TCS
400+ Upbott Interview Questions and Answers
Q201. Draw different types of gate with there circuit diagram
Q202. What is the use of router?
A router is a networking device that forwards data packets between computer networks.
Routers connect multiple devices to the internet or other networks.
They use IP addresses to route data to the correct destination.
Routers can also provide security by blocking unauthorized access to a network.
Examples of routers include home Wi-Fi routers, enterprise routers, and core routers used by internet service providers.
Q203. What is Public static void main?
Q204. What do you think about DBMS?
DBMS is a crucial tool for managing large amounts of data efficiently.
DBMS stands for Database Management System
It helps in organizing, storing, and retrieving data
Examples include MySQL, Oracle, and Microsoft SQL Server
Q205. write a code on reverse of the string
Code to reverse a string
Use a loop to iterate through the characters of the string
Swap the characters from start to end of the string
Continue swapping until you reach the middle of the string
Q206. Explain all normal forms?Conditions to avoid deadlock?
Q207. Comment on its time complexity.
Q208. What are object oriented conepts?
Object oriented concepts are programming concepts that focus on objects and their interactions.
Encapsulation - bundling data and methods that operate on that data within a single unit
Inheritance - creating new classes from existing ones, inheriting their properties and methods
Polymorphism - the ability of objects to take on many forms or have multiple behaviors
Abstraction - hiding implementation details and only showing relevant information to the user
Q209. What is Data Structure? ---told
Q210. what is regression testing? ---told
Q211. What does one mean by DDL, DML?
DDL stands for Data Definition Language and DML stands for Data Manipulation Language.
DDL is used to define the structure of a database, including tables, columns, and constraints.
DML is used to manipulate the data within a database, including inserting, updating, and deleting records.
DDL commands include CREATE, ALTER, and DROP.
DML commands include INSERT, UPDATE, and DELETE.
DDL is used less frequently than DML in day-to-day database operations.
Q212. Explain me about heap sort and quick sort?
Q213. Do you think, C++ has any advantage over C ?
Q214. Do you know what is background check?
A background check is a process of investigating an individual's personal, professional, and criminal history.
Background checks are commonly conducted by employers before hiring a new employee.
They involve verifying information such as education, employment history, and references.
Criminal background checks search for any past convictions or legal issues.
Background checks can also include credit checks, drug tests, and social media screening.
The purpose of a background check ...read more
Q215. how u synchronize a thread? JVM function
Thread synchronization in JVM can be achieved using synchronized keyword or locks.
Use synchronized keyword to ensure only one thread can access a block of code at a time
Use locks to provide more fine-grained control over synchronization
Wait and notify methods can be used to coordinate between threads
Use volatile keyword to ensure changes made by one thread are visible to others
Atomic classes can be used for thread-safe operations
Q216. What is component in react.
Q217. What is the avarage of all natural numbers between 25 to 91
Q218. do u know what is cookie?
Q219. What is the purpose of String args[]?
Q220. why did you choose csbs
I chose CSBS because of its strong reputation in the industry and the opportunity to work on cutting-edge technologies.
CSBS has a strong reputation in the industry for producing top-notch professionals
I was attracted to the opportunity to work on cutting-edge technologies and innovative projects
I believe CSBS will provide me with the skills and knowledge needed to excel in the digital field
Q221. What is normalization? Why we need it?
Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.
Normalization helps in reducing data redundancy by breaking down data into smaller, logical tables.
It improves data integrity by ensuring that each piece of data is stored in only one place.
Normalization reduces the chances of data anomalies and inconsistencies.
It simplifies database maintenance and updates.
Normalization follows a set of rules called normal forms, ...read more
Q222. How gud are u with logics ?
Q223. Differences between structure and class
Q224. What is IOT and why IOT with example
IoT stands for Internet of Things. It refers to the network of physical devices connected to the internet, enabling them to collect and exchange data.
IoT allows devices to communicate and share data with each other over the internet.
It enables automation, remote monitoring, and control of various devices and systems.
Example: Smart home devices like thermostats, lights, and security cameras that can be controlled through a smartphone app.
Q225. Tell me something about UNIX os?
UNIX is a powerful and versatile operating system known for its stability, security, and scalability.
UNIX was developed in the 1970s at Bell Labs.
It is a multi-user, multitasking operating system.
UNIX provides a command-line interface and supports a wide range of programming languages.
It has a hierarchical file system and supports networking.
Popular variants of UNIX include Linux, macOS, and Solaris.
Q226. Swap two variables without using third variable?
Q227. What is Normalization?
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables.
It helps in reducing data redundancy by storing data in a structured way.
Normalization ensures data integrity by minimizing anomalies like insertion, update, and deletion anomalies.
There are different normal forms like 1NF, 2NF, 3NF, and BCNF that define the level of normalization.
Example: ...read more
Q228. What is design development process.
Q229. What is SQL and Why SQL..?
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language.
It is used to communicate with and manage relational databases.
SQL allows users to create, modify, and retrieve data from databases.
It provides a standardized way to interact with databases across different platforms.
SQL is essential for data analysis, reporting, and data-driven decision making.
Examples of SQL commands include SELECT, INSERT, UPDATE, ...read more
Q230. What is JVM?
Q231. Why is the inverter so called?
The inverter is so called because it converts direct current (DC) into alternating current (AC).
An inverter is an electronic device that changes the direction of current flow.
It is called an inverter because it 'inverts' the current from DC to AC.
Inverters are commonly used in solar power systems to convert DC electricity from solar panels into AC electricity for use in homes and businesses.
They are also used in uninterruptible power supplies (UPS) to convert DC battery power...read more
Q232. wht is virtual function? wht is frnd func? example
Q233. tell me two example of RDBMS ?
Q234. Why C is advanced than JAVA?
Q235. Give me some real life Examples of Object and Class.?
Q236. What is Virtual dom?
Q237. What is linked list?
Q238. Lifecycle of component in react.
Q239. What is object oriented programming?
Q240. an capacitor be charged using AC?
Yes, a capacitor can be charged using AC.
AC voltage can be used to charge a capacitor
The capacitor charges when the voltage is positive and discharges when it is negative
The charging and discharging of the capacitor creates an AC waveform
Examples include AC coupling in audio circuits and power factor correction in electrical systems
Q241. Why do we need Transformers?
Q242. What are loop control statements?
Q243. Why validation is important?
Validation is important to ensure accuracy, reliability, and credibility of data or information.
Validation helps to identify errors or inconsistencies in data, ensuring its accuracy.
It helps to maintain the reliability of data by confirming its consistency and completeness.
Validating information adds credibility to the data, making it more trustworthy for decision-making.
Examples: Validating survey responses to ensure they are accurate, verifying the authenticity of documents...read more
Q244. What is a stored procedure?
A stored procedure is a pre-written program that can be called to perform a specific task or set of tasks.
Stored procedures are stored in a database and can be called by applications or other procedures.
They can be used to perform complex data manipulation or to enforce business rules.
Stored procedures can improve performance by reducing network traffic and optimizing query execution.
Examples include procedures for inserting, updating, or deleting data, or for generating repo...read more
Q245. What is an identity column?
An identity column is a column in a database table that automatically generates a unique value for each new row.
Identity columns are commonly used as primary keys in database tables.
They are often used in conjunction with foreign keys to establish relationships between tables.
Identity columns can be configured to start at a specific value and increment by a specific amount.
In SQL Server, the IDENTITY property is used to create an identity column.
Identity columns can also be u...read more
Q246. Draw the 3-Tier Architecture of DBMS
3-Tier Architecture of DBMS includes presentation, application, and data layers.
Presentation Layer: User interface for interacting with the database (e.g. web browser)
Application Layer: Business logic and processing of user requests (e.g. server-side scripts)
Data Layer: Storage and retrieval of data from the database (e.g. SQL database)
Q247. What is Macro Programming in Excel ?
Q248. How many layers are present in Server?
Q249. what is stack,queue.what is semaphores
Stack and queue are data structures used to store and retrieve data. Semaphores are used for synchronization in concurrent programming.
Stack is a LIFO (Last In First Out) data structure. Example: browser history.
Queue is a FIFO (First In First Out) data structure. Example: waiting line.
Semaphore is a synchronization tool used to control access to a shared resource. Example: limiting the number of threads accessing a database.
Q250. what are the recent trends in IT?
Q251. What is the use of pointers?
Pointers are variables that store memory addresses. They are used to manipulate and access data directly in memory.
Pointers allow for efficient memory management and dynamic memory allocation.
They enable the passing of data between functions by reference.
Pointers are essential for implementing data structures like linked lists, trees, and graphs.
They can be used to access and modify elements in arrays or structures.
Pointers are used in low-level programming and system-level o...read more
Q252. What is FM, PM and AM?
FM, PM, and AM are different types of modulation techniques used in communication systems.
FM stands for Frequency Modulation, where the frequency of the carrier signal is varied in proportion to the message signal.
PM stands for Phase Modulation, where the phase of the carrier signal is varied in proportion to the message signal.
AM stands for Amplitude Modulation, where the amplitude of the carrier signal is varied in proportion to the message signal.
FM is commonly used in FM ...read more
Q253. Write a program to find the factorial of a number
Program to find the factorial of a number
Create a function that takes an integer input
Use a loop to multiply the number by decreasing integers until reaching 1
Return the final result as the factorial of the input number
Q254. Explain Overloading and Overriding.
Q255. Difference between JDK and JRE.
Q256. What is DBMS?
DBMS stands for Database Management System. It is a software system that allows users to define, create, maintain and control access to databases.
DBMS is used to manage large amounts of data efficiently.
It provides a way to store, organize, and retrieve data in a structured manner.
It allows multiple users to access the same data simultaneously.
Examples of DBMS include Oracle, MySQL, and Microsoft SQL Server.
Q257. Difference between PL/SQL and SQL?
PL/SQL is a procedural extension of SQL, allowing for more complex operations and logic.
PL/SQL allows for procedural programming, while SQL is used for querying and manipulating data.
PL/SQL can include variables, loops, and conditional statements, making it more powerful for complex tasks.
SQL is used for basic data manipulation like SELECT, INSERT, UPDATE, DELETE.
PL/SQL can be used to create stored procedures, functions, and triggers in Oracle databases.
Q258. Rotate an array clockwise by K
Q259. what is Android? ---told
Android is an operating system developed by Google for mobile devices.
Android is an open-source platform.
It is based on the Linux kernel.
It allows users to customize their devices with various apps and widgets.
Android supports multiple languages and has a large app ecosystem.
Popular Android devices include smartphones, tablets, and smart TVs.
Q260. What is preprocessing?
Preprocessing is the technique of cleaning and transforming raw data into a format suitable for analysis.
Preprocessing involves data cleaning, data transformation, and data reduction.
Data cleaning involves handling missing values, removing duplicates, and correcting inconsistent data.
Data transformation involves scaling, normalization, and encoding categorical variables.
Data reduction involves feature selection and feature extraction.
Examples of preprocessing techniques inclu...read more
Q261. What are temp tables?
Temp tables are temporary tables that are created and used within a session or a batch.
Temp tables are created using the CREATE TABLE statement with the # symbol before the table name.
They are used to store intermediate results during complex queries or stored procedures.
They are automatically dropped when the session or batch ends or when they are explicitly dropped using the DROP TABLE statement.
Temp tables can have indexes and constraints like regular tables.
Example: CREAT...read more
Q262. Which interesting topics in C?
Interesting topics in C include pointers, memory management, data structures, and algorithms.
Pointers and memory management
Data structures
Algorithms
Q263. What is clustering?
Clustering is a technique used in data mining and machine learning to group similar data points together.
Clustering is an unsupervised learning method.
It involves organizing data points into groups based on similarities.
Common clustering algorithms include K-means, hierarchical clustering, and DBSCAN.
Example: clustering customer data to identify different market segments.
Q264. What is linked lists?
Linked lists are data structures where each element points to the next element, forming a chain of nodes.
Each node in a linked list contains data and a reference to the next node
Linked lists can be singly linked (each node points to the next) or doubly linked (each node points to the next and previous)
Inserting or deleting elements in a linked list is efficient compared to arrays
Q265. Inserting node in a linked list?
To insert a node in a linked list, adjust pointers to connect new node with previous and next nodes.
Create a new node with the data to be inserted
Adjust pointers of new node to connect it with previous and next nodes
Update pointers of previous and next nodes to include the new node
Q266. Name of few sorting algorithms? ---told
Sorting algorithms are used to arrange data in a specific order.
Bubble Sort - repeatedly swaps adjacent elements if they are in wrong order
Selection Sort - selects the smallest element and swaps it with the first element
Insertion Sort - inserts each element into its proper place in the sorted array
Merge Sort - divides the array into two halves, sorts them separately and then merges them
Quick Sort - selects a pivot element and partitions the array around the pivot
Heap Sort - b...read more
Q267. Program for fibonacci series in c?
The Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Use a loop to iterate through the desired number of terms in the series.
Initialize the first two numbers in the series as 0 and 1.
Calculate the next number in the series by adding the previous two numbers.
Repeat the process until the desired number of terms is reached.
Q268. How do you weigh an elephant
Q269. what is deadlock? ---told
Q270. What is multithreading ?
Q271. diff bt c and c++? ---told
C is a procedural programming language while C++ is an extension of C with added features of object-oriented programming.
C is a procedural language, meaning it follows a step-by-step approach to solve a problem.
C++ is an extension of C and supports both procedural and object-oriented programming paradigms.
C++ introduces features like classes, objects, inheritance, and polymorphism that are not present in C.
C++ allows for the use of libraries and frameworks developed in C, mak...read more
Q272. What is an instance of a DBMS?
An instance of a DBMS is a specific installation of a database management system software.
An instance is a running copy of a DBMS software.
It can be installed on a single computer or a network of computers.
Each instance has its own set of databases and users.
Examples of DBMS instances include Oracle Database, Microsoft SQL Server, and MySQL.
Q273. Tell me something about DBMS?
Q274. Write the program of Fibonacci series and explain the logic.
Q275. What is Join operation in DBMS?
Q276. Why we go for DBMS?
DBMS helps in organizing and managing large amounts of data efficiently.
DBMS allows for data consistency and integrity
It provides security features to protect data from unauthorized access
DBMS enables data sharing and collaboration among multiple users
It improves data retrieval and manipulation through query optimization
Examples of DBMS include MySQL, Oracle, and SQL Server
Q277. Sketch analog and digital signals?
Analog signals are continuous and vary in amplitude, while digital signals are discrete and have only two states.
Analog signals are represented by a sine wave
Digital signals are represented by square waves
Analog signals can have infinite values
Digital signals have only two values - 0 and 1
Analog signals are susceptible to noise and interference
Digital signals are less susceptible to noise and interference
Q278. Different types of Constraints?
Constraints are limitations or rules that must be followed in order to achieve a desired outcome.
There are various types of constraints such as physical, logical, financial, time, and resource constraints.
Physical constraints refer to limitations related to space, equipment, or materials.
Logical constraints refer to limitations related to rules, regulations, or policies.
Financial constraints refer to limitations related to budget or funding.
Time constraints refer to limitatio...read more
Q279. Will u install this in ur system?
Yes, I will install it in my system.
I have researched about the software and found it useful.
I have checked the system requirements and my system meets them.
I have read reviews and feedback from other users and they are positive.
I have consulted with my IT department and they have approved the installation.
Q280. Tell me the name of some of the virus
Q281. Difference in normal and power switch ?
A normal switch is used to turn on/off a device, while a power switch is used to turn on/off the power supply to the device.
Normal switch controls the device's function, while power switch controls the power supply to the device.
Normal switch is usually a simple on/off switch, while power switch may have additional features like surge protection.
Normal switch is found on most devices, while power switch is usually found on larger devices like computers and home appliances.
Q282. what is polymorphism ?
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism is a fundamental concept in object-oriented programming.
It allows a single interface to be used for different types of objects.
Polymorphism can be achieved through method overriding and method overloading.
Example: A shape class with different subclasses like circle, square, and triangle. They can all be treated as shapes.
Example: A...read more
Q283. What is "Makefile" on Linux?
Makefile is a script file used on Linux to automate the compilation and building of software projects.
Makefile is a text file that contains a set of rules and commands for compiling and linking software.
It is commonly used in Linux development environments to automate the build process.
Makefile specifies dependencies between source files and the commands needed to compile them.
It allows developers to easily build and manage complex software projects.
Makefile is executed by th...read more
Q284. What are the storage classes?
Storage classes are used in programming languages to define the scope and lifetime of variables.
Storage classes determine where and how a variable is stored in memory.
There are typically four storage classes: auto, register, static, and extern.
The 'auto' storage class is the default and is used for local variables.
The 'register' storage class is used to define variables that should be stored in CPU registers for faster access.
The 'static' storage class is used for variables t...read more
Q285. What is indexing?
Indexing is the process of organizing data in a database or search engine to improve search efficiency.
Indexing creates a data structure that allows for faster retrieval of information.
It involves analyzing and storing the values of specific fields in a database or search engine.
Examples include creating an index on a column in a database table or using a search engine's index to quickly find relevant results.
Indexing can improve performance and speed up queries, but can also...read more
Q286. Do you love Programming?
Yes, I love programming because it allows me to create innovative solutions and solve complex problems.
I enjoy the challenge of problem-solving through coding
Programming allows me to bring my ideas to life
I find satisfaction in seeing my code work seamlessly in real-world applications
Q287. What are the ways to reduce attrition
Q288. what is router, bridge?
Q289. How does GSM system work?
Q290. Differences between GSM and CDMA ?
Q291. What is DBMS? ---told
Q292. what are joints? ---explained
Q293. what is dbms? ---told
Q294. What is fragmentation?
Q295. what is segmentation.
Segmentation is the process of dividing a larger market into smaller groups based on similar characteristics or needs.
Segmentation helps businesses target specific customer groups more effectively.
It allows for personalized marketing strategies and tailored product offerings.
Examples of segmentation include demographic (age, gender), geographic (location), psychographic (lifestyle), and behavioral (purchase history) segmentation.
Q296. Different security algorithms?
There are various security algorithms used to protect data and systems.
Symmetric-key algorithms (e.g. AES, DES)
Asymmetric-key algorithms (e.g. RSA, ECC)
Hashing algorithms (e.g. SHA-256, MD5)
Key exchange algorithms (e.g. Diffie-Hellman)
Digital signature algorithms (e.g. DSA, ECDSA)
Q297. What is a pointer?
A pointer is a variable that stores the memory address of another variable.
Pointers are used to indirectly access and manipulate data in memory.
They are commonly used in programming languages like C and C++.
Example: int *ptr; // declares a pointer to an integer variable
Q298. what is multiprocessing? ---told
Q299. What is normalization?
Q300. What is clipper and clamber?
Clipper and clamber are climbing techniques used in rock climbing.
Clipper involves using a carabiner to attach the rope to a bolt or piece of protection.
Clamber involves using hands and feet to climb up a rock face without the use of technical equipment.
Both techniques are commonly used in traditional rock climbing and sport climbing.
Clipper is used for attaching the rope to bolts while lead climbing.
Clamber is used for climbing up easy terrain without the need for ropes or p...read more
More about working at TCS
Top HR Questions asked in Upbott
Interview Process at Upbott
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month