Assistant System Engineer

filter-iconFilter interviews by

100+ Assistant System Engineer Interview Questions and Answers for Freshers

Updated 23 Jul 2024

Q51. What is view and constraint in SQL?

Ans.

View is a virtual table while constraint is a rule to limit data in a table.

  • View is created by a SELECT statement and does not store data

  • Constraint is used to limit the type or amount of data that can be inserted into a table

  • Examples of constraints are PRIMARY KEY, FOREIGN KEY, UNIQUE, CHECK

  • Views can be used to simplify complex queries or to restrict access to sensitive data

Q52. Who is the CEO of TCS?

Ans.

The CEO of TCS is Rajesh Gopinathan.

  • Rajesh Gopinathan became the CEO of TCS in 2017.

  • He has been with TCS for over 20 years, starting as an engineer.

  • Under his leadership, TCS has continued to grow and expand globally.

  • Gopinathan has also emphasized the importance of digital transformation and innovation.

  • He holds a degree in electrical and electronics engineering from the National Institute of Technology, Tiruchirappalli.

Q53. what is a++ and ++a?

Ans.

a++ and ++a are both increment operators in programming languages like C++ and Java.

  • a++ is a post-increment operator which increments the value of a after the expression is evaluated.

  • ++a is a pre-increment operator which increments the value of a before the expression is evaluated.

  • Both operators can be used with variables of numeric data types like int, float, etc.

  • Example: int a = 5; int b = a++; // b = 5, a = 6; int c = ++a; // c = 7, a = 7;

Q54. drawbacks of iphone 6? what do you use?

Ans.

Drawbacks of iPhone 6 include battery life, storage capacity, and lack of headphone jack. I use an iPhone 11.

  • Battery life is relatively short compared to newer models

  • Storage capacity is limited and non-expandable

  • Lack of headphone jack requires the use of adapters or wireless headphones

  • iPhone 11 has longer battery life, larger storage capacity, and improved camera features

Are these interview questions helpful?

Q55. What is difference between static and dynamic polymorphism.

Ans.

Static polymorphism is resolved at compile-time while dynamic polymorphism is resolved at runtime.

  • Static polymorphism is achieved through function overloading and operator overloading.

  • Dynamic polymorphism is achieved through virtual functions and function overriding.

  • Static polymorphism is faster as it is resolved at compile-time.

  • Dynamic polymorphism is more flexible as it allows for runtime binding of functions.

  • Example of static polymorphism: function overloading - multiple f...read more

Q56. Explain theta notation diagrammatically ?

Ans.

Theta notation is a way to describe the upper bound of an algorithm's time complexity.

  • Theta notation is represented by Θ

  • It describes the tightest possible bound on an algorithm's time complexity

  • It takes into account both the best and worst case scenarios

  • For example, an algorithm with Θ(n) time complexity will have a linear runtime

  • An algorithm with Θ(n^2) time complexity will have a quadratic runtime

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. What is OOPS, explain the basic principles of OOPS.

Ans.

OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.

  • OOPS is based on four basic principles: Encapsulation, Inheritance, Polymorphism, and Abstraction.

  • Encapsulation is the process of hiding the implementation details of an object from the outside world.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Polymorphism allows objects of different classes to be treated as if they were of the s...read more

Q58. Write the logic for a palindrome, Armstrong number, Fibonacci sequence and etc?

Ans.

Logic for palindrome, Armstrong number, Fibonacci sequence, etc.

  • Palindrome: Reverse the given number/string and check if it's equal to the original

  • Armstrong number: Sum of cubes of individual digits should be equal to the number itself

  • Fibonacci sequence: Add the previous two numbers to get the next number in the sequence

  • Prime number: A number that is divisible only by 1 and itself

  • Factorial: Multiply all the numbers from 1 to the given number

  • GCD: Find the greatest common divis...read more

Q59. What is stack?operations and program

Ans.

A stack is a data structure that follows the Last In First Out (LIFO) principle.

  • Elements are added to the top of the stack and removed from the top.

  • Common operations include push (add element to top) and pop (remove element from top).

  • Stacks are used in programming for function calls, expression evaluation, and memory management.

  • Example: The back button in a web browser uses a stack to keep track of visited pages.

  • Example: Undo/Redo functionality in a text editor can be impleme...read more

Q60. Final year project, in detail explain design and justify the design.

Ans.

Designed a smart irrigation system using IoT technology.

  • The system uses sensors to detect soil moisture levels and weather conditions.

  • Data is transmitted to a microcontroller which controls the irrigation system.

  • The system is designed to conserve water and reduce manual labor.

  • The design was justified by its potential to save water and increase crop yield.

Q61. What do you know about TCS?

Ans.

TCS is a multinational IT services company headquartered in India.

  • TCS stands for Tata Consultancy Services.

  • It was founded in 1968 by J.R.D. Tata.

  • It is one of the largest IT services companies in the world.

  • TCS offers services in areas such as consulting, digital transformation, and engineering.

  • It has a presence in over 46 countries.

  • Some of its clients include major companies like Microsoft, Citigroup, and General Electric.

Q62. What is delete, truncate and drop?

Ans.

Delete, truncate and drop are SQL commands used to remove data from a database.

  • DELETE command removes specific rows from a table

  • TRUNCATE command removes all rows from a table

  • DROP command removes an entire table from the database

  • DELETE and TRUNCATE can be rolled back, but DROP cannot

  • DELETE and TRUNCATE can have WHERE clause to specify which rows to remove

Q63. What are different Database commands?

Ans.

Database commands are used to manipulate and retrieve data from a database.

  • SELECT: retrieves data from a database

  • INSERT: adds new data to a database

  • UPDATE: modifies existing data in a database

  • DELETE: removes data from a database

  • CREATE: creates a new database or table

  • DROP: deletes a database or table

  • ALTER: modifies the structure of a database or table

Q64. What is computer science ?

Ans.

Computer science is the study of computers and computational systems.

  • Computer science involves the theory, design, development, and application of computer systems.

  • It encompasses various areas such as algorithms, programming languages, data structures, artificial intelligence, and computer networks.

  • Computer scientists solve complex problems and create innovative solutions using computational techniques.

  • Examples of computer science applications include software development, da...read more

Q65. What is dangling pointer?

Ans.

A dangling pointer is a pointer that points to a memory location that has been deallocated or freed.

  • Dangling pointers occur when a pointer is not set to NULL after the memory it points to is freed.

  • Accessing a dangling pointer can lead to undefined behavior or crashes.

  • Dangling pointers can be avoided by setting pointers to NULL after freeing the memory they point to.

Q66. Difference between Java and javascript. Benefits of using javascript. Site three difference between Java and javascript Write a program to find palindrome. What is DOM What is virtual DOM

Ans.

Java is a programming language used for general-purpose programming, while JavaScript is a scripting language primarily used for web development.

  • Java is a statically typed language, while JavaScript is dynamically typed.

  • Java is compiled and runs on the Java Virtual Machine (JVM), while JavaScript is interpreted and runs in the browser.

  • Java is used for backend development, desktop applications, and Android apps, while JavaScript is used for front-end web development.

Q67. Difference between abstract class and interface, how to check mysql version.

Ans.

Abstract class is a class with implementation while interface is a contract without implementation. To check MySQL version, use SELECT VERSION();

  • Abstract class can have constructors while interface cannot

  • Abstract class can have non-abstract methods while interface cannot

  • A class can implement multiple interfaces but can only inherit from one abstract class

  • To check MySQL version, use SELECT VERSION(); in MySQL command line or any MySQL client

Q68. What are the features of C?

Ans.

C is a high-level programming language known for its efficiency and portability.

  • C is a compiled language

  • It has a rich set of operators and data types

  • It supports both procedural and object-oriented programming

  • C is widely used in system programming, embedded systems, and game development

  • Examples of C-based software include the Linux kernel, MySQL, and Adobe Photoshop

Q69. What is pass and break?

Ans.

In programming, pass and break are keywords used for control flow.

  • pass is a keyword used to indicate that no action should be taken in a certain block of code.

  • break is a keyword used to exit a loop or switch statement.

  • pass is commonly used as a placeholder when a statement is required syntactically but no action is needed.

  • break is used to terminate the execution of a loop or switch statement and continue with the next statement outside the loop or switch.

Q70. Explain jvm , jre , jdk ?

Ans.

JVM is a virtual machine that executes Java bytecode. JRE is a runtime environment that includes JVM and libraries. JDK is a development kit that includes JRE and tools for developing Java applications.

  • JVM stands for Java Virtual Machine and is responsible for executing Java bytecode.

  • JRE stands for Java Runtime Environment and includes JVM and libraries required to run Java applications.

  • JDK stands for Java Development Kit and includes JRE along with tools for developing Java ...read more

Q71. What is the latest technology?

Ans.

The latest technology is artificial intelligence (AI).

  • Artificial intelligence (AI) is a branch of computer science that enables machines to perform tasks that typically require human intelligence.

  • AI technologies include machine learning, natural language processing, computer vision, and robotics.

  • Examples of AI applications include virtual assistants (e.g., Siri, Alexa), autonomous vehicles, facial recognition systems, and recommendation algorithms.

  • AI is being used in various ...read more

Q72. What is memory leak?

Ans.

Memory leak is a condition where a program fails to release memory it no longer needs, leading to memory consumption and performance issues.

  • Memory leak occurs when dynamically allocated memory is not deallocated properly.

  • It can happen when a program loses the reference to allocated memory without freeing it.

  • Memory leaks can gradually consume all available memory, causing the program or system to crash.

  • Common causes include forgetting to free memory, incorrect use of pointers,...read more

Q73. What are OOPS concepts?

Ans.

OOPS concepts are the principles of Object-Oriented Programming that help in designing and implementing software systems.

  • Abstraction

  • Encapsulation

  • Inheritance

  • Polymorphism

  • Classes and Objects

  • Methods and Properties

  • Interfaces

  • Overloading and Overriding

Frequently asked in, ,

Q74. What are variables in C?

Ans.

Variables in C are containers that hold data values and can be manipulated throughout the program.

  • Variables must be declared before use

  • They can hold different types of data such as integers, floats, and characters

  • Their values can be changed throughout the program

  • They can be used in mathematical operations

  • Examples: int age = 25; float price = 10.99; char letter = 'a';

Q75. What is stack and queue?

Ans.

Stack and queue are data structures used to store and retrieve data in a specific order.

  • Stack is a Last-In-First-Out (LIFO) data structure where the last element added is the first one to be removed.

  • Queue is a First-In-First-Out (FIFO) data structure where the first element added is the first one to be removed.

  • Stacks are used in undo-redo functionality, recursive function calls, and browser history.

  • Queues are used in scheduling tasks, printing documents, and handling requests...read more

Frequently asked in,

Q76. What are the SQL commands?

Ans.

SQL commands are used to interact with databases to perform tasks such as querying, updating, and deleting data.

  • SQL commands are used to interact with databases

  • Common SQL commands include SELECT, INSERT, UPDATE, DELETE

  • Examples: SELECT * FROM table_name, INSERT INTO table_name (column1, column2) VALUES (value1, value2), UPDATE table_name SET column1 = value1 WHERE condition

Q77. what is cloud computing?

Ans.

Cloud computing is the delivery of computing services over the internet.

  • Cloud computing allows users to access and use computing resources on-demand, such as storage, processing power, and software applications.

  • It eliminates the need for users to own and manage physical infrastructure, as the resources are provided by a third-party service provider.

  • Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

Frequently asked in, ,

Q78. What is tree? and its traversal technique

Ans.

A tree is a data structure consisting of nodes connected by edges. Traversal techniques include in-order, pre-order, post-order, and level-order.

  • A tree is a hierarchical data structure with a root node and child nodes.

  • Traversal techniques include in-order (left subtree, root, right subtree), pre-order (root, left subtree, right subtree), post-order (left subtree, right subtree, root), and level-order (level by level).

  • Examples of trees include binary trees, binary search trees...read more

Q79. When is Iphone 7 released?

Ans.

The iPhone 7 was released on September 16, 2016.

  • The iPhone 7 was released on September 16, 2016.

  • It was the successor to the iPhone 6s and 6s Plus.

  • The iPhone 7 introduced several new features, including a water-resistant design and the removal of the headphone jack.

Q80. What are Oops concepts in Java?

Ans.

Oops concepts are the fundamental principles of object-oriented programming in Java.

  • Encapsulation: wrapping data and methods into a single unit

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single method to perform different tasks

  • Abstraction: hiding implementation details and showing only necessary information

Q81. What are the latest technology you are familiar with

Ans.

I am familiar with various latest technologies in the field of computer science.

  • Artificial Intelligence and Machine Learning

  • Cloud Computing and Virtualization

  • Blockchain Technology

  • Internet of Things (IoT)

  • Big Data Analytics

  • Cybersecurity and Ethical Hacking

Q82. 3. Data types in C++ programming

Ans.

Data types in C++ programming

  • C++ has built-in data types like int, float, double, char, bool, etc.

  • User-defined data types can also be created using classes and structures.

  • Data types determine the size and type of data that can be stored in a variable.

  • Data types also affect the memory allocation and performance of the program.

Q83. what is stored procedure?

Ans.

A stored procedure is a precompiled set of SQL statements that can be executed on a database server.

  • Stored procedures are used to encapsulate and execute a series of SQL statements.

  • They can be used to improve performance by reducing network traffic.

  • Stored procedures can accept input parameters and return output parameters or result sets.

  • They can be used for complex data manipulation, business logic implementation, and security enforcement.

  • Examples of stored procedures include...read more

Frequently asked in,

Q84. Anuly framework you know ?

Ans.

Yes

  • AngularJS - a JavaScript framework for building web applications

  • React - a JavaScript library for building user interfaces

  • Django - a high-level Python web framework

  • Spring - a Java framework for building enterprise-level applications

Q85. Differences between C and Java?

Ans.

C is a procedural language while Java is an object-oriented language.

  • C is compiled while Java is interpreted

  • C has pointers while Java does not

  • Java has automatic garbage collection while C does not

  • Java has platform independence while C does not

  • Java has built-in exception handling while C does not

Q86. What is type casting?

Ans.

Type casting is the process of converting a variable from one data type to another.

  • It is also known as type conversion.

  • It can be done implicitly or explicitly.

  • Explicit type casting is done using casting operators.

  • Examples of casting operators include (int), (float), and (char).

  • Type casting can lead to loss of data if the target data type cannot hold the original value.

Q87. what is static variable?

Ans.

A static variable is a variable that is shared by all instances of a class and retains its value even after the function ends.

  • Static variables are declared using the 'static' keyword.

  • They are initialized only once, at the start of the program execution.

  • Static variables are stored in the data segment of memory.

  • They can be accessed directly using the class name without creating an object.

  • Changes made to a static variable in one instance of a class will be reflected in all other...read more

Q88. What is ASCII?

Ans.

ASCII stands for American Standard Code for Information Interchange. It is a character encoding standard used to represent text in computers.

  • ASCII is a 7-bit character set that includes 128 characters.

  • Each character is represented by a unique numeric code.

  • ASCII codes are used to represent characters in computer systems and communication protocols.

  • Common ASCII codes include 65 for 'A', 97 for 'a', and 48 for '0'.

Q89. 4. Data Structures in C++ programming

Ans.

Data structures in C++ are used to organize and store data efficiently.

  • C++ provides various built-in data structures like arrays, linked lists, stacks, queues, trees, and graphs.

  • Data structures help in performing operations like searching, sorting, and inserting data efficiently.

  • Choosing the right data structure is important for optimizing the performance of a program.

  • C++ also allows creating custom data structures using classes and templates.

Q90. Dynamic memory allocation in C++

Ans.

Dynamic memory allocation in C++ allows for the allocation and deallocation of memory during program execution.

  • Dynamic memory allocation is done using the 'new' keyword in C++.

  • It allows for the creation of arrays or individual objects on the heap.

  • Memory allocated dynamically must be explicitly deallocated using the 'delete' keyword.

  • Dynamic memory allocation is useful when the size of data is not known at compile-time.

  • It can help optimize memory usage and improve program flexi...read more

Q91. Difference between if and while loop.

Ans.

If loop is used for conditional execution while while loop is used for repetitive execution.

  • If loop executes the code block only if the condition is true.

  • While loop executes the code block repeatedly as long as the condition is true.

  • If loop is used for decision-making while while loop is used for iteration.

  • Example of if loop: if (x > 5) { // do something }

  • Example of while loop: while (x < 10) { // do something }

Q92. What are strings?

Ans.

Strings are arrays of characters used to represent text in programming languages.

  • Strings are a data type in programming languages.

  • They are typically enclosed in quotation marks.

  • Strings can contain letters, numbers, symbols, and spaces.

  • They can be concatenated or manipulated using various string operations.

  • Examples: 'Hello, World!', '12345', 'This is a string.'

Q93. What is Pointer?

Ans.

A pointer is a variable that stores the memory address of another variable.

  • Pointers are used to manipulate data directly in memory.

  • They are commonly used in C and C++ programming languages.

  • Pointers can be used to pass values by reference, allowing functions to modify the original data.

  • Null pointers are used to indicate that a pointer does not point to a valid memory address.

Frequently asked in,

Q94. Q6- what are the types of normalisation

Ans.

Normalization is a process of organizing data in a database to reduce redundancy and dependency.

  • First Normal Form (1NF)

  • Second Normal Form (2NF)

  • Third Normal Form (3NF)

  • Boyce-Codd Normal Form (BCNF)

  • Fourth Normal Form (4NF)

  • Fifth Normal Form (5NF) or Project-Join Normal Form (PJNF)

  • Domain-Key Normal Form (DKNF)

Q95. Write the logic of recursion?

Ans.

Recursion is a programming technique where a function calls itself in order to solve a problem.

  • Recursion involves breaking down a problem into smaller subproblems and calling the function recursively on those subproblems.

  • A base case is needed to stop the recursion and prevent infinite loops.

  • Examples of recursive functions include factorial calculation, Fibonacci sequence generation, and tree traversal.

Q96. What is cloud, types of cloud.

Ans.

Cloud refers to the delivery of computing services over the internet. There are three types of cloud: public, private, and hybrid.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection

  • Public cloud services are provided by third-party companies like Amazon Web Services and Microsoft Azure

  • Private cloud services are operated solely for a single organization

  • Hybrid cloud combines public and private cloud services to create a customiz...read more

Q97. How do you retrieve a file?

Ans.

To retrieve a file, locate the file in the file system and open it.

  • Open the file explorer or file manager

  • Navigate to the folder where the file is located

  • Locate the file and double-click on it to open it

  • If the file is not visible, use the search function to locate it

  • If the file was recently worked on, check the recent files list in the application used to create or edit the file

Q98. Why TCS?

Ans.

TCS is a global IT services and consulting company with a strong reputation for innovation and client satisfaction.

  • TCS has a strong global presence with operations in over 46 countries.

  • TCS has a diverse range of clients across industries such as banking, healthcare, and retail.

  • TCS has a strong focus on innovation and invests heavily in research and development.

  • TCS has a strong reputation for client satisfaction and has won numerous awards for its services.

  • TCS offers a wide ra...read more

Q99. What are access specifiers

Ans.

Access specifiers define the visibility and accessibility of class members in object-oriented programming.

  • Access specifiers are keywords used in object-oriented programming languages like Java and C++.

  • They determine the level of access that other classes or objects have to the members of a class.

  • There are three access specifiers: public, private, and protected.

  • Public members are accessible from anywhere in the program.

  • Private members are only accessible within the class itsel...read more

Q100. What is scope of variables

Ans.

The scope of variables refers to the visibility and accessibility of variables within a program.

  • Variables have different scopes depending on where they are declared

  • Local variables have a limited scope and are only accessible within the block of code where they are declared

  • Global variables have a wider scope and can be accessed from anywhere in the program

  • Scope can also be influenced by the use of keywords like 'public', 'private', 'protected' in object-oriented programming

  • Var...read more

Previous
1
2
3
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.5k Interviews
3.8
 • 8.2k Interviews
3.6
 • 7.6k Interviews
3.7
 • 5.6k Interviews
4.1
 • 5k Interviews
3.8
 • 2.8k Interviews
4.0
 • 2.4k Interviews
3.9
 • 368 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Recently Viewed
COMPANY BENEFITS
Tata Motors
No Benefits
INTERVIEWS
Reliance Industries
No Interviews
INTERVIEWS
Hamilton Housewares
No Interviews
INTERVIEWS
IBM
10 top interview questions
INTERVIEWS
ZeMoSo Technologies
No Interviews
INTERVIEWS
Tata Communications
No Interviews
JOBS
Hamilton Housewares
No Jobs
COMPANY BENEFITS
Tata Motors
No Benefits
INTERVIEWS
Hamilton Housewares
No Interviews
INTERVIEWS
HCLTech
No Interviews
Assistant System Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter