec...read more
Q144. What is log4j vulnerability and how do you feel with it?
Log4j vulnerability is a critical security flaw in the Apache Log4j logging library that allows remote code execution.
Log4j vulnerability (CVE-2021-44228) allows attackers to execute arbitrary code remotely.
The vulnerability affects versions 2.0 to 2.14.1 of Apache Log4j.
Exploiting the vulnerability can lead to serious security breaches and data exfiltration.
Organizations need to patch affected systems immediately and monitor for any signs of exploitation.
Q145. If a customer is irate then how would to convert this situation into an opportunity for you to get a positive feedback?
Listen to the customer, empathize with their situation, offer a solution and follow up to ensure satisfaction.
Listen actively to the customer's concerns and acknowledge their frustration.
Empathize with their situation and apologize for any inconvenience caused.
Offer a solution that addresses their concerns and meets their needs.
Follow up with the customer to ensure their satisfaction and ask for feedback.
Thank the customer for their feedback and use it to improve the customer...read more
Q146. How many symbols are there in GD and T
There are 14 symbols in GD&T (Geometric Dimensioning and Tolerancing).
GD&T uses symbols to communicate design requirements and tolerances.
These symbols are used to specify the shape, size, and orientation of features on a part.
Some common symbols in GD&T include concentricity, perpendicularity, flatness, and position.
Each symbol has a specific meaning and is used to ensure proper functionality and interchangeability of parts.
GD&T symbols are standardized and widely used in en...read more
Q147. From your experience what are the factors that needs to be considered while designing a component for sheet metal and plastic?
Factors to consider when designing components for sheet metal and plastic
Material selection based on properties and application requirements
Design for manufacturability to ensure ease of production and cost-effectiveness
Consideration of material thickness and bending radius for sheet metal components
Wall thickness, draft angles, and rib design for plastic components
Integration of features like fastening methods, mounting points, and assembly considerations
Evaluation of enviro...read more
Q148. Use of document type in SAP system?
Document types in SAP system are used to categorize and control different types of documents.
Document types are used to differentiate between various business transactions and processes.
They help in organizing and managing documents in a structured manner.
Document types determine the number range, field selection, and processing rules for each document.
Examples of document types in SAP MM include purchase orders, goods receipts, and invoices.
Q149. Difference between MVVM vs MVC. What is Live data?
MVVM is a design pattern that separates UI from business logic. Live data is observable data that updates UI automatically.
MVC separates UI, business logic, and data. MVVM adds a ViewModel layer to handle UI logic.
Live data is a type of observable data that updates UI automatically when the data changes.
MVVM and Live data are commonly used in Android development with the Android Architecture Components.
MVC is commonly used in web development with frameworks like Ruby on Rails...read more
Q150. Explain about osi and its layers?
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers, each responsible for specific functions.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer interacts with the layer above a...read more
Q151. (3) what is the advantages and disadvantages of online shopping?
Online shopping offers convenience and variety, but can lack personal touch and have potential security risks.
Advantages: convenience, variety, easy price comparison, access to global market
Disadvantages: lack of personal touch, potential security risks, delayed delivery, inability to physically inspect products
Example: Amazon offers a wide range of products at competitive prices, but customers may have concerns about the security of their personal information
Example: Online ...read more
Q152. What is String buffer and string builder ?
String buffer and string builder are classes in Java used for manipulating strings.
String buffer is a mutable sequence of characters that can be modified without creating a new object.
String builder is similar to string buffer but is not synchronized, making it faster in single-threaded applications.
Both classes provide methods for appending, inserting, deleting, and replacing characters in a string.
Example: StringBuffer sb = new StringBuffer("Hello"); sb.append(" World"); Sy...read more
Method hiding in Java is when a subclass defines a static method with the same signature as a static method in the superclass.
Method hiding is achieved by using the 'static' keyword in the subclass method.
It is different from method overriding, where the subclass method overrides the superclass method.
Example: class A { static void display() { System.out.println('A'); } } class B extends A { static void display() { System.out.println('B'); } }
In the above example, if we call ...read more
Q154. Wt are short cut Keys in ms Excel Ans : ctrl+p = paste Ctrl+c= copy Ctrl+x = cut Ctrl+s= save Ctrl+b = bold Ctrl + i = italic Ctrl + u = underline
Short cut keys in MS Excel include Ctrl+p for paste, Ctrl+c for copy, Ctrl+x for cut, Ctrl+s for save, Ctrl+b for bold, Ctrl+i for italic, and Ctrl+u for underline.
Ctrl+p = paste
Ctrl+c= copy
Ctrl+x = cut
Ctrl+s= save
Ctrl+b = bold
Ctrl + i = italic
Ctrl + u = underline
Q155. How do you give bending Allowances
Bending allowances are given to compensate for material stretching during bending process.
Bending allowances are added to the flat pattern of a sheet metal part before bending.
The amount of bending allowance depends on the material type, thickness, bend radius, and angle.
Bending allowances are typically specified in a table or chart provided by the manufacturer.
The bending allowance formula is: BA = (π/180) x R x (180 - α) x K
Where R is the bend radius, α is the bend angle, a...read more
Q156. What do you do incase of bot execution failure
In case of bot execution failure, I would identify the root cause and fix it as soon as possible.
Check the logs to identify the error message and the point of failure
Analyze the code to identify the root cause of the failure
Fix the issue and test the bot again to ensure it is working as expected
Implement measures to prevent similar failures in the future
Q157. Tell all unix commands which are mostly used
Commonly used Unix commands
ls - list directory contents
cd - change directory
mkdir - make directory
rm - remove files or directories
cp - copy files or directories
mv - move or rename files or directories
grep - search for patterns in files
cat - concatenate and display files
chmod - change file permissions
ssh - secure shell remote login
Q158. What to do when you find blue screen while booting system.; What is VPN, it's advantages; In brief about ITIL process,; What is DNS and IP address
Q159. What is the role of "Sorry" word in customer care executive job.
The word 'Sorry' plays a crucial role in customer care executive job as it helps in acknowledging mistakes, showing empathy, and resolving customer issues.
Apologizing for any inconvenience caused to the customer
Expressing empathy towards the customer's situation
Taking responsibility for any errors or misunderstandings
Resolving customer issues promptly and effectively
Using 'Sorry' as a tool to maintain positive customer relationships
Q160. Tell me about indian education system
Indian education system is diverse and complex, with a mix of traditional and modern methods.
The education system is divided into primary, secondary, and tertiary levels.
There is a strong emphasis on rote learning and memorization.
The curriculum varies depending on the state and board of education.
There is a growing trend towards vocational education and skill-based training.
Private schools and coaching centers are popular among students and parents.
The government has launche...read more
Q161. Write SQL query to get the 10th highest salary from employee table
SQL query to get the 10th highest salary from employee table
Use ORDER BY and LIMIT clauses
Subquery can be used to get the 10th highest salary
A copy constructor is a special type of constructor that creates a new object as a copy of an existing object.
Used to initialize a new object as a copy of an existing object
Takes an object of the same class as a parameter
Often used to create deep copies of objects
Q163. How does React works in the background when the state changes?
React uses a virtual DOM to efficiently update the actual DOM when the state changes.
React creates a new virtual DOM tree when the state changes
It compares the new virtual DOM tree with the previous one to find the differences
It then updates only the necessary parts of the actual DOM to reflect the changes
This process is called reconciliation
React also uses a batching mechanism to group multiple state changes together for better performance
Q164. Explain Sheet metal fabrication processes
Sheet metal fabrication processes involve various techniques to shape and form sheet metal into desired products.
Cutting: Techniques like shearing, laser cutting, and waterjet cutting are used to cut sheet metal into desired shapes.
Bending: Sheet metal is bent using techniques like press brake bending or roll forming to create angles and curves.
Forming: Processes like deep drawing, hydroforming, and stamping are used to shape sheet metal into complex forms.
Joining: Welding, r...read more
Q165. What is abstraction and difference between interface and abstract class
Abstraction is a way of hiding implementation details. An interface is a contract that specifies the behavior of a class.
Abstraction is achieved through abstract classes and interfaces
Abstract classes can have both abstract and non-abstract methods
Interfaces can only have abstract methods and constants
A class can implement multiple interfaces but can only inherit from one abstract class
Abstract classes can have constructors but interfaces cannot
Example: An abstract class 'Ani...read more
Q166. Dhcp and dns server ? What is latest version of Windows server? Ip address denge ? What's the range of private ip address? Diffrent between public and private ip address.
DHCP and DNS servers are essential components of a network infrastructure. The latest version of Windows Server is Windows Server 2019.
DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network.
DNS (Domain Name System) translates domain names into IP addresses.
The latest version of Windows Server is Windows Server 2019.
IP addresses are numerical labels assigned to devices connected to a network.
Private IP addresses are used wi...read more
Q167. What’s Customer Support ?
Customer support is providing assistance and guidance to customers before, during, and after a purchase.
Assisting customers with product information and troubleshooting
Resolving customer complaints and issues
Providing guidance on product usage and features
Offering support through various channels like phone, email, and chat
Ensuring customer satisfaction and loyalty
Q168. What is the difference between Map and flatMap
Map transforms each element of a collection, while flatMap transforms each element into a new collection.
Map applies a function to each element of a collection and returns a new collection with the transformed elements.
FlatMap applies a function to each element of a collection and returns a new collection by concatenating the resulting collections.
Map returns a collection with the same number of elements as the original collection, while flatMap can return a collection with a...read more
Q169. Priority P1P2 how will you set the priority of incident
Priority of incident is set based on impact and urgency.
Assess the impact of the incident on the business or customer
Determine the urgency of the incident based on SLA and customer expectations
Assign P1 to incidents with high impact and urgency
Assign P2 to incidents with moderate impact and urgency
Communicate the priority to the customer and stakeholders
Q170. Use of posting period in SAP system ?
Posting period is used to control the posting of financial transactions in SAP system.
Posting period determines the time frame during which financial transactions can be posted in SAP system.
It helps in ensuring that transactions are posted in the correct accounting period.
Posting periods can be defined for different time intervals, such as months or quarters.
Each posting period can have its own start and end dates.
Transactions can only be posted in open posting periods.
Closi...read more
Q171. Most Langugae Nice One time Minimum
The question seems to be incomplete or unclear.
The question lacks context or specific information.
It is difficult to provide a meaningful answer without more details.
Please provide additional information or rephrase the question.
Q172. Explain Few Word About Social-media How It is useful To us .. Say In English like A passage Prepare It Like A summary And Discribe
Social media is a powerful tool for communication and networking.
Social media allows us to connect with people all over the world.
It provides a platform for sharing information and ideas.
Businesses can use social media to reach a wider audience and promote their products or services.
Social media can also be used for customer service and support.
It has revolutionized the way we communicate and interact with each other.
Q173. Write a code for palindrome in any language like c c++ or c#?
Code for palindrome in any language like c c++ or c#
Take input string from user
Reverse the string
Compare original and reversed string
If same, then it is a palindrome
Q174. what are the steps you will take while updating a build and how you will do rollback
Steps for updating a build and performing rollback
Create a backup of the current build before making any changes
Update the build with the necessary changes and test thoroughly
If issues are found, identify the cause and plan for rollback
Rollback by restoring the backup of the previous build
Communicate the rollback to the team and document the process
Q175. how to send the data to the database
Data can be sent to the database using SQL queries or an ORM like Django's ORM.
Use SQL queries to insert, update or delete data in the database.
Use an ORM like Django's ORM to interact with the database using Python code.
Ensure that the data being sent is properly formatted and validated to prevent errors or security issues.
Q176. What is difference between customer service agent and customer care executive?
Customer service agents handle inquiries and complaints, while customer care executives focus on building relationships and providing personalized support.
Customer service agents handle inquiries and complaints, often through phone or email.
Customer care executives focus on building relationships and providing personalized support.
Customer care executives may also handle more complex issues or escalations.
Examples of customer care executives include account managers or custom...read more
Q177. Why do use Tolerances in CAD drawings
Tolerances are used in CAD drawings to ensure that the manufactured part meets the required specifications.
Tolerances help to control the variation in dimensions and ensure that the parts fit together properly.
They also help to reduce manufacturing costs by allowing for a range of acceptable dimensions rather than requiring every part to be made to exact specifications.
Tolerances can be specified for various dimensions such as length, width, diameter, and angles.
Examples of t...read more
Q178. What is the design pattern used in my framework
I don't have the available data to answer this question.
N/A
Q179. Test cases for login
Test cases for login
Verify successful login with valid credentials
Verify error message with invalid credentials
Verify password field is masked
Verify session timeout after inactivity
Verify login page is accessible from any page
Verify login page is not accessible after logout
Q180. What’s the most effective way to gather user and system requirements?
The most effective way to gather user and system requirements is through direct communication and collaboration.
Engage with stakeholders to understand their needs and preferences
Utilize surveys, interviews, and workshops to gather feedback
Document requirements clearly and prioritize them based on importance
Use prototyping and mockups to visualize the final product
Regularly communicate and update stakeholders on the progress
Q181. Concept Of service. Type of service. Difference Between Job scheduler and work Manager.
Service is a software component that performs a specific task. Job scheduler and work manager are types of services used in software development.
A service is a self-contained component that performs a specific task.
Types of services include web services, microservices, and background services.
Job scheduler is a service that schedules and executes jobs at specific times or intervals.
Work manager is a service that manages and prioritizes work requests.
Job scheduler is time-base...read more
Q182. If there is a non tech guys on site to replace faulty router with new router, how do you configure the new router?
The new router can be configured remotely using a laptop or mobile device with access to the network.
Access the router's web interface by entering its IP address in a web browser
Login using default credentials or credentials provided by the company
Configure basic settings such as SSID, password, and security settings
Update firmware if necessary
Test the connection to ensure it is working properly
Q183. What are the new trending technologies that the company is working on.
The company is currently working on implementing AI and machine learning technologies.
AI-powered chatbots for customer service
Machine learning algorithms for data analysis
Computer vision for image recognition
Natural language processing for voice assistants
Predictive analytics for business intelligence
Q184. Possible GD & T Diagram for the rectangular Box
Geometric Dimensioning and Tolerancing (GD&T) diagram for a rectangular box.
Use basic GD&T symbols such as perpendicularity, flatness, and parallelism to specify the dimensions and tolerances of the box.
Include datum features to establish a reference frame for the measurements.
Consider the functional requirements of the box, such as its ability to stack or fit with other components.
Use profile tolerance to control the overall shape of the box.
Consider the manufacturing proces...read more
Q185. How would you increase the revenue for the Practice
To increase revenue for the Practice, I would focus on expanding the client base, improving service offerings, and implementing effective marketing strategies.
Identify target market segments and develop targeted marketing campaigns
Enhance the practice's online presence through search engine optimization (SEO) and social media marketing
Offer additional services or packages to existing clients to increase their spending
Collaborate with other healthcare providers or organization...read more
Q186. What kind of applications does AI have and how can you use them on the job?
AI applications include natural language processing, image recognition, recommendation systems, and autonomous vehicles.
Natural language processing for chatbots and virtual assistants
Image recognition for facial recognition and object detection
Recommendation systems for personalized content suggestions
Autonomous vehicles for self-driving cars
Q187. How Would You Implement Zero-Downtime Deployments in Kubernetes?
Implementing zero-downtime deployments in Kubernetes involves using rolling updates and readiness probes.
Use rolling updates to gradually replace old pods with new ones
Configure readiness probes to ensure new pods are ready before routing traffic to them
Utilize tools like Helm for managing releases and versioning
Q188. How Would You Approach Capacity Planning for a Kubernetes Cluster?
Capacity planning for a Kubernetes cluster involves analyzing resource usage, predicting future needs, and scaling infrastructure accordingly.
Monitor resource usage of pods and nodes using tools like Prometheus and Grafana
Analyze historical data to identify trends and patterns in resource consumption
Estimate future resource requirements based on application growth and workload changes
Scale the cluster by adding or removing nodes, adjusting resource limits, or using auto-scali...read more
Q189. How many class of IP & its range?
There are 5 classes of IP addresses: A, B, C, D, and E. Each class has a different range of IP addresses.
Class A: 1.0.0.0 to 126.0.0.0
Class B: 128.0.0.0 to 191.255.0.0
Class C: 192.0.0.0 to 223.255.255.0
Class D: 224.0.0.0 to 239.255.255.255
Class E: 240.0.0.0 to 255.255.255.255
Q190. Why do you use material type ?
Material type is used to classify and categorize different types of materials in SAP MM.
Material type helps in determining the behavior and attributes of a material in the system.
It is used to control the procurement process, valuation, and account determination for materials.
Different material types have different settings and configurations, such as whether a material is a finished product, raw material, or spare part.
Material types also determine the fields that are mandat...read more
Q191. Different between empathy and sympathy
Empathy is feeling what someone else is feeling, while sympathy is feeling sorry for someone else's feelings.
Empathy is putting yourself in someone else's shoes and experiencing their emotions
Sympathy is acknowledging someone else's emotions and feeling sorry for them
Empathy is more active and involves understanding and sharing the emotions of others
Sympathy is more passive and involves acknowledging the emotions of others
Example: Empathy is feeling sad when your friend is go...read more
Q192. What is the difference b/w confidence and over confidence?
Confidence is having faith in one's abilities while overconfidence is having excessive faith in one's abilities.
Confidence is a positive trait that helps individuals achieve their goals while overconfidence can lead to complacency and mistakes.
Confidence is based on experience and knowledge while overconfidence is often based on assumptions and arrogance.
Confidence allows individuals to take calculated risks while overconfidence can lead to reckless behavior.
For example, a co...read more
Q193. How do you talk to customers on tele calling?
I communicate with customers on tele calling by being polite, professional, and attentive to their needs.
Start the conversation with a greeting and introduction
Listen actively to the customer's needs and concerns
Provide clear and concise information
Ask open-ended questions to engage the customer
Offer solutions or assistance based on the customer's needs
End the call with a thank you and invitation to contact for further assistance
Q194. How to calculate throughput,FPA and attrition in a batch?
Throughput, FPA, and attrition can be calculated by analyzing the number of completed tasks, the number of defects, and the number of employees who have left in a batch.
Throughput can be calculated by dividing the number of completed tasks by the total time taken to complete them.
FPA (First Pass Acceptance) can be calculated by dividing the number of defect-free tasks by the total number of tasks.
Attrition rate can be calculated by dividing the number of employees who have le...read more
Q195. What is oops concepts
OOPs concepts are the principles of Object-Oriented Programming that focus on encapsulation, inheritance, and polymorphism.
Encapsulation: bundling of data and methods that manipulate the data within a single unit
Inheritance: ability of a class to inherit properties and methods from a parent class
Polymorphism: ability of objects to take on multiple forms or behaviors
Abstraction: hiding the implementation details of a class from the outside world
Example: A car is an object that...read more
Q196. Which is better: dynamic memory allocation or static memory allocation & why?
Dynamic memory allocation is better for flexibility and efficiency, while static memory allocation is better for simplicity and speed.
Dynamic memory allocation allows for flexible memory usage at runtime, while static memory allocation requires memory to be allocated at compile time.
Dynamic memory allocation can help prevent memory wastage by allocating memory only when needed, while static memory allocation may lead to unused memory space.
Dynamic memory allocation can lead t...read more
Q197. What is your streight
My strength lies in my ability to empathize with customers and provide personalized solutions to their problems.
Strong communication skills
Active listening
Empathy
Problem-solving
Patience
Adaptability
Product knowledge
Conflict resolution
Time management
Q198. Like, what is adf - what is pipeline, what is IR. What's etc.
ADF is Azure Data Factory, a cloud-based data integration service. Pipeline is a logical grouping of activities that perform a task. IR is Integration Runtime, a compute infrastructure used by ADF to provide data integration capabilities.
ADF is a cloud-based data integration service
Pipeline is a logical grouping of activities that perform a task
IR is Integration Runtime, a compute infrastructure used by ADF to provide data integration capabilities
Q199. How would you differentate the property for dev uat and prod in spring
Properties can be differentiated using Spring profiles for dev, uat, and prod.
Define profiles in application.properties or application.yml
Use @Profile annotation to activate specific profile
Separate property files for each profile
Example: application-dev.properties, application-uat.properties, application-prod.properties
Q200. What are Java Collections you have used in your Project ?
I have used Java Collections such as ArrayList, HashMap, and HashSet in my project.
ArrayList: Used to store and manipulate a list of elements.
HashMap: Used to store key-value pairs for efficient retrieval.
HashSet: Used to store unique elements without duplicates.
Top HR Questions asked in Tech Mahindra
Interview Process at Tech Mahindra

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

