Filter interviews by
It was 1 and half hour test. Both technical discussion and Technical code test.
Top trending discussions
I applied via Approached by Company and was interviewed in Mar 2023. There were 2 interview rounds.
HR questions in TCS focus on candidate's experience, skills, and behavior.
Questions about your previous work experience and projects
Behavioral questions to assess your problem-solving skills and teamwork abilities
Questions about your technical skills and knowledge in the field
Questions about your career goals and aspirations
Questions about how you handle challenges and conflicts in the workplace
I interested in tcs company sir skills and knowledge . extracurricular in drawing
TCS offers a unique work environment with a focus on innovation, collaboration, and continuous learning.
TCS encourages innovation and creativity in problem-solving.
The company promotes a culture of collaboration and teamwork.
Employees have access to continuous learning opportunities through training programs and certifications.
TCS values diversity and inclusion in the workplace.
I'm confident I have the soft skills to succeed in this role and am eager to learn the hands-on skills it requires.
Start With Your Short-Term Goals. Begin with a short-term goal .
I applied via Naukri.com and was interviewed in Feb 2021. There was 1 interview round.
There were a total of seven sections: verbal ability, logical reasoning, arithmetic problems, verbal reasoning, puzzles, pseudocodes, and essay writing, with each section having its own cutoff scores.
First round > General aptitude and versant test.
VDI can be managed by monitoring performance, updating software, optimizing resources, and ensuring security.
Monitor performance regularly to identify any issues or bottlenecks.
Update VDI software and patches to ensure system stability and security.
Optimize resources by balancing workloads and adjusting configurations as needed.
Ensure security measures are in place, such as encryption, access controls, and regular back...
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
I applied via Campus Placement and was interviewed in Nov 2024. There were 2 interview rounds.
Its very easy
Basic maths questions learned up to 10
Basic Apptitude questions
I applied via Naukri.com and was interviewed in Jul 2024. There were 2 interview rounds.
I am a highly experienced Senior Systems Engineer with a strong background in designing, implementing, and maintaining complex IT systems.
Over 10 years of experience in system design and implementation
Proficient in various operating systems such as Windows, Linux, and Unix
Skilled in virtualization technologies like VMware and Hyper-V
Strong troubleshooting and problem-solving skills
Excellent communication and teamwork a...
As a Senior Systems Engineer, my role involves designing, implementing, and maintaining complex systems to meet business needs.
Designing and implementing system architecture
Troubleshooting and resolving technical issues
Collaborating with cross-functional teams
Evaluating new technologies and recommending upgrades
Ensuring system security and compliance
Providing technical support and training to end-users
Errors in our organization are resolved through thorough analysis, collaboration, and testing.
Errors are identified through monitoring systems and user feedback.
A root cause analysis is conducted to determine the underlying issue.
Cross-functional teams collaborate to develop a solution.
The solution is tested in a controlled environment before implementation.
Post-implementation monitoring is done to ensure the error is ...
Windows Server 2019 is the latest version of Microsoft's server operating system, offering new features and improvements for businesses.
Windows Server 2019 provides enhanced security features such as Windows Defender Advanced Threat Protection (ATP).
It includes improvements in virtualization, storage, networking, and hybrid cloud integration.
Windows Server 2019 supports Kubernetes and Linux containers, making it easier...
My data domain is network security, focusing on intrusion detection and prevention systems.
Specialize in designing and implementing security measures to protect networks from cyber attacks
Analyze network traffic patterns to identify potential threats
Utilize tools like Snort and Suricata for intrusion detection
Implement firewall rules to block malicious traffic
Stay updated on latest security threats and vulnerabilities
EMC Networker is a backup software solution used for data protection and recovery in enterprise environments.
EMC Networker is a backup software developed by EMC Corporation.
It is used for backing up, archiving, and recovering data in enterprise environments.
Networker supports a wide range of operating systems, applications, and storage devices.
It provides features like data deduplication, encryption, and centralized ma...
Hyper-V Server is a virtualization platform that allows users to create and manage virtual machines on Windows servers.
Hyper-V Server is a standalone product offered by Microsoft for virtualization purposes.
It allows users to create and manage virtual machines on Windows servers.
Hyper-V Server includes features such as live migration, failover clustering, and support for various operating systems.
It is commonly used in...
FSMO stands for Flexible Single Master Operations. There are 5 types of FSMO roles in Active Directory.
FSMO roles are specialized tasks that can only be performed by one domain controller at a time in a domain or forest.
The 5 types of FSMO roles are: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Each FSMO role has a specific function in the Active Directory environment, such a...
RAID stands for Redundant Array of Independent Disks. It is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
Types of RAID include RAID 0, RAID 1, RAID 5, RAID 10, etc.
RAID 0 offers improved performance but no redundancy.
RAID 1 provides data mirroring for redundancy.
RAID 5 u...
365 Microsoft server is a cloud-based service that provides productivity tools and services for businesses.
Cloud-based service
Includes productivity tools like Word, Excel, PowerPoint
Allows collaboration and communication through Teams and Outlook
Offers storage solutions like OneDrive
Provides security features like encryption and multi-factor authentication
Unity 300 Storage is a high-performance, scalable storage solution designed for enterprise environments.
Unity 300 Storage is part of Dell EMC's Unity family of storage arrays.
It offers features such as inline data reduction, data-at-rest encryption, and cloud tiering.
Unity 300 Storage is ideal for organizations looking for a reliable and efficient storage solution for their data center.
It provides unified storage for b...
I applied via TCS and was interviewed in Dec 2024. There was 1 interview round.
Hash technology is a method used to convert data into a fixed-size string of characters, typically used for data security and integrity.
Hash technology uses algorithms to generate a unique fixed-size string of characters from input data.
It is commonly used for data security, password storage, digital signatures, and data integrity verification.
Examples of hash algorithms include MD5, SHA-1, and SHA-256.
Blockchain is a decentralized, distributed ledger technology used to securely record transactions across multiple computers.
Decentralized database
Consensus mechanism
Immutable record of transactions
Cryptographic security
Smart contracts
Examples: Bitcoin, Ethereum
DML stands for Data Manipulation Language, used to manage data in a database.
DML is a subset of SQL (Structured Query Language) used to insert, update, delete, and retrieve data in a database.
Examples of DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and manipulating data within a database system.
Binary to decimal conversion involves multiplying each digit by 2 raised to the power of its position.
To convert binary to decimal, start from the rightmost digit and multiply each digit by 2 raised to the power of its position.
Add all the results together to get the decimal equivalent.
For example, to convert binary 1011 to decimal: 1*2^3 + 0*2^2 + 1*2^1 + 1*2^0 = 11.
Iterate through array and compare each element to find the maximum number.
Iterate through the array using a loop.
Compare each element to a variable storing the current maximum number.
Update the variable if a larger number is found.
Return the maximum number at the end.
Basic HTML code for inserting image and creating a table
Use <img> tag to insert an image with src attribute
Use <table>, <tr>, <td> tags to create a table structure
Specify image source and table content within respective tags
based on 1 interview
Interview experience
based on 1 review
Rating in categories
GL Accountant
189
salaries
| ₹3.6 L/yr - ₹10.1 L/yr |
Financial Analyst
117
salaries
| ₹3.6 L/yr - ₹9.8 L/yr |
Financial Associate
90
salaries
| ₹3 L/yr - ₹6.5 L/yr |
Data Engineer
65
salaries
| ₹9 L/yr - ₹30 L/yr |
Software Engineer
56
salaries
| ₹6 L/yr - ₹22 L/yr |
Accenture
IBM
TCS
Wipro