i
DXC
Technology
Filter interviews by
JOIN queries combine rows from two or more tables based on related columns, enabling complex data retrieval.
INNER JOIN: Returns records with matching values in both tables. Example: SELECT * FROM A INNER JOIN B ON A.id = B.a_id;
LEFT JOIN: Returns all records from the left table and matched records from the right table. Example: SELECT * FROM A LEFT JOIN B ON A.id = B.a_id;
RIGHT JOIN: Returns all records from the r...
Troubleshooting Wi-Fi issues involves checking connections, settings, and hardware to restore connectivity.
Check if Wi-Fi is enabled on the device. For example, ensure the Wi-Fi switch is turned on or the airplane mode is off.
Restart the device to refresh network settings and clear temporary glitches.
Verify the Wi-Fi network is operational by checking other devices. If they connect, the issue may be with the speci...
VLOOKUP is an Excel function used to search for a value in the first column of a range and return a value in the same row from a specified column.
Syntax: VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
Example: =VLOOKUP(A2, B2:D10, 3, FALSE) looks for the value in A2 within the range B2:D10 and returns the corresponding value from the 3rd column.
The 'range_lookup' argument can be TRUE (approximate...
SQL uses various data types to define the nature of data stored in tables, ensuring proper data handling and storage.
1. INTEGER: Used for whole numbers, e.g., 42.
2. VARCHAR(n): Variable-length string, e.g., 'Hello World'.
3. DATE: Stores date values, e.g., '2023-10-01'.
4. FLOAT: Used for floating-point numbers, e.g., 3.14.
5. BOOLEAN: Represents true/false values, e.g., TRUE or FALSE.
What people are saying about DXC Technology
Kernel upgrade in SAP involves updating the system's kernel files to enhance performance and fix bugs.
Download the latest kernel from the SAP Service Marketplace.
Stop the SAP system before performing the upgrade.
Backup the existing kernel directory for safety.
Extract the downloaded kernel files and replace the old ones in the kernel directory.
Restart the SAP system and check the kernel version to confirm the upgra...
Summtool phases involve data collection, analysis, and reporting for SAP system performance optimization.
Phase 1: Data Collection - Gathers performance metrics from the SAP system.
Phase 2: Data Analysis - Analyzes the collected data to identify bottlenecks.
Phase 3: Reporting - Generates reports to summarize findings and recommendations.
Example: In Phase 2, if high CPU usage is detected, it may suggest optimizing s...
Shadow instances are created during the system copy phase in SAP Basis installations.
Shadow instances are typically created during the 'System Copy' phase.
This phase involves creating a copy of the production system for testing or development.
For example, during a homogeneous system copy, a shadow instance is created to ensure data consistency.
The shadow instance allows for testing upgrades or configurations witho...
ORM (Object-Relational Mapping) is a programming technique for converting data between incompatible type systems using object-oriented programming.
Data Abstraction: ORM allows developers to interact with the database using high-level programming languages instead of SQL, simplifying data manipulation.
Object Mapping: ORM maps database tables to classes and rows to objects, making it easier to work with data as obje...
Servers in the backend manage data, handle requests, and ensure application functionality, providing a bridge between users and databases.
Data Management: Servers store and manage data, such as user information and application data, ensuring it is accessible when needed.
Request Handling: Servers process incoming requests from clients, executing the necessary logic and returning appropriate responses, like fetching...
As a Software Test Engineer, I excel in ensuring software quality through rigorous testing methodologies and automation tools.
Test Planning: I create comprehensive test plans that outline the testing strategy, objectives, resources, and schedule for projects.
Automation Skills: Proficient in tools like Selenium and JUnit, I automate repetitive test cases to improve efficiency and accuracy.
Defect Tracking: I utilize...
I applied via Naukri.com and was interviewed before Dec 2019. There were 3 interview rounds.
Blockings occur when one transaction holds a lock on a resource, preventing other transactions from accessing it. Deadlocks are a specific type of blocking where two or more transactions are waiting for each other to release resources.
Blockings happen when one transaction holds a lock on a resource and other transactions are blocked from accessing it.
Deadlocks occur when two or more transactions are waiting for each ot...
Deadlocks in SQL Server can be identified using SQL Server Profiler or by querying the system_health extended event session.
Use SQL Server Profiler to capture deadlock events
Query the system_health extended event session to view deadlock graphs
Use sp_whoisactive to identify blocking and deadlocking processes
Enable trace flag 1222 to capture deadlock information in the SQL Server error log
Parameter (-1) in DBCC TRACEON(1204,-1) is used to enable deadlock tracing for all sessions.
DBCC TRACEON(1204,-1) enables deadlock tracing for all sessions
The parameter -1 specifies that the trace flag should be enabled for all sessions
Deadlock tracing helps identify and resolve deadlocks in SQL Server
Our backup strategy includes full backups weekly, differential backups daily, and transaction log backups every 15 minutes.
Weekly full backups
Daily differential backups
Transaction log backups every 15 minutes
Backups stored on separate disk
Regular testing of backups for restoration
Point in time recovery is the ability to restore a database to a specific moment in time.
It allows for recovery of data up to a specific point in time.
It requires regular backups and transaction logs.
It is useful in case of accidental data deletion or corruption.
It can be done manually or through automated tools.
Example: Restoring a database to its state before a specific transaction occurred.
Issues faced in log shipping
Network latency causing delays in log shipping
Log backups not being taken frequently enough
Failure to restore logs due to mismatched log backups
Lack of monitoring and alerting for log shipping failures
Faced critical issues like performance bottlenecks, data corruption, and security vulnerabilities in previous SQL projects.
Performance Bottlenecks: Optimized slow-running queries by analyzing execution plans and adding appropriate indexes.
Data Corruption: Resolved a data corruption issue by restoring from backups and implementing a more robust backup strategy.
Security Vulnerabilities: Identified and patched SQL injecti...
Check if the missing msi files are required for the patch. If yes, download and install them.
Verify if the missing msi files are essential for the patch
Check if the msi files are available in the original installation media or backup
If not, download the missing msi files from the vendor's website
Install the missing msi files before applying the patch
Yes, replication is the process of copying and distributing data from one database to another.
Replication is used to improve data availability, scalability, and disaster recovery.
It involves a publisher database that sends data to one or more subscriber databases.
There are three types of replication: snapshot, transactional, and merge.
Snapshot replication copies the entire database to the subscriber.
Transactional repli...
Index reorganize and rebuild based on fragmentation level
For fragmentation level < 5%, use reorganize
For fragmentation level > 30%, use rebuild
For fragmentation level between 5% and 30%, choose based on table size and usage
Use ALTER INDEX statement to perform reorganize or rebuild
Monitor fragmentation level regularly to maintain optimal performance
Updating statistics is necessary after index rebuild or reorganize to ensure query optimization.
Statistics provide information about the distribution of data in a table or index.
Index rebuild or reorganize can change the distribution of data, making old statistics inaccurate.
Outdated statistics can lead to poor query performance.
Updating statistics after index rebuild or reorganize ensures query optimization.
Maintenanc...
The database size I have used in my previous project was approximately 500 GB.
The database size was around 500 GB.
It contained various tables, indexes, and stored procedures.
The data included millions of records from different sources.
We regularly optimized the database to ensure efficient performance.
Backup and recovery strategies were implemented to safeguard the data.
The backup strategy for the biggest database I handled involved regular full backups, daily differential backups, and hourly transaction log backups.
Regular full backups were performed to capture the entire database.
Daily differential backups were taken to capture the changes since the last full backup.
Hourly transaction log backups were taken to capture the changes since the last differential backup.
Backups were store...
Point-in-time recovery is possible up to 07:30 PM with the given backup strategy.
Full backup at midnight captures the database state at that time.
Log backups every hour allow recovery to any point in time within the backup window.
To recover to 07:30 PM, ensure log backups are taken up to that time.
Example: If the last log backup was at 07:00 PM, you can restore to 07:30 PM using the log backup taken at that hour.
The command for Tail log backup is BACKUP LOG WITH NORECOVERY
Use the BACKUP LOG command to create a tail log backup
Add the WITH NORECOVERY option to allow further log backups
Tail log backups are used to capture any transactions that occurred after the last log backup
Syntax: BACKUP LOG database_name TO disk = 'backup_device' WITH NORECOVERY
My current notice period is 30 days, allowing for a smooth transition and knowledge transfer.
Standard notice period in my company is 30 days.
This period allows me to complete ongoing projects and hand over responsibilities.
I believe in leaving on good terms, ensuring a positive relationship with my current employer.
During this time, I can assist in training my replacement if needed.
SQL Profiler is a tool used to capture and analyze SQL Server events and activities.
SQL Profiler captures events such as queries, stored procedures, and errors.
It can be used to troubleshoot performance issues and optimize queries.
Profiling can be done on a live server or on a trace file.
Events can be filtered and grouped for easier analysis.
SQL Profiler has been replaced by Extended Events in newer versions of SQL Ser...
To resolve TempDB full issue, identify the cause and take appropriate action.
Identify the cause of TempDB full issue using DMVs or third-party tools
Check for long-running transactions or open transactions
Check for large sorts or hash joins
Increase the size of TempDB or add more files
Move TempDB to a faster disk
Restart SQL Server to clear TempDB
Modify application code to reduce TempDB usage
Isolation levels in SQL Server determine how transactions interact with each other.
There are five isolation levels: READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, SNAPSHOT, and SERIALIZABLE.
Each level has its own trade-offs between concurrency and consistency.
The default isolation level is READ COMMITTED.
Isolation levels can be set at the transaction level or for the entire database.
For example, the SNAPSHOT isolat...
The default isolation level in SQL Server is READ COMMITTED. It ensures that each transaction sees only committed data.
The default isolation level in SQL Server is READ COMMITTED.
READ COMMITTED ensures that each transaction sees only committed data.
It provides a balance between concurrency and data consistency.
Under READ COMMITTED, a transaction can read data that has been modified by another transaction but not yet co...
The default port of SQL Server is 1433. Yes, we can change the default port by modifying the SQL Server Configuration Manager.
The default port for SQL Server is 1433.
To change the default port, open SQL Server Configuration Manager.
Navigate to SQL Server Network Configuration and select Protocols for the desired SQL Server instance.
Right-click on TCP/IP and choose Properties.
In the IP Addresses tab, scroll down to the ...
Yes, the user who deleted the table can be identified using the transaction log file.
To find out the user who deleted the table, you can query the transaction log file using the fn_dblog function.
The transaction log contains information about all the transactions performed on the database, including the table deletion.
By analyzing the log records, you can identify the specific transaction that deleted the table and ret...
CheckDB runs DBCC CHECKDB command in the background.
CheckDB is a command used to check the logical and physical integrity of all objects in the specified database.
DBCC CHECKDB is the command that CheckDB runs in the background.
DBCC CHECKDB checks the allocation and structural integrity of all the objects in the specified database.
DBCC CHECKDB also checks for common errors like torn pages, index and data page corruption...
Summary.txt contains summarized information while Detail.txt contains detailed information.
Summary.txt provides a brief overview of data while Detail.txt provides a more comprehensive view.
Summary.txt may contain aggregated data while Detail.txt contains individual data points.
Summary.txt is useful for quick analysis while Detail.txt is useful for in-depth analysis.
Example: Summary.txt may contain total sales for a mon...
Yes, I use SQL Server Management Studio (SSMS) and SQL Server Profiler for monitoring SQL Server.
I use SSMS to monitor server activity, query performance, and resource usage.
I use SQL Server Profiler to capture and analyze SQL Server events and performance data.
I also use third-party tools like SolarWinds Database Performance Analyzer and Redgate SQL Monitor for more advanced monitoring and alerting.
Regularly monitorin...
We use ServiceNow as our ticketing tool.
ServiceNow is a cloud-based platform that offers IT service management (ITSM), IT operations management (ITOM), and IT business management (ITBM) solutions.
It allows us to manage incidents, problems, changes, and service requests in a single system.
We can also track the status of tickets, assign them to team members, and set priorities and deadlines.
ServiceNow also provides repor...
I used the ticketing tool to track and manage database-related issues and requests.
Create and assign tickets for database-related issues and requests
Monitor ticket status and update as necessary
Communicate with stakeholders regarding ticket status and resolution
Close tickets once issues are resolved
Generate reports on ticket volume and resolution time
As an MS SQL DBA, I actively raise tickets for issues and improvements, ensuring proactive database management.
I monitor database performance and raise tickets for optimization opportunities.
If I encounter recurring issues, I document them and create tickets for long-term solutions.
I collaborate with development teams to raise tickets for database-related enhancements.
For maintenance tasks, I raise tickets to schedule ...
I appeared for an interview in May 2025, where I was asked the following questions.
I possess a strong foundation in software development, problem-solving skills, and experience with various programming languages and frameworks.
Proficient in languages like Java, Python, and JavaScript, demonstrated through projects such as a web application for task management.
Experience with frameworks like React and Django, where I developed responsive user interfaces and RESTful APIs.
Strong understanding of algorit...
My expected CTC is based on industry standards, my skills, and experience, aiming for a fair compensation package.
Research industry standards for similar roles in my location.
Consider my years of experience and specialized skills, such as proficiency in specific programming languages.
Evaluate the total compensation package, including benefits, bonuses, and stock options.
Be open to negotiation based on the company's bud...
Phone calls in a job facilitate communication, collaboration, and relationship-building among team members and clients.
Enhances communication: Phone calls allow for real-time discussions, reducing misunderstandings.
Builds relationships: Personal interactions foster trust and rapport with clients and colleagues.
Quick problem-solving: Immediate feedback helps address issues faster than emails.
Clarifies complex topics: So...
My working hours are flexible, typically from 9 AM to 5 PM, but I can adjust based on project needs and team collaboration.
I usually start my day at 9 AM and wrap up by 5 PM.
I am open to working overtime during critical project phases.
I can adjust my hours for meetings with international teams.
I prioritize work-life balance but am flexible for urgent tasks.
I prioritize collaboration, respect, and adaptability in the workplace to foster a positive and productive environment.
Effective communication: I regularly hold stand-up meetings to ensure everyone is aligned on project goals.
Respect for diversity: I actively listen to different perspectives, which enhances team creativity and problem-solving.
Adaptability: During a project shift, I quickly adjusted my approach to accom...
Gangster Disciples (GD) is a gang, while Graphical Display (GD) refers to a visual representation of data.
Aptitude tests are used to assess a person's ability to perform specific tasks, think critically, and solve problems. They are commonly used in job recruitments, college admissions, and competitive exams.
### **Types of Aptitude Tests**
1. **Numerical Aptitude** – Assesses mathematical skills, including arithmetic, algebra, ratios, percentages, and data interpretation.
2. **Logical Reasoning** – Evaluates pattern recognition, sequences, and logical deductions.
3. **Verbal Ability** – Tests grammar, comprehension, vocabulary, and sentence formation.
4. **Abstract Reasoning** – Measures the ability to identify patterns, trends, and relationships among shapes or figures.
5. **Spatial Reasoning** – Tests the ability to visualize and manipulate objects in space.
6. **Mechanical Reasoning** – Assesses understanding of mechanical and physical concepts, often for technical roles.
7. **Situational Judgment Test (SJT)** – Evaluates decision-making and problem-solving in workplace scenarios.
### **Common Exam Patterns**
- Multiple-choice questions (MCQs)
- Timed sections
- Increasing difficulty level
- Negative marking (in some tests)
### **Preparation Tips**
✔️ **Practice Regularly** – Solve sample questions and previous papers.
✔️ **Time Management** – Work on speed and accuracy.
✔️ **Learn Shortcuts** – Use mental math tricks and reasoning techniques.
✔️ **Improve Reading Skills** – Enhance vocabulary and comprehension for verbal sections.
✔️ **Use Online Mock Tests** – Simulate real test conditions.
Would you like sample questions or specific test details for a job or exam?
I applied via Job Portal and was interviewed in Dec 2024. There was 1 interview round.
AI has the potential to revolutionize various industries by automating tasks, improving decision-making, and enhancing efficiency.
AI can automate repetitive tasks, saving time and reducing errors.
AI can analyze large amounts of data quickly and accurately, leading to better decision-making.
AI can improve efficiency by optimizing processes and workflows.
AI can enhance customer experiences through personalized recommenda...
Advanced Excel refers to the use of complex functions, formulas, and features to analyze and manipulate data efficiently.
Involves using advanced functions like VLOOKUP, INDEX-MATCH, and SUMIFS
Utilizes PivotTables and PivotCharts for data analysis and visualization
Incorporates macros and VBA programming for automation and customization
Includes data validation, conditional formatting, and what-if analysis
Advanced data mo...
Hardware installation refers to the physical installation of computer components such as processors, memory, storage devices, and peripherals.
Hardware installation involves physically connecting and securing components inside a computer system.
Components may include processors, memory modules, hard drives, graphics cards, and network cards.
Proper cable management and organization are important during hardware installat...
Software installation process involves planning, preparation, installation, configuration, and testing.
Plan the installation by determining software requirements and compatibility with the system
Prepare the system by ensuring it meets the software's prerequisites
Install the software using the appropriate installation method (e.g. setup wizard, command line)
Configure the software settings based on the requirements and b...
Software refers to programs and applications that run on a computer, while hardware refers to the physical components of a computer system.
Software is intangible and can be installed, updated, and removed easily.
Hardware is tangible and includes components like CPU, memory, and storage devices.
Examples of software include operating systems like Windows, applications like Microsoft Office, and games.
Examples of hardware...
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
While pursuing your Master's in Computer Applications (MCA), you can explore job opportunities in software development, web development, data analysis, IT consulting, and more.
Software development: Work as a software developer to create and maintain software applications.
Web development: Explore opportunities in designing and developing websites and web applications.
Data analysis: Analyze data to provide insights and s...
The salary package for an Office Clerk can vary depending on factors such as experience, location, and company size.
Salary packages for Office Clerks typically range from $25,000 to $45,000 per year.
Experience level, location, and company size can all impact the salary offered.
Additional benefits such as health insurance, retirement plans, and paid time off may also be included in the package.
Training schedules typically vary; please confirm with HR for specific timings upon joining.
Training usually starts on the first day of employment.
It may be conducted in the morning or afternoon, depending on the company.
Some companies offer online training modules that can be completed at your own pace.
Example: A company might have a week-long orientation program starting at 9 AM.
Design an Azure Data Factory pipeline to copy data with different delimiters.
Use a Copy Data activity in Azure Data Factory to copy data from source folder to destination folder.
Create a dataset for the source folder with multiple file formats to handle different delimiters.
Use a mapping data flow to transform the data if needed before copying to the destination folder.
A pyspark program to read multiple csv files and create a data frame with count of records against each file.
Use SparkSession to create a Spark application
Read multiple csv files using spark.read.csv() method
Use groupBy() and count() functions to get count of records for each file
Create a new column to store the file name
Join all data frames to create a final data frame with count of records against each file
I appeared for an interview before Jun 2024, where I was asked the following questions.
I thrive under pressure by prioritizing tasks, maintaining clear communication, and using stress management techniques.
Prioritization: I use tools like the Eisenhower Matrix to identify urgent and important tasks.
Time Management: I break projects into manageable tasks and set realistic deadlines.
Communication: I keep stakeholders informed to manage expectations and reduce misunderstandings.
Stress Management: I practice...
I am committed to project success and can be available at any time to address issues as they arise.
I prioritize project needs and can adjust my schedule to be available for urgent issues.
For example, during a critical phase of a project, I once held late-night meetings to resolve unexpected challenges.
I also utilize communication tools to stay connected with the team, ensuring I can respond promptly, regardless of the ...
I applied via Indeed and was interviewed in Dec 2024. There was 1 interview round.
Find largest and smallest from an array of strings.
Convert strings to numbers for comparison
Use a loop to iterate through the array and compare each element to find the largest and smallest
Initialize variables to store the largest and smallest values
Reverse an array of strings
Create a new array and iterate through the original array in reverse order, adding each element to the new array
Alternatively, you can use the reverse() method on the original array
Reverse your name when writing it out
Start by writing your last name first
Then write your first name
For example, if your name is John Doe, you would write it as 'eoD nhoJ'
I applied via Campus Placement
The test level is moderate
I applied via Campus Placement and was interviewed in Nov 2024. There were 3 interview rounds.
MCQ BASED - medium to difficult
Assignment based on your profile , scenario based must
Some of the top questions asked at the DXC Technology interview -
The duration of DXC Technology interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 613 interview experiences
Difficulty level
Duration
based on 10.8k reviews
Rating in categories
Associate Professional Software Engineer
2.7k
salaries
| ₹3 L/yr - ₹8 L/yr |
Software Engineer
1.9k
salaries
| ₹2 L/yr - ₹10.8 L/yr |
Associate Professional
1.4k
salaries
| ₹2 L/yr - ₹7 L/yr |
Associate Software Engineer
1.2k
salaries
| ₹3 L/yr - ₹7.3 L/yr |
Senior Software Engineer
1.2k
salaries
| ₹6.5 L/yr - ₹26 L/yr |
Cognizant
Capgemini
TCS
Wipro