Add office photos
TCS logo
Engaged Employer

TCS

Verified
3.7
based on 90k Reviews
Video summary
Filter interviews by
Clear (1)

600+ TCS System Engineer Interview Questions and Answers

Updated 19 Feb 2025

Q101. What is your understanding of Java Object-Oriented Programming (OOP)?

Ans.

Java OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • Java OOP involves the use of classes and objects.

  • Encapsulation is a key concept where data is kept private within a class and accessed through public methods.

  • Inheritance allows one class to inherit attributes and methods from another class.

  • Polymorphism enables objects to be treated as instances of their parent class.

  • Abstraction in...read more

Add your answer
right arrow

Q102. primary key can be a null or not?

Ans.

No, primary key cannot be null.

  • Primary key uniquely identifies a record in a table.

  • Null values are not unique and can cause data integrity issues.

  • Primary key constraint ensures that the value is not null.

  • However, primary key can have a default value.

View 1 answer
right arrow
TCS System Engineer Interview Questions and Answers for Freshers
illustration image

Q103. What is Search Engine Optimization?

Ans.

Search Engine Optimization (SEO) is the process of improving a website's visibility on search engines to increase organic traffic.

  • SEO involves optimizing website content, meta tags, and backlinks to improve search engine rankings.

  • Keyword research is crucial for SEO to target relevant search terms.

  • Creating high-quality content and obtaining backlinks from reputable websites can boost SEO.

  • Regularly monitoring and analyzing website performance using tools like Google Analytics i...read more

Add your answer
right arrow

Q104. Difference between stored procedure and functions Difference between drop and truncate How to write query for selecting 5th max salary Oops concepts How to manage session in asp. Net MVC

Ans.

Questions related to SQL, OOPs concepts, and ASP.NET MVC session management

  • Stored procedures and functions are both database objects used to encapsulate a set of SQL statements for reuse

  • DROP is used to remove a table or database object, while TRUNCATE is used to remove all rows from a table

  • To select the 5th maximum salary, use the OFFSET and FETCH clauses in SQL Server

  • OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction

  • Session management in ASP.NET ...read more

Add your answer
right arrow
Discover TCS interview dos and don'ts from real experiences

Q105. Differentiate between nvl and nvl2.why We use them.

Ans.

nvl and nvl2 are Oracle functions used to handle null values in SQL queries.

  • nvl is used to replace null values with a specified default value.

  • nvl2 is used to return one value if a specified expression is not null, and another value if it is null.

  • nvl is typically used in scenarios where you want to replace null values with a default value, such as displaying 'N/A' instead of null.

  • nvl2 is useful when you need to perform different actions based on whether a value is null or not,...read more

Add your answer
right arrow

Q106. 1) Internals of Hashmap 2) What is the ER diagram, and draw the ER diagram of your project. 3) What is Synchronization in Java? Explain Deadlock.

Ans.

A hashmap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.

  • Hashmap is implemented using an array of linked lists or a balanced tree

  • It uses a hash function to convert keys into array indices

  • Collision can occur when two keys hash to the same index, resolved using separate chaining or open addressing

  • Retrieval of values is fast as it directly calculates the index using the hash function

  • Insertion and deletion operations can ...read more

Add your answer
right arrow
Are these interview questions helpful?

Q107. have you ever developed restful web service? how?

Ans.

Yes, I have developed RESTful web services.

  • I have used frameworks like Spring Boot or Node.js to develop RESTful web services.

  • I have defined the endpoints and HTTP methods (GET, POST, PUT, DELETE) for the web service.

  • I have implemented the business logic and data processing in the web service.

  • I have used JSON or XML as the data format for request and response payloads.

  • I have handled authentication and authorization using tokens or API keys.

  • I have tested the web service using ...read more

Add your answer
right arrow

Q108. What is oops ? What is ORM in python? Multiple Inheritance in java vs python?

Ans.

OOPs is a programming paradigm that uses objects to represent real-world entities. ORM is a technique to map objects to relational databases.

  • OOPs stands for Object-Oriented Programming.

  • It is based on the concept of objects, which can contain data and code.

  • In OOPs, objects interact with each other to perform tasks.

  • ORM stands for Object-Relational Mapping.

  • It is a technique to map objects to relational databases.

  • ORM allows developers to work with objects instead of SQL statement...read more

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q109. Can you explain encapsulation?

Ans.

Encapsulation is the process of hiding internal details and providing a public interface for accessing and manipulating data.

  • Encapsulation is a fundamental concept in object-oriented programming.

  • It allows for data abstraction and information hiding.

  • Encapsulation helps in achieving data integrity and security.

  • It promotes code reusability and modularity.

  • Example: A class in Java with private variables and public methods.

View 1 answer
right arrow

Q110. What is normalization?

Ans.

Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.

  • Normalization helps in reducing data redundancy by breaking down a large table into smaller, more manageable tables.

  • It ensures that each piece of data is stored in only one place, reducing the chances of inconsistencies.

  • Normalization follows a set of rules called normal forms, such as First Normal Form (1NF), Second Normal Form (2NF), etc.

  • Normalization improves dat...read more

View 1 answer
right arrow

Q111. 2.What is difference between stack and queue?

Ans.

Stack is a LIFO data structure while Queue is a FIFO data structure.

  • Stack follows Last In First Out (LIFO) principle while Queue follows First In First Out (FIFO) principle.

  • Stack has two main operations: push and pop while Queue has two main operations: enqueue and dequeue.

  • Stack is used in recursive function calls, undo/redo operations, and backtracking while Queue is used in breadth-first search, printing tasks in order, and handling requests in a web server.

  • Examples of Stac...read more

Add your answer
right arrow

Q112. Do you Know Phantom Deadlocks?

Ans.

Yes, phantom deadlocks are a type of deadlock that occur due to incorrect lock ordering.

  • Phantom deadlocks occur when multiple processes or threads attempt to acquire locks in a different order.

  • This can lead to a situation where each process is waiting for a lock held by another process, resulting in a deadlock.

  • Phantom deadlocks can be difficult to detect and reproduce as they are intermittent and depend on the timing of lock acquisitions.

  • To prevent phantom deadlocks, it is im...read more

Add your answer
right arrow

Q113. What are cookies in PHP?

Ans.

Cookies in PHP are small text files that are stored on the user's computer to track and store information about the user's activities on a website.

  • Cookies are used to remember user preferences and login information.

  • They can be set, retrieved, and deleted using PHP's setcookie(), $_COOKIE, and setcookie() functions respectively.

  • Cookies can have an expiration date and can be set to be accessible only over a secure connection.

  • They are commonly used for tracking user behavior, pe...read more

Add your answer
right arrow

Q114. what is LAN MAN WAN PAN ETC

Ans.

LAN, MAN, WAN, PAN are types of computer networks that differ in their geographical coverage and purpose.

  • LAN (Local Area Network) is a network that covers a small area like a home, office, or building.

  • MAN (Metropolitan Area Network) is a network that covers a larger area like a city or town.

  • WAN (Wide Area Network) is a network that covers a large geographical area like a country or the whole world.

  • PAN (Personal Area Network) is a network that connects devices within a person'...read more

Add your answer
right arrow

Q115. What is superclass? What do you know about java? what is oop?

Ans.

A superclass is a class that is inherited by one or more subclasses.

  • Superclass is a concept in object-oriented programming (OOP).

  • It is a class that is extended by other classes called subclasses.

  • Subclasses inherit the properties and methods of the superclass.

  • Superclass is also known as a base class or parent class.

  • Example: In Java, the Object class is a superclass for all other classes.

  • Example: A Vehicle class can be a superclass for Car, Truck, and Motorcycle classes.

Add your answer
right arrow

Q116. What are Constructors?

Ans.

Constructors are special methods used to initialize objects in a class.

  • Constructors have the same name as the class they belong to.

  • They are called automatically when an object is created.

  • They can be used to set default values for object properties.

  • Constructors can be overloaded to accept different parameters.

  • Example: public class Car { public Car() { //constructor code here } }

Add your answer
right arrow

Q117. write a program for division nd multiplication inn 8085 processor

Ans.

Program for division and multiplication in 8085 processor.

  • For multiplication, use MUL instruction with 8-bit operand.

  • For division, use DIV instruction with 8-bit dividend and 16-bit divisor.

  • Store the result in appropriate registers or memory locations.

  • Example: To multiply two numbers in registers B and C, use MUL C instruction.

  • Example: To divide two numbers in registers A and B, use DIV B instruction.

Add your answer
right arrow

Q118. explain the concepts of a router

Ans.

A router is a networking device that forwards data packets between computer networks.

  • A router operates at the network layer of the OSI model.

  • It uses routing tables to determine the best path for data packets to reach their destination.

  • Routers can connect multiple networks together, such as LANs and WANs.

  • They provide network address translation (NAT) to allow multiple devices to share a single public IP address.

  • Routers can also provide firewall functionality to protect the net...read more

Add your answer
right arrow

Q119. How to reverse string, array. What is args in Java.

Ans.

To reverse a string or array in Java, use StringBuilder or Collections.reverse. 'args' in Java is an array of strings passed as command line arguments.

  • Use StringBuilder to reverse a string: StringBuilder str = new StringBuilder('hello'); str.reverse();

  • Use Collections.reverse to reverse an array: List list = Arrays.asList('apple', 'banana', 'cherry'); Collections.reverse(list);

  • 'args' in Java is an array of strings used to pass command line arguments to a Java program.

Add your answer
right arrow

Q120. Differences between Object Oriented and Procedure oriented programming languages

Ans.

Object-oriented programming focuses on objects and their interactions, while procedure-oriented programming focuses on procedures and functions.

  • OOP is based on the concept of classes and objects, while POP is based on procedures and functions.

  • OOP supports encapsulation, inheritance, and polymorphism, while POP does not.

  • OOP is more suitable for large-scale projects, while POP is more suitable for small-scale projects.

  • Examples of OOP languages include Java, C++, and Python, whi...read more

Add your answer
right arrow

Q121. How to define constructors in python

Ans.

Constructors in Python are defined using the __init__() method.

  • The __init__() method is called when an object is created.

  • It initializes the object's attributes.

  • The first parameter of __init__() is always self.

  • Example: def __init__(self, name, age): self.name = name; self.age = age

Add your answer
right arrow

Q122. How will you compile a DB2 cobol program using JCL

Ans.

To compile a DB2 COBOL program using JCL, use the IBM COBOL compiler and specify the necessary parameters.

  • Use the IBM COBOL compiler, which can be invoked using the IGYCRCTL utility

  • Specify the necessary parameters, such as the input and output datasets, the DB2 subsystem name, and the DBRM name

  • Include any necessary JCL statements, such as DD statements for the input and output datasets

  • Example JCL: //COMPJOB JOB (ACCT#),CLASS=CLASS,MSGCLASS=MSGCLASS

  • //COBOL.SYSIN DD DSN=MY.COBO...read more

Add your answer
right arrow

Q123. What is the use of COND statements in JCL steps

Ans.

COND statements in JCL steps are used to conditionally execute a step based on the return code of a previous step.

  • COND statements are used to specify the conditions under which a step should be executed.

  • They are typically used to check the return code of a previous step and execute the current step only if the return code meets certain criteria.

  • COND statements can be used to specify multiple conditions, allowing for more complex logic in JCL.

  • Examples of COND statements includ...read more

Add your answer
right arrow

Q124. 3.Write SQL query to find second highest salary in database?

Ans.

SQL query to find second highest salary in database

  • Use ORDER BY and LIMIT to get the second highest salary

  • Assume ties are allowed and use DISTINCT

Add your answer
right arrow

Q125. what are static & dynamic protocols

Ans.

Static protocols are fixed and do not change, while dynamic protocols can adapt to changing network conditions.

  • Static protocols are typically used in simple networks with predictable traffic patterns.

  • Dynamic protocols are used in complex networks with varying traffic patterns.

  • Examples of static protocols include ARP and RARP.

  • Examples of dynamic protocols include OSPF and BGP.

Add your answer
right arrow

Q126. What software development process do you follow?

Ans.

I follow the Agile software development process.

  • I prioritize customer satisfaction and collaboration with the team.

  • I break down the project into smaller tasks and work on them in short iterations.

  • I conduct regular meetings to review progress and make necessary adjustments.

  • I emphasize on continuous improvement and adaptability to changes.

  • Examples: Scrum, Kanban, XP

Add your answer
right arrow

Q127. What is the difference between spring and springboot

Ans.

Spring is a framework for building Java applications, while Spring Boot is a tool that simplifies the setup and configuration of Spring applications.

  • Spring is a comprehensive framework that provides various modules for building Java applications, such as Spring MVC for web applications and Spring Data for data access.

  • Spring Boot is an opinionated tool that simplifies the setup and configuration of Spring applications by providing defaults and auto-configuration.

  • Spring Boot al...read more

Add your answer
right arrow

Q128. Linux / windows which one is more secure?

Ans.

Both Linux and Windows have their own security features and vulnerabilities.

  • Linux is known for its strong security features like SELinux and AppArmor.

  • Windows has improved its security with features like Windows Defender and BitLocker.

  • However, both operating systems have had their fair share of security vulnerabilities and attacks.

  • Ultimately, the level of security depends on how well the system is configured and maintained.

  • It's important to regularly update and patch both Linu...read more

Add your answer
right arrow

Q129. What are the different types of data types in python

Ans.

Python has various data types including integers, floats, strings, lists, tuples, dictionaries, and sets.

  • Integers: whole numbers without decimal points (e.g. 5, -3)

  • Floats: numbers with decimal points (e.g. 3.14, -0.5)

  • Strings: sequences of characters enclosed in quotes (e.g. 'hello', '123')

  • Lists: ordered collections of items (e.g. [1, 'apple', True])

  • Tuples: ordered, immutable collections of items (e.g. (1, 'banana', False))

  • Dictionaries: unordered collections of key-value pairs...read more

Add your answer
right arrow

Q130. What is MVC? Difference between TempData, ViewData and ViewBag Opps concepts SQL related questions

Ans.

MVC is a software architectural pattern used for developing web applications.

  • Model-View-Controller separates the application into three main components: Model (data), View (UI), and Controller (logic)

  • TempData, ViewData, and ViewBag are used to pass data from controller to view in ASP.NET MVC

  • OOP concepts include inheritance, encapsulation, polymorphism, and abstraction

  • SQL questions may include queries, joins, indexes, and normalization

Add your answer
right arrow

Q131. what should a system administrator`s routine be?

Ans.

A system administrator's routine involves monitoring system performance, troubleshooting issues, implementing security measures, and maintaining backups.

  • Regularly monitoring system performance and resource usage

  • Troubleshooting and resolving technical issues as they arise

  • Implementing and maintaining security measures to protect the system from cyber threats

  • Performing regular backups and ensuring data integrity

  • Updating software and firmware to ensure system stability and securi...read more

Add your answer
right arrow

Q132. What you know about electric vehicle

Ans.

Electric vehicles are vehicles that run on electricity instead of gasoline or diesel.

  • Electric vehicles use rechargeable batteries to power an electric motor.

  • They produce zero emissions, making them environmentally friendly.

  • Electric vehicles can be charged at home or at public charging stations.

  • They are becoming more popular as technology improves and prices decrease.

  • Examples of electric vehicles include the Tesla Model S, Nissan Leaf, and Chevy Bolt.

Add your answer
right arrow

Q133. 4. Difference Between method overloading and method overriding?

Ans.

Method overloading is having multiple methods with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.

  • Method overloading is done within the same class while method overriding is done in different classes (subclass and superclass).

  • Method overloading is achieved by changing the number of parameters or the data type of parameters while method overriding is achieved by changing...read more

Add your answer
right arrow

Q134. Explain characteristics of DBMS?

Ans.

DBMS is a software system that manages databases, providing features like data storage, retrieval, and manipulation.

  • DBMS stands for Database Management System.

  • It provides a structured way to store and organize data.

  • DBMS allows multiple users to access and manipulate the data simultaneously.

  • It ensures data integrity and security through various mechanisms.

  • DBMS provides a query language to retrieve and manipulate data, such as SQL.

  • Examples of popular DBMS include Oracle, MySQL,...read more

Add your answer
right arrow

Q135. 3. Find the sum of all numbers from a list except self

Ans.

Sum all numbers in a list except self

  • Iterate through the list and add all numbers except the current one

  • Use a loop or built-in functions like sum() and list comprehension

Add your answer
right arrow

Q136. Write a code for swapping of 2 numbers without using 3rd variable

Ans.

Swapping two numbers without using a third variable in code

  • Use bitwise XOR operation to swap two numbers without using a third variable

  • Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b

  • Ensure to handle edge cases like swapping same numbers

Add your answer
right arrow

Q137. What is s3 What is ec2 What vpc What isAmazon connect Subnet Design vpc and i need 50 IPS

Ans.

S3 is a scalable storage service, EC2 is a virtual server service, VPC is a virtual private cloud, Amazon Connect is a cloud-based contact center service, subnet is a range of IP addresses, design VPC with 50 IPs.

  • S3 - Scalable storage service by AWS

  • EC2 - Virtual server service by AWS

  • VPC - Virtual Private Cloud for networking in AWS

  • Amazon Connect - Cloud-based contact center service by AWS

  • Subnet - Range of IP addresses within a VPC

  • Design VPC with 50 IPs - Create a VPC with a s...read more

Add your answer
right arrow

Q138. What is the difference between DBMS and NoSQL?

Ans.

DBMS is a traditional relational database management system, while NoSQL is a non-relational database management system.

  • DBMS uses structured query language (SQL) for querying and managing data, while NoSQL databases use different query languages or APIs.

  • DBMS is typically used for structured data with predefined schemas, while NoSQL is more flexible and can handle unstructured or semi-structured data.

  • DBMS is ACID-compliant (Atomicity, Consistency, Isolation, Durability), ensur...read more

Add your answer
right arrow

Q139. What are temp data, view data and view bag in MVC

Ans.

Temp data, view data, and view bag are ways to pass data from controller to view in MVC.

  • Temp data is used to pass data between controller and view for a single request.

  • View data is used to pass data from controller to view for the current request.

  • View bag is a dynamic object used to pass data from controller to view for the current request.

Add your answer
right arrow

Q140. What are the programming languages you know?

Ans.

I am proficient in programming languages such as Java, Python, C++, and SQL.

  • Java

  • Python

  • C++

  • SQL

Add your answer
right arrow

Q141. What is the difference between polymorphism and encapsulation

Ans.

Polymorphism allows objects of different classes to be treated as objects of a common superclass. Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Polymorphism enables a single interface to represent different data types or objects. For example, a superclass Animal can have subclasses like Dog and Cat, each with their own implementation of the speak() method.

  • Encapsulation hides the internal state of an object and only expos...read more

Add your answer
right arrow

Q142. What is difference between Machine Learning and Deep Learning

Ans.

Machine learning is a subset of AI that allows systems to learn from data and make predictions, while deep learning is a subset of machine learning that uses neural networks to model and process data.

  • Machine learning is a broader concept that involves algorithms that can learn from and make predictions on data.

  • Deep learning is a subset of machine learning that uses neural networks with multiple layers to model and process data.

  • Deep learning requires a large amount of data and...read more

Add your answer
right arrow

Q143. What is GitHub, and what is its purpose?

Ans.

GitHub is a web-based platform for version control using Git, facilitating collaboration and code sharing among developers.

  • GitHub is used for hosting and sharing code repositories.

  • It allows for version control using Git, enabling developers to track changes and collaborate on projects.

  • Developers can create branches, submit pull requests, and merge code changes easily.

  • GitHub provides features like issue tracking, wikis, and project management tools.

  • Popular open-source projects...read more

Add your answer
right arrow

Q144. SQL joins difference, daily activities whatever done in previous organization

Ans.

Explained SQL joins and daily activities from previous organization.

  • Explained different types of SQL joins such as inner join, left join, right join, and full outer join.

  • Gave examples of how to use SQL joins to combine data from multiple tables.

  • Discussed daily activities such as troubleshooting database issues, optimizing queries, and creating reports.

  • Mentioned experience with database management systems like MySQL, Oracle, and SQL Server.

Add your answer
right arrow

Q145. Explain this line public static void main (string args [])

Ans.

Entry point of Java program, must be public, static, void and accept array of strings as argument.

  • public: method can be accessed from anywhere

  • static: method belongs to class, not instance

  • void: method does not return any value

  • main: method name, entry point of program

  • string args[]: array of strings, command line arguments

Add your answer
right arrow

Q146. What is docker and it's used(mentioned in resume)

Ans.

Docker is a platform for developing, shipping, and running applications in containers.

  • Docker allows applications to be packaged with all dependencies into a container for easy deployment.

  • Containers are lightweight, portable, and isolated environments that run on a shared operating system.

  • Docker simplifies the process of managing and scaling applications across different environments.

  • Examples: Running a web server, database, or microservices in separate containers on the same ...read more

Add your answer
right arrow

Q147. What are the action filters in MVC c#

Ans.

Action filters are attributes that can be applied to controller actions to perform pre/post processing.

  • Action filters are used to modify the behavior of an action method.

  • They can be used to perform authentication, logging, caching, etc.

  • Some built-in action filters in MVC are Authorize, OutputCache, HandleError, etc.

Add your answer
right arrow

Q148. Write a python program to square the elements of list using list comptehension.

Ans.

Python program to square the elements of list using list comprehension.

  • Create a list of numbers

  • Use list comprehension to square each element

  • Print the new list

Add your answer
right arrow

Q149. What are the basic types of Security attacks

Ans.

Basic types of security attacks include malware, phishing, denial of service, man-in-the-middle, and SQL injection.

  • Malware: malicious software designed to harm or exploit a computer system

  • Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity

  • Denial of Service (DoS): flooding a system with excessive requests to disrupt normal operations

  • Man-in-the-middle: intercepting communication between two parties without their knowledge

  • SQL injec...read more

Add your answer
right arrow

Q150. What are famous oops concepts/ pillars of oops

Ans.

The famous pillars of OOPs concepts are Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer
right arrow

Q151. Which is your favorite language and explain why.

Ans.

My favorite language is Python because of its simplicity and versatility.

  • Python has a simple syntax which makes it easy to learn and use.

  • It has a vast library of modules and frameworks for various purposes.

  • Python is used in various fields such as web development, data science, machine learning, and automation.

  • Python is an interpreted language which makes it easy to debug and test code.

  • Python has a large community of developers who contribute to its development and support.

  • Som...read more

Add your answer
right arrow

Q152. Problem arrange 3 numbers in ascending order. Just write the logic

Ans.

Logic to arrange 3 numbers in ascending order.

  • Compare first two numbers and swap if necessary

  • Compare second and third numbers and swap if necessary

  • Repeat until no more swaps are needed

Add your answer
right arrow

Q153. Difference between ArrayList, HashSet and HashMap

Ans.

ArrayList is a resizable array, HashSet is an unordered collection of unique elements, and HashMap is a key-value pair collection.

  • ArrayList allows duplicates and maintains insertion order

  • HashSet does not allow duplicates and does not maintain order

  • HashMap stores key-value pairs and allows null values for both keys and values

Add your answer
right arrow

Q154. Why did you create project in machine learning

Ans.

I created a project in machine learning to improve the accuracy of a recommendation system.

  • To enhance the user experience by providing personalized recommendations

  • To optimize the efficiency of the system by automating the recommendation process

  • To leverage the power of data analysis and pattern recognition in making accurate predictions

  • To explore the potential of machine learning algorithms in solving real-world problems

  • To stay updated with the latest advancements in the field...read more

Add your answer
right arrow

Q155. diff betn passive & active components

Ans.

Passive components do not require an external power source, while active components do.

  • Passive components include resistors, capacitors, and inductors.

  • Active components include transistors, diodes, and integrated circuits.

  • Passive components do not amplify signals, while active components do.

  • Passive components are used to control the flow of electricity, while active components are used to create and amplify signals.

Add your answer
right arrow

Q156. What is Ansible How to maintains secret in Ansible How to monitor k8s

Ans.

Ansible is an open-source automation tool that helps in configuration management, application deployment, and task automation.

  • Ansible uses YAML syntax to define tasks and playbooks

  • It uses SSH protocol to communicate with remote servers

  • Ansible Vault is used to maintain secrets like passwords, API keys, etc.

  • To monitor k8s, Ansible provides modules like k8s_info, k8s_scale, k8s_service, etc.

Add your answer
right arrow

Q157. What is oops What is array What are list Differences between list and array

Ans.

OOPs stands for Object-Oriented Programming. An array is a data structure that stores a collection of elements. Lists are a type of data structure that can store multiple items.

  • OOPs stands for Object-Oriented Programming and is a programming paradigm based on the concept of objects.

  • An array is a data structure that stores a collection of elements of the same data type. For example, an array of integers [1, 2, 3].

  • Lists are a type of data structure that can store multiple items...read more

Add your answer
right arrow

Q158. What is Test NG? What is Selenium ? What is Cucumber? Api

Ans.

TestNG is a testing framework for Java. Selenium is a tool for automating web browsers. Cucumber is a BDD testing tool. API is a set of protocols for building software applications.

  • TestNG is used for unit, functional, and integration testing in Java.

  • Selenium is used for automating web browsers to test web applications.

  • Cucumber is a BDD testing tool that allows tests to be written in plain language.

  • API is a set of protocols for building software applications that allows differ...read more

Add your answer
right arrow

Q159. What is difference between STACK and HEAP memory?

Ans.

STACK memory is used for static memory allocation and follows Last In First Out (LIFO) structure, while HEAP memory is used for dynamic memory allocation and is managed by the programmer.

  • STACK memory is faster to allocate and deallocate compared to HEAP memory.

  • Variables stored in STACK memory have limited scope and lifetime, while variables in HEAP memory can be accessed globally.

  • Example: Local variables in a function are stored in STACK memory, while objects created using 'n...read more

Add your answer
right arrow

Q160. Difference between aem 6.4, 6.5 and AEM as cloud service.

Ans.

AEM 6.4 and 6.5 are on-premise versions while AEM as Cloud Service is a cloud-based version of Adobe Experience Manager.

  • AEM 6.4 and 6.5 require installation and maintenance on-premise while AEM as Cloud Service is fully managed by Adobe.

  • AEM as Cloud Service offers automatic updates and scalability while AEM 6.4 and 6.5 require manual updates and scaling.

  • AEM as Cloud Service offers a headless CMS option while AEM 6.4 and 6.5 do not.

  • AEM as Cloud Service offers a simplified depl...read more

View 1 answer
right arrow

Q161. What are the oops? Explain with eachn one.

Ans.

Oops stands for Object-Oriented Programming concepts which are used to develop software applications.

  • Encapsulation - binding data and functions that manipulate the data together

  • Inheritance - creating new classes from existing classes

  • Polymorphism - ability of objects to take on multiple forms

  • Abstraction - hiding implementation details and showing only functionality

Add your answer
right arrow

Q162. What is cloud computing and explain?

Ans.

Cloud computing is the delivery of computing services over the internet, allowing users to access and store data and applications remotely.

  • Cloud computing allows users to access data and applications from any device with an internet connection.

  • It eliminates the need for physical hardware and on-site data centers.

  • Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

Add your answer
right arrow

Q163. what is different between workgroup and domain

Ans.

Workgroup is a peer-to-peer network where each computer has its own security settings, while a domain is a centralized network managed by a server with shared security settings.

  • Workgroup is decentralized, each computer manages its own security settings

  • Domain is centralized, managed by a server with shared security settings

  • Workgroup is suitable for small networks, domain is suitable for larger networks

  • In a workgroup, users have to create accounts on each computer they want to ...read more

Add your answer
right arrow

Q164. Do you know coding?

Ans.

Yes, I know coding.

  • I am proficient in programming languages such as Java, Python, and C++.

  • I have experience in developing and maintaining software applications.

  • I am familiar with software development methodologies such as Agile and Waterfall.

Add your answer
right arrow

Q165. Comp 1 and Comp 3 usage clause variables in cobol

Ans.

Comp 1 and Comp 3 are usage clause variables in COBOL.

  • Comp 1 is used for binary data and takes up 2 bytes of storage.

  • Comp 3 is used for packed decimal data and takes up variable storage depending on the number of digits.

  • Usage clause variables are used to define the type of data and how it is stored in memory.

Add your answer
right arrow

Q166. Write code(on paper) for finding prime number from the given number.

Ans.

Code to find prime numbers from a given number

  • Iterate from 2 to the given number

  • Check if the number is divisible by any number other than 1 and itself

  • If not divisible, then it is a prime number

Add your answer
right arrow

Q167. Where you check the application logs in SAP?

Ans.

Application logs in SAP can be checked in transaction code SLG1.

  • Application logs can be checked in transaction code SLG1.

  • Logs can also be viewed in transaction code SM21 for system logs.

  • Use transaction code ST11 for developer traces.

  • Logs can be accessed directly in the file system using transaction AL11.

Add your answer
right arrow

Q168. What are constraints?

Ans.

Constraints are limitations or restrictions that must be considered when designing or implementing a system.

  • Constraints can include budget limitations, time constraints, technical limitations, and resource constraints.

  • Examples of constraints in system engineering include limited processing power, restricted memory capacity, and specific regulatory requirements.

  • Identifying and understanding constraints is crucial for successful system design and implementation.

Add your answer
right arrow

Q169. which approach you will follow for writing program

Ans.

I will follow a structured approach for writing programs.

  • I will first analyze the problem and gather requirements.

  • Then, I will design a solution and create a plan.

  • Next, I will write the code and test it thoroughly.

  • Finally, I will deploy the program and maintain it.

  • I will also document the code and follow coding standards.

Add your answer
right arrow

Q170. What is difference between malloc and calloc

Ans.

malloc allocates memory but does not initialize it, while calloc allocates and initializes memory to zero.

  • malloc() takes a single argument, the number of bytes to allocate, while calloc() takes two arguments, the number of elements to allocate and the size of each element.

  • malloc() returns a pointer to the allocated memory block, while calloc() returns a pointer to the first byte of the allocated memory block.

  • calloc() is useful for allocating memory for arrays, as it initializ...read more

Add your answer
right arrow

Q171. Difference between Abstract Class and Interface

Ans.

Abstract class is a class that can have both abstract and non-abstract methods while interface only has abstract methods.

  • Abstract class can have constructors while interface cannot

  • A class can implement multiple interfaces but can only inherit from one abstract class

  • Abstract class can have instance variables while interface cannot

  • Abstract class can provide default implementation for some methods while interface cannot

  • Example of abstract class: Animal (with abstract method 'mak...read more

Add your answer
right arrow

Q172. What is supervised and unsupervised learning

Ans.

Supervised learning is when the model is trained on labeled data, while unsupervised learning is when the model is trained on unlabeled data.

  • Supervised learning requires a dataset with input-output pairs for the model to learn from.

  • Examples of supervised learning include classification and regression tasks.

  • Unsupervised learning involves finding patterns and relationships in data without explicit labels.

  • Examples of unsupervised learning include clustering and dimensionality re...read more

Add your answer
right arrow

Q173. Write basic html , for inserting image and create table.

Ans.

Basic HTML code for inserting image and creating a table

  • Use <img> tag to insert an image with src attribute

  • Use <table>, <tr>, <td> tags to create a table structure

  • Specify image source and table content within respective tags

Add your answer
right arrow

Q174. How to increase performance of stored procedure?

Ans.

To increase performance of a stored procedure, optimize query execution, use appropriate indexes, minimize data transfer, and consider caching.

  • Optimize query execution by using efficient joins, avoiding unnecessary subqueries, and reducing the number of rows returned.

  • Use appropriate indexes to speed up data retrieval and filtering. Analyze the query execution plan to identify missing or unused indexes.

  • Minimize data transfer by selecting only the required columns, avoiding unn...read more

Add your answer
right arrow

Q175. What is public and instance class

Ans.

Public and instance classes are two types of classes in object-oriented programming.

  • Public classes can be accessed from anywhere in the program, while instance classes can only be accessed within their own instance.

  • Public classes are often used for utility classes or classes that need to be accessed globally, while instance classes are used for encapsulation and data hiding.

  • Example of public class: Math class in Java. Example of instance class: Person class with private insta...read more

Add your answer
right arrow

Q176. What do you know about Angular?

Ans.

Angular is a popular JavaScript framework for building web applications.

  • Angular is a TypeScript-based open-source framework developed by Google.

  • It is used for building single-page applications (SPAs) and dynamic web pages.

  • Angular follows the MVC (Model-View-Controller) architectural pattern.

  • It provides features like data binding, dependency injection, and modular development.

  • Angular has a powerful CLI (Command Line Interface) for scaffolding and managing projects.

  • Some popular...read more

View 1 answer
right arrow

Q177. Swap two variables values without using third variable

Ans.

Swap two variables values without using third variable

  • Use XOR operation to swap two variables without using a third variable

  • Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b

  • Ensure variables are not the same to avoid getting zero as result

Add your answer
right arrow

Q178. What do you know about Blockchain Technology

Ans.

Blockchain technology is a decentralized, distributed ledger system that securely records transactions across multiple computers.

  • Decentralized ledger system

  • Securely records transactions

  • Distributed across multiple computers

  • Uses cryptographic techniques to ensure security

  • Examples include Bitcoin and Ethereum

Add your answer
right arrow

Q179. what is lambda expression?

Ans.

A lambda expression is an anonymous function that can be used to create delegates or expression tree types.

  • Lambda expressions are used to write concise and compact code.

  • They are commonly used in functional programming and LINQ queries.

  • Lambda expressions can be used to define inline functions without a formal method declaration.

  • They provide a way to pass behavior as a method argument.

  • Lambda expressions can capture variables from the enclosing scope.

  • Example: (x, y) => x + y is ...read more

View 2 more answers
right arrow

Q180. What is software development life cycle?

Ans.

Software development life cycle (SDLC) is a process used to design, develop, and test software.

  • SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.

  • Each phase has its own set of activities and deliverables.

  • SDLC helps ensure that software is developed efficiently, meets user requirements, and is of high quality.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

Add your answer
right arrow

Q181. What is meant by method overloading?

Ans.

Method overloading is when multiple methods in a class have the same name but different parameters.

  • Allows multiple methods with the same name but different parameters

  • Helps improve code readability and maintainability

  • Example: void print(int num) and void print(String text) in a class

Add your answer
right arrow

Q182. Write a query to find duplicate records

Ans.

Use a query with GROUP BY and HAVING clause to find duplicate records in a database table.

  • Use GROUP BY to group records with the same values

  • Use HAVING COUNT(*) > 1 to filter out duplicate records

  • Example: SELECT column1, column2, COUNT(*) FROM table_name GROUP BY column1, column2 HAVING COUNT(*) > 1;

Add your answer
right arrow

Q183. How do you handle stack over flow?

Ans.

Handle stack overflow by optimizing code, using dynamic memory allocation, and implementing error handling.

  • Optimize code to reduce memory usage and prevent stack overflow.

  • Use dynamic memory allocation for large data structures.

  • Implement error handling to gracefully handle stack overflow situations.

Add your answer
right arrow

Q184. Is Java a complete OOP language?

Ans.

Yes, Java is a complete OOP language with features like classes, objects, inheritance, encapsulation, and polymorphism.

  • Java supports classes and objects for creating reusable code.

  • It implements inheritance, allowing classes to inherit attributes and methods from other classes.

  • Encapsulation is achieved through access modifiers like private, protected, and public.

  • Polymorphism is supported through method overloading and overriding.

  • Java also includes features like abstraction and...read more

Add your answer
right arrow

Q185. VSAMs. Define, access and Alternate index.

Ans.

VSAMs are Virtual Storage Access Method datasets used in mainframe systems for efficient data storage and retrieval.

  • VSAMs are used to store large amounts of data in a mainframe system.

  • They provide efficient access to data through various access methods like sequential, random, and dynamic.

  • Alternate index is a feature of VSAM that allows data to be accessed through a secondary key instead of the primary key.

  • VSAMs are commonly used for storing transactional data in banking and ...read more

Add your answer
right arrow

Q186. Current technology in my core field

Ans.

Current technology in my core field is focused on automation, cloud computing, and artificial intelligence.

  • Automation is being used to streamline processes and increase efficiency.

  • Cloud computing is becoming more prevalent as companies move towards remote work and data storage.

  • Artificial intelligence is being used for data analysis and decision-making.

  • Machine learning is being used to improve automation and AI capabilities.

  • Internet of Things (IoT) is being used to connect dev...read more

View 3 more answers
right arrow

Q187. what is the difference between list and tuple

Ans.

List is mutable and tuple is immutable in Python.

  • List is defined using square brackets [] while tuple is defined using parentheses ().

  • Elements in a list can be changed, added, or removed after creation. Elements in a tuple cannot be changed after creation.

  • Lists are typically used for collections of similar items that may need to be modified, while tuples are used for fixed collections of items.

  • Example: list_example = [1, 2, 3] and tuple_example = (4, 5, 6)

Add your answer
right arrow

Q188. How are you using OOPS concepts in your project

Ans.

I am using OOPS concepts in my project to improve code organization, reusability, and maintainability.

  • I am using encapsulation to hide the internal implementation details of my classes and provide a clean interface for other components to interact with.

  • I am using inheritance to create a hierarchy of classes, where subclasses inherit properties and behaviors from their parent classes.

  • I am using polymorphism to allow objects of different classes to be treated as objects of a co...read more

Add your answer
right arrow

Q189. what is differne betwwen if else and while loop

Ans.

if-else is a conditional statement while while loop is a repetitive statement.

  • if-else statement is used to execute a block of code based on a condition

  • while loop is used to execute a block of code repeatedly as long as a condition is true

  • if-else statement is used for decision making while while loop is used for iteration

  • if-else statement can have multiple conditions while while loop has only one condition

  • Example: if(age > 18){ console.log('You are an adult'); } else { console...read more

Add your answer
right arrow

Q190. Difference between heap and stack memory?

Ans.

Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.

  • Heap memory is allocated at runtime and can be accessed randomly, while stack memory is allocated at compile time and is accessed in a LIFO manner.

  • Heap memory is managed by the programmer, while stack memory is managed by the compiler.

  • Heap memory is typically used for storing objects and data structures, while stack memory is used for storing local variables and function...read more

Add your answer
right arrow

Q191. How to perform keyboard events in selenium

Ans.

Keyboard events in Selenium can be performed using the Actions class

  • Use the Actions class to create a new instance

  • Use the sendKeys method to send keyboard events like typing text

  • Use the keyDown and keyUp methods to simulate pressing and releasing keys

Add your answer
right arrow

Q192. Which programming language you prefer for coding.

Ans.

I prefer using Python for coding due to its simplicity, readability, and versatility.

  • Python is known for its readability and simplicity, making it easier to write and maintain code

  • Python has a large standard library and many third-party libraries for various tasks

  • Python is versatile and can be used for web development, data analysis, automation, and more

Add your answer
right arrow

Q193. What method overloading and method overriding?

Ans.

Method overloading is having multiple methods in the same class with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in the superclass.

  • Method overloading allows a class to have multiple methods with the same name but different parameters.

  • Method overriding occurs when a subclass provides a specific implementation of a method that is already provided by its superclass.

  • Method overloading is ...read more

Add your answer
right arrow

Q194. Define hashing? How to implement hash map?

Ans.

Hashing is a technique used to map data to a fixed-size array for efficient retrieval.

  • Hashing involves using a hash function to generate a unique index for each data element.

  • Hash maps typically consist of an array and a hash function.

  • To implement a hash map, data is hashed using a hash function and stored in the array at the corresponding index.

  • Collision resolution techniques like chaining or open addressing can be used to handle cases where multiple data elements hash to the...read more

Add your answer
right arrow

Q195. Python program to remove duplicate entries in a give array.

Ans.

Python program to remove duplicate entries in a given array of strings.

  • Use a set to store unique elements while iterating through the array.

  • Convert the set back to a list to maintain the order of elements.

  • Return the list with duplicate entries removed.

Add your answer
right arrow

Q196. Explain any windows based server troubleshooting procedure you have performed.

Ans.

I have performed troubleshooting procedures on Windows based servers by identifying the issue, checking event logs, running diagnostic tools, and applying solutions.

  • Identify the issue reported by the user or monitoring system

  • Check event logs for any error messages or warnings

  • Run diagnostic tools such as Windows Server Manager or PowerShell commands

  • Apply solutions such as restarting services, updating drivers, or applying patches

  • Document the troubleshooting steps taken and the...read more

Add your answer
right arrow

Q197. how to link the css file in html

Ans.

Linking a CSS file in HTML involves using the <link> tag in the <head> section of the HTML document.

  • Use the <link> tag with the 'rel' attribute set to 'stylesheet' and the 'href' attribute pointing to the CSS file

  • Place the <link> tag inside the <head> section of the HTML document

  • Make sure the path in the 'href' attribute is correct and relative to the HTML file

  • Example: <link rel='stylesheet' type='text/css' href='styles.css'>

Add your answer
right arrow

Q198. What is meant by the term Oops.?

Ans.

Oops is a term used in programming to refer to an error or mistake in the code.

  • Oops stands for Object-Oriented Programming System.

  • It refers to a mistake or error in the code that causes unexpected behavior.

  • Common examples of Oops include null pointer exceptions, type mismatches, and syntax errors.

  • Debugging tools are used to identify and fix Oops in code.

  • Preventing Oops is important for creating reliable and efficient software.

Add your answer
right arrow

Q199. 1.What is Opps concepts in Java.

Ans.

OOPs concepts in Java are the fundamental principles of object-oriented programming.

  • Encapsulation: wrapping data and code into a single unit

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent multiple types

  • Abstraction: hiding implementation details from the user

  • Examples: class, object, inheritance, polymorphism, encapsulation

Add your answer
right arrow

Q200. Supervised vs unsupervised machine learning. Overfitting and underfitting.

Ans.

Supervised learning uses labeled data to train a model, while unsupervised learning uses unlabeled data. Overfitting occurs when a model is too complex and fits the training data too closely, while underfitting occurs when a model is too simple and fails to capture the underlying patterns in the data.

  • Supervised learning requires labeled data for training, such as classification or regression tasks.

  • Unsupervised learning does not require labeled data and is used for clustering ...read more

Add your answer
right arrow
Previous
1
2
3
4
5
6
7
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at TCS System Engineer

based on 1.1k interviews
6 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
Personal Interview1 Round
HR Round - 3
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top System Engineer Interview Questions from Similar Companies

Siemens Logo
4.1
 â€¢ 19 Interview Questions
Accenture Logo
3.8
 â€¢ 11 Interview Questions
View all
Share an Interview