i
TCS
Filter interviews by
I applied via Campus Placement and was interviewed in May 2023. There were 3 interview rounds.
Arthimetic, Reasoning and English was tested
I was interviewed in Aug 2024.
Discussion with the Leadership team
posted on 31 Oct 2023
RAC startup sequence involves starting the Oracle Clusterware stack and then starting the Oracle ASM instance and database instances.
Start Oracle Clusterware stack using 'crsctl start crs' command
Start Oracle ASM instance using 'srvctl start asm' command
Start database instances using 'srvctl start database -d
I applied via Company Website and was interviewed in Jan 2023. There were 2 interview rounds.
I have strong skills in project management and implementation of complex solutions.
I have experience in leading cross-functional teams to deliver successful projects on time and within budget.
I am skilled in identifying and mitigating risks, and ensuring quality assurance throughout the project lifecycle.
I have implemented various solutions such as CRM systems, ERP systems, and custom software applications.
I am profici...
The current scenario of the SAP system is stable and efficient.
The SAP system is currently running smoothly with no major issues.
The system is being regularly maintained and updated to ensure optimal performance.
New features and functionalities are being added to the system to improve its efficiency.
The system is being used by various departments within the organization for different purposes such as finance, HR, and s
I applied via AmbitionBox and was interviewed in Jul 2022. There were 4 interview rounds.
Online test for 30 mins, consists of voice, reasoning and analytical questions.
posted on 26 Oct 2022
I applied via campus placement at University Business School (UBS), Chandigarh and was interviewed in Apr 2022. There were 3 interview rounds.
It was a AMCAT round consisting of aptitude, English, quant, reasoning and automata fix
Effort estimation for software module development
Break down the module into smaller tasks
Estimate time required for each task
Consider dependencies and risks
Use historical data and expert judgment
Adjust estimates based on complexity and team experience
Use tools like PERT, COCOMO, or function points
Regularly review and update estimates
A data center basic data flow design involves the movement of data between servers, storage devices, and networks.
Data is received from external sources and processed by servers
Processed data is stored in storage devices
Data is retrieved from storage devices and sent to networks for distribution
Networks transmit data to end-users or other systems
Data is constantly monitored and managed for security and efficiency
A DMZ is a network segment that separates an organization's internal network from an untrusted network.
DMZ stands for Demilitarized Zone
It is created to provide an additional layer of security to an organization's network
It is typically used to host publicly accessible servers such as web servers, email servers, etc.
Traffic to and from the DMZ is heavily monitored and restricted to prevent unauthorized access to the in...
APM stands for Application Performance Management. Sync of DC to DR is done for disaster recovery purposes.
APM is the monitoring and management of performance and availability of software applications.
Sync of DC to DR is done to ensure that in case of a disaster, the secondary data center has the most up-to-date data.
This is typically done through replication technologies such as synchronous or asynchronous replication...
Sandboxing is a security mechanism used to isolate programs or processes from the rest of the system.
It creates a virtual environment for testing and running untrusted code
It prevents malicious code from accessing sensitive data or resources
It is commonly used in web browsers to prevent malware from infecting the system
Examples include Docker containers, virtual machines, and chroot jails
A routing algorithm is a process of determining the best path for data to travel from one network to another.
Routing algorithms are used in computer networks to determine the most efficient path for data to travel.
Examples of routing algorithms include OSPF, BGP, and RIP.
Routing algorithms work by analyzing network topology and selecting the best path based on factors such as distance, bandwidth, and cost.
Some routing ...
SIEM is a security tool that collects and analyzes security events. Two factor authentication adds an extra layer of security. SSL is a protocol for secure communication.
SIEM stands for Security Information and Event Management
SIEM collects and analyzes security events from various sources
Two factor authentication requires two forms of identification to access a system
SSL stands for Secure Sockets Layer
SSL is a protoco...
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
I applied via LinkedIn
Control-M is a job scheduling software used for automating and managing workflows.
Control-M is used for scheduling and monitoring batch jobs across multiple platforms.
It provides a centralized view of all jobs and their status.
Control-M allows for easy customization and integration with other tools.
It supports various job types including file transfers, database queries, and shell scripts.
Control-M also has a user-frie...
Admin role involves managing and maintaining systems and applications.
Admins are responsible for user management and access control.
They ensure system security and perform regular backups.
Admins troubleshoot issues and provide technical support.
They also monitor system performance and optimize resources.
Examples of admin roles include network administrator, database administrator, and system administrator.
Interview experience
based on 1 review
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.4k
salaries
| ₹5.1 L/yr - ₹15.9 L/yr |
AST Consultant
51.3k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.9k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.9k
salaries
| ₹8.9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture