Premium Employer

Infosys

3.6
based on 38.2k Reviews
Filter interviews by

1000+ TCS Interview Questions and Answers

Updated 6 Feb 2025
Popular Designations

Q401. What is DRS and HA in vsphere

Ans.

DRS and HA are features in vSphere that provide automated resource management and high availability for virtual machines.

  • DRS (Distributed Resource Scheduler) automatically balances resources across hosts in a cluster to optimize performance and prevent overloading.

  • HA (High Availability) ensures that virtual machines are automatically restarted on another host in the event of a host failure.

  • Both features improve the overall reliability and availability of virtualized environme...read more

Add your answer

Q402. How did you handle P1 incidents? Describe the entire lifecycle.

Ans.

P1 incidents are handled with urgency and priority, following a defined process to minimize impact and restore service quickly.

  • P1 incidents are the most critical and require immediate attention.

  • The first step is to identify and classify the incident as P1.

  • The incident is then escalated to the appropriate teams for investigation and resolution.

  • Regular updates are provided to stakeholders to keep them informed of progress.

  • Once resolved, a post-incident review is conducted to id...read more

Add your answer

Q403. How to sort an array without using any data structures

Ans.

Sort an array without using data structures

  • Use a sorting algorithm like bubble sort or insertion sort

  • Compare adjacent elements and swap them if necessary

  • Repeat the process until the array is sorted

Add your answer

Q404. How to improving your web api performance

Ans.

Improving web API performance involves optimizing code, caching, using asynchronous programming, and scaling infrastructure.

  • Optimize code by reducing unnecessary database queries, using efficient algorithms, and minimizing network calls.

  • Implement caching to store frequently accessed data and reduce the load on the server.

  • Use asynchronous programming to handle multiple requests concurrently and improve responsiveness.

  • Scale infrastructure by adding more servers, using load bala...read more

Add your answer
Discover TCS interview dos and don'ts from real experiences

Q405. What are the different type of changes? What is an emergency change?

Ans.

Different types of changes include standard, normal, and emergency changes. Emergency changes are those that require immediate attention.

  • Standard changes are pre-approved and follow a documented process.

  • Normal changes require a formal review and approval process.

  • Emergency changes are unplanned and require immediate attention to prevent or resolve an incident.

  • Examples of emergency changes include patching a critical security vulnerability or restoring a failed system.

Add your answer

Q406. How many types of graphs? Explain?

Ans.

There are several types of graphs, including line, bar, pie, scatter, and area graphs.

  • Line graphs show trends over time.

  • Bar graphs compare data between different categories.

  • Pie graphs show proportions of a whole.

  • Scatter graphs show the relationship between two variables.

  • Area graphs show the cumulative totals over time.

Add your answer
Are these interview questions helpful?

Q407. When message will come to failure and catch in mq node? Is it same in soap node?

Ans.

Messages fail and catch in MQ and SOAP nodes based on different criteria.

  • In MQ nodes, messages can fail due to issues like invalid message format, queue full, or network errors.

  • MQ nodes can catch messages that fail due to these issues and route them to a designated error queue.

  • In SOAP nodes, messages can fail due to issues like invalid SOAP message format or authentication errors.

  • SOAP nodes can catch messages that fail due to these issues and return a SOAP fault message to th...read more

Add your answer

Q408. What is Docker, container and AWS services for container

Ans.

Docker is a platform for developing, shipping, and running applications in containers. AWS offers services like ECS and EKS for managing containers.

  • Docker is a tool designed to make it easier to create, deploy, and run applications by using containers.

  • Containers allow a developer to package up an application with all parts it needs, such as libraries and other dependencies, and ship it all out as one package.

  • AWS offers services like Amazon Elastic Container Service (ECS) and ...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q409. Multiple inheritance in Java is possible?

Ans.

No, multiple inheritance is not possible in Java.

  • Java does not support multiple inheritance of classes due to the diamond problem.

  • However, multiple inheritance of interfaces is possible.

  • Diamond problem occurs when two superclasses have a common method with same signature.

  • Example: class A and class B both have a method void display() and class C extends A, B. Which display() method will be called?

  • To avoid this, Java allows multiple inheritance of interfaces as they only contai...read more

Add your answer

Q410. How you give access to only that item which the user has created in SharePoint

Add your answer

Q411. What is dba? Roles and responsibilities and what kind of shift model

Ans.

A DBA is a database administrator who is responsible for managing and maintaining a company's database system.

  • Roles include database design, security, backup and recovery, performance tuning, and troubleshooting

  • Responsibilities include ensuring data integrity, availability, and accessibility

  • Shift models vary depending on the company's needs, but may include on-call availability and rotating shifts

  • Examples of database systems include Oracle, MySQL, and SQL Server

Add your answer

Q412. Mongodb database advantage and disadvantage

Ans.

MongoDB is a NoSQL database with flexible schema and high scalability, but lacks transaction support.

  • Advantages: flexible schema, high scalability, easy to use, supports sharding and replication

  • Disadvantages: lacks transaction support, not suitable for complex transactions, limited query functionality compared to SQL databases

  • Example: MongoDB is used by companies like eBay, Forbes, and The Guardian for their high scalability needs.

Add your answer

Q413. - Steps to Create a Docker file - Types of firewall in AWS - How ELK Stack works.

Ans.

Answers to questions related to Docker, AWS firewall types, and ELK Stack

  • To create a Docker file, start with a base image and add necessary dependencies and configurations

  • AWS has two types of firewalls: Network ACLs and Security Groups

  • ELK Stack is a combination of Elasticsearch, Logstash, and Kibana used for log management and analysis

Add your answer

Q414. What is load balancer

Ans.

A load balancer is a device or software that distributes network or application traffic across multiple servers to ensure optimal resource utilization, reliability, and performance.

  • Balances incoming network or application traffic across multiple servers

  • Improves reliability by distributing workload evenly

  • Enhances performance by preventing any single server from becoming a bottleneck

  • Can be hardware-based or software-based

  • Examples include F5 BIG-IP, Citrix NetScaler, and NGINX

Add your answer

Q415. What is step function

Ans.

A step function is a mathematical function that changes abruptly from one constant value to another.

  • Step functions are often used in computer science and signal processing to model discrete changes in a system.

  • Examples include the Heaviside step function and the rectangular function.

  • Step functions are characterized by having a constant value within specific intervals and sudden jumps at the boundaries.

Add your answer

Q416. How snowflake differs from industry competetors? What is the extra edge?

Ans.

Snowflake offers a unique architecture that separates storage and compute, providing scalability, flexibility, and cost-effectiveness.

  • Snowflake's architecture separates storage and compute, allowing for independent scaling of each component.

  • Snowflake uses virtual warehouses to allocate compute resources on-demand, optimizing performance and cost.

  • Snowflake's multi-cluster shared data architecture enables seamless collaboration and data sharing across organizations.

  • Snowflake's ...read more

Add your answer

Q417. 1. Output programs on Exceptions, String equality in Java

Ans.

Answering questions on Exceptions and String equality in Java

  • Exceptions are errors that occur during program execution

  • Java has a try-catch block to handle exceptions

  • String equality can be checked using the equals() method

  • The == operator checks if two strings have the same memory address

  • String comparison is case-sensitive by default

Add your answer

Q418. difference between truncate and delete in mysql?

Ans.

Truncate removes all data from a table while delete removes specific rows.

  • Truncate is faster than delete as it doesn't log individual row deletions

  • Truncate resets auto-increment values while delete doesn't

  • Truncate can't be undone while delete can be rolled back

  • Truncate doesn't trigger any triggers while delete does

Add your answer

Q419. What is the Function of Object?

Ans.

The function of an object is to store data and behavior related to a specific entity in a program.

  • Objects store data in the form of properties

  • Objects can have methods which define behavior

  • Objects can be used to model real-world entities like cars, employees, etc.

  • Objects can be instantiated from classes or created dynamically

Add your answer

Q420. What is the difference between truncate and delete in mySQL How to truncate a table in MySQL Methodology used in your project like agile etc

Ans.

Truncate removes all data from a table while delete removes specific rows.

  • Truncate is faster than delete as it doesn't log individual row deletions

  • Truncate resets auto-increment values while delete doesn't

  • To truncate a table in MySQL, use the TRUNCATE TABLE statement

  • Methodology used in my project was Agile

Add your answer

Q421. Explain tcp three way handshake protocol

Ans.

TCP three way handshake is a process used to establish a connection between a client and server in a reliable manner.

  • Client sends a SYN packet to the server to initiate the connection

  • Server responds with a SYN-ACK packet to acknowledge the request

  • Client sends an ACK packet back to the server to confirm the connection establishment

Add your answer

Q422. What is java version you used

Ans.

I used Java version X.X.X

  • I used Java version X.X.X for the project

  • The Java version used was X.X.X

  • The project was developed using Java X.X.X

View 1 answer

Q423. How the functionalities mentioned in the resume was implemented

Ans.

Functionalities were implemented using a combination of programming languages, frameworks, and design patterns.

  • Implemented functionalities using Java, Spring framework, and MVC design pattern

  • Utilized RESTful APIs for communication between different modules

  • Implemented asynchronous processing using message queues like RabbitMQ

  • Used database technologies like MySQL for data storage and retrieval

Add your answer

Q424. Difference between petrol engine and diesel engine? Both air and fuel is drawn into the cylinder in the petrol engine. Only air is drawn into the cylinder in diesel engine.

Ans.

Petrol engines draw air and fuel into the cylinder, while diesel engines only draw air.

  • Petrol engines use spark plugs to ignite the fuel-air mixture, while diesel engines use compression to ignite the air-fuel mixture.

  • Diesel engines are more fuel-efficient than petrol engines.

  • Petrol engines are generally quieter and smoother than diesel engines.

  • Diesel engines produce more torque than petrol engines, making them better for towing and hauling.

  • Petrol engines are typically less e...read more

Add your answer

Q425. How to add users in data administration?

Ans.

To add users in data administration, follow these steps:

  • Log in to the data administration system

  • Navigate to the user management section

  • Click on the 'Add User' button

  • Fill in the required user details such as name, email, and password

  • Assign appropriate roles and permissions to the user

  • Save the changes and the user will be added to the system

View 1 answer

Q426. What a diffrence bitween liquidity ratio and solvency ratio?

Ans.

Liquidity ratio measures a company's ability to meet short-term obligations while solvency ratio measures long-term financial stability.

  • Liquidity ratio focuses on short-term financial health while solvency ratio focuses on long-term financial health.

  • Liquidity ratio measures a company's ability to pay off short-term debts while solvency ratio measures a company's ability to pay off long-term debts.

  • Examples of liquidity ratios include current ratio and quick ratio while example...read more

Add your answer

Q427. Put these 3 words according to your importance mMoney, Recognition , Promotion

Ans.

Money, Promotion, Recognition - in that order.

  • Money is important for financial stability and security.

  • Promotion is important for career growth and development.

  • Recognition is important for personal satisfaction and motivation.

Add your answer

Q428. What are the techniques for imputing missing value in Time series data?

Add your answer

Q429. How e-PAN works?

Ans.

e-PAN is a digital version of PAN card issued by the Income Tax Department of India.

  • e-PAN is issued in electronic format and can be downloaded from the Income Tax Department's website.

  • It is a valid proof of identity and can be used for various financial transactions.

  • e-PAN is generated using Aadhaar-based e-KYC authentication.

  • It is free of cost and can be obtained within minutes.

  • e-PAN has a unique alphanumeric code and is valid for lifetime.

  • It eliminates the need for physical ...read more

Add your answer

Q430. What is the folder structure of MVC

Ans.

MVC folder structure includes Models, Views, and Controllers folders.

  • Models folder for data-related logic

  • Views folder for UI-related files

  • Controllers folder for handling user input and interaction

Add your answer

Q431. What are extension methods in MVC

Ans.

Extension methods in MVC are static methods that allow adding new methods to existing types without modifying the original type.

  • Extension methods are defined as static methods in a static class.

  • They are used to extend the functionality of existing classes without modifying them.

  • Extension methods are called like regular instance methods.

  • Example: public static class StringExtensions { public static bool IsUpperCase(this string str) { return str.Equals(str.ToUpper()); } }

  • Example...read more

Add your answer

Q432. Difference betweeen Spring and spring boot?

Ans.

Spring is a framework that provides comprehensive infrastructure support for developing Java applications. Spring Boot is a tool that simplifies the process of creating stand-alone, production-grade Spring-based applications.

  • Spring is a framework that provides various modules like Spring Core, Spring MVC, Spring Security, etc.

  • Spring Boot is an opinionated framework that simplifies the setup and configuration of Spring applications.

  • Spring Boot includes embedded servers like To...read more

Add your answer

Q433. what are joins in sql, give example

Ans.

Joins in SQL are used to combine rows from two or more tables based on a related column between them.

  • Joins are used to retrieve data from multiple tables based on a related column

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column

Add your answer

Q434. What are functional Interfaces?

Ans.

Functional interfaces are interfaces with only one abstract method, used for functional programming in Java.

  • Functional interfaces can have multiple default or static methods, but only one abstract method.

  • They are used in lambda expressions and method references for functional programming.

  • Examples include java.lang.Runnable, java.util.Comparator, and java.util.function.Function.

Add your answer

Q435. Explain any special procurement process in detail.

Ans.

Special procurement process involves unique steps or requirements for purchasing goods or services.

  • Special procurement process may involve additional approvals or documentation

  • It may require specific vendors or suppliers to be used

  • Examples include government procurement processes or procurement for highly regulated industries such as pharmaceuticals

  • May also involve bidding or negotiation processes

Add your answer

Q436. Explain oops concepts

Ans.

OOPs concepts are the principles of Object-Oriented Programming that help in designing and implementing software systems.

  • Encapsulation: bundling of data and methods that operate on that data

  • Inheritance: creating new classes from existing ones

  • Polymorphism: ability of objects to take on multiple forms

  • Abstraction: hiding implementation details and showing only functionality

  • Example: A car is an object that encapsulates data like speed and methods like start() and stop()

  • Example: I...read more

Add your answer

Q437. Difference between delete and drop in sql?

Ans.

Delete is used to remove rows from a table, while drop is used to remove an entire table from the database.

  • DELETE is a DML command, while DROP is a DDL command.

  • DELETE statement is used with a WHERE clause to specify which rows to delete, while DROP statement is used to remove the entire table structure.

  • DELETE does not remove the table itself, only the rows within it, while DROP removes the table along with all its data and structure.

Add your answer

Q438. Write a program to find the missing element from the array.

Ans.

Program to find missing element from array of strings

  • Iterate through the array and store elements in a HashSet

  • Iterate through another array and check if each element is present in the HashSet

  • Return the element that is not present in the HashSet

Add your answer

Q439. Explain about EU MDR and FDA regulatory requirements

Ans.

EU MDR and FDA are regulatory requirements for medical devices.

  • EU MDR (Medical Device Regulation) is a new regulation that replaces the Medical Device Directive (MDD) and the Active Implantable Medical Device Directive (AIMDD). It applies to all medical devices sold in the European Union.

  • FDA (Food and Drug Administration) is a regulatory agency in the United States that is responsible for ensuring the safety and efficacy of medical devices sold in the US market.

  • Both EU MDR an...read more

Add your answer

Q440. What are day to day activities in azure

Ans.

Day to day activities in Azure involve managing virtual machines, monitoring resources, deploying applications, and troubleshooting issues.

  • Managing virtual machines by creating, starting, stopping, and resizing them

  • Monitoring resource usage and performance to optimize costs

  • Deploying applications and services using Azure App Service or Azure Kubernetes Service

  • Troubleshooting issues such as network connectivity or performance problems

Add your answer

Q441. Difference between functions and procedure in oracle

Ans.

Functions return a value while procedures do not in Oracle.

  • Functions are used to perform a specific task and return a value.

  • Procedures are used to perform a specific task but do not return a value.

  • Functions can be used in SQL statements while procedures cannot.

  • Functions can be called from within procedures while procedures cannot be called from within functions.

Add your answer

Q442. How to Tack Online data Backup?

Ans.

Online data backup can be achieved through various methods and technologies.

  • Use cloud storage services like Microsoft Azure, Amazon S3, or Google Cloud Storage.

  • Implement backup software solutions like Veeam, Acronis, or Commvault.

  • Utilize network-attached storage (NAS) devices for local backups.

  • Create redundant copies of critical data to ensure data integrity.

  • Regularly test and verify the backup and restore processes.

  • Consider implementing a disaster recovery plan to handle dat...read more

View 1 answer

Q443. What is Recursion and its program

Ans.

Recursion is a process of calling a function within itself.

  • Recursion is useful for solving problems that can be broken down into smaller sub-problems.

  • It involves a base case and a recursive case.

  • Examples include factorial, Fibonacci sequence, and binary search.

  • Recursion can be memory-intensive and may cause stack overflow errors.

  • Tail recursion optimization can be used to optimize recursive functions.

Add your answer

Q444. What is Purpose of itil process

Ans.

ITIL processes are designed to align IT services with business needs and improve efficiency.

  • ITIL processes provide a framework for managing IT services

  • They help to ensure that IT services are aligned with business needs

  • They improve efficiency and effectiveness of IT operations

  • Examples of ITIL processes include incident management, change management, and problem management

Add your answer

Q445. Which method you use to remove spaces in the string

Ans.

One method to remove spaces in a string is by using the replace() method in JavaScript.

  • Use the replace() method with a regular expression to replace all spaces with an empty string

  • Example: str.replace(/\s/g, '') will remove all spaces from the string 'hello world'

  • Another method is to use the split() method to split the string by spaces and then join the array elements without spaces

Add your answer

Q446. What kind of bugs you will encounter in API testing

Ans.

Common bugs in API testing include incorrect data formats, authentication issues, and performance problems.

  • Incorrect data formats such as missing or incorrect parameters

  • Authentication issues like invalid tokens or permissions

  • Performance problems such as slow response times or timeouts

Add your answer

Q447. What are the things required to make apps secured

Ans.

To make apps secured, one needs to implement various measures such as encryption, authentication, and authorization.

  • Implement encryption to protect data in transit and at rest

  • Use strong authentication mechanisms such as two-factor authentication

  • Implement authorization to restrict access to sensitive data and features

  • Regularly update and patch the app to fix security vulnerabilities

  • Conduct regular security audits and penetration testing

  • Implement secure coding practices to prev...read more

Add your answer

Q448. How will you do Project Analysis with the help of excel data?

Ans.

I will use Excel data for project analysis by organizing and analyzing project data, creating charts and graphs for visualization, and identifying trends and patterns.

  • Organize project data in Excel sheets for easy access and analysis

  • Use Excel functions and formulas to calculate project metrics and KPIs

  • Create charts and graphs to visualize project progress and performance

  • Identify trends and patterns in project data to make informed decisions

  • Use pivot tables to summarize and an...read more

Add your answer

Q449. How to prepare NFR Sheet?

Ans.

NFR sheet can be prepared by identifying the non-functional requirements and documenting them in a structured format.

  • Identify the non-functional requirements such as performance, scalability, reliability, security, usability, etc.

  • Document the requirements in a structured format such as a spreadsheet or a table.

  • Include details such as the requirement description, acceptance criteria, priority, and any dependencies.

  • Ensure that the requirements are measurable and testable.

  • Review...read more

Add your answer

Q450. What are the different SAP certifications

Ans.

There are various SAP certifications available for different modules and roles.

  • SAP Certified Application Associate

  • SAP Certified Technology Associate

  • SAP Certified Development Associate

  • SAP Certified Solution Consultant

  • SAP Certified Business Associate

Add your answer

Q451. What is virtual DOM in React?

Ans.

Virtual DOM is a lightweight copy of the actual DOM in React, used for efficient updates.

  • Virtual DOM is a concept where a lightweight copy of the actual DOM is created in memory.

  • When changes are made to the virtual DOM, React compares it with the actual DOM to identify the differences.

  • React then updates only the necessary parts of the actual DOM, making the process more efficient.

  • This helps in improving performance by reducing the number of direct manipulations to the actual ...read more

Add your answer

Q452. What is fibre optical

Ans.

Fibre optical is a technology that uses thin strands of glass or plastic to transmit data through light signals.

  • Fibre optical cables are used for high-speed internet connections.

  • They are also used in telecommunications for long-distance communication.

  • Fibre optical technology is more efficient and faster than traditional copper wire technology.

Add your answer

Q453. What is latency and bandwidth

Ans.

Latency is the time it takes for data to travel from the source to the destination, while bandwidth is the maximum rate of data transfer.

  • Latency is the delay between the moment data is sent and when it is received.

  • Bandwidth is the amount of data that can be transferred in a given amount of time.

  • Latency is measured in milliseconds, while bandwidth is measured in bits per second.

  • Examples: Latency can be affected by distance, network congestion, and processing time. Bandwidth ca...read more

Add your answer

Q454. what is pricing procedure?

Ans.

Pricing procedure is a set of rules and conditions used to determine the price of a product or service.

  • Pricing procedure is used in SAP to determine the price of a product or service

  • It consists of various condition types such as discounts, taxes, surcharges, etc.

  • Each condition type has its own set of rules and conditions that determine its value

  • The pricing procedure is determined based on the sales area, customer, and material

  • Examples of condition types include PR00 (base pri...read more

View 1 answer

Q455. What is computer in your language

Ans.

A computer is an electronic device that can perform various tasks by executing instructions given to it.

  • A computer is made up of hardware components such as CPU, memory, and storage devices.

  • It runs on an operating system and software applications.

  • Computers can be used for various purposes such as communication, entertainment, and work.

  • Examples of computers include desktops, laptops, tablets, and smartphones.

View 1 answer

Q456. What is mss in tcp explain

Ans.

MSS in TCP refers to the maximum segment size, which is the largest amount of data that can be sent in a single TCP segment.

  • MSS is negotiated during the TCP three-way handshake

  • It is determined by the maximum transmission unit (MTU) of the network

  • MSS can be adjusted by the sender or receiver using TCP options

  • A smaller MSS can help prevent fragmentation and improve network performance

View 1 answer

Q457. How are you able to handle a difficult client

Ans.

I handle difficult clients by remaining calm, listening actively, and finding solutions to their concerns.

  • Remain calm and composed during interactions

  • Listen actively to understand their concerns and frustrations

  • Empathize with their perspective and show understanding

  • Find solutions to address their issues and communicate effectively

Add your answer

Q458. What is account payable

Ans.

Account payable is the amount of money a company owes to its suppliers or vendors for goods or services received but not yet paid for.

  • It is a liability on the company's balance sheet

  • It represents the amount owed to suppliers or vendors

  • It is recorded as a credit in the company's books

  • Examples include unpaid invoices for raw materials, utilities, or rent

  • It is important to manage and pay accounts payable on time to maintain good relationships with suppliers

View 2 more answers

Q459. What are the heads comes under income tax act

Ans.

The heads under Income Tax Act are five - Salaries, Income from House Property, Profits and Gains of Business or Profession, Capital Gains, and Income from Other Sources.

  • Salaries

  • Income from House Property

  • Profits and Gains of Business or Profession

  • Capital Gains

  • Income from Other Sources

View 1 answer

Q460. What is first step when u see fire in electrical room

Ans.

The first step is to immediately cut off the power supply to the electrical room.

  • Locate the main power switch and turn it off

  • Call the fire department

  • Evacuate the area and close all doors behind you

  • Use a fire extinguisher if it is safe to do so

  • Do not use water to extinguish an electrical fire

Add your answer

Q461. What are the L3 activities taken care

Ans.

L3 activities refer to advanced technical support and troubleshooting.

  • L3 activities involve resolving complex technical issues that cannot be handled by L1 or L2 support.

  • L3 support may involve analyzing logs, debugging code, and providing solutions to critical problems.

  • L3 support may also involve working closely with developers to identify and fix bugs in software.

  • Examples of L3 activities include resolving network outages, diagnosing server issues, and troubleshooting softwa...read more

Add your answer

Q462. Difference between serial and cover method

Ans.

Serial method involves testing one sample at a time, while cover method involves testing multiple samples together.

  • Serial method tests samples individually in sequence

  • Cover method tests multiple samples simultaneously

  • Serial method is time-consuming but more accurate

  • Cover method is faster but may lead to false negatives

  • Example: Serial method used in PCR testing, cover method used in pool testing

Add your answer

Q463. How to handle an non-co operative team member ?

Ans.

Handling a non-cooperative team member requires effective communication, understanding their perspective, and addressing any underlying issues.

  • Initiate a conversation to understand their concerns and reasons for non-cooperation

  • Listen actively and empathetically to their perspective

  • Address any underlying issues or conflicts that may be causing their behavior

  • Clearly communicate expectations and the impact of their non-cooperation on the team

  • Offer support and resources to help t...read more

Add your answer

Q464. 4.Transactional in Hibernate

Ans.

Transactional in Hibernate refers to the management of database transactions.

  • Hibernate provides transaction management through the use of the Transaction interface.

  • Transactions can be managed programmatically or declaratively using annotations.

  • Transactional behavior can be customized using isolation levels and propagation settings.

  • Example: @Transactional annotation can be used to mark a method as transactional.

  • Example: session.beginTransaction() can be used to programmaticall...read more

Add your answer

Q465. Difference between rank and dense rank

Ans.

Rank assigns unique ranks to each distinct value, while dense rank assigns consecutive ranks to each distinct value.

  • Rank leaves gaps between ranks if there are ties, while dense rank does not

  • Rank function is used to assign a unique rank to each distinct row, while dense rank function is used to assign consecutive ranks to each distinct row

  • Example: If we have values 10, 20, 20, 30 - Rank would assign ranks as 1, 2, 2, 4 while Dense Rank would assign ranks as 1, 2, 2, 3

Add your answer

Q466. Write a code using hashmap and HashSet.

Ans.

Code using hashmap and HashSet

  • Create a HashMap object

  • Add key-value pairs to the HashMap

  • Create a HashSet object

  • Add elements to the HashSet

  • Retrieve values from the HashMap using keys in the HashSet

Add your answer

Q467. What is a Primary Key? What are the features of the C language? What is the use of printf() and scanf() functions

Ans.

A primary key is a unique identifier for a record in a database table.

  • It ensures that each record is unique and can be easily accessed.

  • It is used to establish relationships between tables.

  • It cannot be null or have duplicate values.

  • Examples include social security numbers, email addresses, and employee IDs.

Add your answer

Q468. What is Batch class and example

Ans.

Batch class is a Salesforce feature used to process large amounts of data in chunks.

  • Batch class implements the Database.Batchable interface in Salesforce

  • It allows you to break down a large data set into smaller batches for processing

  • Batch class is useful for handling large data volumes without hitting governor limits

  • Example: A batch class can be used to update all account records with a specific field value

Add your answer

Q469. Git commands: How to commit ,merge code, how to resolve merge conflicts

Ans.

Git commands for committing, merging code, and resolving merge conflicts

  • To commit code: git commit -m 'Commit message'

  • To merge code from a branch: git merge branch_name

  • To resolve merge conflicts: manually edit the conflicting files, add changes, and then commit the merge

Add your answer

Q470. What is difference between return true and return false?

Ans.

return true means a positive response while return false means a negative response.

  • return true is used to indicate that a certain condition is met or an operation is successful

  • return false is used to indicate that a certain condition is not met or an operation has failed

  • return true and return false are often used in conditional statements and functions

  • example: function isEven(num) { if(num % 2 === 0) { return true; } else { return false; } }

Add your answer

Q471. What is observable and promises.how asymc.await works

Ans.

Observable is a pattern for handling asynchronous data streams. Promises are a way to handle asynchronous operations.

  • Observables allow for subscribing to a stream of data and reacting to each event as it comes in.

  • Promises represent a value that may not be available yet, but will be resolved at some point in the future.

  • async/await is a way to write asynchronous code that looks synchronous, by pausing execution until a promise is resolved.

  • async/await can be used with promises, ...read more

Add your answer

Q472. What is pass through query and what are it's components?

Ans.

A pass through query is a SQL statement that is sent directly to a remote database server for processing.

  • It is used to execute SQL statements on a remote database server.

  • It is composed of a SQL statement and a connection string.

  • It is useful for querying large datasets that are stored on a remote server.

  • It can improve performance by reducing network traffic.

  • Example: SELECT * FROM [ODBC;Driver={SQL Server};Server=myServerAddress;Database=myDataBase;Uid=myUsername;Pwd=myPassword...read more

Add your answer

Q473. 2.Singletone class and explain

Ans.

A singleton class is a class that can only have one instance created at a time.

  • Singleton classes are often used in situations where there should only be one instance of a class, such as a database connection or a configuration manager.

  • The class typically has a private constructor to prevent multiple instances from being created.

  • The instance of the class is usually accessed through a static method or property.

  • Example: Java's java.lang.Runtime class is a singleton class that pr...read more

Add your answer

Q474. How to create interface in java

Ans.

Interfaces in Java define a contract for classes to implement certain methods and provide a way to achieve abstraction.

  • Interfaces are declared using the 'interface' keyword in Java.

  • All methods in an interface are abstract by default and do not have a method body.

  • Classes can implement interfaces using the 'implements' keyword.

  • Interfaces can be used to achieve multiple inheritance in Java.

  • Example: public interface Shape { double calculateArea(); }

Add your answer

Q475. 1) what is collections have you used anywhere? 2) how function can return more than one value? 3) what is is materialised view 4) what is pragma autonomous transaction

Ans.

Answers to IT Analyst interview questions

  • 1) Used collections like arrays, lists, and maps in Java and Python for storing and manipulating data

  • 2) A function can return multiple values using tuples, arrays, or objects in programming languages like Python, Java, and C++

  • 3) Materialized view is a database object that stores the result of a query and acts as a table, improving query performance by reducing the need for expensive joins and aggregations

  • 4) Pragma autonomous transactio...read more

Add your answer

Q476. How System Refresh Works ?

Ans.

System refresh is a process of copying production data to a non-production environment to ensure the non-production environment is up-to-date.

  • System refresh involves copying data from production to non-production environments.

  • It helps ensure that the non-production environment has the most recent data for testing and development.

  • System refresh can be done manually or automated using tools like SAP System Copy or Oracle Data Pump.

  • It is important to carefully plan and execute s...read more

Add your answer

Q477. What is list and tuple? What are the differences between them?

Add your answer

Q478. what function is used in selenium to access certified websites

Ans.

The function used in Selenium to access certified websites is 'acceptSslCerts()'.

  • Use the 'acceptSslCerts()' function in Selenium to access certified websites

  • This function is used to bypass SSL certificate errors while accessing secure websites

  • Example: driver = new ChromeDriver(); driver.manage().acceptSslCerts();

Add your answer

Q479. What is JSX? Why it is used?

Ans.

JSX is a syntax extension for JavaScript that allows writing HTML elements in JavaScript code.

  • JSX makes it easier to write and manage UI components in React

  • It allows mixing HTML and JavaScript in a single file

  • JSX gets transpiled into regular JavaScript by tools like Babel

Add your answer

Q480. Different between shallow copy and deep copy.

Ans.

Shallow copy only copies the references of objects, while deep copy creates new copies of objects.

  • Shallow copy creates a new object but does not create copies of nested objects.

  • Deep copy creates new copies of all nested objects.

  • Shallow copy is faster and more memory efficient, but changes to nested objects affect both copies.

  • Deep copy is slower and uses more memory, but changes to nested objects do not affect the original object.

Add your answer

Q481. What is event listener?

Ans.

An event listener is a procedure or function in a computer program that waits for an event to occur.

  • Event listeners are commonly used in web development to handle user interactions like clicks, key presses, etc.

  • They are used to trigger specific actions or functions when a certain event occurs.

  • Event listeners can be added to HTML elements using JavaScript.

  • Example: Adding a click event listener to a button element to perform an action when the button is clicked.

Add your answer

Q482. Why JS is single threaded?

Ans.

JS is single threaded to ensure simplicity and prevent race conditions.

  • JS was designed to be single threaded to simplify programming and prevent race conditions.

  • Having a single thread allows for easier debugging and predictable behavior.

  • Examples of multi-threaded languages like Java can lead to complex synchronization issues.

  • JS uses an event loop to handle asynchronous operations without the need for multiple threads.

Add your answer

Q483. Which design patters are used by you?

Ans.

I have used various design patterns such as Singleton, Factory, Observer, and Decorator.

  • Singleton pattern for ensuring only one instance of a class is created.

  • Factory pattern for creating objects without exposing the instantiation logic.

  • Observer pattern for implementing event handling and notification.

  • Decorator pattern for adding functionality to an object dynamically.

Add your answer

Q484. Please can you explain how you implemented a solution using the tool

Ans.

I implemented a solution using the tool by first analyzing the problem and then designing a plan of action.

  • Identified the problem and its requirements

  • Researched and selected the appropriate tool

  • Designed a plan of action and implemented the solution

  • Tested and evaluated the solution for effectiveness

  • Documented the process and provided training to users

Add your answer

Q485. What is Agile process

Ans.

Agile process is an iterative approach to software development that emphasizes flexibility, collaboration, and customer satisfaction.

  • Agile process involves breaking down a project into smaller, manageable chunks called sprints.

  • It emphasizes continuous feedback and adaptation to changing requirements.

  • It values individuals and interactions over processes and tools.

  • Examples of Agile methodologies include Scrum, Kanban, and Extreme Programming (XP).

View 3 more answers

Q486. Which is more preferable, BAPI or BDC and why?

Ans.

BAPI is more preferable as it provides a standardized interface and supports real-time data processing.

  • BAPI provides a standardized interface for accessing SAP data and functionality

  • BAPI supports real-time data processing and can be used for both read and write operations

  • BDC is a legacy technology and requires more manual effort to maintain

  • BAPI is more flexible and can be used across different SAP modules

  • BAPI is recommended for integrating with non-SAP systems

Add your answer

Q487. entity framework details and show recorded details

Ans.

Entity Framework is an ORM tool for .NET applications. It allows developers to work with databases using objects.

  • Entity Framework is a Microsoft product

  • It supports various database providers such as SQL Server, MySQL, Oracle, etc.

  • It uses LINQ to query data from the database

  • It supports Code First, Database First, and Model First approaches

  • Recorded details can be viewed using SQL Profiler or logging frameworks like Serilog

Add your answer

Q488. Difference between async await and promises

Ans.

Async await is syntactic sugar for promises, making asynchronous code easier to read and write.

  • Async await allows writing asynchronous code that looks synchronous, making it easier to understand.

  • Promises are objects that represent the eventual completion or failure of an asynchronous operation.

  • Async await is built on top of promises and provides a more concise and readable way to work with asynchronous code.

  • Async functions return a promise, which allows chaining and error han...read more

Add your answer

Q489. what is dictionary? is this accept duplicate or not?

Ans.

A dictionary in Python is a collection of key-value pairs. It does not accept duplicate keys.

  • A dictionary is created using curly braces {}

  • Keys in a dictionary must be unique, but values can be duplicated

  • Example: my_dict = {'name': 'John', 'age': 30, 'city': 'New York'}

Add your answer

Q490. What are type of master data.

Ans.

Master data refers to the key data entities that are critical to the business operations of an organization.

  • Customer data

  • Product data

  • Vendor data

  • Employee data

  • Financial data

  • Material data

  • Asset data

  • Location data

Add your answer

Q491. How to manage difficult situation

Ans.

I use active listening, empathy, problem-solving, and conflict resolution techniques to manage difficult situations.

  • Practice active listening to understand the root of the issue

  • Show empathy towards the emotions of all parties involved

  • Utilize problem-solving skills to find mutually beneficial solutions

  • Employ conflict resolution techniques to de-escalate tensions

Add your answer

Q492. what is OOPS concept in java?

Ans.

OOPS concept in Java stands for Object-Oriented Programming System, which is a programming paradigm based on the concept of objects.

  • OOPS focuses on creating objects that contain both data and methods to manipulate that data.

  • Key principles of OOPS include Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation involves bundling data and methods that operate on the data into a singl...read more

Add your answer

Q493. architecture and design of streaming data pipeline in gcp

Ans.

Designing a streaming data pipeline in GCP involves selecting appropriate services like Pub/Sub, Dataflow, BigQuery, and Cloud Storage.

  • Use Google Cloud Pub/Sub for ingesting and distributing data streams

  • Utilize Google Cloud Dataflow for processing and transforming data in real-time

  • Store processed data in Google BigQuery for analysis and querying

  • Consider using Google Cloud Storage for storing raw data or backups

Add your answer

Q494. Difference between java and nodejs

Ans.

Java is a statically typed language while Node.js is a runtime environment for JavaScript.

  • Java is compiled while Node.js is interpreted

  • Java is better for large-scale enterprise applications while Node.js is better for real-time applications

  • Java has a larger community and more libraries while Node.js has a simpler and more lightweight architecture

  • Java is used for Android app development while Node.js is used for server-side web development

  • Java has better performance while Node...read more

Add your answer

Q495. How to add user in Jenkins?

Ans.

Adding a user in Jenkins

  • Go to Jenkins dashboard and click on 'Manage Jenkins'

  • Click on 'Manage Users' and then 'Create User'

  • Fill in the user details and click 'Create User'

  • Assign the necessary permissions to the user

Add your answer

Q496. How to calculate pacing time?

Ans.

Pacing time is calculated by dividing the total number of transactions by the duration of the test.

  • Pacing time is used to determine the rate at which virtual users should be generated during a performance test.

  • It is calculated by dividing the total number of transactions by the duration of the test.

  • For example, if the test is scheduled to run for 1 hour and the expected number of transactions is 10,000, the pacing time would be 6 seconds (3600 seconds / 10,000 transactions).

Add your answer

Q497. What is Jira? How to create CI/CD pipeline?

Ans.

Jira is a project management tool used for tracking issues and managing software development projects. CI/CD pipeline automates software delivery process.

  • Jira is a popular project management tool that allows teams to track issues, manage tasks, and plan projects.

  • To create a CI/CD pipeline, you can use tools like Jenkins, GitLab CI/CD, or CircleCI to automate the software delivery process.

  • In Jira, you can integrate with CI/CD tools to track the progress of software development...read more

Add your answer

Q498. What is and array .write the code for the same and explain

Ans.

An array is a data structure that stores a collection of elements of the same type in a contiguous memory location.

  • Arrays are declared by specifying the data type of the elements and the number of elements in square brackets.

  • Example: String[] names = new String[5];

  • Elements in an array can be accessed using their index, starting from 0.

  • Example: String firstElement = names[0];

Add your answer

Q499. Write SQL queries

Ans.

Answering SQL query writing question for Senior Systems Engineer position

  • Understand the database schema and table relationships

  • Use SELECT, FROM, WHERE, GROUP BY, HAVING, and ORDER BY clauses

  • Use JOINs to combine data from multiple tables

  • Use aggregate functions like COUNT, SUM, AVG, MAX, and MIN

  • Use subqueries to filter data based on results of another query

Add your answer

Q500. What is the difference between C and C++?

Ans.

C is a procedural programming language while C++ is a multi-paradigm programming language with object-oriented features.

  • C is a procedural programming language, while C++ supports both procedural and object-oriented programming.

  • C does not have classes and objects, while C++ supports classes and objects.

  • C does not have features like inheritance and polymorphism, which are supported in C++.

  • C is a subset of C++, meaning that C++ includes all of C's features and adds new features ...read more

Add your answer
2
3
4
5
6
7
8
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at TCS

based on 1.2k interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 657 Interview Questions
3.6
 • 378 Interview Questions
3.5
 • 346 Interview Questions
4.0
 • 245 Interview Questions
4.0
 • 197 Interview Questions
4.0
 • 158 Interview Questions
View all
Top Infosys Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter