TCS
100+ Bottomline Interview Questions and Answers
Q1. How charging protocol works in electric vehicle and what is purpose of charging pin at charging inlet
Charging protocol in EVs and purpose of charging pin at inlet
Charging protocol determines how the battery is charged and how much power is delivered
Charging pin is used to connect the charging cable to the vehicle's charging inlet
Charging protocols include AC charging, DC charging, and wireless charging
Charging protocols also include different charging levels such as Level 1, Level 2, and Level 3
Purpose of charging pin is to ensure safe and reliable transfer of power from the...read more
Q2. What is basic function of firewall.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.
It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.
Firewalls can be hardware or software-based and can be configured to block specific types of ...read more
Q3. What is the difference between Software Development Life Cycle (SDLC) and Software Testing Life Cycle (STLC)?
SDLC focuses on the development of software, while STLC focuses on the testing of software.
SDLC involves planning, designing, coding, and deployment of software.
STLC involves test planning, test case development, test execution, and defect tracking.
SDLC is more focused on the overall software development process, while STLC is more focused on ensuring the quality of the software.
SDLC is a broader process that includes STLC as one of its phases.
Example: In SDLC, a software tea...read more
Q4. How would you handle a bug in a production environment in front of a client?
I would calmly acknowledge the bug, communicate the issue and steps being taken to resolve it, and work quickly to fix it without causing panic.
Acknowledge the bug calmly and professionally
Communicate the issue and steps being taken to resolve it
Work quickly to fix the bug without causing panic
Provide updates to the client on the progress
Q5. What are the different types of Selenium components, and can you explain each one?
Selenium components include Selenium IDE, Selenium WebDriver, Selenium Grid, and Selenium RC.
Selenium IDE: Record and playback tool for creating test scripts without programming.
Selenium WebDriver: Automation tool for writing test scripts in various programming languages.
Selenium Grid: Tool for running tests in parallel on multiple machines or browsers.
Selenium RC (Remote Control): Deprecated tool for running tests in multiple browsers.
Q6. What is middleware in nodejs? Explain with examples.
Middleware in Node.js is a function that sits between the server and the client and performs various tasks.
Middleware functions can be used to handle requests, modify responses, and perform authentication and authorization.
Examples of middleware in Node.js include body-parser, cookie-parser, and express-session.
Middleware functions are executed in the order they are defined in the code.
Middleware can be used to handle errors and pass them to the error handling middleware.
Q7. Explain in detail about how you configure your api w.r.t frontend.
API configuration for frontend
Define API endpoints and methods
Ensure API responses are in the correct format for frontend
Implement authentication and authorization
Optimize API performance for frontend usage
Document API usage for frontend developers
Q8. What is Control Coupling and Data Coupling? Explain the difference between them
Control coupling and data coupling are two types of coupling in software engineering.
Control coupling occurs when one module controls the flow of another module through parameters or flags.
Data coupling occurs when two modules share data through parameters or global variables.
Control coupling is considered more tightly coupled than data coupling.
Examples of control coupling include passing a flag to a function to determine its behavior, or using a return value to control the ...read more
Q9. What is the difference between Router and firewall
Routers connect networks while firewalls protect networks from unauthorized access.
Routers direct traffic between networks while firewalls filter traffic based on predefined rules.
Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.
Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.
Routers can be used to segment networks while firewalls can be used to block malicious traffic.
Routers are essent...read more
Q10. Which are the difference Routing protocols
Routing protocols are used to determine the best path for data to travel in a network.
Distance Vector protocols: RIP, IGRP, EIGRP
Link State protocols: OSPF, IS-IS
Hybrid protocols: BGP
Path Vector protocols: BGP
IGP vs EGP
Q11. What is the difference between retesting and regression testing?
Retesting focuses on testing the same functionality again, while regression testing focuses on testing the impact of changes on existing functionalities.
Retesting is done to ensure that a specific bug or issue has been fixed properly.
Regression testing is done to ensure that new code changes have not adversely affected existing functionalities.
Retesting is usually performed by the same tester who found the bug, while regression testing can be performed by any tester.
Examples:...read more
Q12. What tools are available in the market for automation testing?
Some popular tools for automation testing include Selenium, Appium, JUnit, TestNG, and Cucumber.
Selenium: widely used for web application testing
Appium: for mobile application testing
JUnit: for unit testing in Java
TestNG: for testing in Java
Cucumber: for behavior-driven development testing
Q13. What is the difference between smoke testing and sanity testing?
Smoke testing is a preliminary test to check if the software build is stable, while sanity testing is a subset of regression testing to verify specific functionality.
Smoke testing is done to ensure the critical functionalities of the software are working fine after a build, while sanity testing is done to verify specific changes or fixes.
Smoke testing is a shallow and wide approach to testing, covering all major areas of the software, while sanity testing is a focused and nar...read more
Q14. Which are the BGP attributes
BGP attributes are used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router on the path
Local Preference is used to indicate the preferred path for outbound traffic
MED (Multi-Exit Discriminator) is used to indicate the preferred path for inbound traffic
Origin ind...read more
Q15. What is encapsulation in the context of object-oriented programming?
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit, known as a class.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for data hiding, which prevents outside code from directly accessing an object's internal state.
Methods within a class can be used to control access to the data, ensuring that it is only modified in a controlled manner.
Encapsulation promotes code reusability ...read more
Q16. Difference between SQL and NoSql database?
SQL databases are relational and use structured query language, while NoSQL databases are non-relational and use various data models.
SQL databases are based on a fixed schema, while NoSQL databases are schema-less.
SQL databases use tables to store data, while NoSQL databases use various data models like key-value, document, columnar, or graph.
SQL databases are better suited for complex queries and structured data, while NoSQL databases are more flexible and scalable for unstr...read more
Q17. What are the lifecycle hooks in Angular and how do they function?
Lifecycle hooks in Angular allow developers to tap into key events in a component's lifecycle for custom behavior.
ngOnInit: Called once after the first ngOnChanges. Ideal for initialization logic. Example: Fetching data from a service.
ngOnChanges: Invoked before ngOnInit and whenever one or more data-bound input properties change. Example: Reacting to input changes.
ngDoCheck: Called during every change detection run. Useful for custom change detection. Example: Checking for s...read more
Q18. 5.which is the parent class of all classes in Java?
The parent class of all classes in Java is the Object class.
All classes in Java implicitly extend the Object class.
The Object class provides basic methods such as toString(), equals(), and hashCode().
Any class can override these methods to provide custom implementations.
Example: public class MyClass extends Object { ... }
Example: Object obj = new MyClass();
Q19. How does inverter works. How is motor control
Inverter converts DC to AC. Motor control involves adjusting frequency and voltage of AC to control motor speed.
Inverter uses power electronics to convert DC to AC
Motor control involves adjusting frequency and voltage of AC to control motor speed
Frequency and voltage are adjusted using pulse width modulation (PWM)
Motor speed can be controlled by adjusting the duty cycle of PWM signal
Examples of motor control techniques include scalar control and vector control
Q20. What is a subquery? How is it different from a join?
A subquery is a query nested within another SQL query, while a join combines rows from two or more tables based on related columns.
A subquery can return a single value or a set of values to be used in the main query.
Example of a subquery: SELECT name FROM employees WHERE id IN (SELECT employee_id FROM sales);
Joins combine rows from two or more tables based on a related column between them.
Example of a join: SELECT employees.name, sales.amount FROM employees JOIN sales ON empl...read more
Q21. How to join table? How many types of join in my SQL and SQL?
Joining tables in SQL allows combining data from multiple tables based on related columns. Various join types exist.
1. INNER JOIN: Returns records with matching values in both tables. Example: SELECT * FROM A INNER JOIN B ON A.id = B.id;
2. LEFT JOIN (or LEFT OUTER JOIN): Returns all records from the left table and matched records from the right table. Example: SELECT * FROM A LEFT JOIN B ON A.id = B.id;
3. RIGHT JOIN (or RIGHT OUTER JOIN): Returns all records from the right ta...read more
Q22. Do you have any previous project. If yes what programming language it is in?
Yes, I have worked on a project where I developed a web application using Java programming language.
Developed a web application using Java programming language
Implemented various features and functionalities
Collaborated with a team of developers to ensure project success
Q23. What is your understanding of Java Object-Oriented Programming (OOP)?
Java OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Java OOP involves the use of classes and objects.
Encapsulation is a key concept where data is kept private within a class and accessed through public methods.
Inheritance allows one class to inherit attributes and methods from another class.
Polymorphism enables objects to be treated as instances of their parent class.
Abstraction in...read more
Q24. 1) Internals of Hashmap 2) What is the ER diagram, and draw the ER diagram of your project. 3) What is Synchronization in Java? Explain Deadlock.
A hashmap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.
Hashmap is implemented using an array of linked lists or a balanced tree
It uses a hash function to convert keys into array indices
Collision can occur when two keys hash to the same index, resolved using separate chaining or open addressing
Retrieval of values is fast as it directly calculates the index using the hash function
Insertion and deletion operations can ...read more
Q25. 2.What is difference between stack and queue?
Stack is a LIFO data structure while Queue is a FIFO data structure.
Stack follows Last In First Out (LIFO) principle while Queue follows First In First Out (FIFO) principle.
Stack has two main operations: push and pop while Queue has two main operations: enqueue and dequeue.
Stack is used in recursive function calls, undo/redo operations, and backtracking while Queue is used in breadth-first search, printing tasks in order, and handling requests in a web server.
Examples of Stac...read more
Q26. What is the difference between INNER JOIN and OUTER JOIN?
INNER JOIN returns matching rows, while OUTER JOIN returns all rows with matches and NULLs for non-matching rows.
INNER JOIN: Combines rows from two tables where there is a match in both tables.
Example: SELECT * FROM A INNER JOIN B ON A.id = B.id; // Returns only matching rows.
OUTER JOIN: Combines rows from two tables, returning all rows from one table and matching rows from the other.
Types of OUTER JOIN: LEFT JOIN (all from left, matched from right), RIGHT JOIN (all from righ...read more
Q27. 3.Write SQL query to find second highest salary in database?
SQL query to find second highest salary in database
Use ORDER BY and LIMIT to get the second highest salary
Assume ties are allowed and use DISTINCT
Q28. Linux / windows which one is more secure?
Both Linux and Windows have their own security features and vulnerabilities.
Linux is known for its strong security features like SELinux and AppArmor.
Windows has improved its security with features like Windows Defender and BitLocker.
However, both operating systems have had their fair share of security vulnerabilities and attacks.
Ultimately, the level of security depends on how well the system is configured and maintained.
It's important to regularly update and patch both Linu...read more
Q29. what should a system administrator`s routine be?
A system administrator's routine involves monitoring system performance, troubleshooting issues, implementing security measures, and maintaining backups.
Regularly monitoring system performance and resource usage
Troubleshooting and resolving technical issues as they arise
Implementing and maintaining security measures to protect the system from cyber threats
Performing regular backups and ensuring data integrity
Updating software and firmware to ensure system stability and securi...read more
Q30. Write a code for swapping of 2 numbers without using 3rd variable
Swapping two numbers without using a third variable in code
Use bitwise XOR operation to swap two numbers without using a third variable
Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b
Ensure to handle edge cases like swapping same numbers
Q31. 4. Difference Between method overloading and method overriding?
Method overloading is having multiple methods with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is done within the same class while method overriding is done in different classes (subclass and superclass).
Method overloading is achieved by changing the number of parameters or the data type of parameters while method overriding is achieved by changing...read more
Q32. What you know about electric vehicle
Electric vehicles are vehicles that run on electricity instead of gasoline or diesel.
Electric vehicles use rechargeable batteries to power an electric motor.
They produce zero emissions, making them environmentally friendly.
Electric vehicles can be charged at home or at public charging stations.
They are becoming more popular as technology improves and prices decrease.
Examples of electric vehicles include the Tesla Model S, Nissan Leaf, and Chevy Bolt.
Q33. What is difference between Machine Learning and Deep Learning
Machine learning is a subset of AI that allows systems to learn from data and make predictions, while deep learning is a subset of machine learning that uses neural networks to model and process data.
Machine learning is a broader concept that involves algorithms that can learn from and make predictions on data.
Deep learning is a subset of machine learning that uses neural networks with multiple layers to model and process data.
Deep learning requires a large amount of data and...read more
Q34. What is GitHub, and what is its purpose?
GitHub is a web-based platform for version control using Git, facilitating collaboration and code sharing among developers.
GitHub is used for hosting and sharing code repositories.
It allows for version control using Git, enabling developers to track changes and collaborate on projects.
Developers can create branches, submit pull requests, and merge code changes easily.
GitHub provides features like issue tracking, wikis, and project management tools.
Popular open-source projects...read more
Q35. SQL joins difference, daily activities whatever done in previous organization
Explained SQL joins and daily activities from previous organization.
Explained different types of SQL joins such as inner join, left join, right join, and full outer join.
Gave examples of how to use SQL joins to combine data from multiple tables.
Discussed daily activities such as troubleshooting database issues, optimizing queries, and creating reports.
Mentioned experience with database management systems like MySQL, Oracle, and SQL Server.
Q36. Explain this line public static void main (string args [])
Entry point of Java program, must be public, static, void and accept array of strings as argument.
public: method can be accessed from anywhere
static: method belongs to class, not instance
void: method does not return any value
main: method name, entry point of program
string args[]: array of strings, command line arguments
Q37. Difference between ArrayList, HashSet and HashMap
ArrayList is a resizable array, HashSet is an unordered collection of unique elements, and HashMap is a key-value pair collection.
ArrayList allows duplicates and maintains insertion order
HashSet does not allow duplicates and does not maintain order
HashMap stores key-value pairs and allows null values for both keys and values
Q38. What is Ansible How to maintains secret in Ansible How to monitor k8s
Ansible is an open-source automation tool that helps in configuration management, application deployment, and task automation.
Ansible uses YAML syntax to define tasks and playbooks
It uses SSH protocol to communicate with remote servers
Ansible Vault is used to maintain secrets like passwords, API keys, etc.
To monitor k8s, Ansible provides modules like k8s_info, k8s_scale, k8s_service, etc.
Q39. what is different between workgroup and domain
Workgroup is a peer-to-peer network where each computer has its own security settings, while a domain is a centralized network managed by a server with shared security settings.
Workgroup is decentralized, each computer manages its own security settings
Domain is centralized, managed by a server with shared security settings
Workgroup is suitable for small networks, domain is suitable for larger networks
In a workgroup, users have to create accounts on each computer they want to ...read more
Q40. Where you check the application logs in SAP?
Application logs in SAP can be checked in transaction code SLG1.
Application logs can be checked in transaction code SLG1.
Logs can also be viewed in transaction code SM21 for system logs.
Use transaction code ST11 for developer traces.
Logs can be accessed directly in the file system using transaction AL11.
Q41. Difference between Abstract Class and Interface
Abstract class is a class that can have both abstract and non-abstract methods while interface only has abstract methods.
Abstract class can have constructors while interface cannot
A class can implement multiple interfaces but can only inherit from one abstract class
Abstract class can have instance variables while interface cannot
Abstract class can provide default implementation for some methods while interface cannot
Example of abstract class: Animal (with abstract method 'mak...read more
Q42. What is difference between malloc and calloc
malloc allocates memory but does not initialize it, while calloc allocates and initializes memory to zero.
malloc() takes a single argument, the number of bytes to allocate, while calloc() takes two arguments, the number of elements to allocate and the size of each element.
malloc() returns a pointer to the allocated memory block, while calloc() returns a pointer to the first byte of the allocated memory block.
calloc() is useful for allocating memory for arrays, as it initializ...read more
Q43. What is public and instance class
Public and instance classes are two types of classes in object-oriented programming.
Public classes can be accessed from anywhere in the program, while instance classes can only be accessed within their own instance.
Public classes are often used for utility classes or classes that need to be accessed globally, while instance classes are used for encapsulation and data hiding.
Example of public class: Math class in Java. Example of instance class: Person class with private insta...read more
Q44. What do you know about Angular?
Angular is a popular JavaScript framework for building web applications.
Angular is a TypeScript-based open-source framework developed by Google.
It is used for building single-page applications (SPAs) and dynamic web pages.
Angular follows the MVC (Model-View-Controller) architectural pattern.
It provides features like data binding, dependency injection, and modular development.
Angular has a powerful CLI (Command Line Interface) for scaffolding and managing projects.
Some popular...read more
Q45. Swap two variables values without using third variable
Swap two variables values without using third variable
Use XOR operation to swap two variables without using a third variable
Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b
Ensure variables are not the same to avoid getting zero as result
Q46. What is software development life cycle?
Software development life cycle (SDLC) is a process used to design, develop, and test software.
SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables.
SDLC helps ensure that software is developed efficiently, meets user requirements, and is of high quality.
Examples of SDLC models include Waterfall, Agile, and DevOps.
Q47. What is meant by method overloading?
Method overloading is when multiple methods in a class have the same name but different parameters.
Allows multiple methods with the same name but different parameters
Helps improve code readability and maintainability
Example: void print(int num) and void print(String text) in a class
Q48. Is Java a complete OOP language?
Yes, Java is a complete OOP language with features like classes, objects, inheritance, encapsulation, and polymorphism.
Java supports classes and objects for creating reusable code.
It implements inheritance, allowing classes to inherit attributes and methods from other classes.
Encapsulation is achieved through access modifiers like private, protected, and public.
Polymorphism is supported through method overloading and overriding.
Java also includes features like abstraction and...read more
Q49. Current technology in my core field
Current technology in my core field is focused on automation, cloud computing, and artificial intelligence.
Automation is being used to streamline processes and increase efficiency.
Cloud computing is becoming more prevalent as companies move towards remote work and data storage.
Artificial intelligence is being used for data analysis and decision-making.
Machine learning is being used to improve automation and AI capabilities.
Internet of Things (IoT) is being used to connect dev...read more
Q50. VSAMs. Define, access and Alternate index.
VSAMs are Virtual Storage Access Method datasets used in mainframe systems for efficient data storage and retrieval.
VSAMs are used to store large amounts of data in a mainframe system.
They provide efficient access to data through various access methods like sequential, random, and dynamic.
Alternate index is a feature of VSAM that allows data to be accessed through a secondary key instead of the primary key.
VSAMs are commonly used for storing transactional data in banking and ...read more
Q51. How to perform keyboard events in selenium
Keyboard events in Selenium can be performed using the Actions class
Use the Actions class to create a new instance
Use the sendKeys method to send keyboard events like typing text
Use the keyDown and keyUp methods to simulate pressing and releasing keys
Q52. 1.What is Opps concepts in Java.
OOPs concepts in Java are the fundamental principles of object-oriented programming.
Encapsulation: wrapping data and code into a single unit
Inheritance: creating new classes from existing ones
Polymorphism: using a single interface to represent multiple types
Abstraction: hiding implementation details from the user
Examples: class, object, inheritance, polymorphism, encapsulation
Q53. What is C, advantages of c...etc?
C is a high-level programming language known for its efficiency, flexibility, and portability.
Advantages of C include high performance, close-to-hardware functionality, and a large library of functions.
C is widely used in system programming, embedded systems, and developing operating systems.
C allows for low-level manipulation of memory and provides direct access to hardware, making it suitable for developing device drivers.
C is portable across different platforms and compile...read more
Q54. Use of Static Variable in Java
Static variables in Java are shared among all instances of a class and retain their value throughout the program.
Static variables are declared using the 'static' keyword.
They are initialized only once, at the start of the program.
They can be accessed directly using the class name, without creating an instance of the class.
Changes made to a static variable are reflected in all instances of the class.
Static variables are commonly used for constants or to keep track of global st...read more
Q55. How to handle option values in swift
Option values in Swift can be handled using enums, switch statements, and optional binding.
Use enums to define a set of possible values for an option
Use switch statements to handle each possible value of the option
Use optional binding to safely unwrap optional values
Q56. How to do API using service manager
APIs can be created using Service Manager by defining endpoints and methods for interacting with the service.
Define the API endpoints and methods in the Service Manager configuration.
Implement the logic for handling API requests and responses.
Test the API endpoints using tools like Postman to ensure functionality.
Secure the API by implementing authentication and authorization mechanisms.
Q57. What is merge Sort? Write the code?
Merge Sort is a divide and conquer algorithm that sorts an array by dividing it into two halves, sorting them separately, and then merging the results.
Divide the array into two halves
Recursively sort the two halves
Merge the sorted halves
Repeat until the entire array is sorted
Q58. What are new features in angular13?
Angular 13 is not released yet, so there are no new features to discuss.
Angular 13 has not been released yet
No official information on new features available
Q59. What is lazy loading in angular ?
Lazy loading in Angular is a technique used to load modules only when they are required, improving performance by reducing initial load time.
Lazy loading helps in reducing the initial bundle size of the application.
It allows for faster loading times as only the required modules are loaded when needed.
Lazy loading is achieved by using the loadChildren property in the route configuration of Angular modules.
Example: loadChildren: () => import('./lazy-loaded-module').then(m => m....read more
Q60. How VPN works
VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.
It can be used to access geographically restricted content, bypass censorship, and protect against cyber threats.
VPN can be set u...read more
Q61. What is VTP
VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.
VTP is a Cisco proprietary protocol.
It allows for easy VLAN management by propagating VLAN information across the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows for VLAN creation, deletion, and modification.
Client mode receives and stores VLAN information.
Transparent mode forwards VTP messages but does not participate in VTP updates.
VTP version 3 introduc...read more
Q62. What do you understand by AAA ?
AAA stands for Authentication, Authorization, and Accounting.
Authentication: verifying the identity of a user or device
Authorization: granting access to specific resources or actions
Accounting: tracking and recording usage of resources for billing or auditing purposes
Q63. Probability for to pick a gold ball out of 100balls
The probability of picking a gold ball out of 100 balls is 1%
The probability is calculated by dividing the number of gold balls by the total number of balls
Assuming there is only one gold ball, the probability is 1/100 or 0.01
If there are multiple gold balls, the probability will be higher
Q64. How to configure NFS, NTP,DNS servers
To configure NFS, NTP, and DNS servers, you need to edit configuration files and restart the respective services.
Edit /etc/exports file for NFS server configuration
Edit /etc/ntp.conf file for NTP server configuration
Edit /etc/named.conf file for DNS server configuration
Restart nfs, ntp, and named services after making changes
Q65. What is Angular and it's advantages
Angular is a popular front-end framework developed by Google for building dynamic web applications.
Angular is based on TypeScript, a superset of JavaScript, which adds static typing and other features to the language.
It follows the MVC (Model-View-Controller) architecture, making it easier to organize code and separate concerns.
Angular provides two-way data binding, which allows changes in the model to be automatically reflected in the view and vice versa.
It offers a rich set...read more
Q66. Which version of Angular have you used
I have used Angular 2, 4, 5, 6, 7, 8, 9, and 10.
I have experience in developing web applications using Angular 2 and above.
I have worked on Angular projects with various versions including 4, 5, 6, 7, 8, 9, and 10.
I am familiar with the latest features and updates in Angular 10.
I have used Angular CLI for creating and managing Angular projects.
I have experience in implementing Angular Material design components.
I have worked on projects that involve integrating Angular with b...read more
Q67. Difference between public ,private and protected in java
In Java, public, private, and protected are access modifiers used to control the visibility of classes, methods, and variables.
public: accessible from any other class
private: accessible only within the same class
protected: accessible within the same package and subclasses
Example: public class MyClass {}
Example: private int myVar;
Example: protected void myMethod() {}
Q68. How to save and load ML model weights?
ML model weights can be saved and loaded using serialization libraries like pickle or joblib.
Use serialization libraries like pickle or joblib to save and load model weights.
For saving weights: model.save_weights('model_weights.h5')
For loading weights: model.load_weights('model_weights.h5')
Q69. What is eventloop in nodejs?
Eventloop is a mechanism in Node.js that allows non-blocking I/O operations to be performed efficiently.
Eventloop is responsible for handling asynchronous callbacks in Node.js
It continuously checks the event queue for new events to process
It executes the callbacks in the event queue in a non-blocking manner
It allows Node.js to handle multiple requests simultaneously
It is a key feature that makes Node.js highly scalable
Q70. What is super class?
A super class is a class that is inherited by other classes, providing them with common attributes and behaviors.
Super class is also known as a base class or parent class.
It serves as a blueprint for creating derived classes.
Derived classes inherit the properties and methods of the super class.
Super class can be extended or overridden by the derived classes.
Super class promotes code reusability and modularity.
Example: In a vehicle hierarchy, 'Vehicle' can be a super class wit...read more
Q71. What is polymorphism and OOPs concept
Polymorphism is the ability of a single function or method to operate on different data types. OOPs concept refers to Object-Oriented Programming principles like inheritance, encapsulation, and abstraction.
Polymorphism allows a function to take different forms based on the input data type.
OOPs concept includes inheritance, where a class can inherit properties and methods from another class.
Encapsulation involves bundling data and methods that operate on the data into a single...read more
Q72. How do you resolve a production issue?
I follow a systematic approach by identifying the root cause, implementing a temporary fix if needed, testing the solution, and documenting the resolution.
Identify the root cause of the issue
Implement a temporary fix if necessary to restore production
Test the solution to ensure it resolves the issue
Document the resolution for future reference
Q73. What is Android framework architecture
Android framework architecture is a set of APIs provided by the Android SDK to support the development of applications on the Android platform.
Consists of various layers such as application framework, libraries, runtime, and Linux kernel
Provides developers with tools and APIs to build and interact with applications
Includes components like Activity Manager, Content Providers, View System, and Package Manager
Q74. What is function in Oracle PL/SQL.
A function in Oracle PL/SQL is a stored subprogram that returns a single value and can be called from SQL statements.
Functions are defined using the CREATE FUNCTION statement.
They can take parameters and return a value using the RETURN keyword.
Example: CREATE FUNCTION get_employee_salary(emp_id NUMBER) RETURN NUMBER IS ... END;
Functions can be used in SQL queries, e.g., SELECT get_employee_salary(101) FROM dual;
They help in code reusability and modular programming.
Q75. What is pandas and how to use
pandas is a Python library used for data manipulation and analysis.
pandas provides data structures like DataFrame and Series for handling data
It can read and write data from various file formats like CSV, Excel, SQL databases
pandas allows for data cleaning, filtering, grouping, and merging operations
Example: df = pd.read_csv('data.csv') creates a DataFrame from a CSV file
Q76. Tell me the life cycle of mvc
MVC life cycle involves request handling, routing, controller execution, view rendering, and response generation.
Client sends a request to the server
Routing maps the request to a specific controller
Controller executes the requested action and interacts with the model
View is rendered with the data from the model
Response is generated and sent back to the client
Q77. What are Python’s built-in decorators?
Python's built-in decorators are functions that modify the behavior of other functions or methods.
1. @staticmethod: Defines a method that does not operate on an instance of the class. Example: class MyClass: @staticmethod def my_method(): pass
2. @classmethod: Defines a method that operates on the class itself rather than an instance. Example: class MyClass: @classmethod def my_class_method(cls): pass
3. @property: Allows a method to be accessed like an attribute. Example: clas...read more
Q78. Python coad to find 2nd largest number in arrey
Python code to find the 2nd largest number in an array.
Sort the array in descending order
Return the element at index 1
Q79. write a program to show patterns
Program to display patterns using arrays of strings
Use nested loops to iterate through rows and columns of the array
Fill the array with characters to create the desired pattern
Print each row of the array to display the pattern
Q80. Tell about cyber security?
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves implementing measures to prevent cyber attacks and data breaches.
It includes using firewalls, antivirus software, and encryption to protect systems and data.
Cyber security also involves educating users about safe online practices and implementing policies and procedures to ensure security.
Examples of cyber...read more
Q81. What does OOP stand for?
OOP stands for Object-Oriented Programming.
OOP is a programming paradigm based on the concept of 'objects', which can contain data in the form of fields (attributes or properties) and code in the form of procedures (methods)
Encapsulation, inheritance, and polymorphism are key principles of OOP
Examples of OOP languages include Java, C++, and Python
Q82. What is grep in Linux?
Grep is a command-line utility in Linux used to search for specific patterns in text files.
Grep stands for 'Global Regular Expression Print'.
It is used to search for a specific pattern in one or more files.
Grep can be used with regular expressions to perform complex pattern matching.
Example: grep 'search_term' file.txt
Example: grep -i 'pattern' file1.txt file2.txt
Q83. Write a code on bubble sort in c?
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Initialize an array of strings to be sorted
Use nested loops to compare adjacent elements and swap them if necessary
Repeat the process until the array is sorted
Q84. Introduction project details why IT coding
I have experience working on various IT projects involving coding, which is why I am interested in the System Engineer role.
I have worked on multiple IT projects where I was responsible for coding and system engineering tasks.
I am passionate about IT and enjoy the challenge of problem-solving through coding.
I believe that my coding skills and experience make me a strong candidate for the System Engineer position.
Q85. What is IAM? What is AD?
IAM stands for Identity and Access Management. AD stands for Active Directory.
IAM is a framework for managing digital identities and controlling access to resources.
AD is a Microsoft product that provides directory services, authentication, and authorization.
IAM and AD are often used together to manage user access to resources in an organization.
IAM solutions include Okta, OneLogin, and Azure AD.
AD is commonly used in Windows environments to manage user accounts, computers, a...read more
Q86. What is Java and spring boot ?
Java is a popular programming language used for developing various applications. Spring Boot is a framework that simplifies the development of Java-based applications.
Java is an object-oriented programming language known for its portability and versatility.
Spring Boot is a framework that simplifies the development of Java-based applications by providing pre-configured settings and tools.
Spring Boot allows developers to quickly set up and run standalone Spring-based applicatio...read more
Q87. What is MVC? How it works
MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.
Model represents the data and business logic
View displays the data to the user
Controller handles user input and updates the model and view accordingly
MVC promotes separation of concerns and modularity
Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC
Q88. What is Abstract Class
An abstract class is a class that cannot be instantiated and is meant to be subclassed.
An abstract class serves as a blueprint for other classes.
It can have both abstract and non-abstract methods.
Abstract methods are declared without an implementation and must be implemented by the subclasses.
An abstract class can have constructors and instance variables.
It provides a common interface for all the subclasses.
Q89. What is Array and String
An array is a data structure that stores a collection of elements of the same type. A string is a sequence of characters.
Arrays can be one-dimensional, two-dimensional, or multi-dimensional.
Strings are typically used to represent text and are enclosed in quotation marks.
Arrays and strings are both commonly used in programming languages.
Example of an array: [1, 2, 3, 4, 5]
Example of a string: 'Hello, World!'
Q90. Real life examples of Data Structure
Data structures are used in various real-life scenarios to organize and manage data efficiently.
Phone contacts stored in a hash table for quick access
Employee records stored in a linked list for easy insertion and deletion
File system organized as a tree structure for hierarchical storage
Q91. List out 5 DB related spring boot annotations?
Q92. What's SQL and why we use it?
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases
Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE
SQL is essential for managing large amounts of data efficiently
Q93. What is new in Java 11
Java 11 introduces new features like local variable type inference, HTTP client API, and Epsilon garbage collector.
Local variable type inference allows the compiler to infer the type of a local variable based on its initializer.
HTTP client API provides a standard API for making HTTP requests and handling responses.
Epsilon garbage collector is a no-op garbage collector that can be used for performance testing and short-lived applications.
Other features include Unicode 10 suppo...read more
Q94. Mail flow in on premise and o365 environment
Mail flow in on-premise and O365 environment
In on-premise environment, mail flow is managed by Exchange servers installed on-premises
In O365 environment, mail flow is managed by Exchange Online Protection (EOP) and Exchange Online servers
In a hybrid environment, mail flow can be managed by both on-premise Exchange servers and EOP/Exchange Online servers
Mail flow can be configured using connectors, transport rules, and mail flow policies
Q95. How to handal application
Handling applications involves monitoring, troubleshooting, and optimizing performance.
Monitor application performance regularly to identify any issues or bottlenecks
Troubleshoot any errors or bugs that arise in the application
Optimize the application by fine-tuning configurations and resources
Implement security measures to protect the application from threats
Document changes and updates made to the application for future reference
Q96. what is oops and its feature
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPs features include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation refers to the bundling of data with the methods that operate on that data.
Inheritance allows classes to inherit attributes and methods from other classes.
Polymorphism allows objects to be treated as ...read more
Q97. Difference in .net framework and core
The .NET Framework is a traditional framework for Windows applications, while .NET Core is a cross-platform, open-source framework.
The .NET Framework is primarily for Windows applications, while .NET Core is cross-platform and can run on Windows, macOS, and Linux.
The .NET Framework is closed-source, while .NET Core is open-source.
The .NET Framework is not modular, while .NET Core is modular and allows developers to include only the necessary components in their applications.
T...read more
Q98. How does YOLO algorithm works?
YOLO (You Only Look Once) algorithm is a real-time object detection system that processes images in a single pass.
YOLO divides the image into a grid and predicts bounding boxes and probabilities for each grid cell.
It uses a single neural network to predict multiple bounding boxes and class probabilities simultaneously.
YOLO is known for its speed and accuracy in object detection tasks.
Example: YOLO can detect objects like cars, people, and animals in images or videos.
Q99. What is data binding?
Data binding is a technique that connects UI elements to data sources, enabling automatic data synchronization.
Two types: One-way binding (UI updates from data) and two-way binding (data updates from UI).
Example of one-way binding: Displaying user names from a database in a list.
Example of two-way binding: A form where user input updates the underlying data model in real-time.
Commonly used in frameworks like Angular, React, and Vue.js for efficient UI development.
Q100. What is HSIT?
HSIT stands for Hardware and Software Integration Testing.
HSIT is a type of testing that verifies the compatibility and functionality of hardware and software components.
It is usually performed after unit testing and before system testing.
HSIT can help identify any issues with the integration of hardware and software, such as driver conflicts or compatibility issues.
Examples of HSIT include testing the compatibility of a new graphics card with existing software or testing the...read more
More about working at TCS
Top HR Questions asked in Bottomline
Interview Process at Bottomline
Top System Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month