i
Tech Mahindra
Filter interviews by
I applied via Walk-in and was interviewed in Dec 2019. There were 3 interview rounds.
ICM components are responsible for call routing, queuing, and reporting in Cisco Contact Center solutions.
ICM Router: routes calls based on business rules and agent availability
ICM Logger: records call data for reporting and analysis
ICM AW/HDS: manages agent state and availability
ICM PG: interfaces with peripheral devices such as IVRs and ACDs
ICM CCE: provides a web-based interface for administration and reporting
CVP comprehensive call flow is a sequence of steps that a caller goes through when interacting with a CVP system.
The caller dials the phone number associated with the CVP system.
The call is routed to the CVP system, which answers the call and plays a welcome message.
The caller is prompted to make a selection from a menu of options.
Based on the caller's selection, the CVP system may play additional messages or transfer ...
Explanation of UCCE terms: extension mobility, route pattern, translation pattern, dial peer, trunk group.
Extension mobility allows users to log in to any phone and have their profile settings applied.
Route patterns determine how calls are routed within the network.
Translation patterns modify the calling or called number before routing the call.
Dial peers define how calls are routed to a specific destination.
Trunk grou...
I applied via Naukri.com and was interviewed in Jul 2022. There was 1 interview round.
Indexes are used to improve database performance. Clustered indexes determine the physical order of data, while non-clustered indexes do not.
Indexes are used to speed up data retrieval operations in a database.
Clustered indexes determine the physical order of data in a table, while non-clustered indexes do not.
A table can have only one clustered index, but multiple non-clustered indexes.
Clustered indexes are generally ...
Query to delete duplicate rows from a table
Use GROUP BY clause to group the rows by their unique values
Use HAVING clause to filter out the groups with count greater than 1
Use DELETE statement to delete the duplicate rows
Singleton pattern restricts the instantiation of a class to a single instance and provides a global point of access to it.
Create a private constructor to restrict instantiation of the class
Create a private static instance of the class
Create a public static method to access the instance
Ensure thread safety if necessary
Examples: Database connection, Logger, Configuration settings
Handle exceptions in stored procedures by using TRY-CATCH blocks.
Use TRY-CATCH blocks to catch and handle exceptions
Log the error message and severity level
Rollback the transaction if necessary
Rethrow the error if it cannot be handled
Use RAISERROR to raise custom error messages
SOLID principles are a set of five design principles that help in creating maintainable and scalable software.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open-Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.
I - Interface Segregation Principle: C...
throw is used to throw an exception while throw exception is used to throw a specific exception.
throw is used to throw any type of exception while throw exception is used to throw a specific type of exception.
throw exception is followed by the type of exception that needs to be thrown.
throw can be used to throw any object while throw exception can only be used to throw an exception object.
Example: throw new Exception("
Merit and demerit of Machine learning ?
General Aptitude and reasoning
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves dividing larger tables into smaller ones and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.
Normalization can improve database pe...
Polymorphism is the ability of an object to take on many forms.
It allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A shape class can have multiple subclasses like circle, square, etc. and all can be treated as shapes.
Example: A method can take an object of a parent class as a parameter and it can accept a
Stack is a data structure that follows LIFO. Pre and post tree formation are methods of traversing a tree.
Stack is used for backtracking, undoing, and recursion.
Pre-order traversal visits the root node first, then left subtree, then right subtree.
Post-order traversal visits the left subtree, then right subtree, then root node.
posted on 8 Jun 2022
An array is a collection of similar data types stored in contiguous memory locations.
Arrays can be one-dimensional or multi-dimensional
Elements in an array can be accessed using their index
Arrays can be initialized during declaration or later in the code
Arrays can be passed as arguments to functions
Example: int arr[5] = {1, 2, 3, 4, 5};
Example: char str[10] = "Hello";
I applied via Naukri.com and was interviewed in Nov 2021. There were 4 interview rounds.
A prime number is a positive integer greater than 1 that has no positive integer divisors other than 1 and itself.
Prime numbers are only divisible by 1 and themselves
Examples of prime numbers include 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, and 97
Prime numbers are important in cryptography and number theory
Code to check if a number is prime or not.
A prime number is only divisible by 1 and itself.
Start checking from 2 up to the square root of the number.
If the number is divisible by any number in the range, it's not prime.
Otherwise, it's prime.
What is the average age of a group of people with ages ranging from 20 to 60?
Add up all the ages and divide by the number of people in the group
The age range is 40 years
Assuming an equal distribution of ages, the average age would be 40
I keep myself updated by attending conferences, reading blogs, and taking online courses.
Attend conferences and workshops to learn from experts
Read blogs and articles to stay updated on latest trends
Take online courses and tutorials to gain practical knowledge
Experiment with new technology by building projects
Collaborate with peers to learn from their experiences
I applied via campus placement at SSN College of Engineering, Chennai and was interviewed in Apr 2021. There were 5 interview rounds.
Yes, GD-one time use plastic should be banned.
One-time use plastic is harmful to the environment and wildlife.
Alternatives like reusable bags and containers are readily available.
Many countries and cities have already implemented bans on single-use plastics.
Reducing plastic waste is crucial for the health of our planet.
I applied via Freshervoice, apuzz.com and was interviewed in Nov 2020. There were 3 interview rounds.
I was interviewed in Nov 2019.
Bugs found during testing
Bugs are inevitable in software development
Testing helps to identify and fix bugs before release
Different types of bugs include functional, performance, and security issues
Bug tracking tools like JIRA can help manage and prioritize bug fixes
based on 1 review
Rating in categories
Software Engineer
26.3k
salaries
| ₹2 L/yr - ₹9.1 L/yr |
Senior Software Engineer
21.2k
salaries
| ₹5.5 L/yr - ₹22.7 L/yr |
Technical Lead
11.6k
salaries
| ₹9.5 L/yr - ₹31.9 L/yr |
Associate Software Engineer
5.4k
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Team Lead
4.9k
salaries
| ₹5.1 L/yr - ₹16.8 L/yr |
Infosys
Cognizant
Accenture
Wipro