Add office photos
Engaged Employer

TCS

3.7
based on 91.4k Reviews
Video summary
Filter interviews by

400+ Upbott Interview Questions and Answers

Updated 11 Mar 2025
Popular Designations

Q201. Draw different types of gate with there circuit diagram

Add your answer

Q202. What is the use of router?

Ans.

A router is a networking device that forwards data packets between computer networks.

  • Routers connect multiple devices to the internet or other networks.

  • They use IP addresses to route data to the correct destination.

  • Routers can also provide security by blocking unauthorized access to a network.

  • Examples of routers include home Wi-Fi routers, enterprise routers, and core routers used by internet service providers.

Add your answer

Q203. What is Public static void main?

Add your answer

Q204. What do you think about DBMS?

Ans.

DBMS is a crucial tool for managing large amounts of data efficiently.

  • DBMS stands for Database Management System

  • It helps in organizing, storing, and retrieving data

  • Examples include MySQL, Oracle, and Microsoft SQL Server

Add your answer
Discover Upbott interview dos and don'ts from real experiences

Q205. write a code on reverse of the string

Ans.

Code to reverse a string

  • Use a loop to iterate through the characters of the string

  • Swap the characters from start to end of the string

  • Continue swapping until you reach the middle of the string

Add your answer

Q206. Explain all normal forms?Conditions to avoid deadlock?

Add your answer
Are these interview questions helpful?

Q207. Comment on its time complexity.

Add your answer

Q208. What are object oriented conepts?

Ans.

Object oriented concepts are programming concepts that focus on objects and their interactions.

  • Encapsulation - bundling data and methods that operate on that data within a single unit

  • Inheritance - creating new classes from existing ones, inheriting their properties and methods

  • Polymorphism - the ability of objects to take on many forms or have multiple behaviors

  • Abstraction - hiding implementation details and only showing relevant information to the user

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. What is Data Structure? ---told

Add your answer

Q210. what is regression testing? ---told

Add your answer

Q211. What does one mean by DDL, DML?

Ans.

DDL stands for Data Definition Language and DML stands for Data Manipulation Language.

  • DDL is used to define the structure of a database, including tables, columns, and constraints.

  • DML is used to manipulate the data within a database, including inserting, updating, and deleting records.

  • DDL commands include CREATE, ALTER, and DROP.

  • DML commands include INSERT, UPDATE, and DELETE.

  • DDL is used less frequently than DML in day-to-day database operations.

Add your answer

Q212. Explain me about heap sort and quick sort?

Add your answer

Q213. Do you think, C++ has any advantage over C ?

Add your answer

Q214. Do you know what is background check?

Ans.

A background check is a process of investigating an individual's personal, professional, and criminal history.

  • Background checks are commonly conducted by employers before hiring a new employee.

  • They involve verifying information such as education, employment history, and references.

  • Criminal background checks search for any past convictions or legal issues.

  • Background checks can also include credit checks, drug tests, and social media screening.

  • The purpose of a background check ...read more

Add your answer

Q215. how u synchronize a thread? JVM function

Ans.

Thread synchronization in JVM can be achieved using synchronized keyword or locks.

  • Use synchronized keyword to ensure only one thread can access a block of code at a time

  • Use locks to provide more fine-grained control over synchronization

  • Wait and notify methods can be used to coordinate between threads

  • Use volatile keyword to ensure changes made by one thread are visible to others

  • Atomic classes can be used for thread-safe operations

Add your answer

Q216. What is component in react.

Add your answer

Q217. What is the avarage of all natural numbers between 25 to 91

Add your answer

Q218. do u know what is cookie?

Add your answer

Q219. What is the purpose of String args[]?

Add your answer

Q220. why did you choose csbs

Ans.

I chose CSBS because of its strong reputation in the industry and the opportunity to work on cutting-edge technologies.

  • CSBS has a strong reputation in the industry for producing top-notch professionals

  • I was attracted to the opportunity to work on cutting-edge technologies and innovative projects

  • I believe CSBS will provide me with the skills and knowledge needed to excel in the digital field

Add your answer

Q221. What is normalization? Why we need it?

Ans.

Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.

  • Normalization helps in reducing data redundancy by breaking down data into smaller, logical tables.

  • It improves data integrity by ensuring that each piece of data is stored in only one place.

  • Normalization reduces the chances of data anomalies and inconsistencies.

  • It simplifies database maintenance and updates.

  • Normalization follows a set of rules called normal forms, ...read more

Add your answer

Q222. How gud are u with logics ?

Add your answer

Q223. Differences between structure and class

Add your answer

Q224. What is IOT and why IOT with example

Ans.

IoT stands for Internet of Things. It refers to the network of physical devices connected to the internet, enabling them to collect and exchange data.

  • IoT allows devices to communicate and share data with each other over the internet.

  • It enables automation, remote monitoring, and control of various devices and systems.

  • Example: Smart home devices like thermostats, lights, and security cameras that can be controlled through a smartphone app.

Add your answer

Q225. Tell me something about UNIX os?

Ans.

UNIX is a powerful and versatile operating system known for its stability, security, and scalability.

  • UNIX was developed in the 1970s at Bell Labs.

  • It is a multi-user, multitasking operating system.

  • UNIX provides a command-line interface and supports a wide range of programming languages.

  • It has a hierarchical file system and supports networking.

  • Popular variants of UNIX include Linux, macOS, and Solaris.

Add your answer

Q226. Swap two variables without using third variable?

Add your answer

Q227. What is Normalization?

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down data into smaller, more manageable tables.

  • It helps in reducing data redundancy by storing data in a structured way.

  • Normalization ensures data integrity by minimizing anomalies like insertion, update, and deletion anomalies.

  • There are different normal forms like 1NF, 2NF, 3NF, and BCNF that define the level of normalization.

  • Example: ...read more

Add your answer

Q228. What is design development process.

Add your answer

Q229. What is SQL and Why SQL..?

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language.

  • It is used to communicate with and manage relational databases.

  • SQL allows users to create, modify, and retrieve data from databases.

  • It provides a standardized way to interact with databases across different platforms.

  • SQL is essential for data analysis, reporting, and data-driven decision making.

  • Examples of SQL commands include SELECT, INSERT, UPDATE, ...read more

Add your answer

Q230. What is JVM?

Add your answer

Q231. Why is the inverter so called?

Ans.

The inverter is so called because it converts direct current (DC) into alternating current (AC).

  • An inverter is an electronic device that changes the direction of current flow.

  • It is called an inverter because it 'inverts' the current from DC to AC.

  • Inverters are commonly used in solar power systems to convert DC electricity from solar panels into AC electricity for use in homes and businesses.

  • They are also used in uninterruptible power supplies (UPS) to convert DC battery power...read more

Add your answer

Q232. wht is virtual function? wht is frnd func? example

Add your answer

Q233. tell me two example of RDBMS ?

Add your answer

Q234. Why C is advanced than JAVA?

Add your answer

Q235. Give me some real life Examples of Object and Class.?

Add your answer

Q236. What is Virtual dom?

Add your answer

Q237. What is linked list?

Add your answer

Q238. Lifecycle of component in react.

Add your answer

Q239. What is object oriented programming?

Add your answer

Q240. an capacitor be charged using AC?

Ans.

Yes, a capacitor can be charged using AC.

  • AC voltage can be used to charge a capacitor

  • The capacitor charges when the voltage is positive and discharges when it is negative

  • The charging and discharging of the capacitor creates an AC waveform

  • Examples include AC coupling in audio circuits and power factor correction in electrical systems

Add your answer

Q241. Why do we need Transformers?

Add your answer

Q242. What are loop control statements?

Add your answer

Q243. Why validation is important?

Ans.

Validation is important to ensure accuracy, reliability, and credibility of data or information.

  • Validation helps to identify errors or inconsistencies in data, ensuring its accuracy.

  • It helps to maintain the reliability of data by confirming its consistency and completeness.

  • Validating information adds credibility to the data, making it more trustworthy for decision-making.

  • Examples: Validating survey responses to ensure they are accurate, verifying the authenticity of documents...read more

Add your answer

Q244. What is a stored procedure?

Ans.

A stored procedure is a pre-written program that can be called to perform a specific task or set of tasks.

  • Stored procedures are stored in a database and can be called by applications or other procedures.

  • They can be used to perform complex data manipulation or to enforce business rules.

  • Stored procedures can improve performance by reducing network traffic and optimizing query execution.

  • Examples include procedures for inserting, updating, or deleting data, or for generating repo...read more

Add your answer

Q245. What is an identity column?

Ans.

An identity column is a column in a database table that automatically generates a unique value for each new row.

  • Identity columns are commonly used as primary keys in database tables.

  • They are often used in conjunction with foreign keys to establish relationships between tables.

  • Identity columns can be configured to start at a specific value and increment by a specific amount.

  • In SQL Server, the IDENTITY property is used to create an identity column.

  • Identity columns can also be u...read more

Add your answer

Q246. Draw the 3-Tier Architecture of DBMS

Ans.

3-Tier Architecture of DBMS includes presentation, application, and data layers.

  • Presentation Layer: User interface for interacting with the database (e.g. web browser)

  • Application Layer: Business logic and processing of user requests (e.g. server-side scripts)

  • Data Layer: Storage and retrieval of data from the database (e.g. SQL database)

View 1 answer

Q247. What is Macro Programming in Excel ?

Add your answer

Q248. How many layers are present in Server?

Add your answer

Q249. what is stack,queue.what is semaphores

Ans.

Stack and queue are data structures used to store and retrieve data. Semaphores are used for synchronization in concurrent programming.

  • Stack is a LIFO (Last In First Out) data structure. Example: browser history.

  • Queue is a FIFO (First In First Out) data structure. Example: waiting line.

  • Semaphore is a synchronization tool used to control access to a shared resource. Example: limiting the number of threads accessing a database.

Add your answer

Q250. what are the recent trends in IT?

Add your answer

Q251. What is the use of pointers?

Ans.

Pointers are variables that store memory addresses. They are used to manipulate and access data directly in memory.

  • Pointers allow for efficient memory management and dynamic memory allocation.

  • They enable the passing of data between functions by reference.

  • Pointers are essential for implementing data structures like linked lists, trees, and graphs.

  • They can be used to access and modify elements in arrays or structures.

  • Pointers are used in low-level programming and system-level o...read more

Add your answer

Q252. What is FM, PM and AM?

Ans.

FM, PM, and AM are different types of modulation techniques used in communication systems.

  • FM stands for Frequency Modulation, where the frequency of the carrier signal is varied in proportion to the message signal.

  • PM stands for Phase Modulation, where the phase of the carrier signal is varied in proportion to the message signal.

  • AM stands for Amplitude Modulation, where the amplitude of the carrier signal is varied in proportion to the message signal.

  • FM is commonly used in FM ...read more

Add your answer

Q253. Write a program to find the factorial of a number

Ans.

Program to find the factorial of a number

  • Create a function that takes an integer input

  • Use a loop to multiply the number by decreasing integers until reaching 1

  • Return the final result as the factorial of the input number

Add your answer

Q254. Explain Overloading and Overriding.

Add your answer

Q255. Difference between JDK and JRE.

Add your answer

Q256. What is DBMS?

Ans.

DBMS stands for Database Management System. It is a software system that allows users to define, create, maintain and control access to databases.

  • DBMS is used to manage large amounts of data efficiently.

  • It provides a way to store, organize, and retrieve data in a structured manner.

  • It allows multiple users to access the same data simultaneously.

  • Examples of DBMS include Oracle, MySQL, and Microsoft SQL Server.

View 1 answer

Q257. Difference between PL/SQL and SQL?

Ans.

PL/SQL is a procedural extension of SQL, allowing for more complex operations and logic.

  • PL/SQL allows for procedural programming, while SQL is used for querying and manipulating data.

  • PL/SQL can include variables, loops, and conditional statements, making it more powerful for complex tasks.

  • SQL is used for basic data manipulation like SELECT, INSERT, UPDATE, DELETE.

  • PL/SQL can be used to create stored procedures, functions, and triggers in Oracle databases.

Add your answer

Q258. Rotate an array clockwise by K

Add your answer

Q259. what is Android? ---told

Ans.

Android is an operating system developed by Google for mobile devices.

  • Android is an open-source platform.

  • It is based on the Linux kernel.

  • It allows users to customize their devices with various apps and widgets.

  • Android supports multiple languages and has a large app ecosystem.

  • Popular Android devices include smartphones, tablets, and smart TVs.

Add your answer

Q260. What is preprocessing?

Ans.

Preprocessing is the technique of cleaning and transforming raw data into a format suitable for analysis.

  • Preprocessing involves data cleaning, data transformation, and data reduction.

  • Data cleaning involves handling missing values, removing duplicates, and correcting inconsistent data.

  • Data transformation involves scaling, normalization, and encoding categorical variables.

  • Data reduction involves feature selection and feature extraction.

  • Examples of preprocessing techniques inclu...read more

Add your answer

Q261. What are temp tables?

Ans.

Temp tables are temporary tables that are created and used within a session or a batch.

  • Temp tables are created using the CREATE TABLE statement with the # symbol before the table name.

  • They are used to store intermediate results during complex queries or stored procedures.

  • They are automatically dropped when the session or batch ends or when they are explicitly dropped using the DROP TABLE statement.

  • Temp tables can have indexes and constraints like regular tables.

  • Example: CREAT...read more

Add your answer

Q262. Which interesting topics in C?

Ans.

Interesting topics in C include pointers, memory management, data structures, and algorithms.

  • Pointers and memory management

  • Data structures

  • Algorithms

Add your answer

Q263. What is clustering?

Ans.

Clustering is a technique used in data mining and machine learning to group similar data points together.

  • Clustering is an unsupervised learning method.

  • It involves organizing data points into groups based on similarities.

  • Common clustering algorithms include K-means, hierarchical clustering, and DBSCAN.

  • Example: clustering customer data to identify different market segments.

Add your answer

Q264. What is linked lists?

Ans.

Linked lists are data structures where each element points to the next element, forming a chain of nodes.

  • Each node in a linked list contains data and a reference to the next node

  • Linked lists can be singly linked (each node points to the next) or doubly linked (each node points to the next and previous)

  • Inserting or deleting elements in a linked list is efficient compared to arrays

Add your answer

Q265. Inserting node in a linked list?

Ans.

To insert a node in a linked list, adjust pointers to connect new node with previous and next nodes.

  • Create a new node with the data to be inserted

  • Adjust pointers of new node to connect it with previous and next nodes

  • Update pointers of previous and next nodes to include the new node

Add your answer

Q266. Name of few sorting algorithms? ---told

Ans.

Sorting algorithms are used to arrange data in a specific order.

  • Bubble Sort - repeatedly swaps adjacent elements if they are in wrong order

  • Selection Sort - selects the smallest element and swaps it with the first element

  • Insertion Sort - inserts each element into its proper place in the sorted array

  • Merge Sort - divides the array into two halves, sorts them separately and then merges them

  • Quick Sort - selects a pivot element and partitions the array around the pivot

  • Heap Sort - b...read more

Add your answer

Q267. Program for fibonacci series in c?

Ans.

The Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Use a loop to iterate through the desired number of terms in the series.

  • Initialize the first two numbers in the series as 0 and 1.

  • Calculate the next number in the series by adding the previous two numbers.

  • Repeat the process until the desired number of terms is reached.

Add your answer

Q268. How do you weigh an elephant

Add your answer

Q269. what is deadlock? ---told

Add your answer

Q270. What is multithreading ?

Add your answer

Q271. diff bt c and c++? ---told

Ans.

C is a procedural programming language while C++ is an extension of C with added features of object-oriented programming.

  • C is a procedural language, meaning it follows a step-by-step approach to solve a problem.

  • C++ is an extension of C and supports both procedural and object-oriented programming paradigms.

  • C++ introduces features like classes, objects, inheritance, and polymorphism that are not present in C.

  • C++ allows for the use of libraries and frameworks developed in C, mak...read more

Add your answer

Q272. What is an instance of a DBMS?

Ans.

An instance of a DBMS is a specific installation of a database management system software.

  • An instance is a running copy of a DBMS software.

  • It can be installed on a single computer or a network of computers.

  • Each instance has its own set of databases and users.

  • Examples of DBMS instances include Oracle Database, Microsoft SQL Server, and MySQL.

Add your answer

Q273. Tell me something about DBMS?

Add your answer

Q274. Write the program of Fibonacci series and explain the logic.

Add your answer

Q275. What is Join operation in DBMS?

Add your answer

Q276. Why we go for DBMS?

Ans.

DBMS helps in organizing and managing large amounts of data efficiently.

  • DBMS allows for data consistency and integrity

  • It provides security features to protect data from unauthorized access

  • DBMS enables data sharing and collaboration among multiple users

  • It improves data retrieval and manipulation through query optimization

  • Examples of DBMS include MySQL, Oracle, and SQL Server

Add your answer

Q277. Sketch analog and digital signals?

Ans.

Analog signals are continuous and vary in amplitude, while digital signals are discrete and have only two states.

  • Analog signals are represented by a sine wave

  • Digital signals are represented by square waves

  • Analog signals can have infinite values

  • Digital signals have only two values - 0 and 1

  • Analog signals are susceptible to noise and interference

  • Digital signals are less susceptible to noise and interference

Add your answer

Q278. Different types of Constraints?

Ans.

Constraints are limitations or rules that must be followed in order to achieve a desired outcome.

  • There are various types of constraints such as physical, logical, financial, time, and resource constraints.

  • Physical constraints refer to limitations related to space, equipment, or materials.

  • Logical constraints refer to limitations related to rules, regulations, or policies.

  • Financial constraints refer to limitations related to budget or funding.

  • Time constraints refer to limitatio...read more

Add your answer

Q279. Will u install this in ur system?

Ans.

Yes, I will install it in my system.

  • I have researched about the software and found it useful.

  • I have checked the system requirements and my system meets them.

  • I have read reviews and feedback from other users and they are positive.

  • I have consulted with my IT department and they have approved the installation.

Add your answer

Q280. Tell me the name of some of the virus

Add your answer

Q281. Difference in normal and power switch ?

Ans.

A normal switch is used to turn on/off a device, while a power switch is used to turn on/off the power supply to the device.

  • Normal switch controls the device's function, while power switch controls the power supply to the device.

  • Normal switch is usually a simple on/off switch, while power switch may have additional features like surge protection.

  • Normal switch is found on most devices, while power switch is usually found on larger devices like computers and home appliances.

Add your answer

Q282. what is polymorphism ?

Ans.

Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.

  • Polymorphism is a fundamental concept in object-oriented programming.

  • It allows a single interface to be used for different types of objects.

  • Polymorphism can be achieved through method overriding and method overloading.

  • Example: A shape class with different subclasses like circle, square, and triangle. They can all be treated as shapes.

  • Example: A...read more

Add your answer

Q283. What is "Makefile" on Linux?

Ans.

Makefile is a script file used on Linux to automate the compilation and building of software projects.

  • Makefile is a text file that contains a set of rules and commands for compiling and linking software.

  • It is commonly used in Linux development environments to automate the build process.

  • Makefile specifies dependencies between source files and the commands needed to compile them.

  • It allows developers to easily build and manage complex software projects.

  • Makefile is executed by th...read more

Add your answer

Q284. What are the storage classes?

Ans.

Storage classes are used in programming languages to define the scope and lifetime of variables.

  • Storage classes determine where and how a variable is stored in memory.

  • There are typically four storage classes: auto, register, static, and extern.

  • The 'auto' storage class is the default and is used for local variables.

  • The 'register' storage class is used to define variables that should be stored in CPU registers for faster access.

  • The 'static' storage class is used for variables t...read more

Add your answer

Q285. What is indexing?

Ans.

Indexing is the process of organizing data in a database or search engine to improve search efficiency.

  • Indexing creates a data structure that allows for faster retrieval of information.

  • It involves analyzing and storing the values of specific fields in a database or search engine.

  • Examples include creating an index on a column in a database table or using a search engine's index to quickly find relevant results.

  • Indexing can improve performance and speed up queries, but can also...read more

Add your answer

Q286. Do you love Programming?

Ans.

Yes, I love programming because it allows me to create innovative solutions and solve complex problems.

  • I enjoy the challenge of problem-solving through coding

  • Programming allows me to bring my ideas to life

  • I find satisfaction in seeing my code work seamlessly in real-world applications

Add your answer

Q287. What are the ways to reduce attrition

Add your answer

Q288. what is router, bridge?

Add your answer

Q289. How does GSM system work?

Add your answer

Q290. Differences between GSM and CDMA ?

Add your answer

Q291. What is DBMS? ---told

Add your answer

Q292. what are joints? ---explained

Add your answer

Q293. what is dbms? ---told

Add your answer

Q294. What is fragmentation?

Add your answer

Q295. what is segmentation.

Ans.

Segmentation is the process of dividing a larger market into smaller groups based on similar characteristics or needs.

  • Segmentation helps businesses target specific customer groups more effectively.

  • It allows for personalized marketing strategies and tailored product offerings.

  • Examples of segmentation include demographic (age, gender), geographic (location), psychographic (lifestyle), and behavioral (purchase history) segmentation.

Add your answer

Q296. Different security algorithms?

Ans.

There are various security algorithms used to protect data and systems.

  • Symmetric-key algorithms (e.g. AES, DES)

  • Asymmetric-key algorithms (e.g. RSA, ECC)

  • Hashing algorithms (e.g. SHA-256, MD5)

  • Key exchange algorithms (e.g. Diffie-Hellman)

  • Digital signature algorithms (e.g. DSA, ECDSA)

Add your answer

Q297. What is a pointer?

Ans.

A pointer is a variable that stores the memory address of another variable.

  • Pointers are used to indirectly access and manipulate data in memory.

  • They are commonly used in programming languages like C and C++.

  • Example: int *ptr; // declares a pointer to an integer variable

View 1 answer

Q298. what is multiprocessing? ---told

Add your answer

Q299. What is normalization?

Add your answer

Q300. What is clipper and clamber?

Ans.

Clipper and clamber are climbing techniques used in rock climbing.

  • Clipper involves using a carabiner to attach the rope to a bolt or piece of protection.

  • Clamber involves using hands and feet to climb up a rock face without the use of technical equipment.

  • Both techniques are commonly used in traditional rock climbing and sport climbing.

  • Clipper is used for attaching the rope to bolts while lead climbing.

  • Clamber is used for climbing up easy terrain without the need for ropes or p...read more

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top TCS Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter