
TCS


600+ TCS System Engineer Interview Questions and Answers
Q101. What is your understanding of Java Object-Oriented Programming (OOP)?
Java OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Java OOP involves the use of classes and objects.
Encapsulation is a key concept where data is kept private within a class and accessed through public methods.
Inheritance allows one class to inherit attributes and methods from another class.
Polymorphism enables objects to be treated as instances of their parent class.
Abstraction in...read more
Q102. primary key can be a null or not?
No, primary key cannot be null.
Primary key uniquely identifies a record in a table.
Null values are not unique and can cause data integrity issues.
Primary key constraint ensures that the value is not null.
However, primary key can have a default value.
Q103. What is Search Engine Optimization?
Search Engine Optimization (SEO) is the process of improving a website's visibility on search engines to increase organic traffic.
SEO involves optimizing website content, meta tags, and backlinks to improve search engine rankings.
Keyword research is crucial for SEO to target relevant search terms.
Creating high-quality content and obtaining backlinks from reputable websites can boost SEO.
Regularly monitoring and analyzing website performance using tools like Google Analytics i...read more
Q104. Difference between stored procedure and functions Difference between drop and truncate How to write query for selecting 5th max salary Oops concepts How to manage session in asp. Net MVC
Questions related to SQL, OOPs concepts, and ASP.NET MVC session management
Stored procedures and functions are both database objects used to encapsulate a set of SQL statements for reuse
DROP is used to remove a table or database object, while TRUNCATE is used to remove all rows from a table
To select the 5th maximum salary, use the OFFSET and FETCH clauses in SQL Server
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction
Session management in ASP.NET ...read more
Q105. Differentiate between nvl and nvl2.why We use them.
nvl and nvl2 are Oracle functions used to handle null values in SQL queries.
nvl is used to replace null values with a specified default value.
nvl2 is used to return one value if a specified expression is not null, and another value if it is null.
nvl is typically used in scenarios where you want to replace null values with a default value, such as displaying 'N/A' instead of null.
nvl2 is useful when you need to perform different actions based on whether a value is null or not,...read more
Q106. 1) Internals of Hashmap 2) What is the ER diagram, and draw the ER diagram of your project. 3) What is Synchronization in Java? Explain Deadlock.
A hashmap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.
Hashmap is implemented using an array of linked lists or a balanced tree
It uses a hash function to convert keys into array indices
Collision can occur when two keys hash to the same index, resolved using separate chaining or open addressing
Retrieval of values is fast as it directly calculates the index using the hash function
Insertion and deletion operations can ...read more
Q107. have you ever developed restful web service? how?
Yes, I have developed RESTful web services.
I have used frameworks like Spring Boot or Node.js to develop RESTful web services.
I have defined the endpoints and HTTP methods (GET, POST, PUT, DELETE) for the web service.
I have implemented the business logic and data processing in the web service.
I have used JSON or XML as the data format for request and response payloads.
I have handled authentication and authorization using tokens or API keys.
I have tested the web service using ...read more
Q108. What is oops ? What is ORM in python? Multiple Inheritance in java vs python?
OOPs is a programming paradigm that uses objects to represent real-world entities. ORM is a technique to map objects to relational databases.
OOPs stands for Object-Oriented Programming.
It is based on the concept of objects, which can contain data and code.
In OOPs, objects interact with each other to perform tasks.
ORM stands for Object-Relational Mapping.
It is a technique to map objects to relational databases.
ORM allows developers to work with objects instead of SQL statement...read more
Q109. Can you explain encapsulation?
Encapsulation is the process of hiding internal details and providing a public interface for accessing and manipulating data.
Encapsulation is a fundamental concept in object-oriented programming.
It allows for data abstraction and information hiding.
Encapsulation helps in achieving data integrity and security.
It promotes code reusability and modularity.
Example: A class in Java with private variables and public methods.
Q110. What is normalization?
Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.
Normalization helps in reducing data redundancy by breaking down a large table into smaller, more manageable tables.
It ensures that each piece of data is stored in only one place, reducing the chances of inconsistencies.
Normalization follows a set of rules called normal forms, such as First Normal Form (1NF), Second Normal Form (2NF), etc.
Normalization improves dat...read more
Q111. 2.What is difference between stack and queue?
Stack is a LIFO data structure while Queue is a FIFO data structure.
Stack follows Last In First Out (LIFO) principle while Queue follows First In First Out (FIFO) principle.
Stack has two main operations: push and pop while Queue has two main operations: enqueue and dequeue.
Stack is used in recursive function calls, undo/redo operations, and backtracking while Queue is used in breadth-first search, printing tasks in order, and handling requests in a web server.
Examples of Stac...read more
Q112. Do you Know Phantom Deadlocks?
Yes, phantom deadlocks are a type of deadlock that occur due to incorrect lock ordering.
Phantom deadlocks occur when multiple processes or threads attempt to acquire locks in a different order.
This can lead to a situation where each process is waiting for a lock held by another process, resulting in a deadlock.
Phantom deadlocks can be difficult to detect and reproduce as they are intermittent and depend on the timing of lock acquisitions.
To prevent phantom deadlocks, it is im...read more
Q113. What are cookies in PHP?
Cookies in PHP are small text files that are stored on the user's computer to track and store information about the user's activities on a website.
Cookies are used to remember user preferences and login information.
They can be set, retrieved, and deleted using PHP's setcookie(), $_COOKIE, and setcookie() functions respectively.
Cookies can have an expiration date and can be set to be accessible only over a secure connection.
They are commonly used for tracking user behavior, pe...read more
Q114. what is LAN MAN WAN PAN ETC
LAN, MAN, WAN, PAN are types of computer networks that differ in their geographical coverage and purpose.
LAN (Local Area Network) is a network that covers a small area like a home, office, or building.
MAN (Metropolitan Area Network) is a network that covers a larger area like a city or town.
WAN (Wide Area Network) is a network that covers a large geographical area like a country or the whole world.
PAN (Personal Area Network) is a network that connects devices within a person'...read more
Q115. What is superclass? What do you know about java? what is oop?
A superclass is a class that is inherited by one or more subclasses.
Superclass is a concept in object-oriented programming (OOP).
It is a class that is extended by other classes called subclasses.
Subclasses inherit the properties and methods of the superclass.
Superclass is also known as a base class or parent class.
Example: In Java, the Object class is a superclass for all other classes.
Example: A Vehicle class can be a superclass for Car, Truck, and Motorcycle classes.
Q116. What are Constructors?
Constructors are special methods used to initialize objects in a class.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
They can be used to set default values for object properties.
Constructors can be overloaded to accept different parameters.
Example: public class Car { public Car() { //constructor code here } }
Q117. write a program for division nd multiplication inn 8085 processor
Program for division and multiplication in 8085 processor.
For multiplication, use MUL instruction with 8-bit operand.
For division, use DIV instruction with 8-bit dividend and 16-bit divisor.
Store the result in appropriate registers or memory locations.
Example: To multiply two numbers in registers B and C, use MUL C instruction.
Example: To divide two numbers in registers A and B, use DIV B instruction.
Q118. explain the concepts of a router
A router is a networking device that forwards data packets between computer networks.
A router operates at the network layer of the OSI model.
It uses routing tables to determine the best path for data packets to reach their destination.
Routers can connect multiple networks together, such as LANs and WANs.
They provide network address translation (NAT) to allow multiple devices to share a single public IP address.
Routers can also provide firewall functionality to protect the net...read more
Q119. How to reverse string, array. What is args in Java.
To reverse a string or array in Java, use StringBuilder or Collections.reverse. 'args' in Java is an array of strings passed as command line arguments.
Use StringBuilder to reverse a string: StringBuilder str = new StringBuilder('hello'); str.reverse();
Use Collections.reverse to reverse an array: List
list = Arrays.asList('apple', 'banana', 'cherry'); Collections.reverse(list); 'args' in Java is an array of strings used to pass command line arguments to a Java program.
Q120. Differences between Object Oriented and Procedure oriented programming languages
Object-oriented programming focuses on objects and their interactions, while procedure-oriented programming focuses on procedures and functions.
OOP is based on the concept of classes and objects, while POP is based on procedures and functions.
OOP supports encapsulation, inheritance, and polymorphism, while POP does not.
OOP is more suitable for large-scale projects, while POP is more suitable for small-scale projects.
Examples of OOP languages include Java, C++, and Python, whi...read more
Q121. How to define constructors in python
Constructors in Python are defined using the __init__() method.
The __init__() method is called when an object is created.
It initializes the object's attributes.
The first parameter of __init__() is always self.
Example: def __init__(self, name, age): self.name = name; self.age = age
Q122. How will you compile a DB2 cobol program using JCL
To compile a DB2 COBOL program using JCL, use the IBM COBOL compiler and specify the necessary parameters.
Use the IBM COBOL compiler, which can be invoked using the IGYCRCTL utility
Specify the necessary parameters, such as the input and output datasets, the DB2 subsystem name, and the DBRM name
Include any necessary JCL statements, such as DD statements for the input and output datasets
Example JCL: //COMPJOB JOB (ACCT#),CLASS=CLASS,MSGCLASS=MSGCLASS
//COBOL.SYSIN DD DSN=MY.COBO...read more
Q123. What is the use of COND statements in JCL steps
COND statements in JCL steps are used to conditionally execute a step based on the return code of a previous step.
COND statements are used to specify the conditions under which a step should be executed.
They are typically used to check the return code of a previous step and execute the current step only if the return code meets certain criteria.
COND statements can be used to specify multiple conditions, allowing for more complex logic in JCL.
Examples of COND statements includ...read more
Q124. 3.Write SQL query to find second highest salary in database?
SQL query to find second highest salary in database
Use ORDER BY and LIMIT to get the second highest salary
Assume ties are allowed and use DISTINCT
Q125. what are static & dynamic protocols
Static protocols are fixed and do not change, while dynamic protocols can adapt to changing network conditions.
Static protocols are typically used in simple networks with predictable traffic patterns.
Dynamic protocols are used in complex networks with varying traffic patterns.
Examples of static protocols include ARP and RARP.
Examples of dynamic protocols include OSPF and BGP.
Q126. What software development process do you follow?
I follow the Agile software development process.
I prioritize customer satisfaction and collaboration with the team.
I break down the project into smaller tasks and work on them in short iterations.
I conduct regular meetings to review progress and make necessary adjustments.
I emphasize on continuous improvement and adaptability to changes.
Examples: Scrum, Kanban, XP
Q127. What is the difference between spring and springboot
Spring is a framework for building Java applications, while Spring Boot is a tool that simplifies the setup and configuration of Spring applications.
Spring is a comprehensive framework that provides various modules for building Java applications, such as Spring MVC for web applications and Spring Data for data access.
Spring Boot is an opinionated tool that simplifies the setup and configuration of Spring applications by providing defaults and auto-configuration.
Spring Boot al...read more
Q128. Linux / windows which one is more secure?
Both Linux and Windows have their own security features and vulnerabilities.
Linux is known for its strong security features like SELinux and AppArmor.
Windows has improved its security with features like Windows Defender and BitLocker.
However, both operating systems have had their fair share of security vulnerabilities and attacks.
Ultimately, the level of security depends on how well the system is configured and maintained.
It's important to regularly update and patch both Linu...read more
Q129. What are the different types of data types in python
Python has various data types including integers, floats, strings, lists, tuples, dictionaries, and sets.
Integers: whole numbers without decimal points (e.g. 5, -3)
Floats: numbers with decimal points (e.g. 3.14, -0.5)
Strings: sequences of characters enclosed in quotes (e.g. 'hello', '123')
Lists: ordered collections of items (e.g. [1, 'apple', True])
Tuples: ordered, immutable collections of items (e.g. (1, 'banana', False))
Dictionaries: unordered collections of key-value pairs...read more
Q130. What is MVC? Difference between TempData, ViewData and ViewBag Opps concepts SQL related questions
MVC is a software architectural pattern used for developing web applications.
Model-View-Controller separates the application into three main components: Model (data), View (UI), and Controller (logic)
TempData, ViewData, and ViewBag are used to pass data from controller to view in ASP.NET MVC
OOP concepts include inheritance, encapsulation, polymorphism, and abstraction
SQL questions may include queries, joins, indexes, and normalization
Q131. what should a system administrator`s routine be?
A system administrator's routine involves monitoring system performance, troubleshooting issues, implementing security measures, and maintaining backups.
Regularly monitoring system performance and resource usage
Troubleshooting and resolving technical issues as they arise
Implementing and maintaining security measures to protect the system from cyber threats
Performing regular backups and ensuring data integrity
Updating software and firmware to ensure system stability and securi...read more
Q132. What you know about electric vehicle
Electric vehicles are vehicles that run on electricity instead of gasoline or diesel.
Electric vehicles use rechargeable batteries to power an electric motor.
They produce zero emissions, making them environmentally friendly.
Electric vehicles can be charged at home or at public charging stations.
They are becoming more popular as technology improves and prices decrease.
Examples of electric vehicles include the Tesla Model S, Nissan Leaf, and Chevy Bolt.
Q133. 4. Difference Between method overloading and method overriding?
Method overloading is having multiple methods with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is done within the same class while method overriding is done in different classes (subclass and superclass).
Method overloading is achieved by changing the number of parameters or the data type of parameters while method overriding is achieved by changing...read more
Q134. Explain characteristics of DBMS?
DBMS is a software system that manages databases, providing features like data storage, retrieval, and manipulation.
DBMS stands for Database Management System.
It provides a structured way to store and organize data.
DBMS allows multiple users to access and manipulate the data simultaneously.
It ensures data integrity and security through various mechanisms.
DBMS provides a query language to retrieve and manipulate data, such as SQL.
Examples of popular DBMS include Oracle, MySQL,...read more
Q135. 3. Find the sum of all numbers from a list except self
Sum all numbers in a list except self
Iterate through the list and add all numbers except the current one
Use a loop or built-in functions like sum() and list comprehension
Q136. Write a code for swapping of 2 numbers without using 3rd variable
Swapping two numbers without using a third variable in code
Use bitwise XOR operation to swap two numbers without using a third variable
Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b
Ensure to handle edge cases like swapping same numbers
Q137. What is s3 What is ec2 What vpc What isAmazon connect Subnet Design vpc and i need 50 IPS
S3 is a scalable storage service, EC2 is a virtual server service, VPC is a virtual private cloud, Amazon Connect is a cloud-based contact center service, subnet is a range of IP addresses, design VPC with 50 IPs.
S3 - Scalable storage service by AWS
EC2 - Virtual server service by AWS
VPC - Virtual Private Cloud for networking in AWS
Amazon Connect - Cloud-based contact center service by AWS
Subnet - Range of IP addresses within a VPC
Design VPC with 50 IPs - Create a VPC with a s...read more
Q138. What is the difference between DBMS and NoSQL?
DBMS is a traditional relational database management system, while NoSQL is a non-relational database management system.
DBMS uses structured query language (SQL) for querying and managing data, while NoSQL databases use different query languages or APIs.
DBMS is typically used for structured data with predefined schemas, while NoSQL is more flexible and can handle unstructured or semi-structured data.
DBMS is ACID-compliant (Atomicity, Consistency, Isolation, Durability), ensur...read more
Q139. What are temp data, view data and view bag in MVC
Temp data, view data, and view bag are ways to pass data from controller to view in MVC.
Temp data is used to pass data between controller and view for a single request.
View data is used to pass data from controller to view for the current request.
View bag is a dynamic object used to pass data from controller to view for the current request.
Q140. What are the programming languages you know?
I am proficient in programming languages such as Java, Python, C++, and SQL.
Java
Python
C++
SQL
Q141. What is the difference between polymorphism and encapsulation
Polymorphism allows objects of different classes to be treated as objects of a common superclass. Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Polymorphism enables a single interface to represent different data types or objects. For example, a superclass Animal can have subclasses like Dog and Cat, each with their own implementation of the speak() method.
Encapsulation hides the internal state of an object and only expos...read more
Q142. What is difference between Machine Learning and Deep Learning
Machine learning is a subset of AI that allows systems to learn from data and make predictions, while deep learning is a subset of machine learning that uses neural networks to model and process data.
Machine learning is a broader concept that involves algorithms that can learn from and make predictions on data.
Deep learning is a subset of machine learning that uses neural networks with multiple layers to model and process data.
Deep learning requires a large amount of data and...read more
Q143. What is GitHub, and what is its purpose?
GitHub is a web-based platform for version control using Git, facilitating collaboration and code sharing among developers.
GitHub is used for hosting and sharing code repositories.
It allows for version control using Git, enabling developers to track changes and collaborate on projects.
Developers can create branches, submit pull requests, and merge code changes easily.
GitHub provides features like issue tracking, wikis, and project management tools.
Popular open-source projects...read more
Q144. SQL joins difference, daily activities whatever done in previous organization
Explained SQL joins and daily activities from previous organization.
Explained different types of SQL joins such as inner join, left join, right join, and full outer join.
Gave examples of how to use SQL joins to combine data from multiple tables.
Discussed daily activities such as troubleshooting database issues, optimizing queries, and creating reports.
Mentioned experience with database management systems like MySQL, Oracle, and SQL Server.
Q145. Explain this line public static void main (string args [])
Entry point of Java program, must be public, static, void and accept array of strings as argument.
public: method can be accessed from anywhere
static: method belongs to class, not instance
void: method does not return any value
main: method name, entry point of program
string args[]: array of strings, command line arguments
Q146. What is docker and it's used(mentioned in resume)
Docker is a platform for developing, shipping, and running applications in containers.
Docker allows applications to be packaged with all dependencies into a container for easy deployment.
Containers are lightweight, portable, and isolated environments that run on a shared operating system.
Docker simplifies the process of managing and scaling applications across different environments.
Examples: Running a web server, database, or microservices in separate containers on the same ...read more
Q147. What are the action filters in MVC c#
Action filters are attributes that can be applied to controller actions to perform pre/post processing.
Action filters are used to modify the behavior of an action method.
They can be used to perform authentication, logging, caching, etc.
Some built-in action filters in MVC are Authorize, OutputCache, HandleError, etc.
Q148. Write a python program to square the elements of list using list comptehension.
Python program to square the elements of list using list comprehension.
Create a list of numbers
Use list comprehension to square each element
Print the new list
Q149. What are the basic types of Security attacks
Basic types of security attacks include malware, phishing, denial of service, man-in-the-middle, and SQL injection.
Malware: malicious software designed to harm or exploit a computer system
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity
Denial of Service (DoS): flooding a system with excessive requests to disrupt normal operations
Man-in-the-middle: intercepting communication between two parties without their knowledge
SQL injec...read more
Q150. What are famous oops concepts/ pillars of oops
The famous pillars of OOPs concepts are Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q151. Which is your favorite language and explain why.
My favorite language is Python because of its simplicity and versatility.
Python has a simple syntax which makes it easy to learn and use.
It has a vast library of modules and frameworks for various purposes.
Python is used in various fields such as web development, data science, machine learning, and automation.
Python is an interpreted language which makes it easy to debug and test code.
Python has a large community of developers who contribute to its development and support.
Som...read more
Q152. Problem arrange 3 numbers in ascending order. Just write the logic
Logic to arrange 3 numbers in ascending order.
Compare first two numbers and swap if necessary
Compare second and third numbers and swap if necessary
Repeat until no more swaps are needed
Q153. Difference between ArrayList, HashSet and HashMap
ArrayList is a resizable array, HashSet is an unordered collection of unique elements, and HashMap is a key-value pair collection.
ArrayList allows duplicates and maintains insertion order
HashSet does not allow duplicates and does not maintain order
HashMap stores key-value pairs and allows null values for both keys and values
Q154. Why did you create project in machine learning
I created a project in machine learning to improve the accuracy of a recommendation system.
To enhance the user experience by providing personalized recommendations
To optimize the efficiency of the system by automating the recommendation process
To leverage the power of data analysis and pattern recognition in making accurate predictions
To explore the potential of machine learning algorithms in solving real-world problems
To stay updated with the latest advancements in the field...read more
Q155. diff betn passive & active components
Passive components do not require an external power source, while active components do.
Passive components include resistors, capacitors, and inductors.
Active components include transistors, diodes, and integrated circuits.
Passive components do not amplify signals, while active components do.
Passive components are used to control the flow of electricity, while active components are used to create and amplify signals.
Q156. What is Ansible How to maintains secret in Ansible How to monitor k8s
Ansible is an open-source automation tool that helps in configuration management, application deployment, and task automation.
Ansible uses YAML syntax to define tasks and playbooks
It uses SSH protocol to communicate with remote servers
Ansible Vault is used to maintain secrets like passwords, API keys, etc.
To monitor k8s, Ansible provides modules like k8s_info, k8s_scale, k8s_service, etc.
Q157. What is oops What is array What are list Differences between list and array
OOPs stands for Object-Oriented Programming. An array is a data structure that stores a collection of elements. Lists are a type of data structure that can store multiple items.
OOPs stands for Object-Oriented Programming and is a programming paradigm based on the concept of objects.
An array is a data structure that stores a collection of elements of the same data type. For example, an array of integers [1, 2, 3].
Lists are a type of data structure that can store multiple items...read more
Q158. What is Test NG? What is Selenium ? What is Cucumber? Api
TestNG is a testing framework for Java. Selenium is a tool for automating web browsers. Cucumber is a BDD testing tool. API is a set of protocols for building software applications.
TestNG is used for unit, functional, and integration testing in Java.
Selenium is used for automating web browsers to test web applications.
Cucumber is a BDD testing tool that allows tests to be written in plain language.
API is a set of protocols for building software applications that allows differ...read more
Q159. What is difference between STACK and HEAP memory?
STACK memory is used for static memory allocation and follows Last In First Out (LIFO) structure, while HEAP memory is used for dynamic memory allocation and is managed by the programmer.
STACK memory is faster to allocate and deallocate compared to HEAP memory.
Variables stored in STACK memory have limited scope and lifetime, while variables in HEAP memory can be accessed globally.
Example: Local variables in a function are stored in STACK memory, while objects created using 'n...read more
Q160. Difference between aem 6.4, 6.5 and AEM as cloud service.
AEM 6.4 and 6.5 are on-premise versions while AEM as Cloud Service is a cloud-based version of Adobe Experience Manager.
AEM 6.4 and 6.5 require installation and maintenance on-premise while AEM as Cloud Service is fully managed by Adobe.
AEM as Cloud Service offers automatic updates and scalability while AEM 6.4 and 6.5 require manual updates and scaling.
AEM as Cloud Service offers a headless CMS option while AEM 6.4 and 6.5 do not.
AEM as Cloud Service offers a simplified depl...read more
Q161. What are the oops? Explain with eachn one.
Oops stands for Object-Oriented Programming concepts which are used to develop software applications.
Encapsulation - binding data and functions that manipulate the data together
Inheritance - creating new classes from existing classes
Polymorphism - ability of objects to take on multiple forms
Abstraction - hiding implementation details and showing only functionality
Q162. What is cloud computing and explain?
Cloud computing is the delivery of computing services over the internet, allowing users to access and store data and applications remotely.
Cloud computing allows users to access data and applications from any device with an internet connection.
It eliminates the need for physical hardware and on-site data centers.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Q163. what is different between workgroup and domain
Workgroup is a peer-to-peer network where each computer has its own security settings, while a domain is a centralized network managed by a server with shared security settings.
Workgroup is decentralized, each computer manages its own security settings
Domain is centralized, managed by a server with shared security settings
Workgroup is suitable for small networks, domain is suitable for larger networks
In a workgroup, users have to create accounts on each computer they want to ...read more
Q164. Do you know coding?
Yes, I know coding.
I am proficient in programming languages such as Java, Python, and C++.
I have experience in developing and maintaining software applications.
I am familiar with software development methodologies such as Agile and Waterfall.
Q165. Comp 1 and Comp 3 usage clause variables in cobol
Comp 1 and Comp 3 are usage clause variables in COBOL.
Comp 1 is used for binary data and takes up 2 bytes of storage.
Comp 3 is used for packed decimal data and takes up variable storage depending on the number of digits.
Usage clause variables are used to define the type of data and how it is stored in memory.
Q166. Write code(on paper) for finding prime number from the given number.
Code to find prime numbers from a given number
Iterate from 2 to the given number
Check if the number is divisible by any number other than 1 and itself
If not divisible, then it is a prime number
Q167. Where you check the application logs in SAP?
Application logs in SAP can be checked in transaction code SLG1.
Application logs can be checked in transaction code SLG1.
Logs can also be viewed in transaction code SM21 for system logs.
Use transaction code ST11 for developer traces.
Logs can be accessed directly in the file system using transaction AL11.
Q168. What are constraints?
Constraints are limitations or restrictions that must be considered when designing or implementing a system.
Constraints can include budget limitations, time constraints, technical limitations, and resource constraints.
Examples of constraints in system engineering include limited processing power, restricted memory capacity, and specific regulatory requirements.
Identifying and understanding constraints is crucial for successful system design and implementation.
Q169. which approach you will follow for writing program
I will follow a structured approach for writing programs.
I will first analyze the problem and gather requirements.
Then, I will design a solution and create a plan.
Next, I will write the code and test it thoroughly.
Finally, I will deploy the program and maintain it.
I will also document the code and follow coding standards.
Q170. What is difference between malloc and calloc
malloc allocates memory but does not initialize it, while calloc allocates and initializes memory to zero.
malloc() takes a single argument, the number of bytes to allocate, while calloc() takes two arguments, the number of elements to allocate and the size of each element.
malloc() returns a pointer to the allocated memory block, while calloc() returns a pointer to the first byte of the allocated memory block.
calloc() is useful for allocating memory for arrays, as it initializ...read more
Q171. Difference between Abstract Class and Interface
Abstract class is a class that can have both abstract and non-abstract methods while interface only has abstract methods.
Abstract class can have constructors while interface cannot
A class can implement multiple interfaces but can only inherit from one abstract class
Abstract class can have instance variables while interface cannot
Abstract class can provide default implementation for some methods while interface cannot
Example of abstract class: Animal (with abstract method 'mak...read more
Q172. What is supervised and unsupervised learning
Supervised learning is when the model is trained on labeled data, while unsupervised learning is when the model is trained on unlabeled data.
Supervised learning requires a dataset with input-output pairs for the model to learn from.
Examples of supervised learning include classification and regression tasks.
Unsupervised learning involves finding patterns and relationships in data without explicit labels.
Examples of unsupervised learning include clustering and dimensionality re...read more
Q173. Write basic html , for inserting image and create table.
Basic HTML code for inserting image and creating a table
Use <img> tag to insert an image with src attribute
Use <table>, <tr>, <td> tags to create a table structure
Specify image source and table content within respective tags
Q174. How to increase performance of stored procedure?
To increase performance of a stored procedure, optimize query execution, use appropriate indexes, minimize data transfer, and consider caching.
Optimize query execution by using efficient joins, avoiding unnecessary subqueries, and reducing the number of rows returned.
Use appropriate indexes to speed up data retrieval and filtering. Analyze the query execution plan to identify missing or unused indexes.
Minimize data transfer by selecting only the required columns, avoiding unn...read more
Q175. What is public and instance class
Public and instance classes are two types of classes in object-oriented programming.
Public classes can be accessed from anywhere in the program, while instance classes can only be accessed within their own instance.
Public classes are often used for utility classes or classes that need to be accessed globally, while instance classes are used for encapsulation and data hiding.
Example of public class: Math class in Java. Example of instance class: Person class with private insta...read more
Q176. What do you know about Angular?
Angular is a popular JavaScript framework for building web applications.
Angular is a TypeScript-based open-source framework developed by Google.
It is used for building single-page applications (SPAs) and dynamic web pages.
Angular follows the MVC (Model-View-Controller) architectural pattern.
It provides features like data binding, dependency injection, and modular development.
Angular has a powerful CLI (Command Line Interface) for scaffolding and managing projects.
Some popular...read more
Q177. Swap two variables values without using third variable
Swap two variables values without using third variable
Use XOR operation to swap two variables without using a third variable
Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b
Ensure variables are not the same to avoid getting zero as result
Q178. What do you know about Blockchain Technology
Blockchain technology is a decentralized, distributed ledger system that securely records transactions across multiple computers.
Decentralized ledger system
Securely records transactions
Distributed across multiple computers
Uses cryptographic techniques to ensure security
Examples include Bitcoin and Ethereum
Q179. what is lambda expression?
A lambda expression is an anonymous function that can be used to create delegates or expression tree types.
Lambda expressions are used to write concise and compact code.
They are commonly used in functional programming and LINQ queries.
Lambda expressions can be used to define inline functions without a formal method declaration.
They provide a way to pass behavior as a method argument.
Lambda expressions can capture variables from the enclosing scope.
Example: (x, y) => x + y is ...read more
Q180. What is software development life cycle?
Software development life cycle (SDLC) is a process used to design, develop, and test software.
SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables.
SDLC helps ensure that software is developed efficiently, meets user requirements, and is of high quality.
Examples of SDLC models include Waterfall, Agile, and DevOps.
Q181. What is meant by method overloading?
Method overloading is when multiple methods in a class have the same name but different parameters.
Allows multiple methods with the same name but different parameters
Helps improve code readability and maintainability
Example: void print(int num) and void print(String text) in a class
Q182. Write a query to find duplicate records
Use a query with GROUP BY and HAVING clause to find duplicate records in a database table.
Use GROUP BY to group records with the same values
Use HAVING COUNT(*) > 1 to filter out duplicate records
Example: SELECT column1, column2, COUNT(*) FROM table_name GROUP BY column1, column2 HAVING COUNT(*) > 1;
Q183. How do you handle stack over flow?
Handle stack overflow by optimizing code, using dynamic memory allocation, and implementing error handling.
Optimize code to reduce memory usage and prevent stack overflow.
Use dynamic memory allocation for large data structures.
Implement error handling to gracefully handle stack overflow situations.
Q184. Is Java a complete OOP language?
Yes, Java is a complete OOP language with features like classes, objects, inheritance, encapsulation, and polymorphism.
Java supports classes and objects for creating reusable code.
It implements inheritance, allowing classes to inherit attributes and methods from other classes.
Encapsulation is achieved through access modifiers like private, protected, and public.
Polymorphism is supported through method overloading and overriding.
Java also includes features like abstraction and...read more
Q185. VSAMs. Define, access and Alternate index.
VSAMs are Virtual Storage Access Method datasets used in mainframe systems for efficient data storage and retrieval.
VSAMs are used to store large amounts of data in a mainframe system.
They provide efficient access to data through various access methods like sequential, random, and dynamic.
Alternate index is a feature of VSAM that allows data to be accessed through a secondary key instead of the primary key.
VSAMs are commonly used for storing transactional data in banking and ...read more
Q186. Current technology in my core field
Current technology in my core field is focused on automation, cloud computing, and artificial intelligence.
Automation is being used to streamline processes and increase efficiency.
Cloud computing is becoming more prevalent as companies move towards remote work and data storage.
Artificial intelligence is being used for data analysis and decision-making.
Machine learning is being used to improve automation and AI capabilities.
Internet of Things (IoT) is being used to connect dev...read more
Q187. what is the difference between list and tuple
List is mutable and tuple is immutable in Python.
List is defined using square brackets [] while tuple is defined using parentheses ().
Elements in a list can be changed, added, or removed after creation. Elements in a tuple cannot be changed after creation.
Lists are typically used for collections of similar items that may need to be modified, while tuples are used for fixed collections of items.
Example: list_example = [1, 2, 3] and tuple_example = (4, 5, 6)
Q188. How are you using OOPS concepts in your project
I am using OOPS concepts in my project to improve code organization, reusability, and maintainability.
I am using encapsulation to hide the internal implementation details of my classes and provide a clean interface for other components to interact with.
I am using inheritance to create a hierarchy of classes, where subclasses inherit properties and behaviors from their parent classes.
I am using polymorphism to allow objects of different classes to be treated as objects of a co...read more
Q189. what is differne betwwen if else and while loop
if-else is a conditional statement while while loop is a repetitive statement.
if-else statement is used to execute a block of code based on a condition
while loop is used to execute a block of code repeatedly as long as a condition is true
if-else statement is used for decision making while while loop is used for iteration
if-else statement can have multiple conditions while while loop has only one condition
Example: if(age > 18){ console.log('You are an adult'); } else { console...read more
Q190. Difference between heap and stack memory?
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Heap memory is allocated at runtime and can be accessed randomly, while stack memory is allocated at compile time and is accessed in a LIFO manner.
Heap memory is managed by the programmer, while stack memory is managed by the compiler.
Heap memory is typically used for storing objects and data structures, while stack memory is used for storing local variables and function...read more
Q191. How to perform keyboard events in selenium
Keyboard events in Selenium can be performed using the Actions class
Use the Actions class to create a new instance
Use the sendKeys method to send keyboard events like typing text
Use the keyDown and keyUp methods to simulate pressing and releasing keys
Q192. Which programming language you prefer for coding.
I prefer using Python for coding due to its simplicity, readability, and versatility.
Python is known for its readability and simplicity, making it easier to write and maintain code
Python has a large standard library and many third-party libraries for various tasks
Python is versatile and can be used for web development, data analysis, automation, and more
Q193. What method overloading and method overriding?
Method overloading is having multiple methods in the same class with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in the superclass.
Method overloading allows a class to have multiple methods with the same name but different parameters.
Method overriding occurs when a subclass provides a specific implementation of a method that is already provided by its superclass.
Method overloading is ...read more
Q194. Define hashing? How to implement hash map?
Hashing is a technique used to map data to a fixed-size array for efficient retrieval.
Hashing involves using a hash function to generate a unique index for each data element.
Hash maps typically consist of an array and a hash function.
To implement a hash map, data is hashed using a hash function and stored in the array at the corresponding index.
Collision resolution techniques like chaining or open addressing can be used to handle cases where multiple data elements hash to the...read more
Q195. Python program to remove duplicate entries in a give array.
Python program to remove duplicate entries in a given array of strings.
Use a set to store unique elements while iterating through the array.
Convert the set back to a list to maintain the order of elements.
Return the list with duplicate entries removed.
Q196. Explain any windows based server troubleshooting procedure you have performed.
I have performed troubleshooting procedures on Windows based servers by identifying the issue, checking event logs, running diagnostic tools, and applying solutions.
Identify the issue reported by the user or monitoring system
Check event logs for any error messages or warnings
Run diagnostic tools such as Windows Server Manager or PowerShell commands
Apply solutions such as restarting services, updating drivers, or applying patches
Document the troubleshooting steps taken and the...read more
Q197. how to link the css file in html
Linking a CSS file in HTML involves using the <link> tag in the <head> section of the HTML document.
Use the <link> tag with the 'rel' attribute set to 'stylesheet' and the 'href' attribute pointing to the CSS file
Place the <link> tag inside the <head> section of the HTML document
Make sure the path in the 'href' attribute is correct and relative to the HTML file
Example: <link rel='stylesheet' type='text/css' href='styles.css'>
Q198. What is meant by the term Oops.?
Oops is a term used in programming to refer to an error or mistake in the code.
Oops stands for Object-Oriented Programming System.
It refers to a mistake or error in the code that causes unexpected behavior.
Common examples of Oops include null pointer exceptions, type mismatches, and syntax errors.
Debugging tools are used to identify and fix Oops in code.
Preventing Oops is important for creating reliable and efficient software.
Q199. 1.What is Opps concepts in Java.
OOPs concepts in Java are the fundamental principles of object-oriented programming.
Encapsulation: wrapping data and code into a single unit
Inheritance: creating new classes from existing ones
Polymorphism: using a single interface to represent multiple types
Abstraction: hiding implementation details from the user
Examples: class, object, inheritance, polymorphism, encapsulation
Q200. Supervised vs unsupervised machine learning. Overfitting and underfitting.
Supervised learning uses labeled data to train a model, while unsupervised learning uses unlabeled data. Overfitting occurs when a model is too complex and fits the training data too closely, while underfitting occurs when a model is too simple and fails to capture the underlying patterns in the data.
Supervised learning requires labeled data for training, such as classification or regression tasks.
Unsupervised learning does not require labeled data and is used for clustering ...read more
More about working at TCS







Top HR Questions asked in TCS System Engineer
Interview Process at TCS System Engineer

Top System Engineer Interview Questions from Similar Companies





