Add office photos
Engaged Employer

TCS

3.7
based on 86.6k Reviews
Filter interviews by

1500+ Marsh McLennan Interview Questions and Answers

Updated 23 Jan 2025
Popular Designations

Q201. Would you like to explore in other technologies except coding like cloud?

Ans.

Yes, I am open to exploring other technologies like cloud.

  • I have some experience with cloud technologies like AWS and Azure.

  • I am interested in learning more about cloud computing and its applications.

  • I believe that having knowledge of different technologies can make me a more well-rounded engineer.

Add your answer

Q202. What is polymorphism

Ans.

Polymorphism is the ability of an object to take on many forms.

  • It allows objects of different classes to be treated as if they were objects of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A shape class can have different subclasses like circle, square, triangle, etc. and all of them can be treated as shapes.

  • Example: A method can have different implementations in different classes but can be called using the same name.

  • Example: The + o...read more

View 3 more answers

Q203. What are state management

Ans.

State management is the process of managing the state of an application or system.

  • It involves storing and updating data that represents the current state of the application.

  • State can be managed locally or globally, depending on the architecture of the application.

  • Common techniques for state management include using local state, global state, and state containers like Redux.

  • Examples of state management in action include updating the UI based on user input, managing user authen...read more

View 1 answer

Q204. Difference between interface and abastract, required and include, method overriding and method over loading

Ans.

Interface vs abstract, required vs include, method overriding vs overloading

  • Interface is a contract that defines methods that must be implemented by a class, while abstract class can have implemented methods

  • Required is used to specify mandatory dependencies in a module, while include is used to import code from another file

  • Method overriding is when a subclass provides its own implementation of a method from its superclass, while overloading is when a class has multiple method...read more

Add your answer
Discover Marsh McLennan interview dos and don'ts from real experiences

Q205. 2.what is the difference between TLS and SSL protocol.

Ans.

TLS is the successor of SSL protocol, providing more secure communication over the internet.

  • TLS is the newer version of SSL.

  • TLS uses stronger encryption algorithms.

  • TLS supports more secure cipher suites.

  • TLS provides better authentication and key exchange mechanisms.

  • TLS is backward compatible with SSL, but SSL is not forward compatible with TLS.

View 2 more answers

Q206. What is pointers and what is tree and a program to print pattern

Ans.

Pointers are variables that store memory addresses. Trees are data structures consisting of nodes connected by edges. A program to print pattern can vary depending on the desired pattern.

  • Pointers are used to manipulate memory and create dynamic data structures.

  • They can be used to pass values by reference instead of by value.

  • Example: int *ptr; ptr = # *ptr = 10; //num now equals 10

  • Trees are used to represent hierarchical relationships between data.

  • They consist of nodes connect...read more

Add your answer
Are these interview questions helpful?

Q207. What are the block available in newly created files in unix.

Ans.

Blocks available in newly created files in Unix.

  • Unix uses a file system that is divided into blocks.

  • The size of the block is determined by the file system.

  • The default block size for most file systems is 4096 bytes.

  • The number of blocks allocated to a file depends on its size.

  • The blocks are allocated in a contiguous manner.

  • The blocks are used to store the data of the file.

Add your answer

Q208. Spring Annotation and difference b/w spring mvc and spring boot.

Ans.

Spring Annotation and difference b/w spring mvc and spring boot.

  • Spring Annotation is used to simplify the configuration process in Spring Framework.

  • Spring MVC is a web framework that is used to build web applications.

  • Spring Boot is a framework that is used to build standalone applications.

  • Spring Boot provides an opinionated approach to configuration and reduces the amount of boilerplate code required.

  • Spring Boot includes an embedded web server, which makes it easy to deploy w...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. What are the methods of PR creation

Ans.

There are three methods of PR creation in SAP MM.

  • Manual creation through ME51N transaction

  • Automatic creation through MRP run

  • Creation through purchase requisition conversion

View 3 more answers

Q210. how does view get to know that binded property has been changed in viewmodel

Ans.

The view gets to know that a binded property has been changed in the viewmodel through data binding mechanisms.

  • Data binding mechanisms like two-way binding or event listeners are used to notify the view of property changes in the viewmodel.

  • Frameworks like Angular, React, or Vue.js provide built-in mechanisms for handling property changes in the viewmodel.

  • ViewModels often implement observable patterns or use libraries like RxJS to notify the view of property changes.

Add your answer

Q211. How do you create alert mechanism with using any 3rd party tools ?

Ans.

To create an alert mechanism without using 3rd party tools, one can use scripting languages like Python or Bash.

  • Use scripting languages like Python or Bash to create custom alert mechanisms

  • Leverage built-in system tools like cron jobs and email notifications

  • Integrate with existing monitoring systems like Nagios or Zabbix

  • Create custom scripts to monitor specific events or metrics

  • Use APIs to integrate with external services like Slack or PagerDuty

Add your answer

Q212. How would you handle if client deviates from scope and wants to add something in the scope of wants you to work for something that is out of scope plus does not want to pay you

Ans.

I would communicate the impact of the changes on the project timeline and budget and negotiate a new agreement.

  • Discuss the impact of the changes on the project timeline and budget with the client

  • Explain that the changes are outside the scope of the original agreement

  • Negotiate a new agreement that includes the changes and additional compensation

  • Document the changes and new agreement in writing

Add your answer

Q213. Diff composite and non composite key and then to create primary key without defining primary key what are other alternatives. Ana - Like. Unique, not null, candidate key.

Ans.

Composite key is made up of multiple columns while non-composite key is made up of a single column. Primary key can also be defined using unique, not null, or candidate key.

  • Composite key uses multiple columns to uniquely identify a row while non-composite key uses a single column

  • Primary key can be defined using unique, not null, or candidate key instead of explicitly defining it

  • Candidate key is a unique key that can be used as a primary key

Add your answer

Q214. Batch class and its functions, use of stateful interface in batch class

Ans.

Batch class is used to process large data sets in chunks. Stateful interface maintains state between batches.

  • Batch class implements Database.Batchable interface

  • It has three methods: start(), execute() and finish()

  • Stateful interface is used to maintain state between batches

  • Stateful variables can be declared outside of the execute() method

  • Example: Batch class to update all accounts with a specific field value

Add your answer

Q215. How can you delete nth element from a linked list?

Ans.

To delete nth element from a linked list, we need to traverse to the (n-1)th node and change its next pointer to (n+1)th node.

  • Traverse to (n-1)th node

  • Change its next pointer to (n+1)th node

  • Free the memory of nth node

Add your answer

Q216. What is difference between static and dynamic routing?

Ans.

Static routing uses manually configured routes while dynamic routing uses protocols to automatically update routes.

  • Static routing requires manual configuration of routes while dynamic routing uses protocols to automatically update routes.

  • Static routing is best suited for small networks with few changes while dynamic routing is better for larger networks with frequent changes.

  • Examples of static routing protocols include OSPF and BGP while examples of dynamic routing protocols ...read more

View 1 answer

Q217. Explain about javascript selector

Ans.

JavaScript selectors are used to select and manipulate HTML elements.

  • Selectors can be used with methods like getElementById(), getElementsByClassName(), and querySelector().

  • Selectors can target specific elements based on their tag name, class, ID, attributes, and more.

  • Selectors can also be combined to create more complex queries.

  • Examples: document.getElementById('myElement'), document.querySelector('.myClass')

View 1 answer

Q218. What is JIT in java and it's importance?

Ans.

JIT stands for Just-In-Time compiler in Java. It is important for improving the performance of Java applications.

  • JIT compiles Java bytecode into native machine code at runtime

  • It optimizes frequently executed code segments for faster execution

  • JIT reduces the startup time of Java applications

  • Examples of JIT compilers in Java include HotSpot and JRockit

Add your answer

Q219. various types of design pattern

Ans.

Design patterns are reusable solutions to common software problems.

  • Creational patterns: Singleton, Factory, Abstract Factory, Builder, Prototype

  • Structural patterns: Adapter, Bridge, Composite, Decorator, Facade, Flyweight, Proxy

  • Behavioral patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template Method, Visitor

View 2 more answers

Q220. What is your opinion on having two daily scrum calls?

Ans.

Having two daily scrum calls can be beneficial in certain situations.

  • If the team is distributed across different time zones, having two calls can ensure everyone is able to attend at a reasonable time.

  • If the team is large, having two calls can help ensure everyone has a chance to speak and share their updates.

  • However, having two calls can also be time-consuming and may not be necessary for smaller teams or those in the same time zone.

  • Ultimately, the decision to have two daily...read more

View 2 more answers

Q221. Different between having clause and where clause

Ans.

Having clause is used with aggregate functions while where clause is used with non-aggregate functions.

  • Having clause filters the results of aggregate functions based on a condition

  • Where clause filters the results of non-aggregate functions based on a condition

  • Having clause is used after the group by clause

  • Where clause is used before the group by clause

  • Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 50000;

  • Example: SELECT * FROM e...read more

Add your answer

Q222. What is cash flow ? Give example for operating, investing, Financing activities? What is Depreciation , Amortization and give one example each? Why we create pbdd ? Current ration :- Working capital ?? Differen...

read more
Ans.

Cash flow is the movement of money in and out of a business. Operating, investing, and financing activities affect cash flow.

  • Operating activities involve cash inflows and outflows related to the company's core business operations, such as sales and expenses.

  • Investing activities involve cash inflows and outflows related to the purchase or sale of long-term assets, such as property or equipment.

  • Financing activities involve cash inflows and outflows related to the company's fina...read more

Add your answer

Q223. Which javascript commands have you used in selenium

Ans.

I have used various javascript commands in Selenium such as executeScript, executeAsyncScript, etc.

  • executeScript() method is used to execute JavaScript code in the context of the currently selected frame or window.

  • executeAsyncScript() method is used to execute asynchronous JavaScript code in the context of the currently selected frame or window.

  • Other commonly used JavaScript commands in Selenium include getElementById(), getElementsByClassName(), etc.

Add your answer

Q224. What are constraints

Ans.

Constraints are limitations or restrictions that are put in place to ensure certain requirements are met.

  • Constraints can be physical, such as the size of a database or the amount of memory available

  • Constraints can also be logical, such as business rules or security requirements

  • Constraints can help ensure data integrity and prevent errors or security breaches

  • Examples of constraints include primary keys, foreign keys, check constraints, and unique constraints

View 2 more answers

Q225. Porter's model, role of advertisement, cash flow, balance sheet?

Ans.

Porter's model analyzes industry competition, advertisement influences market positioning, cash flow reflects financial health, balance sheet shows assets and liabilities.

  • Porter's model is a framework that helps analyze industry competition and develop competitive strategies.

  • Advertisement plays a crucial role in influencing market positioning and brand perception.

  • Cash flow is a measure of the money flowing in and out of a company, indicating its financial health and ability t...read more

View 2 more answers

Q226. What is the master data of MM

Ans.

Master data of MM includes material, vendor, and customer data.

  • Material master data includes information about the materials that a company procures, produces, or sells.

  • Vendor master data includes information about the vendors that a company does business with.

  • Customer master data includes information about the customers that a company sells products or services to.

View 6 more answers

Q227. what will you do will reduce Performace issue?

Ans.

To reduce performance issues, I will analyze the system, identify bottlenecks, optimize code, and implement caching.

  • Analyze system to identify bottlenecks

  • Optimize code to improve efficiency

  • Implement caching to reduce load times

  • Use profiling tools to identify performance issues

  • Reduce database queries by optimizing queries and using caching

  • Use a content delivery network (CDN) to reduce server load

  • Implement load balancing to distribute traffic evenly

  • Upgrade hardware or infrastru...read more

Add your answer

Q228. For Finance and Account process 1 what are the golden rules of accounting 2 Difference b/w accrual and cash accounting concept 3 Some journal entries 4 Bank reconciliation 5 Prepaid and Accrued 6 Depreciation v...

read more
Ans.

Basic accounting concepts and journal entries explained

  • Golden rules of accounting are: Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; Debit expenses and losses, Credit income and gains

  • Accrual accounting recognizes revenue and expenses when they are incurred, regardless of when cash is exchanged. Cash accounting recognizes revenue and expenses when cash is actually received or paid.

  • Journal entries are used to record transactions in the account...read more

Add your answer

Q229. 4 what are the different types of attacks?

Ans.

There are various types of attacks, including malware, phishing, DDoS, ransomware, and social engineering.

  • Malware attacks involve malicious software that can harm or exploit systems.

  • Phishing attacks aim to trick individuals into revealing sensitive information.

  • DDoS attacks overwhelm a network or website with excessive traffic, causing it to become unavailable.

  • Ransomware attacks encrypt files or systems and demand a ransom for their release.

  • Social engineering attacks manipulat...read more

View 1 answer

Q230. What are Switching and Routing Technologies do you know?

Ans.

Switching and routing are technologies used in computer networking to direct data traffic.

  • Switching involves forwarding data packets between devices on a network.

  • Routing involves determining the best path for data packets to travel between networks.

  • Examples of switching technologies include Ethernet and ATM.

  • Examples of routing protocols include OSPF and BGP.

View 1 answer

Q231. Which programming language do you prefer and why?

Ans.

I prefer SQL as it is the language of databases and allows for efficient data management.

  • SQL is specifically designed for managing and querying databases

  • It allows for efficient data retrieval and manipulation

  • Other programming languages can be used in conjunction with SQL for more complex tasks

  • Examples of other languages commonly used with SQL include Python and Java

Add your answer

Q232. What is view state

Ans.

View state is a feature in ASP.NET that preserves the state of server-side controls between postbacks.

  • View state is used to maintain the state of server-side controls between postbacks.

  • It is a hidden field on the page that stores the values of the controls.

  • View state can be disabled to improve performance, but it may cause issues with control state.

  • Example: A text box retains its value even after a postback due to view state.

View 1 answer

Q233. What is VDM module in CDS

Ans.

VDM module in CDS is a virtual data model that provides a semantic layer on top of the underlying database tables.

  • VDM stands for Virtual Data Model.

  • It is used in SAP ABAP CDS (Core Data Services) to define the structure and behavior of data models.

  • VDM provides a semantic layer that abstracts the complexity of the underlying database tables.

  • It allows developers to define entities, associations, and annotations to represent business objects and relationships.

  • VDM modules can be ...read more

View 1 answer

Q234. If you have profits in one hand and employees satisfaction on another, which one you would choose?

Ans.

I would choose employee satisfaction over profits.

  • Employee satisfaction is crucial for long-term success and productivity.

  • Happy employees are more likely to be engaged, motivated, and loyal.

  • Satisfied employees contribute to a positive work environment and better teamwork.

  • Investing in employee satisfaction can lead to higher profits in the long run.

  • Examples: Offering competitive salaries, providing growth opportunities, promoting work-life balance, recognizing and rewarding ac...read more

View 2 more answers

Q235. 1.what is symmetric and asymmetric encryption.

Ans.

Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.

  • Symmetric encryption is faster and more efficient than asymmetric encryption.

  • Examples of symmetric encryption algorithms include AES and DES.

  • Asymmetric encryption is more secure as it uses a public key for encryption and a private key for decryption.

  • Examples of asymmetric encryption algorithms include RSA and ECC.

View 2 more answers

Q236. Data flow from AR Invoice table GL Tables

Ans.

Data flows from AR Invoice table to GL Tables through integration processes.

  • AR Invoice table data is typically integrated into GL Tables through automated processes

  • Integration processes may involve mapping fields from AR Invoice table to GL Tables

  • Data may flow through APIs, ETL processes, or direct database connections

View 1 answer

Q237. What are the types of incidents and what is it's priority?

Ans.

There are three types of incidents - High, Medium, and Low. Priority is assigned based on the impact and urgency of the incident.

  • High priority incidents are critical and require immediate attention, such as system downtime or security breaches.

  • Medium priority incidents are important but not critical, such as performance issues or minor bugs.

  • Low priority incidents are minor issues that can be addressed later, such as cosmetic defects or feature requests.

  • Priority is determined ...read more

Add your answer

Q238. 1. Roles and Responsibilities 2. Work experiences and technical skills 3. Explain Automation Framework used in project 4. Java Basic Concepts 5. Maps, List, Sets 6. Selenium concepts 7. TestNG Concepts

Ans.

Interview questions for Systems Engineer role

  • Roles and responsibilities of a Systems Engineer

  • Work experiences and technical skills required for the role

  • Explanation of Automation Framework used in a project

  • Basic concepts of Java programming language

  • Understanding of Maps, List, and Sets in Java

  • Knowledge of Selenium automation tool

  • Understanding of TestNG testing framework

View 1 answer

Q239. What is lvm, repo, softlink hardlink, NTP, nfs, apache, and linux task related question.

Ans.

This question covers various topics related to Linux administration.

  • LVM (Logical Volume Manager) is a tool used for managing disk space in Linux systems.

  • Repo (Repository) is a collection of software packages that can be installed on a Linux system.

  • Softlink and hardlink are types of links used in Linux file systems to create shortcuts to files or directories.

  • NTP (Network Time Protocol) is used to synchronize the system clock of a Linux machine with a time server.

  • NFS (Network F...read more

Add your answer

Q240. How to check only the file (not folders or links) in Unix directory? Ans. find . - maxdepth 1 -type f . Here maxdepth option will restrict search only in current directory else it will check sub directories as...

read more
Ans.

To check only files (not folders or links) in Unix directory, use 'find . -maxdepth 1 -type f'

  • Use the 'find' command in Unix

  • Add the option '-maxdepth 1' to restrict search to current directory

  • Add the option '-type f' to search only for files

  • This will exclude folders and links from the search

Add your answer

Q241. How to design and event hub generated source system data consumption architecture in Azure

Ans.

Design event hub generated source system data consumption architecture in Azure

  • Create an event hub to receive data from source system

  • Use Azure Stream Analytics to process and transform data

  • Store data in Azure Data Lake Storage or Azure Blob Storage

  • Use Azure Databricks or Azure HDInsight for further analysis

  • Consider using Azure Functions for real-time processing

  • Ensure proper security and access control measures are in place

Add your answer

Q242. BDD framework, How to pass input data into function using BDD, how to identify failed test cases and rerun

Ans.

To pass input data into function using BDD, use scenario outline and data tables. To identify failed test cases and rerun, use test runners.

  • Use scenario outline and data tables to pass input data into function using BDD

  • Identify failed test cases using test runners like Cucumber or Behave

  • Rerun failed test cases using the rerun feature in the test runner

  • Use hooks in the BDD framework to perform actions before and after each scenario

  • Example: Given a scenario outline with a data ...read more

Add your answer

Q243. How do you delete the records in a table

Ans.

To delete records in a table, use the DELETE statement with the WHERE clause to specify the condition for deletion.

  • Use the DELETE statement followed by the table name

  • Add the WHERE clause to specify the condition for deletion

  • Execute the query to delete the records

View 2 more answers

Q244. What is CAA and what is the basic framework of CAA

Ans.

CAA stands for Civil Aviation Authority. It is the regulatory body for aviation safety in the UK.

  • CAA is responsible for ensuring the safety of civil aviation in the UK

  • It sets standards for aircraft design, maintenance, and operation

  • CAA issues licenses to pilots, air traffic controllers, and other aviation professionals

  • It also regulates airports and air traffic services

  • Examples of CAA regulations include the Air Navigation Order and the Civil Aviation Regulations

Add your answer

Q245. How you will read data from particular column in excel through automation?

Ans.

To read data from a particular column in Excel through automation, use Excel VBA or Python libraries like openpyxl or pandas.

  • Identify the column by its header or index

  • Use a loop to iterate through the rows and extract the data from the column

  • Store the data in a variable or write it to a file

  • Examples: Excel VBA - Range("A:A").Value; openpyxl - sheet["A"]

  • Examples: pandas - df["Column Name"] or df.iloc[:, column_index]

Add your answer

Q246. What is the definition of success for a product?

Ans.

Success for a product is achieving its intended goals and satisfying user needs.

  • Success is measured by the product's ability to meet user needs and solve their problems.

  • It involves achieving the desired outcomes and delivering value to users.

  • Success can be determined by user satisfaction, adoption rates, and business impact.

  • A successful product is one that fulfills its purpose and generates positive user experiences.

  • Examples of success include high user engagement, positive r...read more

View 1 answer

Q247. What is the troubleshooting of new printer connection with computer or old printer conncetion with computer system.

Ans.

To troubleshoot printer connection, check cables, drivers, and settings. For old printers, check compatibility and update drivers.

  • Check if the printer is properly connected to the computer via USB or network cable

  • Ensure that the printer drivers are installed and up-to-date

  • Check the printer settings to ensure it is set as the default printer

  • For old printers, check compatibility with the computer's operating system and update drivers if necessary

Add your answer

Q248. Tell us about a situation when you have delivered a result with minimal resources?

Ans.

Developed a marketing campaign with limited budget

  • Conducted market research to identify target audience and their preferences

  • Utilized social media platforms to reach a wider audience

  • Collaborated with local businesses to cross-promote the campaign

  • Created visually appealing content in-house to save on outsourcing costs

  • Measured success through analytics and adjusted strategy accordingly

Add your answer

Q249. Why do you think customer service is most important?

Ans.

Customer service is important as it directly impacts customer satisfaction and loyalty.

  • Good customer service can lead to repeat business and positive word-of-mouth referrals.

  • Poor customer service can result in negative reviews and loss of customers.

  • Customer service can also help to identify and address issues before they escalate.

  • It is important to prioritize customer needs and provide timely and effective solutions.

  • Examples of good customer service include personalized inter...read more

View 1 answer

Q250. Write a program to sort the elements( Bubble sorting technique)

Ans.

Bubble sort program for sorting an array of strings.

  • Create a function to perform bubble sort

  • Loop through the array and compare adjacent elements

  • Swap elements if they are in the wrong order

  • Repeat until no more swaps are needed

  • Return the sorted array

Add your answer

Q251. What is search help exit

Ans.

Search help exit is a user-defined ABAP routine that is used to modify the search help behavior.

  • Search help exit is used to customize the search help functionality in SAP.

  • It allows developers to modify the search help behavior by adding additional checks or filters.

  • Search help exit is implemented as a user-defined ABAP routine that is called during the search help process.

  • It can be used to restrict the search results or to add additional fields to the search help dialog.

  • Examp...read more

View 1 answer

Q252. 1. How do you optimize the report and dashboard

Ans.

Optimizing reports and dashboards involves improving performance and user experience.

  • Identify and remove unnecessary data and calculations

  • Use efficient data models and aggregations

  • Optimize SQL queries and database performance

  • Leverage caching and indexing

  • Design intuitive and user-friendly layouts

  • Implement filters and prompts for interactivity

  • Consider data compression and partitioning for large datasets

  • Regularly monitor and tune performance

View 1 answer

Q253. Different between primary key and foreign key

Ans.

Primary key uniquely identifies a record in a table, while foreign key refers to a field in another table.

  • Primary key is unique and cannot be null

  • Foreign key is used to establish a relationship between two tables

  • Primary key can be used as a foreign key in another table

  • Foreign key can have null values

  • Example: CustomerID in Orders table is a foreign key referencing CustomerID in Customers table

Add your answer

Q254. Write a SQL query to find the duplicates?

Ans.

A SQL query to find duplicates in a table.

  • Use the GROUP BY clause to group the records by the columns that may have duplicates.

  • Use the HAVING clause to filter the groups that have more than one record.

  • Select the columns that you want to display in the result.

  • Order the result if necessary.

View 3 more answers

Q255. Have you ever done end to end implementation of any solution

Ans.

Yes, I have done end to end implementation of various solutions.

  • I have implemented a CRM solution for a client from requirement gathering to deployment.

  • I have also implemented an ERP solution for a manufacturing company.

  • I have experience in implementing various software solutions for different industries.

  • I follow a structured approach to ensure successful implementation.

  • I work closely with the client to understand their requirements and provide customized solutions.

Add your answer

Q256. 4. Where did you implement overriding and overloading in your framework.

Ans.

Overriding and overloading were implemented in various parts of the framework.

  • Overriding was implemented in the base class to allow derived classes to provide their own implementation of a method.

  • Overloading was implemented in various methods to allow for multiple versions of the same method with different parameters.

  • Examples of overriding and overloading can be found in the class hierarchy for handling different types of data.

  • Overriding can also be seen in the implementation...read more

Add your answer

Q257. @Transactional default behaviour, difference between Authentication and Authorization. Difference between Cookies and session what is preferred.

Ans.

Explaining @Transactional, Authentication vs Authorization, and Cookies vs Session

  • By default, @Transactional rolls back on unchecked exceptions

  • Authentication is verifying the identity of a user, while Authorization is granting access to resources based on their role

  • Cookies are stored on the client-side, while sessions are stored on the server-side

  • Sessions are preferred for security reasons, as cookies can be easily manipulated

  • Examples of authentication mechanisms include user...read more

Add your answer

Q258. Why you want to join tcs OOPs concepts , what is jvm and jdk

Ans.

I want to join TCS because of its reputation and opportunities. OOPs concepts are fundamental to object-oriented programming. JVM and JDK are essential components of Java programming.

  • TCS is a well-known and respected company in the IT industry

  • TCS offers a wide range of opportunities for career growth and development

  • OOPs concepts are important for creating modular and reusable code

  • JVM is the virtual machine that executes Java bytecode

  • JDK is the Java Development Kit that includ...read more

Add your answer

Q259. Two coding question-program for anagrams and find the number is prime or not.

Ans.

Two coding questions - program for anagrams and finding if a number is prime or not.

  • For anagrams, compare sorted versions of the two strings.

  • For prime numbers, check if the number is divisible by any number less than its square root.

  • Use a loop to iterate through the numbers less than the square root of the number.

Add your answer

Q260. Can we single use badi for multiple implementations

Ans.

Yes, a single BAdI can have multiple implementations.

  • A BAdI (Business Add-In) is a mechanism in SAP ABAP that allows you to add custom functionality to standard SAP programs.

  • A BAdI can have multiple implementations, which are separate pieces of code that enhance or modify the behavior of the standard program.

  • Each implementation is assigned a unique filter value, which determines when it is called during program execution.

  • Multiple implementations can be active at the same time...read more

View 1 answer

Q261. How do you troubleshoot Performance tuning

Ans.

Performance tuning troubleshooting involves identifying bottlenecks and optimizing system resources.

  • Identify the bottleneck by monitoring system resources such as CPU, memory, disk I/O, and network usage.

  • Analyze application and database performance metrics to identify slow queries or inefficient code.

  • Optimize system resources by adjusting configuration settings, upgrading hardware, or implementing caching mechanisms.

  • Test and validate performance improvements to ensure they ha...read more

Add your answer

Q262. What is a single page appliction?

Ans.

A single page application is a web application that loads once and dynamically updates the content without refreshing the page.

  • Loads once and dynamically updates content

  • No page refreshes

  • Uses JavaScript frameworks like React to handle routing and rendering

  • Improves user experience by providing a seamless and responsive interface

View 3 more answers

Q263. 1. what are the difference between queue item and transaction item ?

Ans.

Queue item is a container for data that needs to be processed, while transaction item is a unit of work that is processed by a robot.

  • Queue item is a data container that can hold any type of data, while transaction item is a specific type of data that represents a unit of work.

  • Queue item can be added to a queue by any process, while transaction item is typically added to a queue by a robot.

  • Queue item can be processed by any robot, while transaction item is typically processed ...read more

Add your answer

Q264. How will you code a snake and ladder program

Ans.

A snake and ladder program can be coded using loops, arrays, and conditional statements.

  • Create a board with 100 squares using an array

  • Assign snakes and ladders to specific squares

  • Use a loop to simulate dice rolls and move the player accordingly

  • Use conditional statements to check for snakes and ladders

  • Display the final position of the player and whether they won or lost

Add your answer

Q265. What is the difference between diff and cmp commands

Ans.

diff and cmp are commands used to compare files in Unix/Linux systems.

  • diff shows the differences between two files line by line

  • cmp compares two files byte by byte and shows the first byte that differs

  • diff is more commonly used for comparing text files while cmp is used for binary files

  • diff can also be used to compare directories

  • cmp returns an exit status of 0 if the files are identical, 1 if they differ, and 2 if an error occurs

  • Examples: diff file1.txt file2.txt, cmp file1.bi...read more

Add your answer

Q266. 5. Why did you opted protractor for your project to automate testing.

Ans.

Protractor was chosen for its compatibility with AngularJS and its ability to handle asynchronous testing.

  • Protractor is designed specifically for AngularJS applications

  • It uses WebDriverJS to interact with the browser and simulate user actions

  • Protractor can handle asynchronous testing, which is common in AngularJS applications

  • It has built-in support for Angular-specific locator strategies

  • Example: Protractor was used to automate testing for an AngularJS e-commerce website

Add your answer

Q267. 7. What is your understanding on CSS v/s xpath as locator.

Ans.

CSS and XPath are both locators used in Selenium for web automation.

  • CSS is faster and more readable than XPath.

  • XPath is more powerful and flexible than CSS.

  • CSS is recommended for simple locators like class, id, tag name.

  • XPath is recommended for complex locators like nested elements, dynamic attributes.

  • CSS locators are more stable than XPath as they are less likely to break with changes in the DOM.

  • XPath locators are more reliable than CSS when working with older browsers.

  • Both ...read more

Add your answer

Q268. What is linked list, what is array, multidimensional array, nested for loop, polymorphism

Ans.

A brief explanation of linked list, array, multidimensional array, nested for loop, and polymorphism.

  • Linked list is a data structure where each element points to the next one.

  • Array is a collection of elements of the same data type stored in contiguous memory locations.

  • Multidimensional array is an array with more than one dimension.

  • Nested for loop is a loop inside another loop.

  • Polymorphism is the ability of an object to take on many forms.

View 2 more answers

Q269. difference between template driven and reactive form

Ans.

Template driven forms are based on directives while reactive forms are based on reactive programming.

  • Template driven forms are easier to use and require less code.

  • Reactive forms are more flexible and allow for more complex validation.

  • Template driven forms are suitable for simple forms while reactive forms are better for complex forms.

  • Template driven forms use two-way data binding while reactive forms use observable streams.

  • Template driven forms are synchronous while reactive ...read more

Add your answer

Q270. Are you open to learning new technologies?

Ans.

Yes, I am open to learning new technologies as it helps me stay updated and grow in my career.

  • I believe in continuous learning and adapting to new technologies

  • I am always eager to expand my skill set and knowledge

  • Learning new technologies can open up new opportunities and challenges for me

Add your answer

Q271. Describe the steps for Universe design from scratch?

Ans.

Universe design involves identifying data sources, defining business requirements, creating a schema, and building the universe.

  • Identify data sources and gather requirements

  • Create a schema and map data to it

  • Build the universe using a tool like SAP BusinessObjects

  • Test and validate the universe

  • Publish the universe for end-users to access

View 1 answer

Q272. How Deployment Process Done ?

Ans.

Deployment process involves planning, testing, and executing the release of software into production.

  • Identify the target environment and prepare it for deployment

  • Create a deployment package that includes all necessary files and configurations

  • Test the deployment package in a staging environment

  • Execute the deployment process, which may involve automated or manual steps

  • Monitor the deployment to ensure it is successful and address any issues that arise

Add your answer

Q273. What are the different types of complexities?

Ans.

There are various types of complexities, such as time complexity, space complexity, algorithmic complexity, and computational complexity.

  • Time complexity refers to the amount of time taken by an algorithm to run, often measured in terms of the input size.

  • Space complexity refers to the amount of memory space required by an algorithm to run, also measured in terms of the input size.

  • Algorithmic complexity refers to the efficiency of an algorithm in terms of time and space require...read more

Add your answer

Q274. What is BGP protocol and how it works? AD value of ebgp and ibgp.

Ans.

BGP is a routing protocol used to exchange routing information between different networks on the internet.

  • BGP stands for Border Gateway Protocol.

  • It is used to exchange routing information between different autonomous systems (AS) on the internet.

  • BGP uses a path vector protocol to determine the best path for data to travel between networks.

  • The AD value of eBGP is 20 and the AD value of iBGP is 200.

  • eBGP is used to exchange routing information between different AS, while iBGP is...read more

Add your answer

Q275. What is Maps, Hash maps, Skeleton class OOPS concepts?

Ans.

Maps, Hash maps, and Skeleton class are OOPS concepts used in programming.

  • Maps are data structures that store key-value pairs.

  • Hash maps are a type of map that use a hash function to index the keys.

  • Skeleton class is a class that provides a basic implementation of an interface.

  • OOPS concepts are Object-Oriented Programming concepts that focus on objects and their interactions.

  • Example: HashMap in Java is a commonly used implementation of a hash map.

Add your answer

Q276. What is MVC? Explain how it is work

Ans.

MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.

  • Model represents the data and business logic

  • View displays the data to the user

  • Controller handles user input and updates the model and view accordingly

  • MVC promotes separation of concerns and modularity

  • Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC

Add your answer

Q277. Introduction Correlation cofficient Formula Difference b/w static and dynamic What are the data structures of C and C++ Core subjects questions Why should we hire You Y TCS Are u willing to rellocate What is da...

read more
Add your answer

Q278. How you will communicate with your client ?

Ans.

I will communicate with my client through various channels and establish clear communication protocols.

  • Establish clear communication protocols with the client

  • Use various channels such as email, phone, video conferencing, and in-person meetings

  • Listen actively to the client's needs and concerns

  • Provide regular updates on project progress and any issues that arise

  • Be responsive and available to address any questions or concerns

  • Maintain a professional and respectful demeanor at all...read more

Add your answer

Q279. Difference between store procedure and function ?

Ans.

Stored procedures are used to perform an action, while functions return a value.

  • Stored procedures are precompiled and stored in the database for repeated use.

  • Functions can be used in SQL statements to return a value.

  • Stored procedures can have input and output parameters.

  • Functions can be used in expressions and calculations.

  • Examples: A stored procedure to insert data into a table, a function to calculate the average of a set of numbers.

View 1 answer

Q280. 1. How do you perform parallel testing in selenium.

Ans.

Parallel testing in Selenium can be performed using Selenium Grid or cloud-based testing platforms.

  • Selenium Grid allows for parallel execution of tests on multiple machines or browsers simultaneously.

  • Cloud-based testing platforms like Sauce Labs or BrowserStack provide access to a large number of virtual machines for parallel testing.

  • Parallel testing can significantly reduce test execution time and improve test coverage.

  • Test scripts should be designed to be thread-safe and no...read more

Add your answer

Q281. Junit and what is mockito

Ans.

Junit is a testing framework for Java. Mockito is a mocking framework used for unit testing.

  • Junit is used for writing and running unit tests in Java

  • Mockito is used for creating mock objects to simulate dependencies in unit tests

  • Mockito can be used with Junit to create comprehensive unit tests

  • Example: Mockito.when(mockObject.method()).thenReturn(expectedResult)

Add your answer

Q282. Difference between having and group by?

Ans.

HAVING is used to filter groups while GROUP BY is used to group rows based on a column.

  • HAVING is used with GROUP BY to filter groups based on a condition

  • GROUP BY is used to group rows based on a column

  • HAVING is used after GROUP BY in a query

  • GROUP BY is used before HAVING in a query

  • Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 5000;

View 1 answer

Q283. What is due diligence and what types of due diligence practices are there?

Ans.

Due diligence is the process of investigating and verifying information before making a decision or entering into a contract.

  • Due diligence is important in business to ensure that all relevant information is considered before making a decision.

  • Types of due diligence include financial due diligence, legal due diligence, and operational due diligence.

  • Financial due diligence involves analyzing financial statements and other financial data to assess the financial health of a compa...read more

Add your answer

Q284. Write a program to find Simple Interest?

Ans.

Program to calculate Simple Interest

  • Take input of principal amount, rate of interest and time period

  • Calculate simple interest using formula: (P * R * T) / 100

  • Display the calculated simple interest

Add your answer

Q285. How do you traverse linked list?

Ans.

Traversing a linked list involves iterating through each node starting from the head node.

  • Start at the head node

  • Iterate through each node by following the 'next' pointer

  • Stop when reaching the end of the list (next pointer is null)

Add your answer

Q286. What is the use of private constructor ?

Ans.

Private constructor restricts the creation of objects outside the class.

  • Private constructor is used to prevent the creation of objects outside the class.

  • It is often used in singleton design pattern to ensure only one instance of the class is created.

  • Private constructor can also be used in utility classes where all methods are static.

  • Private constructor can be used to prevent inheritance of a class.

  • Example: java.lang.Math class has a private constructor and all methods are sta...read more

Add your answer

Q287. Recursive stored Procedure Optimising techniques Recovery and backup. How to do Loading of Jason file in sql How is Scheduling done On/off set count with curser example.

Ans.

Questions on SQL Database Administration including recursive stored procedures, optimization, recovery and backup, loading JSON files, scheduling, and cursor examples.

  • For recursive stored procedures, use common table expressions (CTEs) to simplify the code

  • Optimization techniques include indexing, query tuning, and partitioning

  • Regular backups and testing of recovery procedures are essential for data protection

  • To load JSON files in SQL, use OPENROWSET or BULK INSERT

  • Scheduling c...read more

Add your answer

Q288. What do you know about TestNG and Cucumber

Ans.

TestNG is a testing framework for Java while Cucumber is a BDD tool for behavior-driven development.

  • TestNG is used for unit, functional, and integration testing

  • Cucumber is used for acceptance testing and supports BDD

  • TestNG uses annotations to define test methods and groups

  • Cucumber uses Gherkin syntax to define scenarios and steps

  • TestNG generates HTML reports while Cucumber generates reports in various formats

  • TestNG supports parallel testing while Cucumber does not

  • TestNG can b...read more

Add your answer

Q289. Tell about oops concepts What is inheritance? Is multiple inheritance possible in java? What is mutable in java? What is the function of malloc, calloc etc? Difference between delete and truncate? And many more

Ans.

Questions on OOPs concepts, inheritance, mutable in Java, memory allocation functions, and difference between delete and truncate.

  • Inheritance is a mechanism in OOPs where a class can inherit properties and methods from another class.

  • Java supports single inheritance but not multiple inheritance.

  • Mutable in Java refers to objects whose state can be modified after creation.

  • Malloc and calloc are memory allocation functions in C programming.

  • Delete is a SQL command used to remove ro...read more

Add your answer

Q290. Give some steps and troubleshoot steps to check internet connection in MPLS, VPN. What is DHCP.

Ans.

Steps to check internet connection in MPLS, VPN and definition of DHCP

  • Ping the default gateway to check connectivity

  • Check if the IP address is assigned correctly

  • Verify if the DNS server is reachable

  • Check if the VPN tunnel is up

  • Ensure that the MPLS circuit is operational

  • DHCP stands for Dynamic Host Configuration Protocol

  • DHCP is used to automatically assign IP addresses to devices on a network

  • DHCP reduces the administrative burden of manually assigning IP addresses

Add your answer

Q291. What is your favorite programming language?

Ans.

My favorite programming language is Python.

  • I love Python's simplicity and readability.

  • It has a vast library of modules and frameworks.

  • Python is versatile and can be used for web development, data analysis, and more.

  • It's also great for automation and scripting tasks.

  • Examples: Flask, Django, NumPy, Pandas, BeautifulSoup

Add your answer

Q292. If text box is disabled how will you pass value in that text box

Ans.

Value cannot be passed in a disabled text box.

  • Check if there is any other way to pass the value, such as through a different input field.

  • If not, enable the text box temporarily, pass the value, and then disable it again.

  • Alternatively, check if there is any JavaScript code that can be used to pass the value.

Add your answer

Q293. What are SQL versions worked upon,automations

Ans.

SQL versions worked upon and automations

  • Worked on SQL Server 2008, 2012, 2014, and 2016

  • Automated SQL Server tasks using PowerShell scripts

  • Created SQL Server Agent jobs for automating backups and maintenance tasks

Add your answer

Q294. Difference between interfce and abstract class with example

Ans.

Difference between interface and abstract class with example

  • Interface is a blueprint of a class, while abstract class is a partially implemented class

  • Interface can only have abstract methods, while abstract class can have both abstract and non-abstract methods

  • A class can implement multiple interfaces, but can only extend one abstract class

  • Example of interface: Runnable interface in Java

  • Example of abstract class: Animal class with abstract method 'makeSound'

Add your answer

Q295. Truncate vs delete difference?

Ans.

Truncate removes all data, delete removes selected data.

  • Truncate is faster than delete as it doesn't log individual row deletions.

  • Truncate cannot be rolled back, delete can be.

  • Truncate resets identity columns, delete doesn't.

  • Truncate doesn't fire triggers, delete does.

  • Truncate is a DDL operation, delete is a DML operation.

View 2 more answers

Q296. What is Normalization and types?

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and dependency.

  • Normalization helps in improving data consistency and accuracy.

  • There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.

  • Normalization can help in reducing data redundancy and improving database performance.

  • Example: In a database of customers and orders, normalization can help in separating customer information from order in...read more

Add your answer

Q297. What frameworks have you used with python

Ans.

I have used several frameworks with Python including Django, Flask, and Pyramid.

  • Django - a high-level web framework for rapid development of secure and maintainable websites

  • Flask - a micro web framework for building small to medium-sized web applications

  • Pyramid - a lightweight web framework for building complex web applications

  • Other frameworks I have used include Bottle, CherryPy, and Tornado

Add your answer

Q298. How many programming languages do you know? What do you do to improve your technical skills? What are the technical websites you follow?

Ans.

I know multiple programming languages and constantly work on improving my technical skills.

  • I am proficient in Java, Python, and C++.

  • I regularly participate in coding challenges and competitions to enhance my programming skills.

  • I actively seek out online tutorials, courses, and documentation to learn new programming languages and frameworks.

  • I contribute to open-source projects to gain practical experience and collaborate with other developers.

  • I attend technical conferences and...read more

View 1 answer

Q299. How to mouse hover an element? Write Xpath for an element? How to run test parallel? Explain automation test framework that you worked in? What is data provider in testng? What is collections in Java? About lis...

read more
Ans.

Answers to common questions asked in an Automation Tester interview.

  • To mouse hover an element, you can use Actions class in Selenium WebDriver.

  • Xpath for an element can be written using various attributes like id, class, etc.

  • To run tests parallel in TestNG, you can use 'parallel' attribute in testng.xml file.

  • Automation test framework I worked in was based on Page Object Model design pattern.

  • Data provider in TestNG is used to provide data for test methods.

  • Collections in Java ar...read more

Add your answer

Q300. universal gates, why it is universal?

Ans.

Universal gates are capable of performing all logical operations, making them essential building blocks in digital circuits.

  • Universal gates can be used to implement any other type of logic gate.

  • The two most common universal gates are NAND and NOR gates.

  • By combining universal gates in different ways, complex logic functions can be achieved.

  • Universal gates simplify the design process by reducing the number of different types of gates needed.

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top TCS Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter