TCS
1500+ Marsh McLennan Interview Questions and Answers
Q201. Would you like to explore in other technologies except coding like cloud?
Yes, I am open to exploring other technologies like cloud.
I have some experience with cloud technologies like AWS and Azure.
I am interested in learning more about cloud computing and its applications.
I believe that having knowledge of different technologies can make me a more well-rounded engineer.
Q202. What is polymorphism
Polymorphism is the ability of an object to take on many forms.
It allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A shape class can have different subclasses like circle, square, triangle, etc. and all of them can be treated as shapes.
Example: A method can have different implementations in different classes but can be called using the same name.
Example: The + o...read more
Q203. What are state management
State management is the process of managing the state of an application or system.
It involves storing and updating data that represents the current state of the application.
State can be managed locally or globally, depending on the architecture of the application.
Common techniques for state management include using local state, global state, and state containers like Redux.
Examples of state management in action include updating the UI based on user input, managing user authen...read more
Q204. Difference between interface and abastract, required and include, method overriding and method over loading
Interface vs abstract, required vs include, method overriding vs overloading
Interface is a contract that defines methods that must be implemented by a class, while abstract class can have implemented methods
Required is used to specify mandatory dependencies in a module, while include is used to import code from another file
Method overriding is when a subclass provides its own implementation of a method from its superclass, while overloading is when a class has multiple method...read more
Q205. 2.what is the difference between TLS and SSL protocol.
TLS is the successor of SSL protocol, providing more secure communication over the internet.
TLS is the newer version of SSL.
TLS uses stronger encryption algorithms.
TLS supports more secure cipher suites.
TLS provides better authentication and key exchange mechanisms.
TLS is backward compatible with SSL, but SSL is not forward compatible with TLS.
Q206. What is pointers and what is tree and a program to print pattern
Pointers are variables that store memory addresses. Trees are data structures consisting of nodes connected by edges. A program to print pattern can vary depending on the desired pattern.
Pointers are used to manipulate memory and create dynamic data structures.
They can be used to pass values by reference instead of by value.
Example: int *ptr; ptr = # *ptr = 10; //num now equals 10
Trees are used to represent hierarchical relationships between data.
They consist of nodes connect...read more
Q207. What are the block available in newly created files in unix.
Blocks available in newly created files in Unix.
Unix uses a file system that is divided into blocks.
The size of the block is determined by the file system.
The default block size for most file systems is 4096 bytes.
The number of blocks allocated to a file depends on its size.
The blocks are allocated in a contiguous manner.
The blocks are used to store the data of the file.
Q208. Spring Annotation and difference b/w spring mvc and spring boot.
Spring Annotation and difference b/w spring mvc and spring boot.
Spring Annotation is used to simplify the configuration process in Spring Framework.
Spring MVC is a web framework that is used to build web applications.
Spring Boot is a framework that is used to build standalone applications.
Spring Boot provides an opinionated approach to configuration and reduces the amount of boilerplate code required.
Spring Boot includes an embedded web server, which makes it easy to deploy w...read more
Q209. What are the methods of PR creation
There are three methods of PR creation in SAP MM.
Manual creation through ME51N transaction
Automatic creation through MRP run
Creation through purchase requisition conversion
Q210. how does view get to know that binded property has been changed in viewmodel
The view gets to know that a binded property has been changed in the viewmodel through data binding mechanisms.
Data binding mechanisms like two-way binding or event listeners are used to notify the view of property changes in the viewmodel.
Frameworks like Angular, React, or Vue.js provide built-in mechanisms for handling property changes in the viewmodel.
ViewModels often implement observable patterns or use libraries like RxJS to notify the view of property changes.
Q211. How do you create alert mechanism with using any 3rd party tools ?
To create an alert mechanism without using 3rd party tools, one can use scripting languages like Python or Bash.
Use scripting languages like Python or Bash to create custom alert mechanisms
Leverage built-in system tools like cron jobs and email notifications
Integrate with existing monitoring systems like Nagios or Zabbix
Create custom scripts to monitor specific events or metrics
Use APIs to integrate with external services like Slack or PagerDuty
Q212. How would you handle if client deviates from scope and wants to add something in the scope of wants you to work for something that is out of scope plus does not want to pay you
I would communicate the impact of the changes on the project timeline and budget and negotiate a new agreement.
Discuss the impact of the changes on the project timeline and budget with the client
Explain that the changes are outside the scope of the original agreement
Negotiate a new agreement that includes the changes and additional compensation
Document the changes and new agreement in writing
Q213. Diff composite and non composite key and then to create primary key without defining primary key what are other alternatives. Ana - Like. Unique, not null, candidate key.
Composite key is made up of multiple columns while non-composite key is made up of a single column. Primary key can also be defined using unique, not null, or candidate key.
Composite key uses multiple columns to uniquely identify a row while non-composite key uses a single column
Primary key can be defined using unique, not null, or candidate key instead of explicitly defining it
Candidate key is a unique key that can be used as a primary key
Q214. Batch class and its functions, use of stateful interface in batch class
Batch class is used to process large data sets in chunks. Stateful interface maintains state between batches.
Batch class implements Database.Batchable interface
It has three methods: start(), execute() and finish()
Stateful interface is used to maintain state between batches
Stateful variables can be declared outside of the execute() method
Example: Batch class to update all accounts with a specific field value
Q215. How can you delete nth element from a linked list?
To delete nth element from a linked list, we need to traverse to the (n-1)th node and change its next pointer to (n+1)th node.
Traverse to (n-1)th node
Change its next pointer to (n+1)th node
Free the memory of nth node
Q216. What is difference between static and dynamic routing?
Static routing uses manually configured routes while dynamic routing uses protocols to automatically update routes.
Static routing requires manual configuration of routes while dynamic routing uses protocols to automatically update routes.
Static routing is best suited for small networks with few changes while dynamic routing is better for larger networks with frequent changes.
Examples of static routing protocols include OSPF and BGP while examples of dynamic routing protocols ...read more
Q217. Explain about javascript selector
JavaScript selectors are used to select and manipulate HTML elements.
Selectors can be used with methods like getElementById(), getElementsByClassName(), and querySelector().
Selectors can target specific elements based on their tag name, class, ID, attributes, and more.
Selectors can also be combined to create more complex queries.
Examples: document.getElementById('myElement'), document.querySelector('.myClass')
Q218. What is JIT in java and it's importance?
JIT stands for Just-In-Time compiler in Java. It is important for improving the performance of Java applications.
JIT compiles Java bytecode into native machine code at runtime
It optimizes frequently executed code segments for faster execution
JIT reduces the startup time of Java applications
Examples of JIT compilers in Java include HotSpot and JRockit
Q219. various types of design pattern
Design patterns are reusable solutions to common software problems.
Creational patterns: Singleton, Factory, Abstract Factory, Builder, Prototype
Structural patterns: Adapter, Bridge, Composite, Decorator, Facade, Flyweight, Proxy
Behavioral patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template Method, Visitor
Q220. What is your opinion on having two daily scrum calls?
Having two daily scrum calls can be beneficial in certain situations.
If the team is distributed across different time zones, having two calls can ensure everyone is able to attend at a reasonable time.
If the team is large, having two calls can help ensure everyone has a chance to speak and share their updates.
However, having two calls can also be time-consuming and may not be necessary for smaller teams or those in the same time zone.
Ultimately, the decision to have two daily...read more
Q221. Different between having clause and where clause
Having clause is used with aggregate functions while where clause is used with non-aggregate functions.
Having clause filters the results of aggregate functions based on a condition
Where clause filters the results of non-aggregate functions based on a condition
Having clause is used after the group by clause
Where clause is used before the group by clause
Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 50000;
Example: SELECT * FROM e...read more
Q222. What is cash flow ? Give example for operating, investing, Financing activities? What is Depreciation , Amortization and give one example each? Why we create pbdd ? Current ration :- Working capital ?? Differen...
read moreCash flow is the movement of money in and out of a business. Operating, investing, and financing activities affect cash flow.
Operating activities involve cash inflows and outflows related to the company's core business operations, such as sales and expenses.
Investing activities involve cash inflows and outflows related to the purchase or sale of long-term assets, such as property or equipment.
Financing activities involve cash inflows and outflows related to the company's fina...read more
Q223. Which javascript commands have you used in selenium
I have used various javascript commands in Selenium such as executeScript, executeAsyncScript, etc.
executeScript() method is used to execute JavaScript code in the context of the currently selected frame or window.
executeAsyncScript() method is used to execute asynchronous JavaScript code in the context of the currently selected frame or window.
Other commonly used JavaScript commands in Selenium include getElementById(), getElementsByClassName(), etc.
Q224. What are constraints
Constraints are limitations or restrictions that are put in place to ensure certain requirements are met.
Constraints can be physical, such as the size of a database or the amount of memory available
Constraints can also be logical, such as business rules or security requirements
Constraints can help ensure data integrity and prevent errors or security breaches
Examples of constraints include primary keys, foreign keys, check constraints, and unique constraints
Q225. Porter's model, role of advertisement, cash flow, balance sheet?
Porter's model analyzes industry competition, advertisement influences market positioning, cash flow reflects financial health, balance sheet shows assets and liabilities.
Porter's model is a framework that helps analyze industry competition and develop competitive strategies.
Advertisement plays a crucial role in influencing market positioning and brand perception.
Cash flow is a measure of the money flowing in and out of a company, indicating its financial health and ability t...read more
Q226. What is the master data of MM
Master data of MM includes material, vendor, and customer data.
Material master data includes information about the materials that a company procures, produces, or sells.
Vendor master data includes information about the vendors that a company does business with.
Customer master data includes information about the customers that a company sells products or services to.
Q227. what will you do will reduce Performace issue?
To reduce performance issues, I will analyze the system, identify bottlenecks, optimize code, and implement caching.
Analyze system to identify bottlenecks
Optimize code to improve efficiency
Implement caching to reduce load times
Use profiling tools to identify performance issues
Reduce database queries by optimizing queries and using caching
Use a content delivery network (CDN) to reduce server load
Implement load balancing to distribute traffic evenly
Upgrade hardware or infrastru...read more
Q228. For Finance and Account process 1 what are the golden rules of accounting 2 Difference b/w accrual and cash accounting concept 3 Some journal entries 4 Bank reconciliation 5 Prepaid and Accrued 6 Depreciation v...
read moreBasic accounting concepts and journal entries explained
Golden rules of accounting are: Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; Debit expenses and losses, Credit income and gains
Accrual accounting recognizes revenue and expenses when they are incurred, regardless of when cash is exchanged. Cash accounting recognizes revenue and expenses when cash is actually received or paid.
Journal entries are used to record transactions in the account...read more
Q229. 4 what are the different types of attacks?
There are various types of attacks, including malware, phishing, DDoS, ransomware, and social engineering.
Malware attacks involve malicious software that can harm or exploit systems.
Phishing attacks aim to trick individuals into revealing sensitive information.
DDoS attacks overwhelm a network or website with excessive traffic, causing it to become unavailable.
Ransomware attacks encrypt files or systems and demand a ransom for their release.
Social engineering attacks manipulat...read more
Q230. What are Switching and Routing Technologies do you know?
Switching and routing are technologies used in computer networking to direct data traffic.
Switching involves forwarding data packets between devices on a network.
Routing involves determining the best path for data packets to travel between networks.
Examples of switching technologies include Ethernet and ATM.
Examples of routing protocols include OSPF and BGP.
Q231. Which programming language do you prefer and why?
I prefer SQL as it is the language of databases and allows for efficient data management.
SQL is specifically designed for managing and querying databases
It allows for efficient data retrieval and manipulation
Other programming languages can be used in conjunction with SQL for more complex tasks
Examples of other languages commonly used with SQL include Python and Java
Q232. What is view state
View state is a feature in ASP.NET that preserves the state of server-side controls between postbacks.
View state is used to maintain the state of server-side controls between postbacks.
It is a hidden field on the page that stores the values of the controls.
View state can be disabled to improve performance, but it may cause issues with control state.
Example: A text box retains its value even after a postback due to view state.
Q233. What is VDM module in CDS
VDM module in CDS is a virtual data model that provides a semantic layer on top of the underlying database tables.
VDM stands for Virtual Data Model.
It is used in SAP ABAP CDS (Core Data Services) to define the structure and behavior of data models.
VDM provides a semantic layer that abstracts the complexity of the underlying database tables.
It allows developers to define entities, associations, and annotations to represent business objects and relationships.
VDM modules can be ...read more
Q234. If you have profits in one hand and employees satisfaction on another, which one you would choose?
I would choose employee satisfaction over profits.
Employee satisfaction is crucial for long-term success and productivity.
Happy employees are more likely to be engaged, motivated, and loyal.
Satisfied employees contribute to a positive work environment and better teamwork.
Investing in employee satisfaction can lead to higher profits in the long run.
Examples: Offering competitive salaries, providing growth opportunities, promoting work-life balance, recognizing and rewarding ac...read more
Q235. 1.what is symmetric and asymmetric encryption.
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.
Symmetric encryption is faster and more efficient than asymmetric encryption.
Examples of symmetric encryption algorithms include AES and DES.
Asymmetric encryption is more secure as it uses a public key for encryption and a private key for decryption.
Examples of asymmetric encryption algorithms include RSA and ECC.
Q236. Data flow from AR Invoice table GL Tables
Data flows from AR Invoice table to GL Tables through integration processes.
AR Invoice table data is typically integrated into GL Tables through automated processes
Integration processes may involve mapping fields from AR Invoice table to GL Tables
Data may flow through APIs, ETL processes, or direct database connections
Q237. What are the types of incidents and what is it's priority?
There are three types of incidents - High, Medium, and Low. Priority is assigned based on the impact and urgency of the incident.
High priority incidents are critical and require immediate attention, such as system downtime or security breaches.
Medium priority incidents are important but not critical, such as performance issues or minor bugs.
Low priority incidents are minor issues that can be addressed later, such as cosmetic defects or feature requests.
Priority is determined ...read more
Q238. 1. Roles and Responsibilities 2. Work experiences and technical skills 3. Explain Automation Framework used in project 4. Java Basic Concepts 5. Maps, List, Sets 6. Selenium concepts 7. TestNG Concepts
Interview questions for Systems Engineer role
Roles and responsibilities of a Systems Engineer
Work experiences and technical skills required for the role
Explanation of Automation Framework used in a project
Basic concepts of Java programming language
Understanding of Maps, List, and Sets in Java
Knowledge of Selenium automation tool
Understanding of TestNG testing framework
Q239. What is lvm, repo, softlink hardlink, NTP, nfs, apache, and linux task related question.
This question covers various topics related to Linux administration.
LVM (Logical Volume Manager) is a tool used for managing disk space in Linux systems.
Repo (Repository) is a collection of software packages that can be installed on a Linux system.
Softlink and hardlink are types of links used in Linux file systems to create shortcuts to files or directories.
NTP (Network Time Protocol) is used to synchronize the system clock of a Linux machine with a time server.
NFS (Network F...read more
Q240. How to check only the file (not folders or links) in Unix directory? Ans. find . - maxdepth 1 -type f . Here maxdepth option will restrict search only in current directory else it will check sub directories as...
read moreTo check only files (not folders or links) in Unix directory, use 'find . -maxdepth 1 -type f'
Use the 'find' command in Unix
Add the option '-maxdepth 1' to restrict search to current directory
Add the option '-type f' to search only for files
This will exclude folders and links from the search
Q241. How to design and event hub generated source system data consumption architecture in Azure
Design event hub generated source system data consumption architecture in Azure
Create an event hub to receive data from source system
Use Azure Stream Analytics to process and transform data
Store data in Azure Data Lake Storage or Azure Blob Storage
Use Azure Databricks or Azure HDInsight for further analysis
Consider using Azure Functions for real-time processing
Ensure proper security and access control measures are in place
Q242. BDD framework, How to pass input data into function using BDD, how to identify failed test cases and rerun
To pass input data into function using BDD, use scenario outline and data tables. To identify failed test cases and rerun, use test runners.
Use scenario outline and data tables to pass input data into function using BDD
Identify failed test cases using test runners like Cucumber or Behave
Rerun failed test cases using the rerun feature in the test runner
Use hooks in the BDD framework to perform actions before and after each scenario
Example: Given a scenario outline with a data ...read more
Q243. How do you delete the records in a table
To delete records in a table, use the DELETE statement with the WHERE clause to specify the condition for deletion.
Use the DELETE statement followed by the table name
Add the WHERE clause to specify the condition for deletion
Execute the query to delete the records
Q244. What is CAA and what is the basic framework of CAA
CAA stands for Civil Aviation Authority. It is the regulatory body for aviation safety in the UK.
CAA is responsible for ensuring the safety of civil aviation in the UK
It sets standards for aircraft design, maintenance, and operation
CAA issues licenses to pilots, air traffic controllers, and other aviation professionals
It also regulates airports and air traffic services
Examples of CAA regulations include the Air Navigation Order and the Civil Aviation Regulations
Q245. How you will read data from particular column in excel through automation?
To read data from a particular column in Excel through automation, use Excel VBA or Python libraries like openpyxl or pandas.
Identify the column by its header or index
Use a loop to iterate through the rows and extract the data from the column
Store the data in a variable or write it to a file
Examples: Excel VBA - Range("A:A").Value; openpyxl - sheet["A"]
Examples: pandas - df["Column Name"] or df.iloc[:, column_index]
Q246. What is the definition of success for a product?
Success for a product is achieving its intended goals and satisfying user needs.
Success is measured by the product's ability to meet user needs and solve their problems.
It involves achieving the desired outcomes and delivering value to users.
Success can be determined by user satisfaction, adoption rates, and business impact.
A successful product is one that fulfills its purpose and generates positive user experiences.
Examples of success include high user engagement, positive r...read more
Q247. What is the troubleshooting of new printer connection with computer or old printer conncetion with computer system.
To troubleshoot printer connection, check cables, drivers, and settings. For old printers, check compatibility and update drivers.
Check if the printer is properly connected to the computer via USB or network cable
Ensure that the printer drivers are installed and up-to-date
Check the printer settings to ensure it is set as the default printer
For old printers, check compatibility with the computer's operating system and update drivers if necessary
Q248. Tell us about a situation when you have delivered a result with minimal resources?
Developed a marketing campaign with limited budget
Conducted market research to identify target audience and their preferences
Utilized social media platforms to reach a wider audience
Collaborated with local businesses to cross-promote the campaign
Created visually appealing content in-house to save on outsourcing costs
Measured success through analytics and adjusted strategy accordingly
Q249. Why do you think customer service is most important?
Customer service is important as it directly impacts customer satisfaction and loyalty.
Good customer service can lead to repeat business and positive word-of-mouth referrals.
Poor customer service can result in negative reviews and loss of customers.
Customer service can also help to identify and address issues before they escalate.
It is important to prioritize customer needs and provide timely and effective solutions.
Examples of good customer service include personalized inter...read more
Q250. Write a program to sort the elements( Bubble sorting technique)
Bubble sort program for sorting an array of strings.
Create a function to perform bubble sort
Loop through the array and compare adjacent elements
Swap elements if they are in the wrong order
Repeat until no more swaps are needed
Return the sorted array
Q251. What is search help exit
Search help exit is a user-defined ABAP routine that is used to modify the search help behavior.
Search help exit is used to customize the search help functionality in SAP.
It allows developers to modify the search help behavior by adding additional checks or filters.
Search help exit is implemented as a user-defined ABAP routine that is called during the search help process.
It can be used to restrict the search results or to add additional fields to the search help dialog.
Examp...read more
Q252. 1. How do you optimize the report and dashboard
Optimizing reports and dashboards involves improving performance and user experience.
Identify and remove unnecessary data and calculations
Use efficient data models and aggregations
Optimize SQL queries and database performance
Leverage caching and indexing
Design intuitive and user-friendly layouts
Implement filters and prompts for interactivity
Consider data compression and partitioning for large datasets
Regularly monitor and tune performance
Q253. Different between primary key and foreign key
Primary key uniquely identifies a record in a table, while foreign key refers to a field in another table.
Primary key is unique and cannot be null
Foreign key is used to establish a relationship between two tables
Primary key can be used as a foreign key in another table
Foreign key can have null values
Example: CustomerID in Orders table is a foreign key referencing CustomerID in Customers table
Q254. Write a SQL query to find the duplicates?
A SQL query to find duplicates in a table.
Use the GROUP BY clause to group the records by the columns that may have duplicates.
Use the HAVING clause to filter the groups that have more than one record.
Select the columns that you want to display in the result.
Order the result if necessary.
Q255. Have you ever done end to end implementation of any solution
Yes, I have done end to end implementation of various solutions.
I have implemented a CRM solution for a client from requirement gathering to deployment.
I have also implemented an ERP solution for a manufacturing company.
I have experience in implementing various software solutions for different industries.
I follow a structured approach to ensure successful implementation.
I work closely with the client to understand their requirements and provide customized solutions.
Q256. 4. Where did you implement overriding and overloading in your framework.
Overriding and overloading were implemented in various parts of the framework.
Overriding was implemented in the base class to allow derived classes to provide their own implementation of a method.
Overloading was implemented in various methods to allow for multiple versions of the same method with different parameters.
Examples of overriding and overloading can be found in the class hierarchy for handling different types of data.
Overriding can also be seen in the implementation...read more
Q257. @Transactional default behaviour, difference between Authentication and Authorization. Difference between Cookies and session what is preferred.
Explaining @Transactional, Authentication vs Authorization, and Cookies vs Session
By default, @Transactional rolls back on unchecked exceptions
Authentication is verifying the identity of a user, while Authorization is granting access to resources based on their role
Cookies are stored on the client-side, while sessions are stored on the server-side
Sessions are preferred for security reasons, as cookies can be easily manipulated
Examples of authentication mechanisms include user...read more
Q258. Why you want to join tcs OOPs concepts , what is jvm and jdk
I want to join TCS because of its reputation and opportunities. OOPs concepts are fundamental to object-oriented programming. JVM and JDK are essential components of Java programming.
TCS is a well-known and respected company in the IT industry
TCS offers a wide range of opportunities for career growth and development
OOPs concepts are important for creating modular and reusable code
JVM is the virtual machine that executes Java bytecode
JDK is the Java Development Kit that includ...read more
Q259. Two coding question-program for anagrams and find the number is prime or not.
Two coding questions - program for anagrams and finding if a number is prime or not.
For anagrams, compare sorted versions of the two strings.
For prime numbers, check if the number is divisible by any number less than its square root.
Use a loop to iterate through the numbers less than the square root of the number.
Q260. Can we single use badi for multiple implementations
Yes, a single BAdI can have multiple implementations.
A BAdI (Business Add-In) is a mechanism in SAP ABAP that allows you to add custom functionality to standard SAP programs.
A BAdI can have multiple implementations, which are separate pieces of code that enhance or modify the behavior of the standard program.
Each implementation is assigned a unique filter value, which determines when it is called during program execution.
Multiple implementations can be active at the same time...read more
Q261. How do you troubleshoot Performance tuning
Performance tuning troubleshooting involves identifying bottlenecks and optimizing system resources.
Identify the bottleneck by monitoring system resources such as CPU, memory, disk I/O, and network usage.
Analyze application and database performance metrics to identify slow queries or inefficient code.
Optimize system resources by adjusting configuration settings, upgrading hardware, or implementing caching mechanisms.
Test and validate performance improvements to ensure they ha...read more
Q262. What is a single page appliction?
A single page application is a web application that loads once and dynamically updates the content without refreshing the page.
Loads once and dynamically updates content
No page refreshes
Uses JavaScript frameworks like React to handle routing and rendering
Improves user experience by providing a seamless and responsive interface
Q263. 1. what are the difference between queue item and transaction item ?
Queue item is a container for data that needs to be processed, while transaction item is a unit of work that is processed by a robot.
Queue item is a data container that can hold any type of data, while transaction item is a specific type of data that represents a unit of work.
Queue item can be added to a queue by any process, while transaction item is typically added to a queue by a robot.
Queue item can be processed by any robot, while transaction item is typically processed ...read more
Q264. How will you code a snake and ladder program
A snake and ladder program can be coded using loops, arrays, and conditional statements.
Create a board with 100 squares using an array
Assign snakes and ladders to specific squares
Use a loop to simulate dice rolls and move the player accordingly
Use conditional statements to check for snakes and ladders
Display the final position of the player and whether they won or lost
Q265. What is the difference between diff and cmp commands
diff and cmp are commands used to compare files in Unix/Linux systems.
diff shows the differences between two files line by line
cmp compares two files byte by byte and shows the first byte that differs
diff is more commonly used for comparing text files while cmp is used for binary files
diff can also be used to compare directories
cmp returns an exit status of 0 if the files are identical, 1 if they differ, and 2 if an error occurs
Examples: diff file1.txt file2.txt, cmp file1.bi...read more
Q266. 5. Why did you opted protractor for your project to automate testing.
Protractor was chosen for its compatibility with AngularJS and its ability to handle asynchronous testing.
Protractor is designed specifically for AngularJS applications
It uses WebDriverJS to interact with the browser and simulate user actions
Protractor can handle asynchronous testing, which is common in AngularJS applications
It has built-in support for Angular-specific locator strategies
Example: Protractor was used to automate testing for an AngularJS e-commerce website
Q267. 7. What is your understanding on CSS v/s xpath as locator.
CSS and XPath are both locators used in Selenium for web automation.
CSS is faster and more readable than XPath.
XPath is more powerful and flexible than CSS.
CSS is recommended for simple locators like class, id, tag name.
XPath is recommended for complex locators like nested elements, dynamic attributes.
CSS locators are more stable than XPath as they are less likely to break with changes in the DOM.
XPath locators are more reliable than CSS when working with older browsers.
Both ...read more
Q268. What is linked list, what is array, multidimensional array, nested for loop, polymorphism
A brief explanation of linked list, array, multidimensional array, nested for loop, and polymorphism.
Linked list is a data structure where each element points to the next one.
Array is a collection of elements of the same data type stored in contiguous memory locations.
Multidimensional array is an array with more than one dimension.
Nested for loop is a loop inside another loop.
Polymorphism is the ability of an object to take on many forms.
Q269. difference between template driven and reactive form
Template driven forms are based on directives while reactive forms are based on reactive programming.
Template driven forms are easier to use and require less code.
Reactive forms are more flexible and allow for more complex validation.
Template driven forms are suitable for simple forms while reactive forms are better for complex forms.
Template driven forms use two-way data binding while reactive forms use observable streams.
Template driven forms are synchronous while reactive ...read more
Q270. Are you open to learning new technologies?
Yes, I am open to learning new technologies as it helps me stay updated and grow in my career.
I believe in continuous learning and adapting to new technologies
I am always eager to expand my skill set and knowledge
Learning new technologies can open up new opportunities and challenges for me
Q271. Describe the steps for Universe design from scratch?
Universe design involves identifying data sources, defining business requirements, creating a schema, and building the universe.
Identify data sources and gather requirements
Create a schema and map data to it
Build the universe using a tool like SAP BusinessObjects
Test and validate the universe
Publish the universe for end-users to access
Q272. How Deployment Process Done ?
Deployment process involves planning, testing, and executing the release of software into production.
Identify the target environment and prepare it for deployment
Create a deployment package that includes all necessary files and configurations
Test the deployment package in a staging environment
Execute the deployment process, which may involve automated or manual steps
Monitor the deployment to ensure it is successful and address any issues that arise
Q273. What are the different types of complexities?
There are various types of complexities, such as time complexity, space complexity, algorithmic complexity, and computational complexity.
Time complexity refers to the amount of time taken by an algorithm to run, often measured in terms of the input size.
Space complexity refers to the amount of memory space required by an algorithm to run, also measured in terms of the input size.
Algorithmic complexity refers to the efficiency of an algorithm in terms of time and space require...read more
Q274. What is BGP protocol and how it works? AD value of ebgp and ibgp.
BGP is a routing protocol used to exchange routing information between different networks on the internet.
BGP stands for Border Gateway Protocol.
It is used to exchange routing information between different autonomous systems (AS) on the internet.
BGP uses a path vector protocol to determine the best path for data to travel between networks.
The AD value of eBGP is 20 and the AD value of iBGP is 200.
eBGP is used to exchange routing information between different AS, while iBGP is...read more
Q275. What is Maps, Hash maps, Skeleton class OOPS concepts?
Maps, Hash maps, and Skeleton class are OOPS concepts used in programming.
Maps are data structures that store key-value pairs.
Hash maps are a type of map that use a hash function to index the keys.
Skeleton class is a class that provides a basic implementation of an interface.
OOPS concepts are Object-Oriented Programming concepts that focus on objects and their interactions.
Example: HashMap in Java is a commonly used implementation of a hash map.
Q276. What is MVC? Explain how it is work
MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.
Model represents the data and business logic
View displays the data to the user
Controller handles user input and updates the model and view accordingly
MVC promotes separation of concerns and modularity
Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC
Q277. Introduction Correlation cofficient Formula Difference b/w static and dynamic What are the data structures of C and C++ Core subjects questions Why should we hire You Y TCS Are u willing to rellocate What is da...
read moreQ278. How you will communicate with your client ?
I will communicate with my client through various channels and establish clear communication protocols.
Establish clear communication protocols with the client
Use various channels such as email, phone, video conferencing, and in-person meetings
Listen actively to the client's needs and concerns
Provide regular updates on project progress and any issues that arise
Be responsive and available to address any questions or concerns
Maintain a professional and respectful demeanor at all...read more
Q279. Difference between store procedure and function ?
Stored procedures are used to perform an action, while functions return a value.
Stored procedures are precompiled and stored in the database for repeated use.
Functions can be used in SQL statements to return a value.
Stored procedures can have input and output parameters.
Functions can be used in expressions and calculations.
Examples: A stored procedure to insert data into a table, a function to calculate the average of a set of numbers.
Q280. 1. How do you perform parallel testing in selenium.
Parallel testing in Selenium can be performed using Selenium Grid or cloud-based testing platforms.
Selenium Grid allows for parallel execution of tests on multiple machines or browsers simultaneously.
Cloud-based testing platforms like Sauce Labs or BrowserStack provide access to a large number of virtual machines for parallel testing.
Parallel testing can significantly reduce test execution time and improve test coverage.
Test scripts should be designed to be thread-safe and no...read more
Q281. Junit and what is mockito
Junit is a testing framework for Java. Mockito is a mocking framework used for unit testing.
Junit is used for writing and running unit tests in Java
Mockito is used for creating mock objects to simulate dependencies in unit tests
Mockito can be used with Junit to create comprehensive unit tests
Example: Mockito.when(mockObject.method()).thenReturn(expectedResult)
Q282. Difference between having and group by?
HAVING is used to filter groups while GROUP BY is used to group rows based on a column.
HAVING is used with GROUP BY to filter groups based on a condition
GROUP BY is used to group rows based on a column
HAVING is used after GROUP BY in a query
GROUP BY is used before HAVING in a query
Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 5000;
Q283. What is due diligence and what types of due diligence practices are there?
Due diligence is the process of investigating and verifying information before making a decision or entering into a contract.
Due diligence is important in business to ensure that all relevant information is considered before making a decision.
Types of due diligence include financial due diligence, legal due diligence, and operational due diligence.
Financial due diligence involves analyzing financial statements and other financial data to assess the financial health of a compa...read more
Q284. Write a program to find Simple Interest?
Program to calculate Simple Interest
Take input of principal amount, rate of interest and time period
Calculate simple interest using formula: (P * R * T) / 100
Display the calculated simple interest
Q285. How do you traverse linked list?
Traversing a linked list involves iterating through each node starting from the head node.
Start at the head node
Iterate through each node by following the 'next' pointer
Stop when reaching the end of the list (next pointer is null)
Q286. What is the use of private constructor ?
Private constructor restricts the creation of objects outside the class.
Private constructor is used to prevent the creation of objects outside the class.
It is often used in singleton design pattern to ensure only one instance of the class is created.
Private constructor can also be used in utility classes where all methods are static.
Private constructor can be used to prevent inheritance of a class.
Example: java.lang.Math class has a private constructor and all methods are sta...read more
Q287. Recursive stored Procedure Optimising techniques Recovery and backup. How to do Loading of Jason file in sql How is Scheduling done On/off set count with curser example.
Questions on SQL Database Administration including recursive stored procedures, optimization, recovery and backup, loading JSON files, scheduling, and cursor examples.
For recursive stored procedures, use common table expressions (CTEs) to simplify the code
Optimization techniques include indexing, query tuning, and partitioning
Regular backups and testing of recovery procedures are essential for data protection
To load JSON files in SQL, use OPENROWSET or BULK INSERT
Scheduling c...read more
Q288. What do you know about TestNG and Cucumber
TestNG is a testing framework for Java while Cucumber is a BDD tool for behavior-driven development.
TestNG is used for unit, functional, and integration testing
Cucumber is used for acceptance testing and supports BDD
TestNG uses annotations to define test methods and groups
Cucumber uses Gherkin syntax to define scenarios and steps
TestNG generates HTML reports while Cucumber generates reports in various formats
TestNG supports parallel testing while Cucumber does not
TestNG can b...read more
Q289. Tell about oops concepts What is inheritance? Is multiple inheritance possible in java? What is mutable in java? What is the function of malloc, calloc etc? Difference between delete and truncate? And many more
Questions on OOPs concepts, inheritance, mutable in Java, memory allocation functions, and difference between delete and truncate.
Inheritance is a mechanism in OOPs where a class can inherit properties and methods from another class.
Java supports single inheritance but not multiple inheritance.
Mutable in Java refers to objects whose state can be modified after creation.
Malloc and calloc are memory allocation functions in C programming.
Delete is a SQL command used to remove ro...read more
Q290. Give some steps and troubleshoot steps to check internet connection in MPLS, VPN. What is DHCP.
Steps to check internet connection in MPLS, VPN and definition of DHCP
Ping the default gateway to check connectivity
Check if the IP address is assigned correctly
Verify if the DNS server is reachable
Check if the VPN tunnel is up
Ensure that the MPLS circuit is operational
DHCP stands for Dynamic Host Configuration Protocol
DHCP is used to automatically assign IP addresses to devices on a network
DHCP reduces the administrative burden of manually assigning IP addresses
Q291. What is your favorite programming language?
My favorite programming language is Python.
I love Python's simplicity and readability.
It has a vast library of modules and frameworks.
Python is versatile and can be used for web development, data analysis, and more.
It's also great for automation and scripting tasks.
Examples: Flask, Django, NumPy, Pandas, BeautifulSoup
Q292. If text box is disabled how will you pass value in that text box
Value cannot be passed in a disabled text box.
Check if there is any other way to pass the value, such as through a different input field.
If not, enable the text box temporarily, pass the value, and then disable it again.
Alternatively, check if there is any JavaScript code that can be used to pass the value.
Q293. What are SQL versions worked upon,automations
SQL versions worked upon and automations
Worked on SQL Server 2008, 2012, 2014, and 2016
Automated SQL Server tasks using PowerShell scripts
Created SQL Server Agent jobs for automating backups and maintenance tasks
Q294. Difference between interfce and abstract class with example
Difference between interface and abstract class with example
Interface is a blueprint of a class, while abstract class is a partially implemented class
Interface can only have abstract methods, while abstract class can have both abstract and non-abstract methods
A class can implement multiple interfaces, but can only extend one abstract class
Example of interface: Runnable interface in Java
Example of abstract class: Animal class with abstract method 'makeSound'
Q295. Truncate vs delete difference?
Truncate removes all data, delete removes selected data.
Truncate is faster than delete as it doesn't log individual row deletions.
Truncate cannot be rolled back, delete can be.
Truncate resets identity columns, delete doesn't.
Truncate doesn't fire triggers, delete does.
Truncate is a DDL operation, delete is a DML operation.
Q296. What is Normalization and types?
Normalization is the process of organizing data in a database to reduce redundancy and dependency.
Normalization helps in improving data consistency and accuracy.
There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.
Normalization can help in reducing data redundancy and improving database performance.
Example: In a database of customers and orders, normalization can help in separating customer information from order in...read more
Q297. What frameworks have you used with python
I have used several frameworks with Python including Django, Flask, and Pyramid.
Django - a high-level web framework for rapid development of secure and maintainable websites
Flask - a micro web framework for building small to medium-sized web applications
Pyramid - a lightweight web framework for building complex web applications
Other frameworks I have used include Bottle, CherryPy, and Tornado
Q298. How many programming languages do you know? What do you do to improve your technical skills? What are the technical websites you follow?
I know multiple programming languages and constantly work on improving my technical skills.
I am proficient in Java, Python, and C++.
I regularly participate in coding challenges and competitions to enhance my programming skills.
I actively seek out online tutorials, courses, and documentation to learn new programming languages and frameworks.
I contribute to open-source projects to gain practical experience and collaborate with other developers.
I attend technical conferences and...read more
Q299. How to mouse hover an element? Write Xpath for an element? How to run test parallel? Explain automation test framework that you worked in? What is data provider in testng? What is collections in Java? About lis...
read moreAnswers to common questions asked in an Automation Tester interview.
To mouse hover an element, you can use Actions class in Selenium WebDriver.
Xpath for an element can be written using various attributes like id, class, etc.
To run tests parallel in TestNG, you can use 'parallel' attribute in testng.xml file.
Automation test framework I worked in was based on Page Object Model design pattern.
Data provider in TestNG is used to provide data for test methods.
Collections in Java ar...read more
Q300. universal gates, why it is universal?
Universal gates are capable of performing all logical operations, making them essential building blocks in digital circuits.
Universal gates can be used to implement any other type of logic gate.
The two most common universal gates are NAND and NOR gates.
By combining universal gates in different ways, complex logic functions can be achieved.
Universal gates simplify the design process by reducing the number of different types of gates needed.
More about working at TCS
Top HR Questions asked in Marsh McLennan
Interview Process at Marsh McLennan
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month