i
TCS
Filter interviews by
.NET Core is a cross-platform, open-source framework for building modern applications with high performance and flexibility.
Cross-Platform: Runs on Windows, macOS, and Linux, allowing developers to build applications that can operate on multiple operating systems.
Open Source: The source code is available on GitHub, enabling community contributions and transparency.
High Performance: Optimized for speed and efficien...
Interfaces define contracts for classes, while dependency injection promotes loose coupling and easier testing in programming.
Interfaces allow different classes to implement the same methods, promoting polymorphism. Example: 'public interface Shape { void draw(); }'
Dependency Injection (DI) is a design pattern that allows a class to receive its dependencies from an external source rather than creating them interna...
Financial growth involves increasing revenue, profitability, and overall financial health of an organization.
Revenue Growth: Increasing sales through new customers or upselling to existing ones. Example: A tech company launching a new product line.
Cost Management: Reducing operational costs to improve profit margins. Example: Streamlining supply chain processes.
Investment in Assets: Acquiring new assets or improvi...
Securing a network or server involves implementing various strategies to protect data and resources from unauthorized access.
Implement firewalls to filter incoming and outgoing traffic.
Use strong, unique passwords and enable multi-factor authentication.
Regularly update software and operating systems to patch vulnerabilities.
Conduct regular security audits and vulnerability assessments.
Encrypt sensitive data both i...
What people are saying about TCS
Restructuring CTC involves optimizing salary components for tax efficiency and benefits maximization.
Break down the CTC into fixed and variable components for clarity.
Consider increasing the basic salary to enhance retirement benefits.
Incorporate allowances like HRA, travel, and medical for tax benefits.
Evaluate performance bonuses linked to KPIs to motivate and reward.
Explore stock options or ESOPs for long-term ...
OOPs (Object-Oriented Programming) is a programming paradigm based on objects and classes, promoting code reusability and modularity.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class using properties and methods of an existing class (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present th...
Salesforce is a cloud-based customer relationship management (CRM) platform that helps businesses manage customer interactions and data.
Salesforce offers a suite of applications for sales, service, marketing, and more.
It provides tools for automation, analytics, and customer engagement.
Examples include Sales Cloud for sales teams and Service Cloud for customer support.
Salesforce's AppExchange allows users to find ...
Update parent record status when all child records are completed using a Salesforce trigger.
Create an 'after update' trigger on the child object.
Query related parent records using the child record's parent ID.
Check if all child records related to the parent are completed.
If all are completed, update the parent's status field accordingly.
Use a Set to avoid duplicate parent updates in bulk operations.
A controller handles specific requests, while a front controller centralizes request handling for an entire application.
A controller is responsible for processing user input and returning the appropriate response.
A front controller acts as a single entry point for handling requests, delegating to specific controllers.
Example of a controller: In a Spring MVC application, a specific controller class handles requests...
Transient variables are not serialized, so they are not transmitted over the network during serialization.
Transient variables are marked with the 'transient' keyword in Java.
They are excluded from the serialization process, meaning their values are not saved.
Example: If a class has a transient variable 'password', it won't be serialized.
When the object is deserialized, transient variables will have their default v...
I appeared for an interview in Feb 2025.
I follow a structured process to ensure requirements are effectively translated into actionable tasks for the team.
1. Requirement Analysis: Review and clarify requirements with the Product Owner to ensure understanding.
2. Backlog Refinement: Prioritize and break down requirements into user stories and tasks in the product backlog.
3. Sprint Planning: Collaborate with the team to estimate tasks and plan the sprint based ...
Maintaining quality in Sprint demos involves preparation, stakeholder engagement, and continuous feedback.
Conduct thorough sprint reviews to ensure all features are demoed effectively.
Engage stakeholders early to gather feedback and adjust the demo accordingly.
Use real user scenarios during the demo to showcase functionality.
Prepare a clear agenda and objectives for the demo to keep it focused.
Incorporate feedback from...
A Scrum Master's day involves facilitating meetings, coaching teams, and removing obstacles to ensure smooth project delivery.
Start the day with a Daily Stand-up meeting to discuss progress and blockers.
Facilitate Sprint Planning sessions to define the scope of work for the upcoming sprint.
Conduct Sprint Reviews to showcase completed work and gather feedback from stakeholders.
Hold Retrospectives to reflect on the team'...
During PI planning, I facilitate collaboration, align teams, and prioritize work for the upcoming increment.
Preparation: Gather input from stakeholders and teams to define objectives and features.
Team Breakouts: Facilitate sessions where teams estimate and plan their work for the increment.
Dependency Management: Identify and address dependencies between teams to ensure smooth execution.
Review and Adjust: Present plans ...
Faced a conflict over resource allocation in a project, resolved through open communication and collaborative planning.
Identified the conflict during a sprint planning meeting when team members expressed concerns over resource availability.
Facilitated a discussion with stakeholders to understand their priorities and constraints.
Proposed a reallocation of tasks based on team members' strengths and current workloads, ens...
I appeared for an interview in Jan 2025.
Directives in Angular are markers on a DOM element that tell Angular to attach a specified behavior to that DOM element or transform it.
Directives are used to create reusable components or add behavior to existing elements.
There are three types of directives in Angular: Component, Structural, and Attribute directives.
Examples of built-in directives in Angular include ngIf, ngFor, and ngStyle.
Pipes are a form of inter-process communication used in Unix-like operating systems to send data between processes.
Pipes allow communication between processes by connecting the standard output of one process to the standard input of another process
There are two types of pipes: unnamed pipes and named pipes (also known as FIFOs)
Unnamed pipes are created using the pipe system call and exist only as long as the processes ...
DI system in Angular is a design pattern where dependencies are injected into a class rather than the class creating them.
DI helps in creating loosely coupled components in Angular applications.
It allows for easier testing and maintenance of code.
Dependencies are provided to a component through its constructor.
Angular's DI system is hierarchical, meaning dependencies can be injected at different levels of the applicati...
An HTTP Interceptor is a middleware component that intercepts incoming and outgoing HTTP requests in an application.
HTTP Interceptors are commonly used in Angular applications to modify or log HTTP requests/responses.
They can be used to add headers, handle errors, or perform authentication.
An example of using an HTTP Interceptor is adding an authorization token to every outgoing request for secure API calls.
localStorage and sessionStorage are both web storage options in JavaScript, but they have different scopes and lifetimes.
localStorage stores data with no expiration date, while sessionStorage stores data for one session only
localStorage data persists even after the browser is closed and reopened, while sessionStorage data is lost when the browser is closed
Both can only store strings, but can be converted to other data ...
Common design patterns in Angular include Singleton, Observer, Factory, and Dependency Injection.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.
Factory pattern is used to create objects without specifying t...
Route guards in Angular are used to control access to certain routes in an application.
Route guards are used to protect routes in Angular applications by controlling whether a route can be activated or not.
There are three types of route guards in Angular: CanActivate, CanActivateChild, and CanDeactivate.
CanActivate guard is used to determine if a route can be activated.
CanActivateChild guard is used to determine if a c...
Methods for communication between components include synchronous and asynchronous communication, message queues, APIs, and web services.
Synchronous communication: Components communicate in real-time, waiting for a response before proceeding.
Asynchronous communication: Components communicate without waiting for a response, allowing for parallel processing.
Message queues: Components send messages to a queue for other com...
I appeared for an interview in Jun 2025, where I was asked the following questions.
I appeared for an interview in Feb 2025.
The question are related to the financial and accounting
I appeared for an interview in Jun 2025, where I was asked the following questions.
Securing a network or server involves implementing various strategies to protect data and resources from unauthorized access.
Implement firewalls to filter incoming and outgoing traffic.
Use strong, unique passwords and enable multi-factor authentication.
Regularly update software and operating systems to patch vulnerabilities.
Conduct regular security audits and vulnerability assessments.
Encrypt sensitive data both in tra...
To find your system's IP address, use command-line tools or network settings depending on your operating system.
For Windows, open Command Prompt and type 'ipconfig'. Look for 'IPv4 Address'.
On macOS, open Terminal and type 'ifconfig'. Look for 'inet' under the active network interface.
For Linux, open Terminal and type 'hostname -I' or 'ip addr show'. Check the 'inet' line for your IP.
You can also check your IP through ...
Arriving early allows for preparation, reduces stress, and demonstrates professionalism in any setting.
Plan your route in advance to avoid unexpected delays, such as traffic or construction.
Aim to arrive at least 15-30 minutes early to give yourself time to settle in.
Use the extra time to review notes or relax before the meeting or interview.
Consider potential parking issues; arriving early ensures you have time to fin...
I applied via Walk-in and was interviewed in Dec 2024. There were 5 interview rounds.
I am a dedicated and detail-oriented business analyst with a strong background in data analysis and problem-solving.
I have a Bachelor's degree in Business Administration
I have 5 years of experience in analyzing business processes and identifying areas for improvement
I am proficient in using data analysis tools such as Excel and SQL
I have a proven track record of successfully implementing process improvements that have ...
I was responsible for analyzing business processes, gathering requirements, creating reports, and providing recommendations for improvement.
Analyzed current business processes to identify areas for improvement
Gathered and documented business requirements from stakeholders
Created reports and presentations to communicate findings and recommendations
Collaborated with cross-functional teams to implement process improvement...
Logical and reasoning questions.
Introduce the topic area of the report, outlining the purpose of the case study. Summarize the key issues and findings without providing specific details, and identify the theory employed.
Ensuring data accuracy in MIS is crucial for making informed decisions, improving operational efficiency, and maintaining credibility.
Accurate data ensures that decisions are based on reliable information, leading to better outcomes.
Improves operational efficiency by reducing errors and minimizing the need for rework.
Maintains credibility of the organization by providing accurate and trustworthy information to stakehol...
I have successfully managed a complex MIS project involving multiple stakeholders and systems integration.
Led a team of analysts and developers to design and implement a new MIS system for a large financial institution
Coordinated with various departments to gather requirements and ensure alignment with business goals
Managed project timelines, budgets, and resources to ensure successful delivery
Implemented change manage...
I am currently earning a competitive salary based on my experience and skills.
My current salary is in line with industry standards for my level of experience.
I am open to discussing salary expectations for this new role.
I believe my compensation should reflect the value I bring to the company.
I typically issue salary raises ranging from 2-5% based on performance and market standards.
Salary raises are typically based on performance evaluations and market standards.
Raises can range from 2-5% for average performers, higher for exceptional performers.
Consider factors like company budget and industry benchmarks when determining salary raises.
I have worked on various areas in Pega including case management, user interface design, decisioning, and integration with external systems.
Case management
User interface design
Decisioning
Integration with external systems
I expect to assume a leadership role in designing and implementing Pega solutions to meet business requirements.
Lead the design and development of Pega applications
Collaborate with business stakeholders to gather requirements
Provide technical guidance and mentorship to junior developers
Ensure solutions are scalable, efficient, and aligned with best practices
I appeared for an interview in Feb 2025.
Currently, I am involved in various development projects, focusing on software solutions and enhancing user experience.
Developing web applications using React and Node.js to improve user engagement.
Collaborating with cross-functional teams to gather requirements and deliver solutions.
Implementing RESTful APIs for seamless data integration between front-end and back-end systems.
Conducting code reviews and mentoring juni...
When a job abends, it indicates an abnormal termination, requiring specific steps to diagnose and resolve the issue.
Identify the error message: Check logs for specific error codes or messages that indicate the cause of the abend.
Analyze job dependencies: Determine if other jobs or processes affected the job's execution.
Review recent changes: Look for any recent code changes or configuration updates that might have led ...
The duration of TCS interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 2.2k interview experiences
Difficulty level
Duration
based on 98.9k reviews
Rating in categories
Thiruvananthapuram
2-4 Yrs
₹ 2.3-2.8 LPA
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
65.5k
salaries
| ₹7.9 L/yr - ₹14.5 L/yr |
AST Consultant
53.6k
salaries
| ₹12 L/yr - ₹20.6 L/yr |
Assistant System Engineer
33.2k
salaries
| ₹2.5 L/yr - ₹5 L/yr |
Associate Consultant
32.9k
salaries
| ₹16.2 L/yr - ₹28 L/yr |
Amazon
Wipro
Infosys
Accenture