Add office photos
TCS logo
Engaged Employer

TCS

Verified
3.7
based on 90.6k Reviews
Video summary
Filter interviews by
System Engineer
Fresher
Experienced
Skills
Clear (1)

600+ TCS System Engineer Interview Questions and Answers

Updated 5 Mar 2025

Q201. What is C, advantages of c...etc?

Ans.

C is a high-level programming language known for its efficiency, flexibility, and portability.

  • Advantages of C include high performance, close-to-hardware functionality, and a large library of functions.

  • C is widely used in system programming, embedded systems, and developing operating systems.

  • C allows for low-level manipulation of memory and provides direct access to hardware, making it suitable for developing device drivers.

  • C is portable across different platforms and compile...read more

Add your answer
right arrow

Q202. what are packages in PLSQL

Ans.

Packages in PL/SQL are groups of related procedures, functions, variables, and other PL/SQL constructs stored together in the database.

  • Packages help organize and encapsulate code for easier maintenance and reuse.

  • They consist of a specification (header) and a body.

  • Packages can contain procedures, functions, variables, constants, cursors, and exceptions.

  • Example: CREATE PACKAGE emp_package AS ... END emp_package;

  • Example: CREATE PACKAGE BODY emp_package AS ... END emp_package;

Add your answer
right arrow
TCS System Engineer Interview Questions and Answers for Freshers
illustration image

Q203. How do you design a ban EXOR gate ?

Ans.

To design a ban EXOR gate, use two NAND gates and one OR gate.

  • Draw the logic diagram for the EXOR gate

  • Use two NAND gates to create a NAND gate with inverted inputs

  • Connect the output of the two NAND gates to the inputs of an OR gate

  • The output of the OR gate is the output of the EXOR gate

Add your answer
right arrow

Q204. Explain OOPS concepts. Explain projects you have done.

Ans.

OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction. Projects include developing a CRM system and a mobile app.

  • Inheritance: Allows a class to inherit properties and behavior from another class. Example: Parent class 'Vehicle' and child class 'Car'.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class 'Employee' with private variables and public methods.

  • Polymorphism: Ability to present the same interfac...read more

Add your answer
right arrow
Discover TCS interview dos and don'ts from real experiences

Q205. Difference between random forest and descision tree.

Ans.

Random forest is an ensemble learning method using multiple decision trees, while decision tree is a single tree-based model.

  • Random forest is a collection of decision trees that are trained with random subsets of data and features.

  • Decision tree is a single tree structure that makes decisions by splitting nodes based on feature values.

  • Random forest reduces overfitting by averaging the predictions of multiple trees.

  • Decision tree can be prone to overfitting due to its high compl...read more

Add your answer
right arrow

Q206. What is difference between list and tuple

Ans.

List is mutable, tuple is immutable in Python.

  • List can be modified after creation, tuple cannot.

  • List is defined using square brackets [], tuple using parentheses ().

  • List is used for collections of items that may change, tuple for fixed collections.

  • Example: list_example = [1, 2, 3], tuple_example = (4, 5, 6)

Add your answer
right arrow
Are these interview questions helpful?

Q207. What is mil and sil and what is their object

Ans.

MIL stands for Model-in-the-Loop and SIL stands for Software-in-the-Loop. They are simulation techniques used in system engineering.

  • MIL involves testing a model of a system in a simulation environment before any software is implemented.

  • SIL involves testing the software component of a system in a simulation environment before it is integrated with hardware.

  • Both MIL and SIL help in identifying and fixing issues early in the development process.

  • These techniques are commonly used...read more

Add your answer
right arrow

Q208. Circuit Diagram

Ans.

A circuit diagram is a graphical representation of an electrical circuit.

  • It shows the components and connections in the circuit

  • Symbols are used to represent each component

  • Lines represent the wires connecting the components

  • It helps in understanding the circuit's function and troubleshooting

  • Examples include diagrams for simple circuits like a flashlight or complex circuits like a computer motherboard

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q209. what is subnetting

Ans.

Subnetting is the process of dividing a network into smaller subnetworks, called subnets, to improve network efficiency and security.

  • Subnetting allows for better utilization of IP addresses by dividing a network into smaller segments.

  • It helps in improving network performance by reducing network congestion.

  • Subnetting enhances network security by isolating different departments or devices within a network.

  • It enables efficient routing and reduces broadcast traffic.

  • Example: A net...read more

Add your answer
right arrow

Q210. what are protocols

Ans.

Protocols are a set of rules and guidelines that govern the communication between devices or systems.

  • Protocols define the format and order of messages exchanged between devices.

  • They ensure reliable and efficient communication by specifying error detection and correction mechanisms.

  • Examples of protocols include TCP/IP, HTTP, SMTP, and FTP.

  • Protocols can operate at different layers of the network stack, such as the application layer, transport layer, or network layer.

Add your answer
right arrow

Q211. What is singleton class explain with example

Ans.

A singleton class is a class that can only have one instance created throughout the entire application.

  • Singleton classes are used when we want to restrict the number of instances of a class to one.

  • They are often used in scenarios where we need to maintain a single point of control or coordination.

  • For example, a logger class can be implemented as a singleton class to ensure that only one instance of the logger is created and used throughout the application.

Add your answer
right arrow

Q212. Use of Static Variable in Java

Ans.

Static variables in Java are shared among all instances of a class and retain their value throughout the program.

  • Static variables are declared using the 'static' keyword.

  • They are initialized only once, at the start of the program.

  • They can be accessed directly using the class name, without creating an instance of the class.

  • Changes made to a static variable are reflected in all instances of the class.

  • Static variables are commonly used for constants or to keep track of global st...read more

View 2 more answers
right arrow

Q213. How to connect mongoDB in python

Ans.

Use pymongo library to connect mongoDB in python

  • Install pymongo library using pip

  • Import pymongo in your python script

  • Create a MongoClient object with the connection string

  • Access the database and collection using the MongoClient object

Add your answer
right arrow

Q214. how can we handle exception in python

Ans.

Exceptions in Python can be handled using try, except, and finally blocks.

  • Use try block to enclose the code that may raise an exception

  • Use except block to handle the exception and provide alternative code

  • Use finally block to execute code regardless of whether an exception was raised or not

Add your answer
right arrow

Q215. Which is working technology in TCS.

Ans.

TCS works with a wide range of technologies across various domains.

  • TCS has expertise in areas such as cloud computing, artificial intelligence, blockchain, and cybersecurity.

  • In the healthcare domain, TCS has developed solutions for electronic medical records, clinical trials management, and patient engagement.

  • TCS also works with emerging technologies such as quantum computing and 5G.

  • TCS has partnerships with leading technology companies such as Microsoft, IBM, and Oracle.

  • TCS ...read more

Add your answer
right arrow

Q216. What are types of Machine Learning

Ans.

Types of Machine Learning include supervised learning, unsupervised learning, semi-supervised learning, reinforcement learning, and deep learning.

  • Supervised learning: The model is trained on labeled data.

  • Unsupervised learning: The model is trained on unlabeled data.

  • Semi-supervised learning: A combination of supervised and unsupervised learning.

  • Reinforcement learning: The model learns through trial and error.

  • Deep learning: Involves neural networks with multiple layers.

Add your answer
right arrow

Q217. What is java and there features.

Ans.

Java is a high-level programming language known for its platform independence and object-oriented features.

  • Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)

  • Java is object-oriented, allowing for modular and reusable code

  • Java has automatic memory management through garbage collection

  • Java supports multithreading for concurrent programming

  • Java has a rich set of APIs and libraries for various functionalities

Add your answer
right arrow

Q218. Types of Search Engine Optimization

Ans.

Types of SEO include on-page, off-page, technical, local, and mobile optimization.

  • On-page SEO focuses on optimizing content and HTML source code of a webpage.

  • Off-page SEO involves building backlinks and increasing website authority.

  • Technical SEO deals with website structure, speed, and indexing.

  • Local SEO targets local search results and optimizing Google My Business.

  • Mobile SEO ensures websites are optimized for mobile devices and user experience.

Add your answer
right arrow

Q219. 2. What are decorators in Python

Ans.

Decorators are functions that modify the behavior of other functions without changing their source code.

  • Decorators are denoted by the '@' symbol followed by the decorator function name

  • They can be used to add functionality to a function, such as logging or timing

  • They can also be used to modify the behavior of a function, such as adding caching or authentication

  • Decorators can be stacked on top of each other to apply multiple modifications to a function

  • Example: @staticmethod, @c...read more

Add your answer
right arrow

Q220. How to handle option values in swift

Ans.

Option values in Swift can be handled using enums, switch statements, and optional binding.

  • Use enums to define a set of possible values for an option

  • Use switch statements to handle each possible value of the option

  • Use optional binding to safely unwrap optional values

Add your answer
right arrow

Q221. How to do API using service manager

Ans.

APIs can be created using Service Manager by defining endpoints and methods for interacting with the service.

  • Define the API endpoints and methods in the Service Manager configuration.

  • Implement the logic for handling API requests and responses.

  • Test the API endpoints using tools like Postman to ensure functionality.

  • Secure the API by implementing authentication and authorization mechanisms.

Add your answer
right arrow

Q222. How to delete duplicate rows in SQL

Ans.

To delete duplicate rows in SQL, you can use the DELETE statement with a self-join or the ROW_NUMBER() function.

  • Use a self-join to delete duplicate rows by comparing each row with other rows in the same table.

  • Alternatively, you can use the ROW_NUMBER() function to assign a unique number to each row and then delete the rows with duplicate numbers.

  • Here's an example of using a self-join to delete duplicate rows: DELETE FROM table_name WHERE column_name IN (SELECT column_name FRO...read more

Add your answer
right arrow

Q223. How to run testcases in parallel

Ans.

Testcases can be run in parallel by using test automation frameworks like Selenium Grid or TestNG.

  • Use test automation frameworks like Selenium Grid or TestNG to run testcases in parallel

  • Divide testcases into smaller, independent units that can be executed concurrently

  • Ensure that test data and resources are managed properly to avoid conflicts

  • Monitor and analyze test results to identify any issues or bottlenecks

  • Adjust the parallelism level based on the available resources and t...read more

Add your answer
right arrow

Q224. What is merge Sort? Write the code?

Ans.

Merge Sort is a divide and conquer algorithm that sorts an array by dividing it into two halves, sorting them separately, and then merging the results.

  • Divide the array into two halves

  • Recursively sort the two halves

  • Merge the sorted halves

  • Repeat until the entire array is sorted

Add your answer
right arrow

Q225. What is stack in data structure?

Ans.

A stack is a linear data structure that follows the Last In First Out (LIFO) principle.

  • Elements are added and removed from the top of the stack.

  • Common operations include push (add element) and pop (remove element).

  • Examples of stacks include function call stack in programming and stack of plates.

  • Stacks can be implemented using arrays or linked lists.

Add your answer
right arrow

Q226. What are new features in angular13?

Ans.

Angular 13 is not released yet, so there are no new features to discuss.

  • Angular 13 has not been released yet

  • No official information on new features available

Add your answer
right arrow

Q227. What is lazy loading in angular ?

Ans.

Lazy loading in Angular is a technique used to load modules only when they are required, improving performance by reducing initial load time.

  • Lazy loading helps in reducing the initial bundle size of the application.

  • It allows for faster loading times as only the required modules are loaded when needed.

  • Lazy loading is achieved by using the loadChildren property in the route configuration of Angular modules.

  • Example: loadChildren: () => import('./lazy-loaded-module').then(m => m....read more

Add your answer
right arrow

Q228. How VPN works

Ans.

VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.

  • VPN creates a secure and encrypted connection between the user's device and the private network.

  • It masks the user's IP address and location, providing anonymity and privacy.

  • VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.

  • It can be used to access geographically restricted content, bypass censorship, and protect against cyber threats.

  • VPN can be set u...read more

Add your answer
right arrow

Q229. What is VTP

Ans.

VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.

  • VTP is a Cisco proprietary protocol.

  • It allows for easy VLAN management by propagating VLAN information across the network.

  • VTP operates in three modes: server, client, and transparent.

  • Server mode allows for VLAN creation, deletion, and modification.

  • Client mode receives and stores VLAN information.

  • Transparent mode forwards VTP messages but does not participate in VTP updates.

  • VTP version 3 introduc...read more

Add your answer
right arrow

Q230. write code for polymorphism?

Ans.

Polymorphism is achieved through method overriding and method overloading.

  • Polymorphism allows objects of different classes to be treated as if they are objects of the same class.

  • Method overriding is when a subclass provides its own implementation of a method that is already defined in its superclass.

  • Method overloading is when a class has multiple methods with the same name but different parameters.

  • Polymorphism can be achieved through interfaces as well.

  • Example: Animal class w...read more

Add your answer
right arrow

Q231. What is java? What is inheritance

Ans.

Java is a popular programming language used for developing applications. Inheritance is a mechanism in OOP where a class inherits properties and behaviors from another class.

  • Java is an object-oriented programming language known for its portability and versatility.

  • Inheritance allows a class to inherit properties and behaviors from another class, promoting code reusability.

  • Example: Class B extends Class A, inheriting all the attributes and methods of Class A.

Add your answer
right arrow

Q232. What is interfaces nad abstract ?

Ans.

Interfaces and abstract are programming concepts used to achieve abstraction and modularity in code.

  • Interfaces define a set of methods that a class must implement.

  • Abstract classes are classes that cannot be instantiated and can have both abstract and non-abstract methods.

  • Both concepts are used to achieve abstraction and modularity in code.

  • Interfaces are used to define contracts between classes, while abstract classes are used to provide a base implementation for subclasses.

  • Ja...read more

Add your answer
right arrow

Q233. What do you understand by AAA ?

Ans.

AAA stands for Authentication, Authorization, and Accounting.

  • Authentication: verifying the identity of a user or device

  • Authorization: granting access to specific resources or actions

  • Accounting: tracking and recording usage of resources for billing or auditing purposes

Add your answer
right arrow

Q234. Probability for to pick a gold ball out of 100balls

Ans.

The probability of picking a gold ball out of 100 balls is 1%

  • The probability is calculated by dividing the number of gold balls by the total number of balls

  • Assuming there is only one gold ball, the probability is 1/100 or 0.01

  • If there are multiple gold balls, the probability will be higher

Add your answer
right arrow

Q235. How to configure NFS, NTP,DNS servers

Ans.

To configure NFS, NTP, and DNS servers, you need to edit configuration files and restart the respective services.

  • Edit /etc/exports file for NFS server configuration

  • Edit /etc/ntp.conf file for NTP server configuration

  • Edit /etc/named.conf file for DNS server configuration

  • Restart nfs, ntp, and named services after making changes

Add your answer
right arrow

Q236. malloc and calloc? what is union? code for factorial

Ans.

malloc and calloc are memory allocation functions in C. Union is a data type that allows storing different data types in the same memory location. Factorial is a mathematical operation.

  • malloc() allocates a block of memory of specified size and returns a pointer to the first byte of the block.

  • calloc() allocates a block of memory for an array of elements, initializes them to zero, and returns a pointer to the first byte of the block.

  • Union is a data type that allows storing diff...read more

Add your answer
right arrow

Q237. What is java and how it is it is

Ans.

Java is a high-level programming language known for its portability, security, and object-oriented features.

  • Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).

  • It is object-oriented, allowing for modular and reusable code.

  • Java is known for its security features, such as sandboxing and automatic memory management.

  • Popular Java frameworks include Spring, Hibernate, and Apache Struts.

View 1 answer
right arrow

Q238. What is DHCP in windows server.

Ans.

DHCP in Windows Server is a network protocol that automatically assigns IP addresses to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • It allows devices to obtain IP addresses and other network configuration information automatically.

  • DHCP servers manage a pool of IP addresses and assign them to devices as they connect to the network.

  • DHCP reduces the need for manual configuration of network settings on each device.

  • Windows Server includes a DHCP server...read more

Add your answer
right arrow

Q239. Overall git steps from writing code to getting it live.

Ans.

Git steps: write code, stage changes, commit changes, push to remote repository, deploy to live server.

  • Write code in local repository

  • Stage changes using 'git add' command

  • Commit changes using 'git commit' command

  • Push changes to remote repository using 'git push' command

  • Deploy changes to live server

Add your answer
right arrow

Q240. tell me about query optimization?

Ans.

Query optimization is the process of improving the efficiency and performance of database queries.

  • Identifying slow queries and analyzing their execution plans

  • Creating appropriate indexes on tables to speed up query execution

  • Rewriting queries to use efficient joins and filters

  • Using query hints or optimizer hints to guide the query optimizer

  • Regularly monitoring and tuning the database for optimal performance

Add your answer
right arrow

Q241. explain oops concepts used in your automation project

Ans.

OOPs concepts used in automation project include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Used to hide the internal implementation details of classes and provide access only through methods.

  • Inheritance: Allows reusing code from existing classes and creating new classes based on them.

  • Polymorphism: Enables objects to be treated as instances of their parent class, allowing for flexibility in method implementation.

  • Abstraction: Focuses on the essent...read more

Add your answer
right arrow

Q242. What's your favourite stack to work on

Ans.

My favorite stack to work on is the MEAN stack.

  • I enjoy working with MongoDB for its flexibility and scalability.

  • I appreciate the simplicity and ease of use of Express.js.

  • AngularJS is my go-to for front-end development.

  • Node.js is a powerful tool for server-side scripting and I find it very versatile.

Add your answer
right arrow

Q243. what is oops concepts

Ans.

Object-oriented programming concepts that promote code reusability and modularity.

  • Encapsulation: bundling data and methods together in a class

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent different types

  • Abstraction: hiding unnecessary details and exposing only essential features

View 1 answer
right arrow

Q244. what is the tdd framework

Ans.

TDD framework stands for Test-Driven Development framework.

  • TDD is a software development approach where tests are written before the code.

  • It follows a red-green-refactor cycle: write a failing test, write code to pass the test, refactor the code.

  • Popular TDD frameworks include JUnit for Java, NUnit for .NET, and pytest for Python.

View 1 answer
right arrow

Q245. what are different version of java

Ans.

Different versions of Java include Java SE, Java EE, and Java ME.

  • Java SE (Standard Edition) is the core Java platform for developing desktop, web, and mobile applications.

  • Java EE (Enterprise Edition) is used for developing enterprise applications.

  • Java ME (Micro Edition) is designed for mobile and embedded devices.

Add your answer
right arrow

Q246. what is java and spring and hibernate

Ans.

Java is a programming language, Spring is a framework for building Java applications, and Hibernate is an ORM tool for Java.

  • Java is a widely-used programming language known for its portability and versatility.

  • Spring is a popular framework for building enterprise Java applications, providing features like dependency injection and aspect-oriented programming.

  • Hibernate is an ORM (Object-Relational Mapping) tool that simplifies database interactions in Java applications by mappin...read more

Add your answer
right arrow

Q247. What are the DML commands you have used

Ans.

DML commands I have used include INSERT, UPDATE, DELETE in SQL databases.

  • INSERT: Used to add new records to a table

  • UPDATE: Used to modify existing records in a table

  • DELETE: Used to remove records from a table

Add your answer
right arrow

Q248. Which version of Angular have you used

Ans.

I have used Angular 2, 4, 5, 6, 7, 8, 9, and 10.

  • I have experience in developing web applications using Angular 2 and above.

  • I have worked on Angular projects with various versions including 4, 5, 6, 7, 8, 9, and 10.

  • I am familiar with the latest features and updates in Angular 10.

  • I have used Angular CLI for creating and managing Angular projects.

  • I have experience in implementing Angular Material design components.

  • I have worked on projects that involve integrating Angular with b...read more

Add your answer
right arrow

Q249. What is Angular and it's advantages

Ans.

Angular is a popular front-end framework developed by Google for building dynamic web applications.

  • Angular is based on TypeScript, a superset of JavaScript, which adds static typing and other features to the language.

  • It follows the MVC (Model-View-Controller) architecture, making it easier to organize code and separate concerns.

  • Angular provides two-way data binding, which allows changes in the model to be automatically reflected in the view and vice versa.

  • It offers a rich set...read more

Add your answer
right arrow

Q250. Difference between public ,private and protected in java

Ans.

In Java, public, private, and protected are access modifiers used to control the visibility of classes, methods, and variables.

  • public: accessible from any other class

  • private: accessible only within the same class

  • protected: accessible within the same package and subclasses

  • Example: public class MyClass {}

  • Example: private int myVar;

  • Example: protected void myMethod() {}

Add your answer
right arrow

Q251. How to save and load ML model weights?

Ans.

ML model weights can be saved and loaded using serialization libraries like pickle or joblib.

  • Use serialization libraries like pickle or joblib to save and load model weights.

  • For saving weights: model.save_weights('model_weights.h5')

  • For loading weights: model.load_weights('model_weights.h5')

Add your answer
right arrow

Q252. What is goroutines and channels in Go?

Ans.

Goroutines are lightweight threads that allow concurrent execution in Go. Channels are used for communication and synchronization between goroutines.

  • Goroutines enable concurrent execution of functions or methods.

  • Channels provide a way for goroutines to communicate and synchronize their actions.

  • Goroutines and channels are fundamental to achieve concurrency in Go.

  • Example: go funcName() starts a new goroutine, and channelName <- value sends a value to a channel.

  • Example: <-channe...read more

Add your answer
right arrow

Q253. What are the types of oops

Ans.

There are four types of OOPs: Encapsulation, Inheritance, Polymorphism, and Abstraction.

  • Encapsulation: Hiding the implementation details of an object from the outside world.

  • Inheritance: Creating a new class from an existing class, inheriting its properties and methods.

  • Polymorphism: The ability of an object to take on many forms, allowing different objects to be treated as if they were the same type.

  • Abstraction: Focusing on the essential features of an object, ignoring the irr...read more

Add your answer
right arrow

Q254. What is eventloop in nodejs?

Ans.

Eventloop is a mechanism in Node.js that allows non-blocking I/O operations to be performed efficiently.

  • Eventloop is responsible for handling asynchronous callbacks in Node.js

  • It continuously checks the event queue for new events to process

  • It executes the callbacks in the event queue in a non-blocking manner

  • It allows Node.js to handle multiple requests simultaneously

  • It is a key feature that makes Node.js highly scalable

Add your answer
right arrow

Q255. fibonacci series in any programming language

Ans.

Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Start with two variables, a and b, initialized to 0 and 1 respectively

  • Print a and then swap a and b, and set b to the sum of the old a and b

  • Repeat the previous step as many times as needed to generate the desired number of terms

Add your answer
right arrow

Q256. String reversal without out using any method

Ans.

Reverse a string without using any built-in methods

  • Create a new array to store the reversed string

  • Iterate through the original string from end to start and add each character to the new array

  • Join the characters in the new array to form the reversed string

Add your answer
right arrow

Q257. Write a paragraph on

Ans.

A system engineer is responsible for designing, implementing, and maintaining computer systems and networks.

  • System engineers design and implement computer systems and networks

  • They ensure the systems are secure and reliable

  • They troubleshoot and resolve technical issues

  • They work with other IT professionals to ensure the systems meet business needs

  • Examples of systems they may work on include servers, databases, and cloud computing platforms

Add your answer
right arrow

Q258. Model a milling process

Ans.

A milling process involves removing material from a workpiece using a rotating cutting tool.

  • Select appropriate cutting tool and workpiece material

  • Determine the cutting speed, feed rate, and depth of cut

  • Set up the milling machine and secure the workpiece

  • Start the machine and monitor the process for any issues

  • Inspect the finished product for accuracy and quality

Add your answer
right arrow

Q259. What is super class?

Ans.

A super class is a class that is inherited by other classes, providing them with common attributes and behaviors.

  • Super class is also known as a base class or parent class.

  • It serves as a blueprint for creating derived classes.

  • Derived classes inherit the properties and methods of the super class.

  • Super class can be extended or overridden by the derived classes.

  • Super class promotes code reusability and modularity.

  • Example: In a vehicle hierarchy, 'Vehicle' can be a super class wit...read more

View 2 more answers
right arrow

Q260. Difference between drop, delete and truncate

Ans.

Drop, delete, and truncate are SQL commands used to remove data from a database, but they differ in their functionality and impact.

  • DROP command removes an entire table from the database along with its structure and data.

  • DELETE command removes specific rows from a table based on a condition.

  • TRUNCATE command removes all rows from a table, but keeps the table structure intact.

  • DROP and TRUNCATE are faster than DELETE as they don't generate undo logs.

  • DELETE can be rolled back, whi...read more

Add your answer
right arrow

Q261. Main difference between function and procedure.

Ans.

Functions return a value, while procedures do not.

  • Functions are used to perform a specific task and return a value.

  • Procedures are used to perform a specific task but do not return a value.

  • Functions can be called within expressions, while procedures cannot.

  • Functions have a return type, while procedures do not have a return type.

  • Example: A function to calculate the square of a number would return the result, while a procedure to display a message would not return anything.

Add your answer
right arrow

Q262. Difference between functions and stored procedure

Ans.

Functions and stored procedures are both database objects used to perform specific tasks, but they have some key differences.

  • Functions return a value, while stored procedures do not necessarily return a value.

  • Functions can be used in SQL statements, while stored procedures cannot be used in SQL statements directly.

  • Functions can be called from within stored procedures, but stored procedures cannot be called from within functions.

  • Functions are typically used for calculations an...read more

Add your answer
right arrow

Q263. What are the OOPs 4 pillars ?

Ans.

The 4 pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation restricts access to certain components within a class, protecting the data.

  • Abstraction hides complex implementation details and only shows the necessary features.

  • Polymorphism allows objects to be treated as instances of their parent class or their own class.

Add your answer
right arrow

Q264. What is polymorphism and OOPs concept

Ans.

Polymorphism is the ability of a single function or method to operate on different data types. OOPs concept refers to Object-Oriented Programming principles like inheritance, encapsulation, and abstraction.

  • Polymorphism allows a function to take different forms based on the input data type.

  • OOPs concept includes inheritance, where a class can inherit properties and methods from another class.

  • Encapsulation involves bundling data and methods that operate on the data into a single...read more

Add your answer
right arrow

Q265. What are middlewares in Node.js?

Ans.

Middlewares in Node.js are functions that have access to the request and response objects, and can modify them or perform additional tasks before passing them to the next middleware in the chain.

  • Middlewares are used to handle common tasks like logging, authentication, error handling, etc.

  • They are executed sequentially in the order they are defined in the code.

  • Example: Express.js uses middlewares extensively for routing and handling requests.

Add your answer
right arrow

Q266. what is devops and why do we need it

Ans.

DevOps is a software development methodology that combines software development (Dev) with IT operations (Ops) to shorten the systems development life cycle.

  • DevOps aims to automate and integrate the processes between software development and IT teams to build, test, and release software faster and more reliably.

  • It emphasizes collaboration, communication, and integration between software developers and IT operations teams.

  • DevOps helps organizations to deliver applications and ...read more

Add your answer
right arrow

Q267. how many types of joins are there

Ans.

There are four types of joins in SQL: INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • INNER JOIN: Returns rows when there is a match in both tables.

  • LEFT JOIN: Returns all rows from the left table and the matched rows from the right table.

  • RIGHT JOIN: Returns all rows from the right table and the matched rows from the left table.

  • FULL JOIN: Returns rows when there is a match in one of the tables.

Add your answer
right arrow

Q268. Convert Binary to Octal

Ans.

Binary to Octal conversion involves grouping binary digits into sets of three and then converting each set to its corresponding octal digit.

  • Group binary digits into sets of three starting from the rightmost digit

  • If the leftmost set has less than three digits, add zeros to the left

  • Convert each set of three binary digits to its corresponding octal digit

  • Combine all the octal digits to get the final octal number

Add your answer
right arrow

Q269. What are broadcast variables and joins

Ans.

Broadcast variables are read-only shared variables that are cached on each machine in a cluster, while joins are operations that combine rows from two or more tables based on a related column between them.

  • Broadcast variables are used to efficiently distribute large read-only data to all nodes in a Spark cluster.

  • Joins are used to combine rows from two or more tables based on a related column between them.

  • Broadcast variables are useful when performing joins on large datasets to...read more

Add your answer
right arrow

Q270. How do you resolve a production issue?

Ans.

I follow a systematic approach by identifying the root cause, implementing a temporary fix if needed, testing the solution, and documenting the resolution.

  • Identify the root cause of the issue

  • Implement a temporary fix if necessary to restore production

  • Test the solution to ensure it resolves the issue

  • Document the resolution for future reference

Add your answer
right arrow

Q271. Different between call by reference and Call by value

Ans.

Call by reference passes the address of the variable as an argument, while call by value passes the value of the variable.

  • Call by reference allows the function to modify the actual value of the variable passed as an argument.

  • Call by value only allows the function to work with a copy of the variable's value.

  • Example: In call by reference, changes made to the parameter inside the function will reflect in the original variable. In call by value, changes made to the parameter insi...read more

Add your answer
right arrow

Q272. difference between @responsebody, @restcontroller

Ans.

The @ResponseBody annotation is used to indicate that the return value of a method should be serialized and included in the response body, while @RestController is a specialized version of @Controller that is used for RESTful web services.

  • The @ResponseBody annotation is used to convert the return value of a method into a response body

  • @RestController is a combination of @Controller and @ResponseBody annotations

  • @RestController is typically used in Spring MVC applications to bui...read more

Add your answer
right arrow

Q273. what is inversion of control?

Ans.

Inversion of control is a design principle where the control flow of a program is inverted, with the framework or container controlling the flow.

  • Inversion of control allows for loose coupling between components.

  • It promotes modular and reusable code.

  • Dependency injection is a common implementation of inversion of control.

  • Inversion of control can be achieved through frameworks like Spring in Java or Angular in JavaScript.

Add your answer
right arrow

Q274. What is bsod and endpoint encryption

Ans.

BSOD stands for Blue Screen of Death. Endpoint encryption is a security measure to protect data on devices.

  • BSOD is a critical error screen displayed on Windows operating systems when the system encounters a fatal error

  • Endpoint encryption is a security measure that encrypts data on devices such as laptops, smartphones, and tablets to protect against unauthorized access

  • Endpoint encryption can be implemented using software or hardware solutions such as BitLocker, VeraCrypt, or S...read more

Add your answer
right arrow

Q275. What you have idea about linked list

Ans.

A linked list is a data structure where each element points to the next element in the sequence.

  • Consists of nodes with data and a reference to the next node

  • Dynamic in size and can grow or shrink during execution

  • Common operations include insertion, deletion, and traversal

Add your answer
right arrow

Q276. Explain DBMS?

Ans.

DBMS stands for Database Management System. It is a software that manages and organizes data in a structured manner.

  • DBMS is a software system that allows users to create, retrieve, update, and manage databases.

  • It provides an interface for users to interact with the database and perform various operations.

  • DBMS ensures data integrity, security, and consistency.

  • It supports multiple users accessing the database simultaneously.

  • Examples of popular DBMS include Oracle, MySQL, SQL Se...read more

Add your answer
right arrow

Q277. How to install os on server

Ans.

To install an OS on a server, you need to boot from the installation media and follow the on-screen instructions.

  • Insert the installation media (such as a USB drive or DVD) into the server

  • Boot the server from the installation media

  • Follow the on-screen instructions to select the OS version, partition the disk, and complete the installation process

Add your answer
right arrow

Q278. How can you deploy the ssis packages

Ans.

SSIS packages can be deployed using SQL Server Management Studio or the dtutil utility.

  • Deploy using SQL Server Management Studio by connecting to Integration Services, right-clicking on the SSISDB folder, and selecting 'Deploy Project'.

  • Deploy using dtutil utility by running a command like 'dtutil /FILE C:\SSISPackages\Package.dtsx /COPY SQL;Package /DESTSERVER serverName /COPYFILE SQL;Package /Q'.

Add your answer
right arrow

Q279. Types of joins?

Ans.

Types of joins in SQL include inner join, left join, right join, and full outer join.

  • Inner join returns only the matching rows from both tables.

  • Left join returns all rows from the left table and the matching rows from the right table.

  • Right join returns all rows from the right table and the matching rows from the left table.

  • Full outer join returns all rows from both tables, including unmatched rows.

View 1 answer
right arrow

Q280. file handle in c?

Ans.

A file handle in C is a pointer that represents a file stream, allowing operations like reading and writing.

  • A file handle is typically obtained by opening a file using functions like fopen()

  • File handles are used to perform operations like reading, writing, and closing files

  • They can be passed as arguments to functions like fread(), fwrite(), and fclose()

  • File handles can be used to check for errors during file operations

View 1 answer
right arrow

Q281. What is SQL and basic Query?

Ans.

SQL is a programming language used for managing and manipulating relational databases. Basic queries retrieve data from databases.

  • SQL stands for Structured Query Language

  • Basic SQL queries include SELECT, INSERT, UPDATE, DELETE

  • Queries are used to retrieve, insert, update, or delete data in a database

  • Example: SELECT * FROM table_name WHERE condition;

Add your answer
right arrow

Q282. Write a program to check if a number is prime?

Ans.

A program to check if a number is prime by iterating through possible factors.

  • Iterate from 2 to square root of the number and check if the number is divisible by any of the factors.

  • If the number is divisible by any factor, it is not prime.

  • If the number is not divisible by any factor, it is prime.

Add your answer
right arrow

Q283. Write any difficult code according to you

Ans.

Implementing a sorting algorithm like quicksort

  • Implement the quicksort algorithm using recursion

  • Choose a pivot element and partition the array into two subarrays

  • Repeat the process for the subarrays until the entire array is sorted

Add your answer
right arrow

Q284. what is module.exports

Ans.

module.exports is a special object in Node.js that allows you to export functions, objects, or primitive values from a module.

  • Used to export functions, objects, or primitive values from a module

  • Can be assigned directly to a function, object, or value to be exported

  • Commonly used in Node.js to create reusable modules

Add your answer
right arrow

Q285. what is page object model

Ans.

Page Object Model is a design pattern used in test automation to create an object repository for web elements on a web page.

  • It helps in creating reusable and maintainable code for automated tests.

  • Each web page is represented as a class, and the elements on the page are defined as variables within the class.

  • Methods are created to perform actions on these elements, making the tests more readable and easier to maintain.

  • Page Object Model promotes code reusability and reduces code...read more

Add your answer
right arrow

Q286. 1. Find if a number belongs to a Fibonacci series

Ans.

Check if a number belongs to Fibonacci series

  • Check if the given number is a perfect square

  • If yes, check if 5*n^2 + 4 or 5*n^2 - 4 is a perfect square

  • If yes, then the number belongs to Fibonacci series

Add your answer
right arrow

Q287. What is Android framework architecture

Ans.

Android framework architecture is a set of APIs provided by the Android SDK to support the development of applications on the Android platform.

  • Consists of various layers such as application framework, libraries, runtime, and Linux kernel

  • Provides developers with tools and APIs to build and interact with applications

  • Includes components like Activity Manager, Content Providers, View System, and Package Manager

Add your answer
right arrow

Q288. Define different types of sorting algorithm

Ans.

Sorting algorithms are methods used to arrange elements in a list in a specific order.

  • Bubble Sort: Repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order.

  • Merge Sort: Divides the unsorted list into n sublists, each containing one element, then repeatedly merges sublists to produce new sorted sublists until there is only one sublist remaining.

  • Quick Sort: Picks an element as pivot and partitions the given array around the pic...read more

Add your answer
right arrow

Q289. Merge two strings having some conditions?

Ans.

Merge two strings with conditions

  • Check if both strings are not empty

  • Concatenate the strings if both are not empty

  • Apply any additional conditions specified

Add your answer
right arrow

Q290. What is AD,DNS,DHCP,Port Numbers

Ans.

AD, DNS, DHCP, and Port Numbers are all important components of network infrastructure.

  • AD (Active Directory) is a Microsoft service that manages users, computers, and other resources on a network.

  • DNS (Domain Name System) is a service that translates domain names into IP addresses.

  • DHCP (Dynamic Host Configuration Protocol) is a service that automatically assigns IP addresses to devices on a network.

  • Port numbers are used to identify specific processes or services running on a d...read more

Add your answer
right arrow

Q291. What is head tag in HTML?

Ans.

Head tag in HTML is used to define the header section of a webpage, containing metadata, links to external resources, and scripts.

  • Head tag is placed between the opening <head> and closing </head> tags in the HTML document.

  • It contains metadata such as title, character set, viewport settings, and links to external CSS stylesheets.

  • It also includes scripts for JavaScript, meta tags for SEO, and other elements that are not displayed on the webpage.

  • Example: <head> <title>Page Title...read more

Add your answer
right arrow

Q292. What is use of change log table

Ans.

Change log table is used to track changes made to a database, providing a history of modifications.

  • Tracks changes made to database records

  • Provides a history of modifications

  • Helps in auditing and troubleshooting

  • Can be used to revert to previous versions of data

Add your answer
right arrow

Q293. Difference in abstract class and interfaces?

Ans.

Abstract class can have both abstract and non-abstract methods, while interfaces can only have abstract methods.

  • Abstract class can have constructor, fields, and methods, while interfaces cannot have any implementation.

  • A class can only extend one abstract class, but can implement multiple interfaces.

  • Abstract classes are used to define a common base class for related classes, while interfaces are used to define a contract for classes to implement.

  • Example: Abstract class 'Animal...read more

Add your answer
right arrow

Q294. Tell a logic for leap year code

Ans.

A leap year is divisible by 4, but not by 100 unless it is also divisible by 400.

  • Check if the year is divisible by 4.

  • If it is divisible by 100, also check if it is divisible by 400.

  • If both conditions are met, it is a leap year.

Add your answer
right arrow

Q295. Different types of Data source you have used ?

Ans.

I have used various data sources including databases, APIs, logs, and files.

  • Databases (SQL, NoSQL)

  • APIs (REST, SOAP)

  • Logs (system logs, application logs)

  • Files (CSV, JSON, XML)

Add your answer
right arrow

Q296. What is abstraction in Java?

Ans.

Abstraction in Java is the concept of hiding the implementation details and showing only the necessary features of an object.

  • Abstraction allows you to define the structure of an object without specifying the implementation details.

  • Abstract classes and interfaces are used to achieve abstraction in Java.

  • Abstract classes can have both abstract and concrete methods, while interfaces can only have abstract methods.

  • Example: abstract class Animal { abstract void makeSound(); }

  • Exampl...read more

Add your answer
right arrow

Q297. Do you any front end technology

Ans.

Yes, I have experience with front end technologies.

  • I am proficient in HTML, CSS, and JavaScript

  • I have worked with popular front end frameworks such as React and Angular

  • I am familiar with responsive design and cross-browser compatibility

  • I have experience with version control systems like Git

Add your answer
right arrow

Q298. What are oops concepts. give examples,

Ans.

Object-oriented programming concepts that help in creating modular and reusable code.

  • Encapsulation - bundling of data and methods that operate on that data

  • Inheritance - creating new classes from existing ones

  • Polymorphism - ability of objects to take on multiple forms

  • Abstraction - hiding implementation details from the user

  • Examples: Class, Object, Inheritance, Polymorphism, Encapsulation, etc.

Add your answer
right arrow

Q299. Streams api calculate second highest salary

Add your answer
right arrow

Q300. Tell me the life cycle of mvc

Ans.

MVC life cycle involves request handling, routing, controller execution, view rendering, and response generation.

  • Client sends a request to the server

  • Routing maps the request to a specific controller

  • Controller executes the requested action and interacts with the model

  • View is rendered with the data from the model

  • Response is generated and sent back to the client

Add your answer
right arrow
Previous
1
2
3
4
5
6
7
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at TCS System Engineer

based on 1.1k interviews
6 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
Personal Interview1 Round
HR Round - 3
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top System Engineer Interview Questions from Similar Companies

TCS iON Logo
3.9
 • 15 Interview Questions
Accenture Logo
3.8
 • 11 Interview Questions
LTIMindtree Logo
3.8
 • 10 Interview Questions
IBM Logo
4.0
 • 10 Interview Questions
Infosys BPM  Logo
3.6
 • 10 Interview Questions
View all
Recently Viewed
REVIEWS
Tata Motors
No Reviews
LIST OF COMPANIES
Schneider Electric
Locations
INTERVIEWS
Acma Computers
No Interviews
REVIEWS
Tata Motors
No Reviews
LIST OF COMPANIES
Schneider Electric
Locations
INTERVIEWS
Tech Mahindra
No Interviews
INTERVIEWS
Tech Mahindra
No Interviews
SALARIES
Schneider Electric
LIST OF COMPANIES
Mahindra Insurance Brokers
Locations
LIST OF COMPANIES
Nirmal Industrial Controls
Locations
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter