Add office photos
Engaged Employer

Tech Mahindra

3.5
based on 36.3k Reviews
Video summary
Filter interviews by

1500+ FININDIA financial Consultancy Services Interview Questions and Answers

Updated 3 Apr 2025
Popular Designations

Q301. How will you give feedback to a stubborn agent? And what will be the technique?

Ans.

I would use active listening and positive reinforcement to give feedback to a stubborn agent.

  • Listen actively to the agent's concerns and try to understand their perspective

  • Provide positive feedback on areas where the agent is performing well

  • Offer constructive criticism on areas where improvement is needed

  • Provide specific examples to support feedback

  • Encourage the agent to ask questions and provide feedback on the feedback given

  • Follow up with the agent to ensure that the feedba...read more

Add your answer

Q302. What is HIL bench setup and what are tools used for that?

Ans.

HIL bench setup is a hardware-in-the-loop testing environment used to simulate real-world conditions for testing electronic control units (ECUs).

  • HIL bench setup is used in automotive and aerospace industries.

  • It consists of a computer, HIL simulator, and ECU under test.

  • The HIL simulator generates signals to simulate sensors and actuators.

  • The ECU under test is connected to the HIL simulator to validate its functionality.

  • Tools used for HIL bench setup include dSPACE, National In...read more

Add your answer

Q303. Write a code that takes a string as an input and gives the characters and their count as output.

Ans.

Code to count characters in a string and output their count.

  • Create an empty dictionary to store character counts.

  • Loop through each character in the string and add it to the dictionary with a count of 1 if it doesn't exist, or increment the count if it does.

  • Output the dictionary with the character counts.

Add your answer

Q304. How to implicitly call an interface method?

Ans.

To implicitly call an interface method, create an object of the implementing class and assign it to the interface type.

  • Create an interface with the desired method signature

  • Create a class that implements the interface

  • Create an object of the implementing class and assign it to the interface type

  • Call the method on the interface object

  • The implementing class's method will be implicitly called

Add your answer
Discover FININDIA financial Consultancy Services interview dos and don'ts from real experiences

Q305. What is difference between lookup and master details relationship in Salesforce?

Ans.

Lookup relationship is loosely coupled while master-detail relationship is tightly coupled in Salesforce.

  • Lookup relationship does not impact the deletion of related records, while master-detail relationship does.

  • In lookup relationship, child records do not inherit the security and sharing settings of the parent record, while in master-detail relationship they do.

  • Lookup relationship can be set to optional, while master-detail relationship is always required.

  • An example of looku...read more

Add your answer

Q306. How will you allocate memory for 50 characters using malloc( )?

Add your answer
Are these interview questions helpful?

Q307. 2. Types of customer support?

Ans.

Types of customer support include phone support, email support, live chat support, self-service support, and social media support.

  • Phone support: Assisting customers over the phone.

  • Email support: Resolving customer queries through email communication.

  • Live chat support: Providing real-time assistance through chat platforms.

  • Self-service support: Offering online resources and FAQs for customers to find solutions independently.

  • Social media support: Addressing customer concerns and...read more

View 8 more answers

Q308. What is the advantages of Spring Boot over Spring framework?

Ans.

Spring Boot simplifies Spring framework development by providing auto-configuration, embedded servers, and production-ready features.

  • Spring Boot provides auto-configuration which reduces the need for manual configuration, making development faster and easier.

  • It includes embedded servers like Tomcat, Jetty, or Undertow, eliminating the need for deploying applications on external servers.

  • Spring Boot offers production-ready features such as metrics, health checks, and externaliz...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q309. How do you handle irid customers?

Ans.

I handle irate customers by actively listening to their concerns and empathizing with their situation.

  • Remain calm and composed

  • Listen actively to their concerns

  • Empathize with their situation

  • Apologize for any inconvenience caused

  • Offer a solution or escalate to a higher authority if necessary

View 1 answer

Q310. What is the list and list are mutable or immutable?

Ans.

Lists are a data structure in Python that can hold multiple items. They are mutable, meaning their elements can be changed.

  • Lists are enclosed in square brackets []

  • Elements in a list can be of different data types

  • Lists can be modified by adding, removing, or changing elements

  • Example: my_list = ['apple', 'banana', 'cherry']

View 1 answer

Q311. series of programs, data and instructions used in a computer's hardware to help the device operate and you complete tasks. Hardware is the physical components that comprise a computer, such as the graphics card

Ans.

Software is a collection of programs, data, and instructions that enable a computer to perform tasks.

  • Software is the intangible part of a computer system.

  • It includes operating systems, applications, and utilities.

  • Examples of software include Microsoft Windows, Adobe Photoshop, and Google Chrome.

Add your answer

Q312. What is Exception Handling in stored procedures?

Ans.

Exception handling in stored procedures manages errors gracefully, ensuring robust database operations.

  • Allows developers to catch and handle errors using TRY...CATCH blocks.

  • Example: BEGIN TRY ... END TRY for normal execution and BEGIN CATCH ... END CATCH for error handling.

  • Can log error details using ERROR_MESSAGE(), ERROR_NUMBER(), etc.

  • Helps maintain data integrity by rolling back transactions in case of errors.

  • Example: ROLLBACK TRANSACTION in the CATCH block to undo changes...read more

Add your answer

Q313. Q:- Difference between empathy and sympathy? Q:- What is BPS?

Ans.

Empathy is understanding and sharing the feelings of others, while sympathy is feeling sorry for someone's situation.

  • Empathy involves putting oneself in someone else's shoes and experiencing their emotions.

  • Sympathy involves feeling sorry for someone's situation without necessarily understanding their emotions.

  • Empathy is more active and involves a deeper level of understanding, while sympathy is more passive.

  • Example: If a friend is going through a breakup, empathy would involv...read more

View 2 more answers

Q314. what is react hook? useEffect with all dependencies

Ans.

React hooks are functions that let you use state and lifecycle features in functional components.

  • useEffect is a hook that allows you to perform side effects in function components.

  • It takes two arguments: a function to run and an array of dependencies.

  • The effect runs after the render and can be used for data fetching, subscriptions, or manually changing the DOM.

  • If the dependencies array is empty, the effect runs only once after the initial render.

  • If dependencies are provided, ...read more

Add your answer

Q315. How can you manager your customer? How can yuu slove conflicts between your team mates? How can present a business deck? What is the current role responsibilities in my current organisation? Few Excel short cut...

read more
Ans.

Managing customers, resolving conflicts, presenting business decks, Excel shortcuts and formulas, role responsibilities, CAPA, 5 WHY ANALYSIS, RCA

  • To manage customers, prioritize their needs, communicate effectively, and provide excellent service

  • To resolve conflicts between team mates, listen to both sides, find common ground, and encourage open communication

  • To present a business deck, focus on key points, use visuals, and engage the audience

  • Excel shortcuts: Ctrl+C (copy), Ctr...read more

Add your answer

Q316. What is advantageous of online shopping?

Ans.

Online shopping offers convenience, variety, and often better prices.

  • Convenience of shopping from anywhere at any time

  • Wide variety of products available from different sellers

  • Ability to compare prices and find deals

  • Saves time and effort of physically going to a store

  • Can read reviews and ratings from other customers

  • Can easily return or exchange products

  • Examples: Amazon, eBay, Walmart, etc.

View 1 answer

Q317. Ops round- what is kyc process, what is spi and pii, etc

Ans.

KYC process refers to verifying the identity of customers to prevent fraud, while SPI and PII are types of sensitive information.

  • KYC process stands for Know Your Customer and involves verifying the identity of customers through documents like ID cards, passports, etc.

  • SPI stands for Sensitive Personal Information, such as financial details, while PII stands for Personally Identifiable Information, like name and address.

  • KYC process is crucial in industries like banking and fina...read more

Add your answer

Q318. how to remove duplicate rows from bigquery? find the month of a given date in bigquery.

Ans.

To remove duplicate rows from BigQuery, use the DISTINCT keyword. To find the month of a given date, use the EXTRACT function.

  • To remove duplicate rows, use SELECT DISTINCT * FROM table_name;

  • To find the month of a given date, use SELECT EXTRACT(MONTH FROM date_column) AS month_name FROM table_name;

  • Make sure to replace 'table_name' and 'date_column' with the appropriate values in your query.

Add your answer

Q319. If system is restart multiple times, what was the issue?

Ans.

The issue could be related to hardware failure, software corruption, or overheating.

  • Possible hardware failure such as faulty RAM or hard drive

  • Software corruption due to malware or corrupted system files

  • Overheating causing the system to shut down and restart

View 3 more answers

Q320. What is an empty extract, and what is the process for creating one?

Ans.

An empty extract in Tableau is a data extract that contains no data, only the structure of the data source.

  • An empty extract is created by selecting 'Extract' from the data menu in Tableau and choosing 'Extract Data' without selecting any data source.

  • Empty extracts are useful for creating a template for future data imports or for sharing the data source structure without sharing the actual data.

  • To create an empty extract, you can also use the 'Create Extract' option in Tableau...read more

Add your answer

Q321. What are Positive and negative risks and how do you manage risks

Ans.

Positive risks are opportunities while negative risks are threats. Risks are managed through identification, assessment, and mitigation.

  • Positive risks are events that could have a positive impact on the project if they occur. For example, a vendor may offer a discount if the project is completed ahead of schedule.

  • Negative risks are events that could have a negative impact on the project if they occur. For example, a key team member may leave the project unexpectedly.

  • Risk mana...read more

Add your answer

Q322. How to handle hackler and aggresive trainee in batch?

Ans.

Address the behavior privately, set clear expectations, and offer support.

  • Speak to the trainee privately to understand their behavior and any underlying issues.

  • Set clear expectations for behavior in the training session and consequences for not meeting them.

  • Offer support and resources to help the trainee improve their behavior and performance.

  • If the behavior continues, involve a supervisor or HR representative.

  • Example: 'I understand that you may be frustrated, but interruptin...read more

Add your answer

Q323. Different info record types ?

Ans.

Different info record types in SAP MM include standard, consignment, subcontracting, pipeline, and service.

  • Standard info record is used for regular procurement of materials.

  • Consignment info record is used when materials are stored at the customer's location but owned by the vendor.

  • Subcontracting info record is used when a vendor performs a specific service or process on materials provided by the company.

  • Pipeline info record is used for materials that are continuously supplied...read more

View 4 more answers

Q324. What is Can FD and why it is required.

Ans.

CAN FD stands for Controller Area Network Flexible Data Rate, it is required for high-speed communication in automotive and industrial applications.

  • CAN FD allows for higher data rates compared to traditional CAN networks

  • It is necessary for transmitting large amounts of data quickly and efficiently

  • Used in applications where real-time communication and reliability are crucial, such as automotive ECUs

  • Example: CAN FD is used in modern cars for transmitting sensor data, control si...read more

Add your answer

Q325. What approach would you take to handle a scenario involving an irritated customer?

Ans.

I would listen to the customer, empathize with their situation, apologize for any inconvenience, and work towards finding a solution.

  • Listen actively to the customer's concerns without interrupting

  • Empathize with the customer's frustration and show understanding

  • Apologize for any inconvenience caused, even if it wasn't directly your fault

  • Work towards finding a solution that satisfies the customer's needs

  • Offer alternatives or escalate the issue to a supervisor if necessary

Add your answer

Q326. What do you think is the future of agile in IT companies? How do you see it shaping up?

Ans.

Agile will continue to grow and evolve in IT companies, with a focus on scaling and integrating with other methodologies.

  • Agile will become more mainstream and widely adopted in IT companies

  • There will be a focus on scaling agile to larger organizations and projects

  • Agile will continue to evolve and integrate with other methodologies, such as DevOps and Lean

  • There will be a greater emphasis on agile coaching and training to ensure successful implementation

  • Agile will continue to d...read more

Add your answer

Q327. What is index in SQL? Which index we are using for which process?

Ans.

Index in SQL is a data structure that improves the speed of data retrieval operations.

  • Indexes are used to quickly locate data without having to search every row in a table.

  • Clustered index determines the physical order of data in a table.

  • Non-clustered index creates a separate structure that contains the indexed columns and a pointer to the actual data.

  • Unique index ensures that the indexed columns contain unique values.

  • Full-text index is used for efficient text-based searches.

  • C...read more

Add your answer

Q328. what are access ties available in azure storage

Ans.

Access tiers in Azure Storage include hot, cool, and archive tiers.

  • Hot access tier: Optimized for frequently accessed data with higher storage costs.

  • Cool access tier: Optimized for infrequently accessed data with lower storage costs.

  • Archive access tier: Optimized for rarely accessed data with the lowest storage costs.

  • Data in the archive tier may have longer retrieval times compared to hot and cool tiers.

Add your answer

Q329. how will you handle errors in prod environment

Ans.

I will handle errors in prod environment by implementing proper error logging, monitoring, and alerting systems.

  • Implement comprehensive error logging to track errors and their root causes

  • Set up monitoring tools to detect errors in real-time and alert the team

  • Establish a process for prioritizing and resolving errors based on impact and severity

  • Regularly review and analyze error logs to identify patterns and prevent future occurrences

Add your answer

Q330. In ACI, how VMM integration approach and why it's required

Ans.

VMM integration in ACI allows seamless communication between virtual and physical networks

  • VMM integration in ACI enables automation and orchestration of network policies across virtual and physical environments

  • It helps in maintaining consistency and reducing errors in network configurations

  • Examples of VMMs include VMware vSphere, Microsoft Hyper-V, and KVM

  • VMM integration is required to ensure efficient communication and management of virtualized workloads in the data center

Add your answer

Q331. What do you mean by ETag (Entity Tag) and how does it work?

Ans.

ETag is an HTTP header used for web caching to determine if a resource has changed.

  • ETag is a unique identifier assigned to a specific version of a resource on the web server.

  • When a client requests a resource, the server sends the ETag along with the resource.

  • The client can then use the ETag in subsequent requests to check if the resource has been modified.

  • If the ETag matches the current version of the resource on the server, a 304 Not Modified response is returned.

  • This helps ...read more

Add your answer

Q332. 2.WAP to provide String without duplicates.(Each character repeated only once) eg: "Hello World" => "Helo Wrd"; Hint:Use Set (Linked hashset)

Ans.

The program removes duplicates from a given string using a Set data structure.

  • Create a LinkedHashSet to maintain the order of characters while removing duplicates

  • Iterate through each character in the input string and add it to the set

  • Convert the set back to a string and return the result

Add your answer

Q333. What is slicing in python and what is full form on pep?

Ans.

Slicing is a feature in Python that allows accessing parts of a sequence. PEP stands for Python Enhancement Proposal.

  • Slicing is done using the colon (:) operator.

  • It can be used on strings, lists, tuples, and other sequence types.

  • Syntax: sequence[start:stop:step]

  • start is the index where the slice starts, stop is the index where it ends (exclusive), and step is the increment.

  • PEP is a document that describes proposed changes to Python's design or implementation.

  • PEP 8 is the styl...read more

Add your answer

Q334. What is difference between sto and intercompany sto process

Ans.

STO is a process of transferring goods from one plant to another within the same company code, while intercompany STO is between different company codes.

  • STO is used for transferring goods within the same company code

  • Intercompany STO is used for transferring goods between different company codes

  • Intercompany STO requires additional configuration settings

  • Intercompany STO involves accounting entries between different company codes

View 1 answer

Q335. Can you explain defrance between Hardware & Software.

Ans.

Hardware refers to physical components of a computer while software refers to programs and applications that run on the computer.

  • Hardware includes components such as the motherboard, CPU, RAM, and hard drive.

  • Software includes programs such as Microsoft Office, Adobe Photoshop, and web browsers.

  • Hardware is tangible and can be physically touched while software is intangible and cannot be physically touched.

  • Hardware can be upgraded or replaced while software can be updated or un...read more

Add your answer

Q336. Explain your framework in detail

Ans.

My framework is a hybrid framework that combines data-driven and keyword-driven approaches.

  • The framework uses Excel sheets to store test data and keywords.

  • It uses Selenium WebDriver for browser automation.

  • It has a modular structure with reusable functions and libraries.

  • It generates detailed HTML reports for test results.

  • It supports parallel execution of tests.

  • It has built-in exception handling and logging mechanisms.

View 1 answer

Q337. What is patch and how to create and apply

Ans.

A patch is a file that contains changes to a software program. It can be created using a diff tool and applied using a patch tool.

  • A patch file contains the changes made to a software program.

  • It can be created using a diff tool like Git diff or SVN diff.

  • The patch file can be applied using a patch tool like Git apply or SVN patch.

  • Patches are commonly used to update software programs or fix bugs.

  • Patches can also be used to customize software programs by adding or removing featur...read more

Add your answer

Q338. Why we cannot operate transformer in dc supply

Ans.

Transformers cannot operate on DC supply due to the absence of changing magnetic field required for induction.

  • Transformers work on the principle of electromagnetic induction, which requires a changing magnetic field.

  • DC supply produces a constant magnetic field, which does not induce a voltage in the secondary coil of the transformer.

  • AC supply, on the other hand, produces a changing magnetic field, allowing for induction and voltage transformation.

  • Operating a transformer on DC...read more

View 2 more answers

Q339. Write a program in java to count the occurrence of each character in a string

Ans.

Program in Java to count occurrence of each character in a string

  • Create a HashMap to store characters and their counts

  • Iterate through the string and update the counts in the HashMap

  • Print the characters and their counts from the HashMap

Add your answer

Q340. Different stock type in SAP system ?

Ans.

Different stock types in SAP system include unrestricted stock, quality inspection stock, blocked stock, and special stock.

  • Unrestricted stock is available for use and can be used for any purpose.

  • Quality inspection stock is used for items that are undergoing quality checks.

  • Blocked stock is not available for use and requires special authorization to be used.

  • Special stock includes consignment stock, project stock, and returnable packaging stock.

View 2 more answers

Q341. Types of annotations in spring boot?

Ans.

Spring Boot has several annotations for different purposes.

  • Spring Boot annotations are used for configuration, mapping, security, testing, etc.

  • @Configuration, @RestController, @RequestMapping, @Autowired, @Test are some commonly used annotations.

  • Annotations help in reducing boilerplate code and make the code more readable and maintainable.

Add your answer

Q342. What are the stages of Close of Business (COB), and can you define each stage?

Ans.

The stages of Close of Business (COB) include preparation, reconciliation, reporting, and archiving.

  • Preparation involves finalizing transactions and ensuring all data is accurate.

  • Reconciliation is the process of comparing financial records to ensure they match.

  • Reporting involves generating reports for management and stakeholders.

  • Archiving is the final stage where all documents and records are stored for future reference.

Add your answer

Q343. What is disadvantages of online shopping

Ans.

Disadvantages of online shopping include lack of physical inspection, delayed delivery, and security concerns.

  • Products cannot be physically inspected before purchase

  • Delivery can be delayed or lost in transit

  • Security concerns such as fraud and identity theft

  • Difficulty in returning or exchanging products

  • Limited customer service compared to in-store shopping

  • Inability to support local businesses

  • Potential for hidden fees or shipping costs

  • Risk of receiving counterfeit or damaged pr...read more

View 1 answer

Q344. What are the parameters should match in BGP neighbourship?

Ans.

Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.

  • AS number must match on both neighbors

  • IP address must be reachable between neighbors

  • Subnet mask should be the same on both neighbors

  • BGP version should be compatible between neighbors

Add your answer

Q345. Given a string ="This is my interview for QA engineer"; write code to give an output of each word with vowel count?

Ans.

Code to output each word with vowel count in a given string.

  • Split the string into words using space as delimiter

  • Iterate through each word and count the number of vowels

  • Store the word and its vowel count in an array of strings

Add your answer

Q346. How to deal with angry customer

Ans.

Listen actively, empathize, apologize, offer a solution, and follow up.

  • Stay calm and professional

  • Listen actively and let the customer vent

  • Empathize with their situation and apologize for any inconvenience

  • Offer a solution or options to resolve the issue

  • Follow up to ensure the customer is satisfied

  • Examples: offer a refund, replacement, or discount

  • Examples: escalate to a supervisor if necessary

View 1 answer

Q347. Given a dropdown contains options with duplicates. Find those duplicates along with its occurrence/frequency?

Ans.

Find duplicates in a dropdown along with their occurrence/frequency.

  • Iterate through the dropdown options and store each option in a hashmap with its frequency.

  • Identify options with frequency greater than 1 as duplicates.

  • Return the duplicates along with their occurrence/frequency.

Add your answer

Q348. What is OU and how to configure and Please Explain ADC ?

Ans.

OU stands for Organizational Unit, used to organize objects within a domain. ADC stands for Active Directory Connector, used to synchronize data between on-premises AD and Azure AD.

  • OU is a container within a domain used to organize objects like users, groups, and computers.

  • OU helps in delegating administrative tasks and applying Group Policies.

  • Example: Sales department can have its own OU with specific users and policies.

  • ADC is used to synchronize on-premises Active Directory...read more

Add your answer

Q349. what is inheritance, encapsulation, access modifiers

Ans.

Inheritance, encapsulation, and access modifiers are key concepts in object-oriented programming.

  • Inheritance allows a class to inherit properties and behaviors from another class.

  • Encapsulation is the concept of bundling data and methods that operate on the data within a single unit.

  • Access modifiers control the visibility and accessibility of class members.

  • Examples: public, private, protected

  • Inheritance example: class Dog extends Animal

  • Encapsulation example: private int age; p...read more

View 2 more answers

Q350. What is DHCP and how many type of DHCP and please explain how to work DHCP DORA Process ?

Ans.

DHCP is a network protocol that assigns IP addresses to devices on a network. There are two types of DHCP: DHCPv4 and DHCPv6.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • DHCPv4 is used for assigning IPv4 addresses, while DHCPv6 is used for assigning IPv6 addresses.

  • DHCP DORA process stands for Discover, Offer, Request, Acknowledge.

  • Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.

  • Offer: DHCP server responds with a DHCP Offer message cont...read more

Add your answer

Q351. What are the webpage optimization techniques? How to check webpage optimization? In lighthouse optimization reports , how to fix issue related render blocking scripts?

Ans.

Webpage optimization techniques include minifying CSS and JS files, optimizing images, using asynchronous loading for scripts, and reducing render-blocking scripts.

  • Minify CSS and JS files to reduce file sizes and improve loading times.

  • Optimize images by compressing them and using the correct file format (e.g. JPEG for photographs, PNG for graphics).

  • Use asynchronous loading for scripts to prevent them from blocking the rendering of the page.

  • Reduce render-blocking scripts by mo...read more

Add your answer

Q352. How did you like the MBT aptitude test?

Add your answer

Q353. What are the aspects you need to consider while making hardware project (instrument )

Add your answer

Q354. What are the aspects you need to consider while making software project (code)

Add your answer

Q355. What will you do if you win 1 cr rs lottery?

Ans.

I would invest a portion of it, donate to charity and use the rest to fulfill my personal goals.

  • Invest a portion of the money in a diversified portfolio to ensure long-term financial stability.

  • Donate a portion of the money to a reputable charity to give back to the community.

  • Use the remaining money to fulfill personal goals such as traveling, buying a house, or pursuing a hobby.

  • Consult with a financial advisor to make informed decisions about investing the money.

Add your answer

Q356. char *p & int *p. what is the size of p?

Ans.

The size of char *p and int *p is the same, which is typically 8 bytes on a 64-bit system.

  • Both char *p and int *p are pointers, so their size is determined by the architecture of the system.

  • On a 64-bit system, the size of both char *p and int *p is usually 8 bytes.

  • The size of a pointer can vary depending on the system's architecture and compiler settings.

Add your answer

Q357. What is Robot framework? Challenges faced during testing? Types of Testing. How to handle bugs? Whether you will be able to work for extra hours during prod releases?

Ans.

Robot Framework is a generic open-source automation framework for acceptance testing and acceptance test-driven development (ATDD).

  • Robot Framework is a keyword-driven test automation framework that uses tabular test data syntax.

  • Challenges faced during testing include identifying and prioritizing test cases, handling dynamic elements, and maintaining test scripts.

  • Types of testing include functional testing, regression testing, performance testing, and security testing.

  • Handling...read more

Add your answer

Q358. What methods do you use to transfer data from on-premises storage to Azure Data Lake Storage Gen2?

Ans.

Methods to transfer data from on-premises storage to Azure Data Lake Storage Gen2

  • Use Azure Data Factory to create pipelines for data transfer

  • Utilize Azure Data Box for offline data transfer

  • Leverage Azure Storage Explorer for manual data transfer

  • Implement Azure Data Migration Service for large-scale data migration

Add your answer

Q359. what is firmware and where it is used?

Ans.

Firmware is a type of software that is embedded in hardware devices to control their functionality.

  • Firmware is a combination of hardware and software.

  • It is used to control the behavior of hardware devices.

  • Firmware is typically stored in non-volatile memory, such as ROM or flash memory.

  • Examples of devices that use firmware include routers, printers, and digital cameras.

Add your answer

Q360. What are the three stages of event propagation and how to handle it

Ans.

Event propagation consists of three stages: capturing, target, and bubbling.

  • Capturing phase: Events are captured from the outermost element to the target element.

  • Target phase: Event reaches the target element where the event originated.

  • Bubbling phase: Events bubble up from the target element to the outermost element.

Add your answer

Q361. How many languages you can speak?

Ans.

I can speak three languages fluently: English, Spanish, and French.

  • Fluent in English, Spanish, and French

  • Can communicate effectively in all three languages

  • Have experience using all three languages in professional settings

View 6 more answers

Q362. Design process of parts for which commodity you are applying and also prepare for cad test if required.

Add your answer

Q363. What is a microsoft authenticator?

Ans.

Microsoft Authenticator is a two-factor authentication app that provides an extra layer of security for your Microsoft account.

  • It generates a unique code every 30 seconds that you need to enter along with your password to access your account.

  • It can also be used for passwordless sign-in using biometric authentication.

  • It supports multiple accounts and can be used for personal and work accounts.

  • It can be downloaded for free on iOS and Android devices.

View 1 answer

Q364. 3) what do you know about artificial intelligence

Ans.

Artificial intelligence is the simulation of human intelligence processes by machines.

  • AI involves the development of algorithms and computer programs that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, and language translation.

  • Machine learning is a subset of AI that involves training algorithms to learn from data and improve their performance over time.

  • Deep learning is a subset of machine learning t...read more

Add your answer

Q365. What is overage charges?

Ans.

Overage charges refer to additional fees charged for exceeding a set limit or quota.

  • Overage charges are common in telecommunications and internet service provider contracts.

  • For example, a mobile phone plan may have a set limit on data usage, and any usage beyond that limit may result in overage charges.

  • Overage charges can also apply to credit cards, where exceeding the credit limit can result in additional fees.

  • These charges can add up quickly and result in unexpected expense...read more

View 2 more answers

Q366. How do you handle transformation of multi array in JSON in Kafka

Ans.

Multi array transformation in JSON in Kafka

  • Use a JSON serializer and deserializer to convert multi arrays to JSON and vice versa

  • Ensure that the data is properly formatted and validated before sending it to Kafka

  • Consider using a schema registry to manage the schema for the JSON data

  • Test the transformation thoroughly to ensure that it is working as expected

Add your answer

Q367. Difference between online and offline shopping

Ans.

Online shopping is convenient and offers a wider range of products, while offline shopping allows for physical inspection and immediate gratification.

  • Online shopping can be done from anywhere with an internet connection.

  • Offline shopping allows for physical inspection of products before purchase.

  • Online shopping offers a wider range of products and often better prices.

  • Offline shopping allows for immediate gratification and eliminates shipping time.

  • Online shopping may require ad...read more

View 1 answer

Q368. what is the purpose of for loop

Ans.

For loop is used to iterate over a block of code multiple times based on a condition.

  • Used to execute a block of code multiple times

  • Iterates over a sequence of values

  • Can be used with arrays, lists, or ranges

  • Example: for(int i=0; i<5; i++) { //code block }

Add your answer

Q369. Consider urgency and importance: Assess the importance and urgency of each task, and prioritize the most urgent tasks first.

Ans.

Prioritizing tasks based on importance and urgency is crucial for effective time management in mechanical maintenance engineering.

  • Identify tasks that are both important and urgent, and prioritize them first.

  • Consider the consequences of not completing a task on time - tasks with severe consequences should be prioritized.

  • Delegate tasks that are important but not urgent to free up time for urgent tasks.

  • Use tools like Eisenhower Matrix to categorize tasks based on importance and ...read more

Add your answer

Q370. How tracerout works? What is source and destination IP?

Ans.

Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.

  • Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.

  • The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.

  • Traceroute displays the IP addresses of the routers in the path and the round-trip time for each hop.

  • It helps in ident...read more

Add your answer

Q371. Under which principle does VLAN work?

Ans.

VLAN works under the principle of network segmentation.

  • VLAN separates a physical network into multiple logical networks.

  • It improves network performance, security, and management.

  • VLAN tags packets with a unique identifier to identify the network they belong to.

  • Example: VLAN can be used to separate guest and employee networks in a company.

Add your answer

Q372. What is dhcp and dns server. Web server ?

Ans.

DHCP is a network protocol that automatically assigns IP addresses to devices. DNS server translates domain names into IP addresses. Web server hosts websites.

  • DHCP assigns IP addresses to devices on a network

  • DNS server translates domain names into IP addresses

  • Web server hosts websites

Add your answer

Q373. What is Subnet mask

Ans.

Subnet mask is a 32-bit number used to divide an IP address into network and host addresses.

  • It is used to identify the network portion of an IP address

  • It is represented in decimal format or dotted decimal notation

  • It is used in conjunction with IP addresses to determine network and host addresses

View 6 more answers

Q374. What is the purpose of static keyword in Java

Ans.

Static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.

  • Static variables are shared among all instances of a class

  • Static methods can be called without creating an object of the class

  • Static keyword can be used to create static blocks for initializing static variables

  • Static keyword can also be used to create static nested classes

Add your answer

Q375. Write testcases for Whatsapp video calling feature

Ans.

Testcases for Whatsapp video calling feature

  • Test if video call can be initiated successfully

  • Test if video call can be accepted/rejected by recipient

  • Test if video call quality is good

  • Test if video call can be ended properly

  • Test if video call can be switched to voice call

  • Test if video call works on different network connections (3G, 4G, Wi-Fi)

  • Test if video call works on different devices (Android, iOS)

  • Test if video call can be made in a group chat

Add your answer

Q376. what do you know about customer support.

Ans.

Customer support involves assisting customers with their inquiries, issues, and concerns to ensure a positive experience.

  • Providing timely and accurate responses to customer inquiries

  • Resolving customer issues and complaints effectively

  • Offering product or service recommendations based on customer needs

  • Maintaining a positive and professional attitude at all times

  • Utilizing various communication channels such as phone, email, and chat

  • Documenting customer interactions and feedback ...read more

Add your answer

Q377. How would you deal with aged customer

Ans.

I would provide patient and attentive service, taking into account any physical or cognitive limitations.

  • Speak clearly and slowly, allowing time for the customer to process information

  • Use simple language and avoid technical jargon

  • Be patient and understanding, allowing the customer to take their time

  • Offer assistance with any physical tasks, such as carrying bags or opening doors

  • Ensure the customer is comfortable and has access to any necessary amenities, such as seating or wat...read more

View 1 answer

Q378. how to bring specific commit changes to your branch?

Ans.

Use git cherry-pick command to bring specific commit changes to your branch.

  • Identify the commit hash of the specific changes you want to bring to your branch.

  • Checkout to the branch where you want to apply the changes.

  • Use 'git cherry-pick <commit-hash>' command to apply the specific commit changes to your branch.

Add your answer

Q379. What are the Key Result Areas (KRA) for an auditor?

Ans.

Key Result Areas (KRA) for an auditor include compliance with regulations, accuracy of financial statements, and identification of risks.

  • Ensuring compliance with regulations and standards

  • Accuracy of financial statements and reports

  • Identification and assessment of risks

  • Effective communication with stakeholders

  • Continuous improvement of audit processes

Add your answer

Q380. What is the process for conducting capacity planning?

Ans.

Capacity planning involves forecasting future resource needs and ensuring that the necessary resources are available.

  • Identify current resource usage and performance levels

  • Forecast future resource needs based on growth projections

  • Determine any potential bottlenecks or constraints

  • Allocate resources accordingly to meet future demands

  • Regularly review and adjust the capacity plan as needed

Add your answer

Q381. What Key Performance Indicators (KPIs) have you worked with?

Ans.

I have worked with KPIs such as sales targets, customer satisfaction scores, employee productivity metrics, and project completion rates.

  • Sales targets

  • Customer satisfaction scores

  • Employee productivity metrics

  • Project completion rates

Add your answer

Q382. what operator is used in composer to move data from gcs to bq

Ans.

The operator used in Composer to move data from GCS to BigQuery is the GCS to BigQuery operator.

  • The GCS to BigQuery operator is used in Apache Airflow, which is the underlying technology of Composer.

  • This operator allows you to transfer data from Google Cloud Storage (GCS) to BigQuery.

  • You can specify the source and destination parameters in the operator to define the data transfer process.

Add your answer

Q383. What is CX care'excutive

Ans.

CX care executive is a customer support professional who provides assistance and resolves issues related to customer experience.

  • CX care executive is responsible for ensuring customer satisfaction and loyalty.

  • They handle customer queries, complaints, and feedback through various channels like phone, email, chat, etc.

  • They work towards improving the overall customer experience by identifying areas of improvement and suggesting solutions.

  • Examples of CX care executives include cus...read more

View 3 more answers

Q384. Tell me advantages and disadvantages of online shopping?

Add your answer

Q385. Tell us about Child Labour?

Ans.

Child labour refers to the exploitation of children through any form of work that deprives them of their childhood, interferes with their ability to attend regular schools, and is mentally, physically, socially or morally harmful.

  • Child labour is a global issue affecting millions of children worldwide.

  • It involves children being engaged in work that is often hazardous, exploitative, and detrimental to their well-being.

  • Child labour can take various forms, including forced labour...read more

View 2 more answers

Q386. What is B.P.O and customer service

Ans.

B.P.O stands for Business Process Outsourcing. It involves outsourcing non-core business functions to a third-party service provider.

  • B.P.O is a cost-effective way for companies to handle non-core business functions such as customer service, technical support, and back-office operations.

  • Customer service is a crucial aspect of B.P.O as it involves handling customer queries, complaints, and providing support.

  • B.P.O companies use various channels such as phone, email, chat, and so...read more

View 1 answer

Q387. write program in java to print even no by one thread and odd no by another thread

Ans.

Program to print even and odd numbers using two threads in Java

  • Create two threads, one for even numbers and one for odd numbers

  • Use a loop to generate numbers and check if they are even or odd

  • Print the numbers using the respective threads

  • Use synchronization to ensure alternate printing of even and odd numbers

Add your answer

Q388. How to Human resources in work life balance in speech in a employee

Ans.

Human resources can promote work-life balance by implementing policies, providing resources, and fostering a supportive culture.

  • Implement flexible work arrangements such as telecommuting or flexible hours.

  • Offer employee assistance programs to support mental health and well-being.

  • Encourage managers to prioritize work-life balance and lead by example.

  • Provide resources for stress management, time management, and self-care.

  • Promote a culture of work-life balance through communicat...read more

View 1 answer

Q389. How a microprocessor does handle an interrupt?

Add your answer

Q390. What is current CTC and expected CTC

Ans.

The question asks about the candidate's current and expected salary.

  • Be honest and transparent about your current salary.

  • Research the market rates for your role and level of experience to determine a reasonable expected salary.

  • Consider other benefits and perks besides the base salary.

  • Avoid discussing salary expectations too early in the interview process.

  • Focus on the value you can bring to the company rather than just the salary.

Add your answer

Q391. How to link TestNG file in Maven POM

Ans.

To link TestNG file in Maven POM, add the TestNG dependency and plugin in POM.xml

  • Add TestNG dependency in POM.xml

  • Add TestNG plugin in POM.xml

  • Configure TestNG plugin to run the TestNG XML file

  • Example: org.testng testng 7.4.0 org.apache.maven.plugins maven-surefire-plugin 3.0.0-M5 testng.xml

Add your answer

Q392. What is the prise stategy of the product?

Ans.

The price strategy of the product is to offer competitive pricing based on market demand and value proposition.

  • Competitive pricing: The product is priced competitively compared to similar products in the market.

  • Market demand: The price is determined based on the demand for the product and the willingness of customers to pay.

  • Value proposition: The price reflects the unique features, benefits, and quality of the product.

  • Discounts and promotions: The company may offer discounts ...read more

View 1 answer

Q393. How does hash map internally work in Java?

Ans.

HashMap in Java uses an array of linked lists to store key-value pairs, with keys being hashed to determine the index in the array.

  • HashMap contains an array of linked lists where each element is a key-value pair

  • When a key is inserted, its hash code is used to determine the index in the array

  • If multiple keys hash to the same index, they are stored in a linked list at that index

  • To retrieve a value, the key's hash code is used to find the correct index and then search the linked...read more

Add your answer

Q394. Quata arrangement in SAP system ?

Ans.

Quota arrangement in SAP system is used to define the distribution of goods or services over a specific period of time.

  • Quota arrangement is used to allocate quantities to different sources or vendors based on predefined rules.

  • It helps in maintaining a balance between multiple sources and ensures fair distribution.

  • Quota arrangement can be set up for both procurement and sales processes.

  • It can be based on various factors such as vendor performance, price, availability, etc.

  • For ...read more

View 1 answer

Q395. What is the SQL query to calculate the average sales over a period of 7 days?

Ans.

Calculate average sales over a 7-day period using SQL query.

  • Use the AVG() function to calculate the average sales.

  • Filter the data based on the date range of the 7-day period using WHERE clause.

  • Group the data by date to calculate the average sales for each day.

  • Join the tables if necessary to get the sales data.

Add your answer

Q396. How can you debug a program while it's being used?

Ans.

Debugging a program while it's being used requires using tools like logging, monitoring, and remote debugging.

  • Use logging to track the flow of the program and identify any errors or issues.

  • Implement monitoring tools to keep an eye on the program's performance and detect any anomalies in real-time.

  • Utilize remote debugging techniques to troubleshoot and fix issues without interrupting the program's operation.

  • Use breakpoints and watchpoints to pause the program at specific point...read more

Add your answer

Q397. How would you troubleshoot a crashing program?

Ans.

To troubleshoot a crashing program, I would start by checking for error messages, reviewing recent changes, testing in a different environment, and debugging the code.

  • Check for error messages to identify the cause of the crash

  • Review recent changes in the program or system that may have caused the crash

  • Test the program in a different environment to see if the crash is environment-specific

  • Debug the code to identify and fix any issues causing the crash

Add your answer

Q398. What is the maximum number of stores that can be created in Redux?

Ans.

There is no hard limit on the number of stores that can be created in Redux.

  • Redux does not have a built-in limit on the number of stores that can be created.

  • Each store in Redux is independent and can manage its own state.

  • It is recommended to use a single store for most applications, but multiple stores can be used for complex scenarios.

  • Creating multiple stores can lead to increased complexity and potential performance issues.

Add your answer

Q399. Is it possible to create an object of an abstract class?

Ans.

No, it is not possible to create an object of an abstract class.

  • Abstract classes cannot be instantiated directly.

  • You can only create objects of concrete classes that inherit from the abstract class.

  • Abstract classes can have abstract methods that must be implemented by concrete subclasses.

Add your answer

Q400. what is the difference between java and c++

Ans.

Java is a high-level, object-oriented programming language, while C++ is a low-level, multi-paradigm language.

  • Java is platform-independent, while C++ is platform-dependent.

  • Java uses automatic garbage collection, while C++ requires manual memory management.

  • Java does not support pointers, while C++ does.

  • Java has a simpler syntax compared to C++.

  • Java is more secure due to its strong type checking and exception handling mechanisms.

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at FININDIA financial Consultancy Services

based on 3.3k interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 249 Interview Questions
3.8
 • 208 Interview Questions
3.6
 • 193 Interview Questions
4.1
 • 193 Interview Questions
3.4
 • 179 Interview Questions
3.3
 • 147 Interview Questions
View all
Top Tech Mahindra Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter