Tech Mahindra
1500+ FININDIA financial Consultancy Services Interview Questions and Answers
Q301. How will you give feedback to a stubborn agent? And what will be the technique?
I would use active listening and positive reinforcement to give feedback to a stubborn agent.
Listen actively to the agent's concerns and try to understand their perspective
Provide positive feedback on areas where the agent is performing well
Offer constructive criticism on areas where improvement is needed
Provide specific examples to support feedback
Encourage the agent to ask questions and provide feedback on the feedback given
Follow up with the agent to ensure that the feedba...read more
Q302. What is HIL bench setup and what are tools used for that?
HIL bench setup is a hardware-in-the-loop testing environment used to simulate real-world conditions for testing electronic control units (ECUs).
HIL bench setup is used in automotive and aerospace industries.
It consists of a computer, HIL simulator, and ECU under test.
The HIL simulator generates signals to simulate sensors and actuators.
The ECU under test is connected to the HIL simulator to validate its functionality.
Tools used for HIL bench setup include dSPACE, National In...read more
Q303. Write a code that takes a string as an input and gives the characters and their count as output.
Code to count characters in a string and output their count.
Create an empty dictionary to store character counts.
Loop through each character in the string and add it to the dictionary with a count of 1 if it doesn't exist, or increment the count if it does.
Output the dictionary with the character counts.
Q304. How to implicitly call an interface method?
To implicitly call an interface method, create an object of the implementing class and assign it to the interface type.
Create an interface with the desired method signature
Create a class that implements the interface
Create an object of the implementing class and assign it to the interface type
Call the method on the interface object
The implementing class's method will be implicitly called
Q305. What is difference between lookup and master details relationship in Salesforce?
Lookup relationship is loosely coupled while master-detail relationship is tightly coupled in Salesforce.
Lookup relationship does not impact the deletion of related records, while master-detail relationship does.
In lookup relationship, child records do not inherit the security and sharing settings of the parent record, while in master-detail relationship they do.
Lookup relationship can be set to optional, while master-detail relationship is always required.
An example of looku...read more
Q306. How will you allocate memory for 50 characters using malloc( )?
Q307. 2. Types of customer support?
Types of customer support include phone support, email support, live chat support, self-service support, and social media support.
Phone support: Assisting customers over the phone.
Email support: Resolving customer queries through email communication.
Live chat support: Providing real-time assistance through chat platforms.
Self-service support: Offering online resources and FAQs for customers to find solutions independently.
Social media support: Addressing customer concerns and...read more
Q308. What is the advantages of Spring Boot over Spring framework?
Spring Boot simplifies Spring framework development by providing auto-configuration, embedded servers, and production-ready features.
Spring Boot provides auto-configuration which reduces the need for manual configuration, making development faster and easier.
It includes embedded servers like Tomcat, Jetty, or Undertow, eliminating the need for deploying applications on external servers.
Spring Boot offers production-ready features such as metrics, health checks, and externaliz...read more
Q309. How do you handle irid customers?
I handle irate customers by actively listening to their concerns and empathizing with their situation.
Remain calm and composed
Listen actively to their concerns
Empathize with their situation
Apologize for any inconvenience caused
Offer a solution or escalate to a higher authority if necessary
Q310. What is the list and list are mutable or immutable?
Lists are a data structure in Python that can hold multiple items. They are mutable, meaning their elements can be changed.
Lists are enclosed in square brackets []
Elements in a list can be of different data types
Lists can be modified by adding, removing, or changing elements
Example: my_list = ['apple', 'banana', 'cherry']
Q311. series of programs, data and instructions used in a computer's hardware to help the device operate and you complete tasks. Hardware is the physical components that comprise a computer, such as the graphics card
Software is a collection of programs, data, and instructions that enable a computer to perform tasks.
Software is the intangible part of a computer system.
It includes operating systems, applications, and utilities.
Examples of software include Microsoft Windows, Adobe Photoshop, and Google Chrome.
Q312. What is Exception Handling in stored procedures?
Exception handling in stored procedures manages errors gracefully, ensuring robust database operations.
Allows developers to catch and handle errors using TRY...CATCH blocks.
Example: BEGIN TRY ... END TRY for normal execution and BEGIN CATCH ... END CATCH for error handling.
Can log error details using ERROR_MESSAGE(), ERROR_NUMBER(), etc.
Helps maintain data integrity by rolling back transactions in case of errors.
Example: ROLLBACK TRANSACTION in the CATCH block to undo changes...read more
Q313. Q:- Difference between empathy and sympathy? Q:- What is BPS?
Empathy is understanding and sharing the feelings of others, while sympathy is feeling sorry for someone's situation.
Empathy involves putting oneself in someone else's shoes and experiencing their emotions.
Sympathy involves feeling sorry for someone's situation without necessarily understanding their emotions.
Empathy is more active and involves a deeper level of understanding, while sympathy is more passive.
Example: If a friend is going through a breakup, empathy would involv...read more
Q314. what is react hook? useEffect with all dependencies
React hooks are functions that let you use state and lifecycle features in functional components.
useEffect is a hook that allows you to perform side effects in function components.
It takes two arguments: a function to run and an array of dependencies.
The effect runs after the render and can be used for data fetching, subscriptions, or manually changing the DOM.
If the dependencies array is empty, the effect runs only once after the initial render.
If dependencies are provided, ...read more
Q315. How can you manager your customer? How can yuu slove conflicts between your team mates? How can present a business deck? What is the current role responsibilities in my current organisation? Few Excel short cut...
read moreManaging customers, resolving conflicts, presenting business decks, Excel shortcuts and formulas, role responsibilities, CAPA, 5 WHY ANALYSIS, RCA
To manage customers, prioritize their needs, communicate effectively, and provide excellent service
To resolve conflicts between team mates, listen to both sides, find common ground, and encourage open communication
To present a business deck, focus on key points, use visuals, and engage the audience
Excel shortcuts: Ctrl+C (copy), Ctr...read more
Q316. What is advantageous of online shopping?
Online shopping offers convenience, variety, and often better prices.
Convenience of shopping from anywhere at any time
Wide variety of products available from different sellers
Ability to compare prices and find deals
Saves time and effort of physically going to a store
Can read reviews and ratings from other customers
Can easily return or exchange products
Examples: Amazon, eBay, Walmart, etc.
Q317. Ops round- what is kyc process, what is spi and pii, etc
KYC process refers to verifying the identity of customers to prevent fraud, while SPI and PII are types of sensitive information.
KYC process stands for Know Your Customer and involves verifying the identity of customers through documents like ID cards, passports, etc.
SPI stands for Sensitive Personal Information, such as financial details, while PII stands for Personally Identifiable Information, like name and address.
KYC process is crucial in industries like banking and fina...read more
Q318. how to remove duplicate rows from bigquery? find the month of a given date in bigquery.
To remove duplicate rows from BigQuery, use the DISTINCT keyword. To find the month of a given date, use the EXTRACT function.
To remove duplicate rows, use SELECT DISTINCT * FROM table_name;
To find the month of a given date, use SELECT EXTRACT(MONTH FROM date_column) AS month_name FROM table_name;
Make sure to replace 'table_name' and 'date_column' with the appropriate values in your query.
Q319. If system is restart multiple times, what was the issue?
The issue could be related to hardware failure, software corruption, or overheating.
Possible hardware failure such as faulty RAM or hard drive
Software corruption due to malware or corrupted system files
Overheating causing the system to shut down and restart
Q320. What is an empty extract, and what is the process for creating one?
An empty extract in Tableau is a data extract that contains no data, only the structure of the data source.
An empty extract is created by selecting 'Extract' from the data menu in Tableau and choosing 'Extract Data' without selecting any data source.
Empty extracts are useful for creating a template for future data imports or for sharing the data source structure without sharing the actual data.
To create an empty extract, you can also use the 'Create Extract' option in Tableau...read more
Q321. What are Positive and negative risks and how do you manage risks
Positive risks are opportunities while negative risks are threats. Risks are managed through identification, assessment, and mitigation.
Positive risks are events that could have a positive impact on the project if they occur. For example, a vendor may offer a discount if the project is completed ahead of schedule.
Negative risks are events that could have a negative impact on the project if they occur. For example, a key team member may leave the project unexpectedly.
Risk mana...read more
Q322. How to handle hackler and aggresive trainee in batch?
Address the behavior privately, set clear expectations, and offer support.
Speak to the trainee privately to understand their behavior and any underlying issues.
Set clear expectations for behavior in the training session and consequences for not meeting them.
Offer support and resources to help the trainee improve their behavior and performance.
If the behavior continues, involve a supervisor or HR representative.
Example: 'I understand that you may be frustrated, but interruptin...read more
Q323. Different info record types ?
Different info record types in SAP MM include standard, consignment, subcontracting, pipeline, and service.
Standard info record is used for regular procurement of materials.
Consignment info record is used when materials are stored at the customer's location but owned by the vendor.
Subcontracting info record is used when a vendor performs a specific service or process on materials provided by the company.
Pipeline info record is used for materials that are continuously supplied...read more
Q324. What is Can FD and why it is required.
CAN FD stands for Controller Area Network Flexible Data Rate, it is required for high-speed communication in automotive and industrial applications.
CAN FD allows for higher data rates compared to traditional CAN networks
It is necessary for transmitting large amounts of data quickly and efficiently
Used in applications where real-time communication and reliability are crucial, such as automotive ECUs
Example: CAN FD is used in modern cars for transmitting sensor data, control si...read more
Q325. What approach would you take to handle a scenario involving an irritated customer?
I would listen to the customer, empathize with their situation, apologize for any inconvenience, and work towards finding a solution.
Listen actively to the customer's concerns without interrupting
Empathize with the customer's frustration and show understanding
Apologize for any inconvenience caused, even if it wasn't directly your fault
Work towards finding a solution that satisfies the customer's needs
Offer alternatives or escalate the issue to a supervisor if necessary
Q326. What do you think is the future of agile in IT companies? How do you see it shaping up?
Agile will continue to grow and evolve in IT companies, with a focus on scaling and integrating with other methodologies.
Agile will become more mainstream and widely adopted in IT companies
There will be a focus on scaling agile to larger organizations and projects
Agile will continue to evolve and integrate with other methodologies, such as DevOps and Lean
There will be a greater emphasis on agile coaching and training to ensure successful implementation
Agile will continue to d...read more
Q327. What is index in SQL? Which index we are using for which process?
Index in SQL is a data structure that improves the speed of data retrieval operations.
Indexes are used to quickly locate data without having to search every row in a table.
Clustered index determines the physical order of data in a table.
Non-clustered index creates a separate structure that contains the indexed columns and a pointer to the actual data.
Unique index ensures that the indexed columns contain unique values.
Full-text index is used for efficient text-based searches.
C...read more
Q328. what are access ties available in azure storage
Access tiers in Azure Storage include hot, cool, and archive tiers.
Hot access tier: Optimized for frequently accessed data with higher storage costs.
Cool access tier: Optimized for infrequently accessed data with lower storage costs.
Archive access tier: Optimized for rarely accessed data with the lowest storage costs.
Data in the archive tier may have longer retrieval times compared to hot and cool tiers.
Q329. how will you handle errors in prod environment
I will handle errors in prod environment by implementing proper error logging, monitoring, and alerting systems.
Implement comprehensive error logging to track errors and their root causes
Set up monitoring tools to detect errors in real-time and alert the team
Establish a process for prioritizing and resolving errors based on impact and severity
Regularly review and analyze error logs to identify patterns and prevent future occurrences
Q330. In ACI, how VMM integration approach and why it's required
VMM integration in ACI allows seamless communication between virtual and physical networks
VMM integration in ACI enables automation and orchestration of network policies across virtual and physical environments
It helps in maintaining consistency and reducing errors in network configurations
Examples of VMMs include VMware vSphere, Microsoft Hyper-V, and KVM
VMM integration is required to ensure efficient communication and management of virtualized workloads in the data center
Q331. What do you mean by ETag (Entity Tag) and how does it work?
ETag is an HTTP header used for web caching to determine if a resource has changed.
ETag is a unique identifier assigned to a specific version of a resource on the web server.
When a client requests a resource, the server sends the ETag along with the resource.
The client can then use the ETag in subsequent requests to check if the resource has been modified.
If the ETag matches the current version of the resource on the server, a 304 Not Modified response is returned.
This helps ...read more
Q332. 2.WAP to provide String without duplicates.(Each character repeated only once) eg: "Hello World" => "Helo Wrd"; Hint:Use Set (Linked hashset)
The program removes duplicates from a given string using a Set data structure.
Create a LinkedHashSet to maintain the order of characters while removing duplicates
Iterate through each character in the input string and add it to the set
Convert the set back to a string and return the result
Q333. What is slicing in python and what is full form on pep?
Slicing is a feature in Python that allows accessing parts of a sequence. PEP stands for Python Enhancement Proposal.
Slicing is done using the colon (:) operator.
It can be used on strings, lists, tuples, and other sequence types.
Syntax: sequence[start:stop:step]
start is the index where the slice starts, stop is the index where it ends (exclusive), and step is the increment.
PEP is a document that describes proposed changes to Python's design or implementation.
PEP 8 is the styl...read more
Q334. What is difference between sto and intercompany sto process
STO is a process of transferring goods from one plant to another within the same company code, while intercompany STO is between different company codes.
STO is used for transferring goods within the same company code
Intercompany STO is used for transferring goods between different company codes
Intercompany STO requires additional configuration settings
Intercompany STO involves accounting entries between different company codes
Q335. Can you explain defrance between Hardware & Software.
Hardware refers to physical components of a computer while software refers to programs and applications that run on the computer.
Hardware includes components such as the motherboard, CPU, RAM, and hard drive.
Software includes programs such as Microsoft Office, Adobe Photoshop, and web browsers.
Hardware is tangible and can be physically touched while software is intangible and cannot be physically touched.
Hardware can be upgraded or replaced while software can be updated or un...read more
Q336. Explain your framework in detail
My framework is a hybrid framework that combines data-driven and keyword-driven approaches.
The framework uses Excel sheets to store test data and keywords.
It uses Selenium WebDriver for browser automation.
It has a modular structure with reusable functions and libraries.
It generates detailed HTML reports for test results.
It supports parallel execution of tests.
It has built-in exception handling and logging mechanisms.
Q337. What is patch and how to create and apply
A patch is a file that contains changes to a software program. It can be created using a diff tool and applied using a patch tool.
A patch file contains the changes made to a software program.
It can be created using a diff tool like Git diff or SVN diff.
The patch file can be applied using a patch tool like Git apply or SVN patch.
Patches are commonly used to update software programs or fix bugs.
Patches can also be used to customize software programs by adding or removing featur...read more
Q338. Why we cannot operate transformer in dc supply
Transformers cannot operate on DC supply due to the absence of changing magnetic field required for induction.
Transformers work on the principle of electromagnetic induction, which requires a changing magnetic field.
DC supply produces a constant magnetic field, which does not induce a voltage in the secondary coil of the transformer.
AC supply, on the other hand, produces a changing magnetic field, allowing for induction and voltage transformation.
Operating a transformer on DC...read more
Q339. Write a program in java to count the occurrence of each character in a string
Program in Java to count occurrence of each character in a string
Create a HashMap to store characters and their counts
Iterate through the string and update the counts in the HashMap
Print the characters and their counts from the HashMap
Q340. Different stock type in SAP system ?
Different stock types in SAP system include unrestricted stock, quality inspection stock, blocked stock, and special stock.
Unrestricted stock is available for use and can be used for any purpose.
Quality inspection stock is used for items that are undergoing quality checks.
Blocked stock is not available for use and requires special authorization to be used.
Special stock includes consignment stock, project stock, and returnable packaging stock.
Q341. Types of annotations in spring boot?
Spring Boot has several annotations for different purposes.
Spring Boot annotations are used for configuration, mapping, security, testing, etc.
@Configuration, @RestController, @RequestMapping, @Autowired, @Test are some commonly used annotations.
Annotations help in reducing boilerplate code and make the code more readable and maintainable.
Q342. What are the stages of Close of Business (COB), and can you define each stage?
The stages of Close of Business (COB) include preparation, reconciliation, reporting, and archiving.
Preparation involves finalizing transactions and ensuring all data is accurate.
Reconciliation is the process of comparing financial records to ensure they match.
Reporting involves generating reports for management and stakeholders.
Archiving is the final stage where all documents and records are stored for future reference.
Q343. What is disadvantages of online shopping
Disadvantages of online shopping include lack of physical inspection, delayed delivery, and security concerns.
Products cannot be physically inspected before purchase
Delivery can be delayed or lost in transit
Security concerns such as fraud and identity theft
Difficulty in returning or exchanging products
Limited customer service compared to in-store shopping
Inability to support local businesses
Potential for hidden fees or shipping costs
Risk of receiving counterfeit or damaged pr...read more
Q344. What are the parameters should match in BGP neighbourship?
Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.
AS number must match on both neighbors
IP address must be reachable between neighbors
Subnet mask should be the same on both neighbors
BGP version should be compatible between neighbors
Q345. Given a string ="This is my interview for QA engineer"; write code to give an output of each word with vowel count?
Code to output each word with vowel count in a given string.
Split the string into words using space as delimiter
Iterate through each word and count the number of vowels
Store the word and its vowel count in an array of strings
Q346. How to deal with angry customer
Listen actively, empathize, apologize, offer a solution, and follow up.
Stay calm and professional
Listen actively and let the customer vent
Empathize with their situation and apologize for any inconvenience
Offer a solution or options to resolve the issue
Follow up to ensure the customer is satisfied
Examples: offer a refund, replacement, or discount
Examples: escalate to a supervisor if necessary
Q347. Given a dropdown contains options with duplicates. Find those duplicates along with its occurrence/frequency?
Find duplicates in a dropdown along with their occurrence/frequency.
Iterate through the dropdown options and store each option in a hashmap with its frequency.
Identify options with frequency greater than 1 as duplicates.
Return the duplicates along with their occurrence/frequency.
Q348. What is OU and how to configure and Please Explain ADC ?
OU stands for Organizational Unit, used to organize objects within a domain. ADC stands for Active Directory Connector, used to synchronize data between on-premises AD and Azure AD.
OU is a container within a domain used to organize objects like users, groups, and computers.
OU helps in delegating administrative tasks and applying Group Policies.
Example: Sales department can have its own OU with specific users and policies.
ADC is used to synchronize on-premises Active Directory...read more
Q349. what is inheritance, encapsulation, access modifiers
Inheritance, encapsulation, and access modifiers are key concepts in object-oriented programming.
Inheritance allows a class to inherit properties and behaviors from another class.
Encapsulation is the concept of bundling data and methods that operate on the data within a single unit.
Access modifiers control the visibility and accessibility of class members.
Examples: public, private, protected
Inheritance example: class Dog extends Animal
Encapsulation example: private int age; p...read more
Q350. What is DHCP and how many type of DHCP and please explain how to work DHCP DORA Process ?
DHCP is a network protocol that assigns IP addresses to devices on a network. There are two types of DHCP: DHCPv4 and DHCPv6.
DHCP stands for Dynamic Host Configuration Protocol.
DHCPv4 is used for assigning IPv4 addresses, while DHCPv6 is used for assigning IPv6 addresses.
DHCP DORA process stands for Discover, Offer, Request, Acknowledge.
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP server responds with a DHCP Offer message cont...read more
Q351. What are the webpage optimization techniques? How to check webpage optimization? In lighthouse optimization reports , how to fix issue related render blocking scripts?
Webpage optimization techniques include minifying CSS and JS files, optimizing images, using asynchronous loading for scripts, and reducing render-blocking scripts.
Minify CSS and JS files to reduce file sizes and improve loading times.
Optimize images by compressing them and using the correct file format (e.g. JPEG for photographs, PNG for graphics).
Use asynchronous loading for scripts to prevent them from blocking the rendering of the page.
Reduce render-blocking scripts by mo...read more
Q352. How did you like the MBT aptitude test?
Q353. What are the aspects you need to consider while making hardware project (instrument )
Q354. What are the aspects you need to consider while making software project (code)
Q355. What will you do if you win 1 cr rs lottery?
I would invest a portion of it, donate to charity and use the rest to fulfill my personal goals.
Invest a portion of the money in a diversified portfolio to ensure long-term financial stability.
Donate a portion of the money to a reputable charity to give back to the community.
Use the remaining money to fulfill personal goals such as traveling, buying a house, or pursuing a hobby.
Consult with a financial advisor to make informed decisions about investing the money.
Q356. char *p & int *p. what is the size of p?
The size of char *p and int *p is the same, which is typically 8 bytes on a 64-bit system.
Both char *p and int *p are pointers, so their size is determined by the architecture of the system.
On a 64-bit system, the size of both char *p and int *p is usually 8 bytes.
The size of a pointer can vary depending on the system's architecture and compiler settings.
Q357. What is Robot framework? Challenges faced during testing? Types of Testing. How to handle bugs? Whether you will be able to work for extra hours during prod releases?
Robot Framework is a generic open-source automation framework for acceptance testing and acceptance test-driven development (ATDD).
Robot Framework is a keyword-driven test automation framework that uses tabular test data syntax.
Challenges faced during testing include identifying and prioritizing test cases, handling dynamic elements, and maintaining test scripts.
Types of testing include functional testing, regression testing, performance testing, and security testing.
Handling...read more
Q358. What methods do you use to transfer data from on-premises storage to Azure Data Lake Storage Gen2?
Methods to transfer data from on-premises storage to Azure Data Lake Storage Gen2
Use Azure Data Factory to create pipelines for data transfer
Utilize Azure Data Box for offline data transfer
Leverage Azure Storage Explorer for manual data transfer
Implement Azure Data Migration Service for large-scale data migration
Q359. what is firmware and where it is used?
Firmware is a type of software that is embedded in hardware devices to control their functionality.
Firmware is a combination of hardware and software.
It is used to control the behavior of hardware devices.
Firmware is typically stored in non-volatile memory, such as ROM or flash memory.
Examples of devices that use firmware include routers, printers, and digital cameras.
Q360. What are the three stages of event propagation and how to handle it
Event propagation consists of three stages: capturing, target, and bubbling.
Capturing phase: Events are captured from the outermost element to the target element.
Target phase: Event reaches the target element where the event originated.
Bubbling phase: Events bubble up from the target element to the outermost element.
Q361. How many languages you can speak?
I can speak three languages fluently: English, Spanish, and French.
Fluent in English, Spanish, and French
Can communicate effectively in all three languages
Have experience using all three languages in professional settings
Q362. Design process of parts for which commodity you are applying and also prepare for cad test if required.
Q363. What is a microsoft authenticator?
Microsoft Authenticator is a two-factor authentication app that provides an extra layer of security for your Microsoft account.
It generates a unique code every 30 seconds that you need to enter along with your password to access your account.
It can also be used for passwordless sign-in using biometric authentication.
It supports multiple accounts and can be used for personal and work accounts.
It can be downloaded for free on iOS and Android devices.
Q364. 3) what do you know about artificial intelligence
Artificial intelligence is the simulation of human intelligence processes by machines.
AI involves the development of algorithms and computer programs that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, and language translation.
Machine learning is a subset of AI that involves training algorithms to learn from data and improve their performance over time.
Deep learning is a subset of machine learning t...read more
Q365. What is overage charges?
Overage charges refer to additional fees charged for exceeding a set limit or quota.
Overage charges are common in telecommunications and internet service provider contracts.
For example, a mobile phone plan may have a set limit on data usage, and any usage beyond that limit may result in overage charges.
Overage charges can also apply to credit cards, where exceeding the credit limit can result in additional fees.
These charges can add up quickly and result in unexpected expense...read more
Q366. How do you handle transformation of multi array in JSON in Kafka
Multi array transformation in JSON in Kafka
Use a JSON serializer and deserializer to convert multi arrays to JSON and vice versa
Ensure that the data is properly formatted and validated before sending it to Kafka
Consider using a schema registry to manage the schema for the JSON data
Test the transformation thoroughly to ensure that it is working as expected
Q367. Difference between online and offline shopping
Online shopping is convenient and offers a wider range of products, while offline shopping allows for physical inspection and immediate gratification.
Online shopping can be done from anywhere with an internet connection.
Offline shopping allows for physical inspection of products before purchase.
Online shopping offers a wider range of products and often better prices.
Offline shopping allows for immediate gratification and eliminates shipping time.
Online shopping may require ad...read more
Q368. what is the purpose of for loop
For loop is used to iterate over a block of code multiple times based on a condition.
Used to execute a block of code multiple times
Iterates over a sequence of values
Can be used with arrays, lists, or ranges
Example: for(int i=0; i<5; i++) { //code block }
Q369. Consider urgency and importance: Assess the importance and urgency of each task, and prioritize the most urgent tasks first.
Prioritizing tasks based on importance and urgency is crucial for effective time management in mechanical maintenance engineering.
Identify tasks that are both important and urgent, and prioritize them first.
Consider the consequences of not completing a task on time - tasks with severe consequences should be prioritized.
Delegate tasks that are important but not urgent to free up time for urgent tasks.
Use tools like Eisenhower Matrix to categorize tasks based on importance and ...read more
Q370. How tracerout works? What is source and destination IP?
Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.
Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.
The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.
Traceroute displays the IP addresses of the routers in the path and the round-trip time for each hop.
It helps in ident...read more
Q371. Under which principle does VLAN work?
VLAN works under the principle of network segmentation.
VLAN separates a physical network into multiple logical networks.
It improves network performance, security, and management.
VLAN tags packets with a unique identifier to identify the network they belong to.
Example: VLAN can be used to separate guest and employee networks in a company.
Q372. What is dhcp and dns server. Web server ?
DHCP is a network protocol that automatically assigns IP addresses to devices. DNS server translates domain names into IP addresses. Web server hosts websites.
DHCP assigns IP addresses to devices on a network
DNS server translates domain names into IP addresses
Web server hosts websites
Q373. What is Subnet mask
Subnet mask is a 32-bit number used to divide an IP address into network and host addresses.
It is used to identify the network portion of an IP address
It is represented in decimal format or dotted decimal notation
It is used in conjunction with IP addresses to determine network and host addresses
Q374. What is the purpose of static keyword in Java
Static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.
Static variables are shared among all instances of a class
Static methods can be called without creating an object of the class
Static keyword can be used to create static blocks for initializing static variables
Static keyword can also be used to create static nested classes
Q375. Write testcases for Whatsapp video calling feature
Testcases for Whatsapp video calling feature
Test if video call can be initiated successfully
Test if video call can be accepted/rejected by recipient
Test if video call quality is good
Test if video call can be ended properly
Test if video call can be switched to voice call
Test if video call works on different network connections (3G, 4G, Wi-Fi)
Test if video call works on different devices (Android, iOS)
Test if video call can be made in a group chat
Q376. what do you know about customer support.
Customer support involves assisting customers with their inquiries, issues, and concerns to ensure a positive experience.
Providing timely and accurate responses to customer inquiries
Resolving customer issues and complaints effectively
Offering product or service recommendations based on customer needs
Maintaining a positive and professional attitude at all times
Utilizing various communication channels such as phone, email, and chat
Documenting customer interactions and feedback ...read more
Q377. How would you deal with aged customer
I would provide patient and attentive service, taking into account any physical or cognitive limitations.
Speak clearly and slowly, allowing time for the customer to process information
Use simple language and avoid technical jargon
Be patient and understanding, allowing the customer to take their time
Offer assistance with any physical tasks, such as carrying bags or opening doors
Ensure the customer is comfortable and has access to any necessary amenities, such as seating or wat...read more
Q378. how to bring specific commit changes to your branch?
Use git cherry-pick command to bring specific commit changes to your branch.
Identify the commit hash of the specific changes you want to bring to your branch.
Checkout to the branch where you want to apply the changes.
Use 'git cherry-pick <commit-hash>' command to apply the specific commit changes to your branch.
Q379. What are the Key Result Areas (KRA) for an auditor?
Key Result Areas (KRA) for an auditor include compliance with regulations, accuracy of financial statements, and identification of risks.
Ensuring compliance with regulations and standards
Accuracy of financial statements and reports
Identification and assessment of risks
Effective communication with stakeholders
Continuous improvement of audit processes
Q380. What is the process for conducting capacity planning?
Capacity planning involves forecasting future resource needs and ensuring that the necessary resources are available.
Identify current resource usage and performance levels
Forecast future resource needs based on growth projections
Determine any potential bottlenecks or constraints
Allocate resources accordingly to meet future demands
Regularly review and adjust the capacity plan as needed
Q381. What Key Performance Indicators (KPIs) have you worked with?
I have worked with KPIs such as sales targets, customer satisfaction scores, employee productivity metrics, and project completion rates.
Sales targets
Customer satisfaction scores
Employee productivity metrics
Project completion rates
Q382. what operator is used in composer to move data from gcs to bq
The operator used in Composer to move data from GCS to BigQuery is the GCS to BigQuery operator.
The GCS to BigQuery operator is used in Apache Airflow, which is the underlying technology of Composer.
This operator allows you to transfer data from Google Cloud Storage (GCS) to BigQuery.
You can specify the source and destination parameters in the operator to define the data transfer process.
Q383. What is CX care'excutive
CX care executive is a customer support professional who provides assistance and resolves issues related to customer experience.
CX care executive is responsible for ensuring customer satisfaction and loyalty.
They handle customer queries, complaints, and feedback through various channels like phone, email, chat, etc.
They work towards improving the overall customer experience by identifying areas of improvement and suggesting solutions.
Examples of CX care executives include cus...read more
Q384. Tell me advantages and disadvantages of online shopping?
Q385. Tell us about Child Labour?
Child labour refers to the exploitation of children through any form of work that deprives them of their childhood, interferes with their ability to attend regular schools, and is mentally, physically, socially or morally harmful.
Child labour is a global issue affecting millions of children worldwide.
It involves children being engaged in work that is often hazardous, exploitative, and detrimental to their well-being.
Child labour can take various forms, including forced labour...read more
Q386. What is B.P.O and customer service
B.P.O stands for Business Process Outsourcing. It involves outsourcing non-core business functions to a third-party service provider.
B.P.O is a cost-effective way for companies to handle non-core business functions such as customer service, technical support, and back-office operations.
Customer service is a crucial aspect of B.P.O as it involves handling customer queries, complaints, and providing support.
B.P.O companies use various channels such as phone, email, chat, and so...read more
Q387. write program in java to print even no by one thread and odd no by another thread
Program to print even and odd numbers using two threads in Java
Create two threads, one for even numbers and one for odd numbers
Use a loop to generate numbers and check if they are even or odd
Print the numbers using the respective threads
Use synchronization to ensure alternate printing of even and odd numbers
Q388. How to Human resources in work life balance in speech in a employee
Human resources can promote work-life balance by implementing policies, providing resources, and fostering a supportive culture.
Implement flexible work arrangements such as telecommuting or flexible hours.
Offer employee assistance programs to support mental health and well-being.
Encourage managers to prioritize work-life balance and lead by example.
Provide resources for stress management, time management, and self-care.
Promote a culture of work-life balance through communicat...read more
Q389. How a microprocessor does handle an interrupt?
Q390. What is current CTC and expected CTC
The question asks about the candidate's current and expected salary.
Be honest and transparent about your current salary.
Research the market rates for your role and level of experience to determine a reasonable expected salary.
Consider other benefits and perks besides the base salary.
Avoid discussing salary expectations too early in the interview process.
Focus on the value you can bring to the company rather than just the salary.
Q391. How to link TestNG file in Maven POM
To link TestNG file in Maven POM, add the TestNG dependency and plugin in POM.xml
Add TestNG dependency in POM.xml
Add TestNG plugin in POM.xml
Configure TestNG plugin to run the TestNG XML file
Example:
org.testng testng 7.4.0 org.apache.maven.plugins maven-surefire-plugin 3.0.0-M5 testng.xml
Q392. What is the prise stategy of the product?
The price strategy of the product is to offer competitive pricing based on market demand and value proposition.
Competitive pricing: The product is priced competitively compared to similar products in the market.
Market demand: The price is determined based on the demand for the product and the willingness of customers to pay.
Value proposition: The price reflects the unique features, benefits, and quality of the product.
Discounts and promotions: The company may offer discounts ...read more
Q393. How does hash map internally work in Java?
HashMap in Java uses an array of linked lists to store key-value pairs, with keys being hashed to determine the index in the array.
HashMap contains an array of linked lists where each element is a key-value pair
When a key is inserted, its hash code is used to determine the index in the array
If multiple keys hash to the same index, they are stored in a linked list at that index
To retrieve a value, the key's hash code is used to find the correct index and then search the linked...read more
Q394. Quata arrangement in SAP system ?
Quota arrangement in SAP system is used to define the distribution of goods or services over a specific period of time.
Quota arrangement is used to allocate quantities to different sources or vendors based on predefined rules.
It helps in maintaining a balance between multiple sources and ensures fair distribution.
Quota arrangement can be set up for both procurement and sales processes.
It can be based on various factors such as vendor performance, price, availability, etc.
For ...read more
Q395. What is the SQL query to calculate the average sales over a period of 7 days?
Calculate average sales over a 7-day period using SQL query.
Use the AVG() function to calculate the average sales.
Filter the data based on the date range of the 7-day period using WHERE clause.
Group the data by date to calculate the average sales for each day.
Join the tables if necessary to get the sales data.
Q396. How can you debug a program while it's being used?
Debugging a program while it's being used requires using tools like logging, monitoring, and remote debugging.
Use logging to track the flow of the program and identify any errors or issues.
Implement monitoring tools to keep an eye on the program's performance and detect any anomalies in real-time.
Utilize remote debugging techniques to troubleshoot and fix issues without interrupting the program's operation.
Use breakpoints and watchpoints to pause the program at specific point...read more
Q397. How would you troubleshoot a crashing program?
To troubleshoot a crashing program, I would start by checking for error messages, reviewing recent changes, testing in a different environment, and debugging the code.
Check for error messages to identify the cause of the crash
Review recent changes in the program or system that may have caused the crash
Test the program in a different environment to see if the crash is environment-specific
Debug the code to identify and fix any issues causing the crash
Q398. What is the maximum number of stores that can be created in Redux?
There is no hard limit on the number of stores that can be created in Redux.
Redux does not have a built-in limit on the number of stores that can be created.
Each store in Redux is independent and can manage its own state.
It is recommended to use a single store for most applications, but multiple stores can be used for complex scenarios.
Creating multiple stores can lead to increased complexity and potential performance issues.
Q399. Is it possible to create an object of an abstract class?
No, it is not possible to create an object of an abstract class.
Abstract classes cannot be instantiated directly.
You can only create objects of concrete classes that inherit from the abstract class.
Abstract classes can have abstract methods that must be implemented by concrete subclasses.
Q400. what is the difference between java and c++
Java is a high-level, object-oriented programming language, while C++ is a low-level, multi-paradigm language.
Java is platform-independent, while C++ is platform-dependent.
Java uses automatic garbage collection, while C++ requires manual memory management.
Java does not support pointers, while C++ does.
Java has a simpler syntax compared to C++.
Java is more secure due to its strong type checking and exception handling mechanisms.
Top HR Questions asked in FININDIA financial Consultancy Services
Interview Process at FININDIA financial Consultancy Services
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month