i
TCS
Filter interviews by
I applied via campus placement at Bannari Amman Institute of Technology, Sathyamangalam and was interviewed before Apr 2020. There was 1 interview round.
I was interviewed in Aug 2016.
What people are saying about TCS
I applied via campus placement at Indian Institute of Technology (IIT), Chennai and was interviewed in Dec 2016. There were 5 interview rounds.
I am a highly motivated and experienced System Engineer with a passion for problem-solving and innovation.
I have a Bachelor's degree in Computer Science and over 5 years of experience in system engineering.
I am skilled in designing, implementing, and maintaining complex systems.
I have experience in working with various operating systems, including Windows, Linux, and Unix.
I am proficient in programming languages such a...
A milling process involves removing material from a workpiece using a rotating cutting tool.
Select appropriate cutting tool and workpiece material
Determine the cutting speed, feed rate, and depth of cut
Set up the milling machine and secure the workpiece
Start the machine and monitor the process for any issues
Inspect the finished product for accuracy and quality
Modeling an upsetting operation involves understanding process parameters and their relationships.
Upsetting is a metal forming process that involves compressing a metal workpiece to reduce its length and increase its diameter.
Process parameters include temperature, pressure, and deformation rate.
Temperature affects the material's flow stress and ductility, while pressure and deformation rate affect the material's strai...
Yes, I know coding.
I am proficient in programming languages such as Java, Python, and C++.
I have experience in developing and maintaining software applications.
I am familiar with software development methodologies such as Agile and Waterfall.
Yes, I am willing to learn coding if it is needed.
I have some basic knowledge of coding and am willing to improve my skills.
I am a quick learner and can adapt to new technologies easily.
I am open to taking courses or attending training sessions to improve my coding skills.
Learning coding will also help me better understand the systems I work with.
For example, I have experience with Python and SQL, and can learn other l
Yes, I am comfortable with working on different projects as per completion of each project.
I am adaptable and can quickly switch between projects
I enjoy learning new things and taking on new challenges
I am able to prioritize tasks and manage my time effectively
Examples: In my previous job, I worked on multiple projects simultaneously and was able to successfully complete them all within their respective deadlines
I am e...
Yes, I am comfortable with programming and algorithm development.
I have experience in programming languages such as Python, Java, and C++.
I have developed algorithms for various projects in my previous roles.
I am always willing to learn new programming languages and improve my skills.
I understand the importance of engineering and IT working together to achieve project goals.
TCS is a global IT services, consulting and business solutions organization.
TCS is one of the largest IT services companies in the world
It provides a wide range of services including consulting, application development, and infrastructure management
TCS has a strong presence in various industries such as banking, healthcare, and retail
It has won numerous awards for its services and innovation
TCS is headquartered in Mumb...
The technical interview was challenging but fair. I would rate it an 8 out of 10.
The interviewer asked a variety of technical questions related to the job.
I was given a few hypothetical scenarios to work through.
I was asked to explain my thought process and reasoning behind my answers.
Overall, the interview was a good test of my technical skills and problem-solving abilities.
TCS interview questions for designations
Stored procedures are pre-written SQL codes that can be saved and reused.
Stored procedures can improve database performance by reducing network traffic.
They can be used to enforce business rules and security measures.
They can be parameterized to accept input values and return output values.
Examples include procedures for inserting, updating, and deleting data.
They can also be used for complex operations such as data ag
Stored procedures offer advantages such as improved performance, security, and code reusability.
Stored procedures can reduce network traffic by executing multiple SQL statements at once.
They can also improve performance by pre-compiling SQL statements.
Stored procedures can enhance security by allowing access to only specific procedures rather than entire tables.
They promote code reusability by allowing multiple applica...
Functions return a value while stored procedures do not.
Functions are used to perform a specific task and return a value to the caller.
Stored procedures are used to execute a set of statements and do not return a value.
Functions can be used in SELECT, WHERE, and HAVING clauses.
Stored procedures can be used to modify data, but functions cannot.
Functions can be called from within a stored procedure.
A normal function is called directly in the code, while a stored procedure is invoked using a database query.
Normal function calling is done within the program code, while stored procedure invocation is done through a database query.
Normal functions are defined and called within the same programming language, while stored procedures are defined and invoked within a database management system.
Normal function calling is ...
Constructors are special methods used to initialize objects in a class.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
They can be used to set default values for object properties.
Constructors can be overloaded to accept different parameters.
Example: public class Car { public Car() { //constructor code here } }
A constructor is a special method used to initialize an object, while a method is a function that performs a specific task.
Constructors are called automatically when an object is created, while methods need to be called explicitly.
Constructors have the same name as the class, while methods can have any valid name.
Constructors do not have a return type, while methods can have a return type.
Constructors are used to set i...
Constructor is a special method used to initialize objects in a class.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
They can take parameters to initialize the object's properties.
They do not have a return type.
Multiple constructors can be defined with different parameters.
Example: public class Car { public Car(String make, String model) { ... } }
Assignment is assigning a value to a variable, while initialization is declaring and assigning a value to a variable.
Assignment changes the value of an existing variable, while initialization creates a new variable and assigns a value to it.
Initialization is done only once, while assignment can be done multiple times.
Example of initialization: int x = 5; Example of assignment: x = 10;
Initialization can also be done usi...
Code to allocate memory to an object
Use the 'new' keyword in C++ to allocate memory to an object
Use 'malloc' function in C to allocate memory to an object
In Java, memory is automatically allocated to an object using 'new' keyword
In Python, memory is automatically allocated to an object when it is created
DBMS stands for Database Management System. It is a software that manages and organizes data in a structured manner.
DBMS is a software system that allows users to create, retrieve, update, and manage databases.
It provides an interface for users to interact with the database and perform various operations.
DBMS ensures data integrity, security, and consistency.
It supports multiple users accessing the database simultaneou...
DBMS is a software system that manages databases, providing features like data storage, retrieval, and manipulation.
DBMS stands for Database Management System.
It provides a structured way to store and organize data.
DBMS allows multiple users to access and manipulate the data simultaneously.
It ensures data integrity and security through various mechanisms.
DBMS provides a query language to retrieve and manipulate data, s...
Deadlocks occur when two or more processes are unable to proceed because each is waiting for the other to finish.
Deadlocks happen when two or more processes are blocked and unable to proceed
Each process is waiting for a resource that is being held by another process
Deadlocks can be prevented by using techniques like resource allocation graphs and banker's algorithm
Examples of deadlocks include the dining philosophers p
Yes, phantom deadlocks are a type of deadlock that occur due to incorrect lock ordering.
Phantom deadlocks occur when multiple processes or threads attempt to acquire locks in a different order.
This can lead to a situation where each process is waiting for a lock held by another process, resulting in a deadlock.
Phantom deadlocks can be difficult to detect and reproduce as they are intermittent and depend on the timing o...
Procedural programming focuses on procedures and functions, while OOP emphasizes objects and classes.
Procedural programming uses a top-down approach, while OOP uses a bottom-up approach.
In procedural programming, data and functions are separate, while in OOP, they are encapsulated within objects.
Procedural programming is more suitable for small-scale programs, while OOP is better for large-scale projects.
C is a procedu...
JSP is a Java-based technology used for creating dynamic web pages. It allows embedding Java code within HTML pages.
JSP stands for JavaServer Pages.
It is a technology used for developing web applications.
JSP allows embedding Java code within HTML pages.
It provides a simplified way to create dynamic web content.
JSP files are compiled into servlets and executed on the server.
Advantages of JSP include easy integration wit...
PHP was chosen for its versatility, large community support, and ease of use.
PHP is a widely used scripting language with a large community of developers and extensive documentation.
It is known for its versatility and ability to integrate with various databases and web servers.
PHP is also relatively easy to learn and has a low learning curve compared to other languages like JSP.
While JSP may be considered more secure, ...
File System in C++ is used for managing files and directories, providing functions for file input/output operations.
C++ provides the
File streams can be used to read from and write to files.
Common file operations include opening, closing, reading, and writing files.
File streams can handle different file types such as text files and binary files.
File system functions like file e...
Paging is a memory management technique used by operating systems to manage memory usage.
Paging divides memory into fixed-size pages.
Pages are stored in physical memory or on disk.
When a process needs a page, it is loaded into physical memory.
If there is no space in physical memory, a page is swapped out to disk.
Paging allows for efficient use of memory and prevents processes from accessing memory they shouldn't.
Exampl...
Types of file systems in OS include FAT, NTFS, HFS+, ext2/3/4, and APFS.
FAT (File Allocation Table) is a simple file system used by older versions of Windows.
NTFS (New Technology File System) is a more advanced file system used by newer versions of Windows.
HFS+ (Hierarchical File System Plus) is used by Apple's macOS.
ext2/3/4 are file systems used by Linux.
APFS (Apple File System) is a newer file system used by Apple's
Developed an innovative system for monitoring and optimizing energy consumption in college buildings.
Designed and implemented a smart energy management system using IoT devices.
Developed algorithms to analyze energy usage patterns and identify areas for improvement.
Created a user-friendly web interface for real-time monitoring and control of energy consumption.
Collaborated with college administration to implement energ...
A thread is a lightweight unit of execution within a process, while a process is an instance of a program in execution.
A process has its own memory space, while threads share the same memory space within a process.
Processes are independent and isolated from each other, while threads share resources and can communicate with each other more easily.
Creating a new process is more resource-intensive than creating a new thre...
Cookies in PHP are small text files that are stored on the user's computer to track and store information about the user's activities on a website.
Cookies are used to remember user preferences and login information.
They can be set, retrieved, and deleted using PHP's setcookie(), $_COOKIE, and setcookie() functions respectively.
Cookies can have an expiration date and can be set to be accessible only over a secure connec...
Protocols are a set of rules that govern the communication between devices or systems.
Protocols define the format, timing, sequencing, and error checking of messages exchanged between devices.
Different types of protocols include network protocols (TCP/IP, HTTP, FTP), communication protocols (RS-232, USB, Bluetooth), and application protocols (SMTP, POP3, IMAP).
Network protocols govern the communication between devices ...
Experience certainty refers to the level of confidence and assurance gained through repeated exposure to a particular task or situation.
Experience certainty is achieved through repetition and familiarity.
It allows individuals to perform tasks with greater ease and efficiency.
For example, a pilot who has flown the same route multiple times will have a higher level of experience certainty compared to a pilot who is flyin...
I am a system engineer with expertise in designing and implementing complex IT infrastructures.
I have a Bachelor's degree in Computer Science.
I have 5 years of experience in system engineering.
I am proficient in various operating systems such as Windows, Linux, and Unix.
I have strong knowledge of networking protocols and security measures.
I have successfully implemented virtualization technologies like VMware and Hyper...
I am actively involved in various extra-curricular activities.
I participate in community service projects, such as volunteering at local shelters and organizing donation drives.
I am a member of a sports team and regularly participate in tournaments and matches.
I enjoy playing musical instruments and often perform at school events and talent shows.
I am part of a coding club where we collaborate on projects and participa...
A system engineer is responsible for designing, implementing, and maintaining computer systems and networks.
System engineers design and implement computer systems and networks
They ensure the systems are secure and reliable
They troubleshoot and resolve technical issues
They work with other IT professionals to ensure the systems meet business needs
Examples of systems they may work on include servers, databases, and cloud
I am a versatile freelancer with expertise in system engineering.
I have experience in designing and implementing complex systems.
I am skilled in troubleshooting and resolving technical issues.
I have worked on various projects involving network infrastructure and server management.
I am proficient in programming languages like Python and Java.
I have a strong understanding of cloud computing and virtualization technologie...
In my free time, I enjoy writing articles and blog posts on various technical topics.
I write articles and blog posts on system engineering best practices.
I write about emerging technologies and their impact on system engineering.
I contribute to technical forums and discussion boards by sharing my knowledge and experiences.
I occasionally write tutorials and guides to help others in the field.
I am currently working on a ...
I felt like an achiever when I successfully implemented a complex system upgrade.
Successfully implemented a complex system upgrade
Received positive feedback from colleagues and superiors
Achieved desired results within the given timeframe
Overcame challenges and obstacles during the implementation process
TCS bond agreement is a contract signed by employees to work for a certain period of time with the company.
TCS bond agreement is a legal contract between TCS and its employees.
Employees sign the bond agreement to work for a certain period of time with the company.
The bond period can range from 1 to 2 years depending on the role and level of the employee.
If an employee wishes to leave the company before the bond period ...
Get interview-ready with Top TCS Interview Questions
Networking refers to the process of connecting devices and systems to share information and resources.
Networking involves the use of hardware and software to connect devices and systems.
It allows for the sharing of information and resources such as files, printers, and internet access.
Networking can be done through wired or wireless connections.
Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth.
...
A router is a networking device that forwards data packets between computer networks.
A router operates at the network layer of the OSI model.
It uses routing tables to determine the best path for data packets to reach their destination.
Routers can connect multiple networks together, such as LANs and WANs.
They provide network address translation (NAT) to allow multiple devices to share a single public IP address.
Routers ...
Subnetting is the process of dividing a network into smaller subnetworks, called subnets, to improve network efficiency and security.
Subnetting allows for better utilization of IP addresses by dividing a network into smaller segments.
It helps in improving network performance by reducing network congestion.
Subnetting enhances network security by isolating different departments or devices within a network.
It enables effi...
Protocols are a set of rules and guidelines that govern the communication between devices or systems.
Protocols define the format and order of messages exchanged between devices.
They ensure reliable and efficient communication by specifying error detection and correction mechanisms.
Examples of protocols include TCP/IP, HTTP, SMTP, and FTP.
Protocols can operate at different layers of the network stack, such as the applic
Static protocols are fixed and do not change, while dynamic protocols can adapt to changing network conditions.
Static protocols are typically used in simple networks with predictable traffic patterns.
Dynamic protocols are used in complex networks with varying traffic patterns.
Examples of static protocols include ARP and RARP.
Examples of dynamic protocols include OSPF and BGP.
TCS is a leading global IT services company with a strong reputation and diverse opportunities for growth.
TCS has a strong reputation in the IT industry for delivering high-quality services and solutions.
TCS offers diverse opportunities for growth and career development.
TCS has a global presence, providing exposure to different cultures and working environments.
TCS values innovation and encourages employees to think cr...
I expect to receive proper training and support to transition into the IT field successfully.
I expect to be provided with relevant training and resources to learn the necessary skills for the role.
I hope for guidance and mentorship from experienced IT professionals within the company.
I am eager to contribute my non-IT skills and knowledge to the team, bringing a fresh perspective.
I am committed to putting in the effort...
R, L, and C are basic electronic components used in circuits for resistance, inductance, and capacitance respectively.
Resistors (R) limit current flow and reduce voltage
Inductors (L) store energy in a magnetic field and resist changes in current
Capacitors (C) store energy in an electric field and pass AC signals while blocking DC signals
These components are used in various circuits such as filters, oscillators, and amp
Passive components do not require an external power source, while active components do.
Passive components include resistors, capacitors, and inductors.
Active components include transistors, diodes, and integrated circuits.
Passive components do not amplify signals, while active components do.
Passive components are used to control the flow of electricity, while active components are used to create and amplify signals.
A switch is a networking device that connects devices together on a local area network (LAN) and forwards data packets between them.
Switches operate at the data link layer of the OSI model.
They use MAC addresses to forward data to the correct destination.
Switches can improve network performance by reducing network congestion and collisions.
Examples of switches include Ethernet switches, LAN switches, and network switch
LAN, MAN, WAN, PAN are types of computer networks that differ in their geographical coverage and purpose.
LAN (Local Area Network) is a network that covers a small area like a home, office, or building.
MAN (Metropolitan Area Network) is a network that covers a larger area like a city or town.
WAN (Wide Area Network) is a network that covers a large geographical area like a country or the whole world.
PAN (Personal Area Ne...
Potential difference is the difference in electric potential between two points in an electric field.
Potential difference is measured in volts (V)
It is the work done per unit charge to move a charge from one point to another
It is the driving force that causes current to flow in a circuit
Potential difference can be calculated using Ohm's law: V = IR
A battery creates a potential difference between its terminals to power
A modem is a device that modulates and demodulates signals to enable communication between devices over a network.
Modulates digital signals into analog signals for transmission over telephone lines
Demodulates analog signals back into digital signals for use by the receiving device
Can be used for dial-up internet connections or to connect to a local area network (LAN)
Examples include cable modems, DSL modems, and wirele
I am a system engineer with experience in designing and implementing complex systems.
I have a degree in computer engineering
I have worked on projects involving network infrastructure design and implementation
I am proficient in programming languages such as Java and Python
I have experience with cloud computing platforms such as AWS and Azure
I am a quick learner and enjoy working in a team environment
My academics were affected by personal circumstances and health issues.
I faced some personal challenges during my academic years
I had to take a break from studies due to health issues
I have since worked hard to improve my skills and knowledge
I have gained practical experience through internships and projects
I have the necessary technical skills and experience to excel in this role.
I have a strong background in systems engineering and have successfully completed several complex projects.
I am a quick learner and am always eager to expand my knowledge and skills.
I am a team player and work well with others to achieve common goals.
I am highly organized and detail-oriented, ensuring that all tasks are completed accurately and ...
Yes, I am willing to work in night shifts if required.
I understand that as a system engineer, there may be times when working in night shifts is necessary to ensure the smooth functioning of the system.
I am flexible and adaptable to changing work schedules and can manage my time effectively to ensure that I am well-rested and alert during night shifts.
I have prior experience working in night shifts and understand the c...
I have worked on multiple projects during my BE and TE.
During my BE, I worked on a project to develop a web-based attendance management system for a college.
In this project, I was responsible for designing the database schema, developing the front-end using HTML, CSS, and JavaScript, and implementing the back-end using PHP and MySQL.
The system allowed students to mark their attendance online and generated reports for f...
My favorite subject is computer networks.
I enjoy studying the different protocols and technologies used in computer networks.
I find it fascinating how data is transmitted and routed across networks.
I have hands-on experience in configuring and troubleshooting network devices.
I have worked on projects involving network design and optimization.
I am familiar with concepts like IP addressing, subnetting, and VLANs.
Program for division and multiplication in 8085 processor.
For multiplication, use MUL instruction with 8-bit operand.
For division, use DIV instruction with 8-bit dividend and 16-bit divisor.
Store the result in appropriate registers or memory locations.
Example: To multiply two numbers in registers B and C, use MUL C instruction.
Example: To divide two numbers in registers A and B, use DIV B instruction.
3 Interview rounds
based on 12.1k reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.6k
salaries
| ₹5.1 L/yr - ₹15.9 L/yr |
AST Consultant
51.3k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.9k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.8k
salaries
| ₹8.9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture