i
TCS
Filter interviews by
I applied via Company Website and was interviewed in Jan 2021. There were 5 interview rounds.
I am proficient in Java, Python, and C++.
Java - object-oriented language used for developing desktop and web applications
Python - high-level language used for scripting, data analysis, and web development
C++ - general-purpose language used for system programming and game development
WAP in C to check if a number is prime or not
Take input from user
Loop from 2 to n/2 and check if n is divisible by any number
If divisible, then not prime. Else, prime
Print the result
WAP in C to find the reverse of a number
Take input number from user
Initialize a variable to store the reverse of the number
Use a while loop to extract the last digit of the number and add it to the reverse variable
Divide the number by 10 to remove the last digit
Repeat until the number becomes 0
Print the reverse of the number
Program to check if a number is palindrome or not in C language.
Take an integer input from the user.
Store the input in a separate variable.
Reverse the input number.
Compare the reversed number with the original number.
If both are equal, then the number is a palindrome.
If not, then the number is not a palindrome.
ls command is used to list files and directories in a directory.
ls command stands for 'list'.
It displays the names of files and directories in the current directory by default.
Options can be used with ls command to customize the output, such as -l for long listing format or -a to show hidden files.
Example: 'ls -l' will display files and directories in long listing format.
DNS translates domain names to IP addresses to locate resources on the internet.
DNS servers store records mapping domain names to IP addresses
When a user enters a domain name, their device queries a DNS server to resolve it
DNS uses a hierarchical system with top-level domains like .com or .org
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Verification is the process of evaluating whether a system or component meets specified requirements and criteria.
Verification involves checking if the system is being built right.
It focuses on ensuring that the software is being developed according to the requirements.
Examples of verification activities include code reviews, walkthroughs, and inspections.
posted on 1 Jul 2024
At my previous company, we used a variety of technologies including AWS, Docker, Kubernetes, Jenkins, and Ansible.
AWS (Amazon Web Services) for cloud computing services
Docker for containerization of applications
Kubernetes for container orchestration
Jenkins for continuous integration and continuous deployment
Ansible for automation of IT tasks
posted on 10 Mar 2024
I applied via Hirepro and was interviewed in Feb 2024. There were 3 interview rounds.
1)Binary searching
2) cloud technology
Network architecture
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
Permissions applied on types determine the level of access and actions that can be performed on them.
Permissions can be applied to various types such as files, folders, databases, etc.
Examples of permissions include read, write, execute, delete, modify, etc.
Permissions can be granted to individual users or groups of users.
Permissions can be inherited from parent objects or explicitly set on individual objects.
A file is a collection of data or information that is stored on a computer or other digital device.
A file can contain text, images, audio, video, or any other type of digital data.
Files are organized into directories or folders for easy access and management.
Files can be created, edited, moved, copied, and deleted by users or programs.
Examples of files include documents, spreadsheets, presentations, photos, music, and
Aptitude TesT - logically things, IQ level
Given one topic. Need to discussion. And Debet
I applied via LinkedIn and was interviewed in Jul 2022. There were 2 interview rounds.
Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.
Networking involves connecting devices to share resources such as files, printers, and internet access.
DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.
DNS cluster can be configured using tools like BIND an...
Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.
Backups are essential for data recovery in case of disasters or system failures
Ports are identified by numbers and are used to establish connections between devices
Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.
based on 25 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.7k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51.2k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.9k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.7k
salaries
| ₹8.9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture