i
Tech
Mahindra
Filter interviews by
Collections are data structures that store groups of related objects, enabling efficient data management and manipulation.
ArrayList: A resizable array implementation in Java, useful for storing lists of items like user profiles in a social media app.
HashMap: A key-value pair collection that allows for fast retrieval, ideal for caching user sessions in a web application.
HashSet: A collection that prevents duplicate...
I have extensive experience in SQL development, including database design, optimization, and complex query writing.
Proficient in writing complex SQL queries for data retrieval and manipulation, e.g., using JOINs, subqueries, and CTEs.
Experience in database design and normalization to ensure data integrity and reduce redundancy.
Skilled in performance tuning of SQL queries using indexing and query optimization techn...
Unix commands are essential tools for file management, process control, and system navigation in Unix-like operating systems.
ls: Lists files and directories in the current directory. Example: 'ls -l' for detailed listing.
cd: Changes the current directory. Example: 'cd /home/user' to navigate to the user's home directory.
cp: Copies files or directories. Example: 'cp file.txt /backup/' to copy 'file.txt' to the back...
Dependency injection is a design pattern that allows a class to receive its dependencies from an external source rather than creating them internally.
Promotes loose coupling between classes, making code easier to manage and test.
Facilitates unit testing by allowing mock dependencies to be injected.
Commonly used in frameworks like Spring (Java) and Angular (JavaScript).
Example: Instead of a class instantiating its ...
What people are saying about Tech Mahindra
Exception handling in stored procedures manages errors gracefully, ensuring robust database operations.
Allows developers to catch and handle errors using TRY...CATCH blocks.
Example: BEGIN TRY ... END TRY for normal execution and BEGIN CATCH ... END CATCH for error handling.
Can log error details using ERROR_MESSAGE(), ERROR_NUMBER(), etc.
Helps maintain data integrity by rolling back transactions in case of errors.
E...
Authentication verifies identity; authorization determines access rights.
Authentication is the process of verifying who a user is.
Authorization is the process of determining what a user can do.
Example of authentication: Logging in with a username and password.
Example of authorization: Granting access to a specific file based on user roles.
Authentication can occur without authorization, but authorization cannot occ...
An interface defines a contract for classes, specifying methods and properties without implementation details.
Interfaces allow for abstraction, enabling different classes to implement the same methods in their own way.
They promote loose coupling by allowing code to depend on abstractions rather than concrete implementations.
In languages like Java, an interface can be implemented by multiple classes, allowing for p...
Stored procedures and functions are both database objects, but they serve different purposes and have distinct characteristics.
Stored procedures can perform actions like modifying data, while functions are primarily used to compute and return a value.
Stored procedures do not return a value directly, but functions must return a value.
Example of a stored procedure: 'CREATE PROCEDURE UpdateEmployeeSalary ...'; Exampl...
MES Proficy enhances manufacturing efficiency through real-time data integration and analytics.
Real-time data collection: MES Proficy captures data from machines and processes instantly, allowing for immediate insights.
Improved decision-making: With access to real-time analytics, managers can make informed decisions quickly, reducing downtime.
Quality control: MES Proficy helps in tracking product quality throughou...
Server-client model involves server providing services to clients, monitoring client status to ensure active connection.
Server-client model involves a server providing services to multiple clients.
Clients connect to the server to request and receive data or services.
Server monitors client connections to ensure they are active and responsive.
Server may use heartbeat signals or periodic checks to monitor client stat...
Just few normal coding questions
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
Find the largest common prefix among an array of strings
Iterate through the characters of the first string and compare with the corresponding characters of other strings
Stop when a mismatch is found or when reaching the end of any string
Return the prefix found so far
It's a general aptitude test with 60 questions in 1hr
Gave a topic to discuss
Reverse a string by iterating through the characters and swapping them
Create a function that takes a string as input
Initialize two pointers, one at the beginning and one at the end of the string
Swap the characters at the two pointers and move them towards the center until they meet
I applied via Approached by Company and was interviewed in May 2024. There were 3 interview rounds.
I was asked to write a program to reverse a string using Java.
As a Senior Software Engineer, your roles and responsibilities include leading development projects, mentoring junior team members, and ensuring high-quality code.
Leading development projects from conception to completion
Mentoring and providing guidance to junior team members
Ensuring the quality of code through code reviews and testing
Collaborating with cross-functional teams to deliver software solutions
Staying update...
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example of compile-time polymorphism: function overloading in C++.
Example of runtime polymorphism: method overriding in Java.
Regression testing is testing the entire application after changes, while retesting is testing a specific bug fix.
Regression testing involves testing the entire application to ensure that new code changes have not negatively impacted existing functionality.
Retesting involves testing a specific bug fix to ensure that the issue has been resolved.
Regression testing is typically done after every code change, while retestin...
Pega testing is a software testing process specifically designed for applications built on the Pega platform.
Pega testing involves testing the functionality, performance, and security of applications developed using Pega technology.
It includes testing various components such as user interfaces, business logic, integrations, and workflows.
Test cases are designed to validate the behavior of Pega applications based on bus...
Automation framework is a set of guidelines, best practices, tools, and libraries used to automate testing of software applications.
Provides structure and guidelines for automated testing
Helps in organizing test scripts and test data
Supports reusability of code and components
Facilitates easy maintenance and scalability
Examples: Selenium WebDriver, TestNG, Cucumber
I applied via Naukri.com and was interviewed in Jul 2024. There were 2 interview rounds.
Sql and pyhton moderate level questions
I appeared for an interview in Feb 2025, where I was asked the following questions.
I have extensive experience in SQL development, including database design, optimization, and complex query writing.
Proficient in writing complex SQL queries for data retrieval and manipulation, e.g., using JOINs, subqueries, and CTEs.
Experience in database design and normalization to ensure data integrity and reduce redundancy.
Skilled in performance tuning of SQL queries using indexing and query optimization techniques...
Unix commands are essential tools for file management, process control, and system navigation in Unix-like operating systems.
ls: Lists files and directories in the current directory. Example: 'ls -l' for detailed listing.
cd: Changes the current directory. Example: 'cd /home/user' to navigate to the user's home directory.
cp: Copies files or directories. Example: 'cp file.txt /backup/' to copy 'file.txt' to the backup di...
I applied via Naukri.com and was interviewed in Apr 2024. There were 2 interview rounds.
CAN FD stands for Controller Area Network Flexible Data Rate, it is required for high-speed communication in automotive and industrial applications.
CAN FD allows for higher data rates compared to traditional CAN networks
It is necessary for transmitting large amounts of data quickly and efficiently
Used in applications where real-time communication and reliability are crucial, such as automotive ECUs
Example: CAN FD is us...
LKA stands for Lane Keep Assist, while LDW stands for Lane Departure Warning.
LKA helps keep the vehicle centered in its lane by providing steering input if necessary.
LDW alerts the driver if the vehicle is unintentionally drifting out of its lane.
LKA is more proactive in assisting the driver with lane keeping, while LDW is more of a warning system.
Some vehicles may have both LKA and LDW features integrated for enhanced...
ASPICE (Automotive SPICE) model is a framework for software development in the automotive industry. ITR (Integrated Test Requirement) is a part of ASPICE focusing on testing requirements.
ASPICE is a framework for software development in the automotive industry
ITR is a part of ASPICE that focuses on testing requirements
ASPICE helps in ensuring high-quality software development in automotive projects
Writing test cases for ADAS ECU involves verifying functionality and performance of the electronic control unit.
Identify the input and output requirements of the ADAS ECU
Create test cases to cover different scenarios such as normal operation, edge cases, and failure modes
Include test cases for communication protocols, sensor inputs, and system responses
Verify the integration of ADAS ECU with other components in the sys...
Calculate average of integer arrays using Java 8 streams
Use IntStream to convert the array to a stream of integers
Use average() method to calculate the average of the integers
Collect the result using getAsDouble() method
Idempotency is the property of an operation where applying it multiple times has the same effect as applying it once.
Idempotency ensures that repeating the same operation multiple times will not change the result.
Examples include GET requests in RESTful APIs, where multiple identical requests will return the same response.
Idempotency is important in distributed systems to prevent duplicate operations.
PUT and DELETE req...
Some of the top questions asked at the Tech Mahindra Senior Software Engineer interview -
The duration of Tech Mahindra Senior Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 136 interview experiences
Difficulty level
Duration
based on 2k reviews
Rating in categories
Software Engineer
26.6k
salaries
| ₹2 L/yr - ₹11 L/yr |
Senior Software Engineer
22.1k
salaries
| ₹6.4 L/yr - ₹24 L/yr |
Technical Lead
12.4k
salaries
| ₹9.8 L/yr - ₹39 L/yr |
Associate Software Engineer
6k
salaries
| ₹1.9 L/yr - ₹5.7 L/yr |
Team Lead
5.3k
salaries
| ₹5.8 L/yr - ₹18.3 L/yr |
Infosys
Cognizant
Accenture
Wipro