i
TCS
Filter interviews by
I was interviewed in Aug 2016.
Asymptotic notation is a way to describe the performance of an algorithm by analyzing its behavior as the input size approaches infinity.
Asymptotic notation is used to analyze the efficiency and scalability of algorithms.
It provides a way to compare algorithms based on their growth rates.
Commonly used asymptotic notations include Big O, Big Omega, and Big Theta.
Big O notation represents the upper bound or worst-case sc...
Theta notation is a way to describe the upper bound of an algorithm's time complexity.
Theta notation is represented by Θ
It describes the tightest possible bound on an algorithm's time complexity
It takes into account both the best and worst case scenarios
For example, an algorithm with Θ(n) time complexity will have a linear runtime
An algorithm with Θ(n^2) time complexity will have a quadratic runtime
ArrayList is a dynamic array that can grow or shrink in size. It provides advantages like dynamic resizing and built-in methods.
ArrayList is a resizable array implementation of the List interface in Java.
It can store elements of any type, including objects and primitives.
Advantages over generic arrays include dynamic resizing, automatic memory management, and built-in methods like add(), remove(), etc.
Example: ArrayLis...
A linked list is a data structure that consists of a sequence of nodes, where each node contains a reference to the next node.
A linked list is a dynamic data structure that can grow or shrink as needed.
Each node in a linked list contains two parts: data and a reference to the next node.
To insert a node at the beginning of a linked list, we create a new node, set its data, and update the reference of the new node to poi
Join is a database operation that combines rows from two or more tables based on a related column between them.
Inner join returns only the matching rows from both tables.
Outer join returns all the rows from one table and the matching rows from the other table.
There are different types of outer joins: left outer join, right outer join, and full outer join.
Joining tables can be done using the JOIN keyword in SQL.
Example:...
Byte code is a compiled code that is generated by the Java compiler and can be executed by the Java Virtual Machine (JVM).
Byte code is an intermediate representation of Java source code.
It is platform-independent and can be executed on any device with a JVM.
Byte code is stored in .class files.
Examples of byte code instructions include loading, storing, and arithmetic operations.
JVM is a virtual machine that executes Java bytecode. JRE is a runtime environment that includes JVM and libraries. JDK is a development kit that includes JRE and tools for developing Java applications.
JVM stands for Java Virtual Machine and is responsible for executing Java bytecode.
JRE stands for Java Runtime Environment and includes JVM and libraries required to run Java applications.
JDK stands for Java Development ...
Computer science is the study of computers and computational systems.
Computer science involves the theory, design, development, and application of computer systems.
It encompasses various areas such as algorithms, programming languages, data structures, artificial intelligence, and computer networks.
Computer scientists solve complex problems and create innovative solutions using computational techniques.
Examples of comp...
Yes
AngularJS - a JavaScript framework for building web applications
React - a JavaScript library for building user interfaces
Django - a high-level Python web framework
Spring - a Java framework for building enterprise-level applications
I am an avid traveler and have visited over 20 countries.
I love exploring new cultures and experiencing different cuisines.
I have hiked to the top of Mount Kilimanjaro in Tanzania.
I have scuba dived in the Great Barrier Reef in Australia.
I have attended the Carnival in Rio de Janeiro, Brazil.
I enjoy documenting my travels through photography and blogging.
I was interviewed in Sep 2016.
Inner join is a type of join operation in relational databases that returns only the matching rows from both tables.
Inner join combines rows from two or more tables based on a related column between them.
It returns only the rows where the join condition is true.
The result set of an inner join contains only the columns that are common to both tables.
Inner join is commonly used to retrieve data that exists in multiple ta...
Inner join returns only the matching rows from both tables while outer join returns all rows from both tables with null values for non-matching rows.
Inner join is used to combine rows from two tables where the join condition is met.
Outer join is used to combine rows from two tables even if the join condition is not met.
There are three types of outer join: left outer join, right outer join, and full outer join.
Left oute...
The OSI framework is a conceptual model that defines how network protocols interact and communicate with each other.
The OSI framework stands for Open Systems Interconnection framework.
It consists of seven layers, each with its own specific functions and protocols.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer provides services to the layer above it and uses se...
Yes, I am comfortable working at odd hours.
I am flexible and adaptable to different work schedules.
I understand the importance of round-the-clock support in the field of systems engineering.
I have previous experience working night shifts and weekends.
I am committed to meeting project deadlines and ensuring system availability at all times.
I was interviewed before May 2016.
What people are saying about TCS
I was interviewed before May 2016.
TCS interview questions for designations
I was interviewed before May 2016.
I interned at XYZ company for 3 months, working on software development projects.
Developed a web application using Java and Spring framework
Collaborated with a team of 5 developers to design and implement new features
Conducted testing and debugging to ensure application functionality
Participated in daily stand-up meetings and code reviews
Learned about agile development methodologies and software engineering best practi
Yes, I am flexible with location.
I am open to relocation if required for the job.
I am willing to work in different cities or countries.
I understand that some positions may require travel or relocation.
I am adaptable to new environments and cultures.
Yes, I am flexible with working hours.
I understand that sometimes work requires extra hours or different schedules
I am willing to adjust my personal schedule to accommodate work needs
I have experience working flexible hours in my previous job
Get interview-ready with Top TCS Interview Questions
I was interviewed in Jan 2016.
Memory leak is a condition where a program fails to release memory it no longer needs, leading to memory consumption and performance issues.
Memory leak occurs when dynamically allocated memory is not deallocated properly.
It can happen when a program loses the reference to allocated memory without freeing it.
Memory leaks can gradually consume all available memory, causing the program or system to crash.
Common causes inc...
A static variable in C is a variable that retains its value between function calls.
Static variables are declared using the 'static' keyword.
They are initialized only once, at the start of the program.
Their value persists even after the function call ends.
Static variables have a default initial value of 0.
They are useful for maintaining state across function calls.
Local variables are declared within a specific function or block, while global variables are declared outside of any function or block.
Local variables have a limited scope and are only accessible within the function or block where they are declared.
Global variables can be accessed from anywhere in the program.
Local variables are created when a function is called and destroyed when the function ends.
Global variables are...
Method overriding is a feature in object-oriented programming where a subclass provides a different implementation of a method that is already defined in its superclass.
Method overriding is used to achieve runtime polymorphism.
The method in the subclass must have the same name, return type, and parameters as the method in the superclass.
The @Override annotation can be used to indicate that a method is intended to overr...
Cache memory is a small, fast memory that stores frequently accessed data for quick access.
Cache memory is faster than main memory but smaller in size.
It reduces the time taken to access data from main memory.
Examples include CPU cache, web browser cache, and disk cache.
Cache memory is volatile and can be cleared at any time.
Cache hit is when data is found in cache, cache miss is when it's not.
C is a procedural language while Java is an object-oriented language.
C is compiled while Java is interpreted
C has pointers while Java does not
Java has automatic garbage collection while C does not
Java has platform independence while C does not
Java has built-in exception handling while C does not
Exception handling is a mechanism to handle runtime errors and prevent program crashes.
Exceptions are objects that represent errors or exceptional situations in a program.
When an exception occurs, the program stops executing and jumps to the nearest exception handler.
Exception handling involves catching and handling exceptions to prevent program crashes.
Try-catch blocks are used to catch and handle exceptions.
Example: ...
Run time exceptions are errors that occur during program execution.
They are unexpected and can cause the program to crash.
Examples include null pointer exceptions and arithmetic exceptions.
They can be handled using try-catch blocks.
Proper error handling can prevent run time exceptions.
A stack is a data structure that follows the Last In First Out (LIFO) principle.
Elements are added to the top of the stack and removed from the top.
Common operations include push (add element to top) and pop (remove element from top).
Stacks are used in programming for function calls, expression evaluation, and memory management.
Example: The back button in a web browser uses a stack to keep track of visited pages.
Exampl...
My interests include technology, problem-solving, and continuous learning.
Technology: I enjoy staying up-to-date with the latest advancements in the field of technology and exploring new gadgets and software.
Problem-solving: I have a strong passion for solving complex problems and finding efficient solutions. I enjoy analyzing issues and brainstorming creative approaches.
Continuous learning: I believe in the importance...
The iPhone 7 was released on September 16, 2016.
The iPhone 7 was released on September 16, 2016.
It was the successor to the iPhone 6s and 6s Plus.
The iPhone 7 introduced several new features, including a water-resistant design and the removal of the headphone jack.
Drawbacks of iPhone 6 include battery life, storage capacity, and lack of headphone jack. I use an iPhone 11.
Battery life is relatively short compared to newer models
Storage capacity is limited and non-expandable
Lack of headphone jack requires the use of adapters or wireless headphones
iPhone 11 has longer battery life, larger storage capacity, and improved camera features
The latest technology is artificial intelligence (AI).
Artificial intelligence (AI) is a branch of computer science that enables machines to perform tasks that typically require human intelligence.
AI technologies include machine learning, natural language processing, computer vision, and robotics.
Examples of AI applications include virtual assistants (e.g., Siri, Alexa), autonomous vehicles, facial recognition systems, ...
Cloud computing is the delivery of computing services over the internet.
Cloud computing allows users to access and use computing resources on-demand, such as storage, processing power, and software applications.
It eliminates the need for users to own and manage physical infrastructure, as the resources are provided by a third-party service provider.
Examples of cloud computing services include Amazon Web Services (AWS),
Scale up and scale down operations refer to increasing or decreasing the resources allocated to a system or application.
Scale up involves adding more resources to a system to handle increased demand or workload.
Examples of scale up include adding more RAM, CPU, or storage to a server.
Scale down involves reducing the resources allocated to a system when demand or workload decreases.
Examples of scale down include removin...
I used these components in my projects because they provided the necessary functionality and met the project requirements.
The components were chosen based on their compatibility with the existing system.
They offered the required features and capabilities for the project.
The components were cost-effective and readily available in the market.
They had a proven track record of reliability and performance.
The components wer...
Yes, I am aiming for higher studies.
I believe that continuous learning and personal growth are essential in the field of technology.
Higher studies will provide me with the opportunity to deepen my knowledge and skills in my chosen field.
I am particularly interested in pursuing a master's degree in Computer Science to gain a more in-depth understanding of advanced concepts and technologies.
By pursuing higher studies, I ...
4 Interview rounds
based on 3.5k reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.9k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
31.3k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.6k
salaries
| ₹8.9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture