Interview Rounds

 Interview round 1:

 Interview round 1: TCS NQT

The first round of the TCS recruitment process is TCS NQT (National Qualifier Test), which is considered one of the most difficult stages of the procedure. It is an Ability Test that evaluates a candidate's abilities and skills. TCS NQT Exams are offered both online (at home) and in-person at TCS iON Authorised Exam Centers. 

The test has five sections:

The candidates will be assessed for the following topics: 

Numerical ability: Number Systems, Arithmetic, Elementary Statistics, and Data Interpretation are all assessed in this part. 

Verbal Ability: This section assesses English grammar, how to use it correctly, and reading comprehension.

 Reasoning ability: Identifying words and mathematical patterns, problem-solving, figurative and factual analysis, decision-making, propositional reasoning, and visual-spatial reasoning are all assessed in this section.

 The programming section examines knowledge and skill in specific disciplines related to occupational roles in the areas below: 

Pseudo-code, Algorithms, Programming structures, fundamental Software Development Life Cycle (SDLC) and its stage-wise documents, and implementation using C, C++, and Java will be tested.

 Candidates must be able to code in any of the following programming languages: C, C++, Java, Python, and PERL. 

Hands-on exercise of coding.

 After passing the NQT Round, you will be eligible for the TCS NINJA Technical Interview.

Interview round 2: Technical interview 

This is the most challenging stage of the hiring process, so do your best to prepare for it. The focus of the entire interview process will be on your technical knowledge, biography, and primary projects.

 The technical round of the TCS interview which is face to face consists of questions designed to assess the candidate's knowledge of data structures and algorithms, database management systems, operating systems, networking, object-oriented programming ideas, and a programming language of your choice. There's a considerable chance you'll be asked to write some code on pen and paper.managerial questions. The majority of the questions are based on the profile for which you are being interviewed. You should be up to date on any new technologies or software required for that position. You may also be asked questions based on your actions to assess your thinking style. You could be put under pressure to see how you react. Your CV's achievements may be questioned, and you may have to defend them. You may be questioned about your previous working experiences, your objectives, motivations for joining TCS, and other similar topics. 

The panel will assess your corporate culture fit, attitude, soft skills, desired career advancement, and other factors in this round. 

You might also be asked generic questions about your work experience, college degree, speciality, desire to relocate, and so on. In any event, regardless of the route the interview takes, always be gracious. The interview panel aims to force you to step outside of your comfort zone. Maintain your composure and respond to the questions that you are familiar with. If the answer is unknown, don't give up; instead, try it with what you know. 

Interview round 4: HR round

 Expect questions about work experience, education, interests, and family background, in addition to the standard HR questions about strengths and weaknesses, reasons for applying to the company, why you should be hired, and so on. They can also ask questions about TCS - when it was formed, its objectives, values, organizational structure, and so on. 

 Most candidates believe that the HR interview is simple, but keep in mind that a poor HR interview can jeopardize your chances of receiving the job, even if you have cleared all other hurdles (aptitude test, technical round, etc.). The goal is to maintain a pleasant and confident demeanour. Interviews can be long and tedious, so remember to smile

  • This is the last stage of the hiring process. Candidates are expected to be adaptable, yet this phase allows for negotiation. The most common questions asked are :Please tell me about yourself. (Start with your academics, projects, achievements, other curriculum activities, and your strengths if you are a beginner. Also, tell them about your hobbies, background, and so on. If you're an experienced professional, start with your present position, achievements, previous work history, and then academic and personal information.)  
  • Why do you want to work in the IT field?
  •  Why are you interested in working for TCS?
  • Are you willing to relocate to different parts of India?
  • Why are you looking for a job change? (If you're an experienced professional seeking a change, this is a common question. The easiest method to respond to this question is to state that you are leaving your current work in order to advance your career. Make sure you don't criticize or speak poorly about the company where you now work.)

Interview Process

 TCS is an excellent location to begin your career as a new employee. It provides a fantastic workplace as well as a welcoming setting with a good ambiance conducive to individual and company progress. TCS holds a mass recruiting procedure every year to find applicants for the position of  Software Engineer. This article not only explains how to answer relevant TCS interview questions but also provides a road map for experienced and fresher candidates to acquire their dream job in TCS. 

TCS Technical Interview Questions: Freshers and Experienced

1. What are interrupts?
 An interrupt is a part of the hardware system that alerts the CPU when it wants to access a specific resource. This interrupt signal is received by an interrupt handler, which “tells” the processor to operate in response to the interrupt request.
 
2. What do you mean by SQL Correlated Subqueries? 
A correlated sub-query is a sub-query that is dependent on another query. Sub-queries that are executed for each row of an outer query are referred to as correlated sub-queries. For each row in the outer query, each sub-query is executed once.
Correlated sub-queries can alternatively be thought of as queries that the parent statement uses for row-by-row processing. The parent statement, in this case, might be SELECT, UPDATE, or DELETE. 

3. In a database management system, what are the two integrity rules? 

Referential integrity rules and entity integrity rules are the two forms of integrity rules.
According to referential integrity requirements, if a primary key value is used as a foreign key in a child table, it cannot be changed. Let R and S be two different relations. Assume that R relates to the relation S through a set of attributes that serve as the Primary Key of S and as a Foreign Key in the relation R. The Foreign Key in a tuple in R must then be either equal to the Primary Key in a tuple in S or completely NULL.
The main key value cannot be null due to entity integrity. An attribute X of a relation R(R) cannot take null values if it is a Prime Attribute of R(R). A Prime Attribute is an attribute that is a part of a relation's Candidate Key. 

4. What exactly are macros? What are the benefits and drawbacks?

Macros are pre-processor constants that are replaced at compile time. Thus, a macro is a section of code in a program that has been given a name. The compiler substitutes this name with the actual piece of code whenever it encounters it.
The downside of macros is that they are not function calls; they simply change the code. Similarly, they have the advantage of saving time when substituting the same values.

 #include
 // defining macros
 #define TEXT "Hello"
 #define EVEN 2
 #define SUMMATION (8 + 2)
 int main() { printf("String: %s\n", TEXT); 
 printf("First Even Number: %d\n", EVEN); 
 printf("Summation: 8+2=%d\n", SUMMATION);
 return 0; 
Any instance of the terms TEXT, EVEN and SUMMATION in the sample above will be substituted by whatever is in their body. 

5. What is the difference between the Java Development Kit (JDK), Java Runtime Environment (JRE), and Java Virtual Machine (JVM)? 

Java Virtual Machine(JVM) is an abstract machine that offers a runtime environment for Java byte-code execution. It is a specification that describes how the Java Virtual Machine works. Oracle and other companies have helped with its adoption. JRE is the name of the program that implements it. 
There are JVMs for a variety of hardware and software systems (so JVM is platform-dependent). It is a runtime instance that is created when the Java class is executed. The JVM is divided into three parts: specification, implementation, and instance. 
Java Runtime Environment (JRE) is an acronym for Java Runtime Environment. It is the JVM implementation. The Java Runtime Environment (JRE) is a collection of software tools for creating Java applications. It's responsible for creating the runtime environment. It is the JVM implementation. It is a real thing. It comprises a collection of libraries as well as other files that JVM uses during execution.
 The term JDK stands for Java Development Kit. It's a software development environment for creating Java applets and applications. It is a real thing. It includes JRE as well as developer tools. JDK is an implementation of any of Oracle Corporation's Java Platforms, as listed below: Java Platform Standard Edition Java Platform Enterprise Edition Java Platform Micro Edition.

6. Write the code to reverse a given number using Command Line Arguments. 

  • There is no need for a specific input line because the number is entered as a Command-line Argument.
  • From the command line argument, extract the input number. 
  • This number will be of the String type.
  •  Convert this number to an integer and save it in the variable num. 
  • Create a variable called rev to record the inverse of this number. Now loop through num until it equals zero, i.e. (num > 0). At the end of each iteration, add the remainder of num to rev after multiplying it by 10. The last digit of num will be stored in rev.
  •  To eliminate the last digit from the num, divide it by ten. When the loop is finished, rev has the opposite of num. 
class IB
 {
 // Function for reversing the number public static int revNum(int num) 
{
 // Variable which stores the
 // required reverse number int rev = 0; 
// Traversing the number digit by digit while (1) 
if(num <= 0) break; 
// Attach the last digit of num 
// as the next digit of rev rev = rev * 10 + num % 10;
 // Drop the last digit of num num = num / 10; 
}
 // Return the resultant reverse number return rev;
 }
 public static void main(String[] args)
 {
 if (args.length > 0) 
// Obtain the command line argument and 
// Convert it to integer type from string type int number = Integer.parseInt(args[0]); System.out.println(revNum(number));
 } 
else System.out.println("No command line arguments found."); 
}
 }

 7. What is meant by Cycle Stealing? 

In the context of Direct Memory Access, we come across cycle stealing (DMA). The DMA controller can either use the data bus when the CPU is not using it or force the CPU to cease execution temporarily. Cycle stealing is the term for the second method. It's worth noting that cycle stealing is only possible at specific breakpoints in an instruction cycle.

8. What are the two concepts of swapping in the context of OS? How does swapping help in better memory management? 

Swapping has been subdivided into two concepts: Swap-in and Swap-out. 
Swap-out is a technique for transferring a process from RAM to the secondary memory. 
Swap-in is a technique for removing a program from the secondary memory and reinstalling it in the main memory, also known as RAM. 
Processes can be copied from the main memory to a backing store and then copied back at regular intervals determined by the operating system. Swapping allows more processes to execute at the same time than memory allows. Swapping allows the CPU to do numerous jobs at the same time. As a result, procedures don't have to wait very long to be executed. It aids the CPU's ability to manage several tasks in a single main memory. 
It facilitates the creation and use of virtual memory. 

9. What is the RR Scheduling Algorithm in OS? 

The RR (round-robin) scheduling algorithm was designed with time-sharing systems in mind. The CPU scheduler goes around a circular queue, allocating CPU to each task for a time period of up to around 10 to 100 milliseconds.
It is simple and easy to implement. It is preemptive because processes are only allotted CPU for a certain amount of time. All processes get an equal share of CPU. Disadvantages include context switches, low throughput, larger waiting time, and response time.

10. What do you mean by concurrency control?

 Concurrency Control in a Database Management System is a method of controlling multiple operations at the same time without interfering. It ensures that Database transactions are completed in a timely and accurate manner to deliver accurate results without jeopardizing the database's data integrity. 
The concurrency control mechanism is used by DBMS for the following reasons: 
  • Isolation is achieved by reciprocal exclusion of conflicting transactions. 
  • Conflicts between read-write and write-write must be resolved.
  •  Constantly preserving execution obstacles in order to maintain database consistency The system must keep track of how the concurrent transactions interact. 
  • Concurrent-control techniques are used to achieve this control.

11. What do you know about SLIP? 

Serial Line Internet Protocol (SLIP) is a basic protocol for communication over serial ports and routers that works with TCP/IP. They allow machines that were previously configured for direct communication to communicate with one another.
A client might be linked to the Internet service provider (ISP) over a slower SLIP line, for example. When a client requires a service, he or she submits a request to the ISP. The ISP responds to the request and sends it across high-speed multiplexed lines to the Internet. The results are then sent back to the client through SLIP lines by the ISP. 
The format of a SLIP frame is fairly simple, consisting of a payload and a flag that serves as an end delimiter. The flag is usually a special character with a decimal value of 192. If this flag is included in the data, it is preceded by an escape sequence, which prevents the receiver from mistaking it for the end of the frame. 

12. What is Socket Programming? What Are The Benefits And Drawbacks Of Java Sockets? 

Socket programming is a method of allowing two network nodes to communicate with each other. One socket (node) listens on a specific port at an IP address, while the other socket connects with it. While the client connects to the server, the server creates the listener socket. 
Java Socket Benefits:
  •  Sockets are adaptable and adequate. For general communications, efficient socket-based programming is simple to build. Low network traffic is caused by sockets.
  •  Unlike HTML forms and CGI scripts, which construct and send entire web pages for each new request, Java applets can simply send the information that has changed.
Java Socket Drawbacks:
  • Because a Java applet running in a Web browser can only connect to the machine from which it originated and nowhere else on the network, security restrictions can be oppressive at times.
  •  Despite all of Java's beneficial capabilities, Socket-based connections merely allow for the transmission of raw data packets between programs. Both the client and the server must provide ways for making the data valuable in some way. 
  • Because data formats and protocols are application-specific, the re-use of socket-based systems is limited.


13. What is NAT?

Network Address Translation (NAT) is an acronym for Network Address Translation. It involves modifying the IP headers of packets being transported over a traffic routing device to remap one IP address space to another. 

14. What is piggybacking?

After receiving data packets in two-way communication, the receiver sends an acknowledgment (control frame or ACK) to the sender. The receiver, on the other hand, does not send the acknowledgment right away, instead of waiting until the next data packet is received by its network layer. The ACK is then added to the incoming data frame. Piggybacking is the process of postponing the ACK and attaching it to the next outgoing data frame. 

15. What does a database schema imply? What are its types? 

A "database schema" is a plan for how a database is built that describes how data is organized (divided into database tables in the case of relational databases). A database schema is formally defined as a series of formulas (sentences) known as integrity constraints that are imposed on a database. 
Physical schema, logical schema, and view schema are the three types of schema. 
The physical schema describes how the data contained in blocks of storage is characterized at the physical level of a database.
The logical schema is the design of a database at the logical level; programmers and database administrators work at this level; data can be characterized as certain types of data records that are stored in data structures; however, internal details such as data structure implementation are obscured at this level (available at the physical level). 
View schema is the design of a database at the view level. This term refers to how end-users interact with database systems.

 16. What is the difference between a clustered index and non clustered index ?

 A clustered index is a form of index that reorders the physical storage of records in a table, whereas a non clustered index is one in which the logical order of the index does not match the physical storage order of the rows on the disc. Insert and update operations are faster than with a clustered index. Data is physically stored in index order, making it faster to read than non-clustered data. 

17. What do you understand about round trip time?

The round-trip time (RTT) is the time it takes for a network request to travel from a starting point to a destination and back to the initial point in milliseconds (ms). RTT is a useful indicator for measuring the health of a connection on a local network or the wider Internet, and it is frequently used by network managers to diagnose network connection speed and dependability.

Post a Comment

0 Comments