0% found this document useful (0 votes)
84 views

TCS Interview Questions: Click Here

Uploaded by

Utkarsh Sirohi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views

TCS Interview Questions: Click Here

Uploaded by

Utkarsh Sirohi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

TCS Interview Questions

To view the live version of the


page, click here.

© Copyright by Interviewbit
Contents

TCS Recruitment Process


1. Interview Process
2. Interview Rounds

TCS Technical Interview Questions: Freshers and


Experienced
3. What is Socket Programming? What Are The Benefits And Drawbacks Of Java
Sockets?
4. What is IPsec? What are its components?
5. What do you understand about a Subnet Mask?
6. What is NAT?
7. What is piggybacking?
8. What does a database schema imply? What are its types?
9. What is the difference between a clustered index and non clustered index ?
10. What do you understand about round trip time?
11. What is a Ping?
12. What do you know about SLIP?
13. What is Ethernet?
14. What is the tunnel mode in networking?
15. Discuss the RSA algorithm in brief.
16. In a so ware program, what is cyclomatic complexity?
17. Give an instance where there was a bug that you didn't find in black box testing
but discovered in white box testing.
18. What is slice splicing in so ware testing? What are its two types?

Page 1 © Copyright by Interviewbit


TCS Interview Questions

TCS Technical Interview Questions:


Freshers and Experienced (.....Continued)

19. Enlist the differences between AWT and Swing in Java.


20. Explain memory leak in C++. How can you avoid it?
21. What is the meaning of a command line argument in C?
22. What do you mean by concurrency control?
23. What do you mean by SQL Correlated Subqueries?
24. What is a checkpoint in a database management system, and when does it
eventuate?
25. In a database management system, what are the two integrity rules?
26. What exactly are macros? What are the benefits and drawbacks?
27. What is the difference between the Java Development Kit (JDK), Java Runtime
Environment (JRE), and Java Virtual Machine (JVM)?
28. How will you swap two numbers without the use of a third variable?
29. Write the code to reverse a given number using Command Line Arguments.
30. What is meant by Cycle Stealing?
31. What are the two concepts of swapping in the context of OS? How does
swapping help in better memory management?
32. What is the RR Scheduling Algorithm in OS?
33. What are interrupts?

TCS Interview Preparation


34. Interview Preparation Tips

Frequently Asked Questions


35. Does TCS Nqt have coding questions?

Page 2 © Copyright by Interviewbit


TCS Interview Questions

Frequently Asked Questions (.....Continued)


36. Who is eligible for TCS Nqt?
37. What is the salary for freshers in TCS?
38. What kind of coding questions are asked in TCS?
39. What are the basic questions asked in a TCS interview?
40. What is TCS ninja?
41. How many rounds of interviews are there in TCS?
42. Is TCS interview tough for experienced?

Page 3 © Copyright by Interviewbit


Let's get Started
IT companies have expanded rapidly in recent years, particularly in India, but only a
few are able to provide their employees a long-term career. That is why individuals
choose to work with well-known companies. Being linked with a brand not only
offers you the assurance that you are on the correct track in your career, but it also
helps to ensure job security to some level. TCS is a brand that people believe can help
them advance their careers while maintaining a proper work-life balance.
Tata Consultancy Services is an IT services, consulting, and business solutions firm
that has been assisting many of the world's leading corporations in their
transformation efforts for more than 50 years. It is based in Mumbai, Maharashtra,
with its main campus in Chennai, Tamil Nadu. TCS is the world's largest IT services
firm by market capitalization ($169.2 billion) as of February 2021.TCS is part of the
Tata group, India's largest multinational corporate conglomerate, and employs
approximately 488,000 world-class consultants in 46 countries.
The Top Employers Institute has named TCS a Global Top Employer, one of just eight
firms in the world to get this honor. TCS is able to attract and develop the greatest
personnel by offering holistic long-term jobs based on continuous learning-enabled
anytime, anywhere, any device digital learning environment.

Page 4 © Copyright by Interviewbit


TCS Interview Questions

TCS Recruitment Process


1. Interview Process
TCS is an excellent location to begin your career as a new employee. It provides a
fantastic workplace as well as a welcoming setting with a good ambiance conducive
to individual and company progress. TCS holds a mass recruiting procedure every
year to find applicants for the position of So ware Engineer. This article not only
explains how to answer relevant TCS interview questions but also provides a road
map for experienced and fresher candidates to acquire their dream job in TCS.

2. Interview Rounds
Interview round 1: TCS NQT
The first round of the TCS recruitment process is TCS NQT (National Qualifier Test),
which is considered one of the most difficult stages of the procedure. It is an Ability
Test that evaluates a candidate's abilities and skills. TCS NQT Exams are offered both
online (at home) and in-person at TCS iON Authorised Exam Centers.
The test has five sections:

Page 5 © Copyright by Interviewbit


TCS Interview Questions

Numerical Ability 20-30 Questions

Verbal 20-25 Questions

Reasoning Ability 25-35 Questions

Programming logic 5-15 Questions

Coding 1-2 Questions

The candidates will be assessed for the following topics:


Numerical ability: Number Systems, Arithmetic, Elementary Statistics, and Data
Interpretation are all assessed in this part.
Verbal Ability: This section assesses English grammar, how to use it correctly,
and reading comprehension.
Reasoning ability: Identifying words and mathematical patterns, problem-
solving, figurative and factual analysis, decision-making, propositional
reasoning, and visual-spatial reasoning are all assessed in this section.
The programming section examines knowledge and skill in specific disciplines
related to occupational roles in the areas below:
Pseudo-code, Algorithms, Programming structures, fundamental So ware
Development Life Cycle (SDLC) and its stage-wise documents, and
implementation using C, C++, and Java will be tested.
Candidates must be able to code in any of the following programming
languages: C, C++, Java, Python, and PERL.
Hands-on exercise of coding.
A er passing the NQT Round, you will be eligible for the TCS NINJA Technical
Interview.
Interview round 2: Technical interview

Page 6 © Copyright by Interviewbit


TCS Interview Questions

This is the most challenging stage of the hiring process, so do your best to prepare for
it. The focus of the entire interview process will be on your technical knowledge,
biography, and primary projects.
The technical round of the TCS interview which is face to face consists of questions
designed to assess the candidate's knowledge of data structures and algorithms,
database management systems, operating systems, networking, object-oriented
programming ideas, and a programming language of your choice. There's a
considerable chance you'll be asked to write some code on pen and paper.
Interview round 3: Managerial round
The managerial round is handled by a panel of senior members. This is also a face-to-
face interview round. This round may consist entirely of technical questions or a
combination of technical and managerial questions. The majority of the questions
are based on the profile for which you are being interviewed. You should be up to
date on any new technologies or so ware required for that position. You may also be
asked questions based on your actions to assess your thinking style. You could be put
under pressure to see how you react. Your CV's achievements may be questioned,
and you may have to defend them. You may be questioned about your previous
working experiences, your objectives, motivations for joining TCS, and other similar
topics.
The panel will assess your corporate culture fit, attitude, so skills, desired career
advancement, and other factors in this round.
You might also be asked generic questions about your work experience, college
degree, speciality, desire to relocate, and so on. In any event, regardless of the route
the interview takes, always be gracious. The interview panel aims to force you to step
outside of your comfort zone. Maintain your composure and respond to the
questions that you are familiar with. If the answer is unknown, don't give up; instead,
try it with what you know.
Interview round 4: HR round

Page 7 © Copyright by Interviewbit


TCS Interview Questions

Expect questions about work experience, education, interests, and family


background, in addition to the standard HR questions about strengths and
weaknesses, reasons for applying to the company, why you should be hired, and so
on. They can also ask questions about TCS - when it was formed, its objectives,
values, organizational structure, and so on.
Most candidates believe that the HR interview is simple, but keep in mind that a poor
HR interview can jeopardize your chances of receiving the job, even if you have
cleared all other hurdles (aptitude test, technical round, etc.). The goal is to maintain
a pleasant and confident demeanour. Interviews can be long and tedious, so
remember to smile!
This is the last stage of the hiring process. Candidates are expected to be adaptable,
yet this phase allows for negotiation. The most common questions asked are :
Please tell me about yourself. (Start with your academics, projects,
achievements, other curriculum activities, and your strengths if you are a
beginner. Also, tell them about your hobbies, background, and so on. If you're an
experienced professional, start with your present position, achievements,
previous work history, and then academic and personal information.)
Why do you want to work in the IT field?
Why are you interested in working for TCS?
Are you willing to relocate to different parts of India?
Why are you looking for a job change? (If you're an experienced professional
seeking a change, this is a common question. The easiest method to respond to
this question is to state that you are leaving your current work in order to
advance your career. Make sure you don't criticize or speak poorly about the
company where you now work.)
What is your expected salary? (This is a difficult question to answer. It is
generally asked of experienced employees. You may inquire about the
company's standard raise for employees.

TCS Technical Interview Questions: Freshers and


Experienced

Page 8 © Copyright by Interviewbit


TCS Interview Questions

3. What is Socket Programming? What Are The Benefits And


Drawbacks Of Java Sockets?
Socket programming is a method of allowing two network nodes to communicate
with each other. One socket (node) listens on a specific port at an IP address, while
the other socket connects with it. While the client connects to the server, the server
creates the listener socket.
Java Socket Benefits:
Sockets are adaptable and adequate. For general communications, efficient
socket-based programming is simple to build.
Low network traffic is caused by sockets. Unlike HTML forms and CGI scripts,
which construct and send entire web pages for each new request, Java applets
can simply send the information that has changed.
Java Socket Drawbacks:
Because a Java applet running in a Web browser can only connect to the
machine from which it originated and nowhere else on the network, security
restrictions can be oppressive at times.
Despite all of Java's beneficial capabilities, Socket-based connections merely
allow for the transmission of raw data packets between programs. Both the
client and the server must provide ways for making the data valuable in some
way.
Because data formats and protocols are application-specific, the re-use of
socket-based systems is limited.

4. What is IPsec? What are its components?


IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of
protocols that offer data authentication, integrity, and confidentiality between two
communication points over an IP network. It also specifies how packets are
encrypted, decrypted, and authenticated. It specifies the protocols for safe key
exchange and key management.
It consists of the following components:

Page 9 © Copyright by Interviewbit


TCS Interview Questions

Encapsulating Security Payload (ESP): Data integrity, encryption,


authentication, and anti-replay are all provided by ESP. It also supports payload
authentication.
Authentication Header (AH): This header also supports data integrity,
authentication, and anti-replay, but not encryption. anti-replay protection
guards against unwanted packet transmission. It does not ensure the privacy of
data.
IKE (Internet Key Exchange): It's a network security protocol that allows two
devices to dynamically exchange encryption keys and find a way to
communicate across a Security Association (SA). To support secure
communication, the Security Association (SA) creates common security
properties between two network entities. IKE (Internet Key Exchange) protects
the content of messages and serves as an open framework for implementing
common algorithms like SHA and MD5. Each packet is assigned a unique
identifier by the algorithm's IP sec users. The device can then determine
whether a packet is correct or not using this identifier. Unauthorized packets are
deleted and not delivered to the intended recipient.

5. What do you understand about a Subnet Mask?


The number indicating the range of IP addresses that can be used within a network is
called a Subnet Mask. Sub Networks or subnets are assigned to them. These
subnetworks are a collection of LANs that are linked to the internet.
This Subnet mask is a 32-bit value that masks the IP address and divides it into two
parts: the network address and the host address. Subnet Masks are made by
assigning all network bits to "1" and all host bits to "0." There are two network
addresses that can't be assigned to any host on the network: "0" and "255", which are
assigned to the network and the broadcast address, respectively, and hence can't be
assigned to anyone.

6. What is NAT?
Network Address Translation (NAT) is an acronym for Network Address Translation.
It involves modifying the IP headers of packets being transported over a traffic
routing device to remap one IP address space to another.

Page 10 © Copyright by Interviewbit


TCS Interview Questions

7. What is piggybacking?
A er receiving data packets in two-way communication, the receiver sends an
acknowledgment (control frame or ACK) to the sender. The receiver, on the other
hand, does not send the acknowledgment right away, instead of waiting until the
next data packet is received by its network layer. The ACK is then added to the
incoming data frame. Piggybacking is the process of postponing the ACK and
attaching it to the next outgoing data frame.

8. What does a database schema imply? What are its types?


A "database schema" is a plan for how a database is built that describes how data is
organized (divided into database tables in the case of relational databases). A
database schema is formally defined as a series of formulas (sentences) known as
integrity constraints that are imposed on a database.
Physical schema, logical schema, and view schema are the three types of schema.
The physical schema describes how the data contained in blocks of storage is
characterized at the physical level of a database.
The logical schema is the design of a database at the logical level; programmers and
database administrators work at this level; data can be characterized as certain types
of data records that are stored in data structures; however, internal details such as
data structure implementation are obscured at this level (available at the physical
level).
View schema is the design of a database at the view level. This term refers to how
end-users interact with database systems.

9. What is the difference between a clustered index and non


clustered index ?
A clustered index is a form of index that reorders the physical storage of records in a
table, whereas a non clustered index is one in which the logical order of the index
does not match the physical storage order of the rows on the disc. Insert and update
operations are faster than with a clustered index. Data is physically stored in index
order, making it faster to read than non-clustered data.

Page 11 © Copyright by Interviewbit


TCS Interview Questions

10. What do you understand about round trip time?


The round-trip time (RTT) is the time it takes for a network request to travel from a
starting point to a destination and back to the initial point in milliseconds (ms). RTT
is a useful indicator for measuring the health of a connection on a local network or
the wider Internet, and it is frequently used by network managers to diagnose
network connection speed and dependability.

11. What is a Ping?


A ping is a computer program that is used to determine whether a host is reachable
and capable of accepting requests across an IP network. It operates by sending an
ICMP (Internet Control Message Protocol) Echo to a network computer and waiting
for a response. It can be used for troubleshooting as well.

12. What do you know about SLIP?


Serial Line Internet Protocol (SLIP) is a basic protocol for communication over serial
ports and routers that works with TCP/IP. They allow machines that were previously
configured for direct communication to communicate with one another.
A client might be linked to the Internet service provider (ISP) over a slower SLIP line,
for example. When a client requires a service, he or she submits a request to the ISP.
The ISP responds to the request and sends it across high-speed multiplexed lines to
the Internet. The results are then sent back to the client through SLIP lines by the ISP.
The format of a SLIP frame is fairly simple, consisting of a payload and a flag that
serves as an end delimiter. The flag is usually a special character with a decimal value
of 192. If this flag is included in the data, it is preceded by an escape sequence, which
prevents the receiver from mistaking it for the end of the frame.

13. What is Ethernet?

Page 12 © Copyright by Interviewbit


TCS Interview Questions

Ethernet is a network technology that connects devices via cables for data
transmission in Local Area Networks (LANs), Metropolitan Area Networks (MANs), and
Wide Area Networks (WANs). It delivers services on the OSI Model's Physical and Data
Link layers. The purpose of an Ethernet network is so computers and other devices
can efficiently share files, information, and data. Ethernet was first introduced in
1980.

14. What is the tunnel mode in networking?


Tunnel Mode is a way of transmitting data over the Internet that encrypts both the
contents and the original IP address information. It secures communications
between security gateways, firewalls, and other devices in a Site-to-Site VPN. In
Transport Mode or Tunnel Mode, the Encapsulating Security Payload (ESP) is used.
ESP encrypts the data and the IP header information in Tunnel Mode.

15. Discuss the RSA algorithm in brief.


The RSA, an asymmetric cryptography algorithm, is used to protect the data transfer.
For encryption, this technique uses a public key, while the decryption key is kept
secure or secret. Two huge prime numbers are used to generate the encryption key,
which is then publicized along with an auxiliary value. This public key can be used for
encryption by anyone, but only someone who knows the prime numbers can decrypt
it. This technique, however, is believed to be slow, and as a result, it is not frequently
used to encrypt data.

16. In a so ware program, what is cyclomatic complexity?


The number of linearly independent paths in a code segment is measured in terms of
cyclomatic complexity. It's a so ware statistic that shows how complex a code is. It is
calculated using the program's Control Flow Graph. The nodes in the graph represent
the smallest set of commands in a program, and a directed edge connects the two
nodes, indicating whether the second command should be executed immediately
a er the first.
The directed graph inside control flow is the edge connecting two basic blocks of the
program mathematically, as control may flow from first to second.
CC = E − N + P

Page 13 © Copyright by Interviewbit


TCS Interview Questions

where,
CC: cyclomatic complexity.
E: number of edges in the control flow graph
N: the number of nodes in the control flow graph
P: the number of connected elements

17. Give an instance where there was a bug that you didn't find
in black box testing but discovered in white box testing.
Let's imagine you have an item that is stored across numerous tables, and you want
to delete it. Your black-box test case is considered passed a er the entity disappears
from the GUI a er deletion in black-box testing. White-box testing, on the other
hand, verifies that all relevant rows are removed from the tables. The test case is
considered unsuccessful if the deletion simply deletes the parent record, leaving the
child rows intact.

18. What is slice splicing in so ware testing? What are its two
types?
A program slice is a set of program statements. We could code a slice and test it right
away if we chose to construct so ware in terms of compatible slices. We can then
code and test additional slices before combining them into good so ware. Slice
splicing is the term for this process.
There are two forms of slicing: static and dynamic.
Static Slicing:
A static slice of a program contains all statements that may change the value of
a variable at any point during any arbitrary execution of the program.
In general, static slices are larger.
It considers every potential program execution.
Dynamic slicing:

Page 14 © Copyright by Interviewbit


TCS Interview Questions

A dynamic slice of a program is made up of all the statements that actually


impact the value of a variable at any point for a specific execution of the
program.
In general, dynamic slices are smaller.
Only takes into account a particular program execution.

19. Enlist the differences between AWT and Swing in Java.

AWT Swing

Swing is a part of Java


Java AWT is a Java API for
Foundation Classes that are
creating graphical user
used to build a variety of
interfaces.
apps.

The components that belong The components that belong


to Java AWT are heavily to Java Swing are light
weighted. weighted.

The execution time of Swing


The execution time of AWT is
is less than that of AWT.
more than that of Swing.
Swing components are
AWT components are
comparatively more
comparatively less powerful.
powerful.

The components that belong The components that belong


to Java AWT are platform- to Java Swing are
dependent. independent of any platform.

AWT does not support the Swing supports the MVC


MVC pattern. pattern.

Page 15 © Copyright by Interviewbit


TCS Interview Questions

20. Explain memory leak in C++. How can you avoid it?
Memory leaking happens in C++ when programmers dynamically allocate memory
with the new keyword or using malloc()/calloc() and then forget to deallocate it with
the delete() or delete[] operators or the free() function. In C++, one of the most
common causes of memory leakage is the use of the incorrect delete operator.
The delete [] operator should be used to free an array of data values, whereas the
delete operator should be used to clear a single allocated memory space.
To avoid memory leak:
When possible, utilise smart pointers instead of manually managing memory.
Instead of char *, use std::string. All memory management is handled internally,
which is quick and well-optimized.
Unless you're interacting with an older library, you should never use a raw
pointer.
In C++, the simplest strategy to avoid memory leaks is to have a few new/delete
calls as possible at the program level — ideally NONE.
Write all code between the new and delete keywords to allocate memory and
deallocate memory.

21. What is the meaning of a command line argument in C?


Command-line arguments are used to get parameters from the command prompt in
C. There are three arguments to the main function in C. They are as follows:
Argument counter
Argument vector
Environment vector

22. What do you mean by concurrency control?


Concurrency Control in a Database Management System is a method of controlling
multiple operations at the same time without interfering. It ensures that Database
transactions are completed in a timely and accurate manner to deliver accurate
results without jeopardizing the database's data integrity.
The concurrency control mechanism is used by DBMS for the following reasons:

Page 16 © Copyright by Interviewbit


TCS Interview Questions

Isolation is achieved by reciprocal exclusion of conflicting transactions.


Conflicts between read-write and write-write must be resolved.
Constantly preserving execution obstacles in order to maintain database
consistency
The system must keep track of how the concurrent transactions interact.
Concurrent-control techniques are used to achieve this control.

23. What do you mean by SQL Correlated Subqueries?


A correlated sub-query is a sub-query that is dependent on another query. Sub-
queries that are executed for each row of an outer query are referred to as correlated
sub-queries. For each row in the outer query, each sub-query is executed once.
Correlated sub-queries can alternatively be thought of as queries that the parent
statement uses for row-by-row processing. The parent statement, in this case, might
be SELECT, UPDATE, or DELETE.

24. What is a checkpoint in a database management system,


and when does it eventuate?
A checkpoint is a technique that removes all previous logs from the system and
stores them permanently on the storage drive. Checkpoints are those locations in the
transaction log record from which all committed data up to the point of the crash
can be recovered.

25. In a database management system, what are the two


integrity rules?
Referential integrity rules and entity integrity rules are the two forms of integrity
rules.

Page 17 © Copyright by Interviewbit


TCS Interview Questions

According to referential integrity requirements, if a primary key value is used as a


foreign key in a child table, it cannot be changed. Let R and S be two different
relations. Assume that R relates to the relation S through a set of attributes that serve
as the Primary Key of S and as a Foreign Key in the relation R. The Foreign Key in a
tuple in R must then be either equal to the Primary Key in a tuple in S or completely
NULL.
The main key value cannot be null due to entity integrity. An attribute X of a relation
R(R) cannot take null values if it is a Prime Attribute of R(R). A Prime Attribute is an
attribute that is a part of a relation's Candidate Key.

26. What exactly are macros? What are the benefits and
drawbacks?
Macros are pre-processor constants that are replaced at compile time. Thus, a macro
is a section of code in a program that has been given a name. The compiler
substitutes this name with the actual piece of code whenever it encounters it.
The downside of macros is that they are not function calls; they simply change the
code. Similarly, they have the advantage of saving time when substituting the same
values.

#include <stdio.h>
// defining macros
#define TEXT "Hello"
#define EVEN 2
#define SUMMATION (8 + 2)
int main()
{
printf("String: %s\n", TEXT);
printf("First Even Number: %d\n", EVEN);
printf("Summation: 8+2=%d\n", SUMMATION);
return 0;
}

Any instance of the terms TEXT, EVEN and SUMMATION in the sample above will be
substituted by whatever is in their body.

Page 18 © Copyright by Interviewbit


TCS Interview Questions

27. What is the difference between the Java Development Kit


(JDK), Java Runtime Environment (JRE), and Java Virtual
Machine (JVM)?
Java Virtual Machine(JVM) is an abstract machine that offers a runtime
environment for Java byte-code execution. It is a specification that describes how the
Java Virtual Machine works. Oracle and other companies have helped with its
adoption. JRE is the name of the program that implements it.
There are JVMs for a variety of hardware and so ware systems (so JVM is platform-
dependent). It is a runtime instance that is created when the Java class is executed.
The JVM is divided into three parts: specification, implementation, and instance.
Java Runtime Environment (JRE) is an acronym for Java Runtime Environment. It is
the JVM implementation. The Java Runtime Environment (JRE) is a collection of
so ware tools for creating Java applications. It's responsible for creating the runtime
environment. It is the JVM implementation. It is a real thing. It comprises a collection
of libraries as well as other files that JVM uses during execution.
The term JDK stands for Java Development Kit. It's a so ware development
environment for creating Java applets and applications. It is a real thing. It includes
JRE as well as developer tools. JDK is an implementation of any of Oracle
Corporation's Java Platforms, as listed below:
Java Platform Standard Edition
Java Platform Enterprise Edition
Java Platform Micro Edition

Page 19 © Copyright by Interviewbit


TCS Interview Questions

28. How will you swap two numbers without the use of a third
variable?
This can be achieved using arithmetic operations.

int x = 5, y = 15;

// Code to swap the values of x and y


x = x + y; // x now becomes 20
y = x - y; // y becomes 5
x = x - y; // x becomes 15

Or

int x = 5, y = 15;

// Code to swap the values of x and y


x = x * y; // x now becomes 75
y = x / y; // y becomes 5
x = x / y; // x becomes 15

This can also be achieved using bitwise operations.

Page 20 © Copyright by Interviewbit


TCS Interview Questions

int x = 5, y = 15;

// Code to swap the values of x and y


x = x ^ y; // x now becomes 20
y = x ^ y; // y becomes 5
x = x ^ y; // x becomes 15

29. Write the code to reverse a given number using Command


Line Arguments.
There is no need for a specific input line because the number is entered as a
Command-line Argument.
From the command line argument, extract the input number. This number will
be of the String type.
Convert this number to an integer and save it in the variable num.
Create a variable called rev to record the inverse of this number.
Now loop through num until it equals zero, i.e. (num > 0).
At the end of each iteration, add the remainder of num to rev a er multiplying it
by 10. The last digit of num will be stored in rev.
To eliminate the last digit from the num, divide it by ten.
When the loop is finished, rev has the opposite of num.

Page 21 © Copyright by Interviewbit


TCS Interview Questions

class IB {

// Function for reversing the number


public static int revNum(int num)
{

// Variable which stores the


// required reverse number
int rev = 0;

// Traversing the number digit by digit


while (1) {

if(num <= 0)
break;
// Attach the last digit of num
// as the next digit of rev
rev = rev * 10 + num % 10;

// Drop the last digit of num


num = num / 10;
}

// Return the resultant reverse number


return rev;
}

public static void main(String[] args)


{

if (args.length > 0) {

// Obtain the command line argument and


// Convert it to integer type from string type
int number = Integer.parseInt(args[0]);

System.out.println(revNum(number));
}
else
System.out.println("No command line arguments found.");
}
}

30. What is meant by Cycle Stealing?

Page 22 © Copyright by Interviewbit


TCS Interview Questions

In the context of Direct Memory Access, we come across cycle stealing (DMA). The
DMA controller can either use the data bus when the CPU is not using it or force the
CPU to cease execution temporarily. Cycle stealing is the term for the second
method. It's worth noting that cycle stealing is only possible at specific breakpoints in
an instruction cycle.

31. What are the two concepts of swapping in the context of OS?
How does swapping help in better memory management?
Swapping has been subdivided into two concepts: Swap-in and Swap-out.
Swap-out is a technique for transferring a process from RAM to the secondary
memory.
Swap-in is a technique for removing a program from the secondary memory and
reinstalling it in the main memory, also known as RAM.
Processes can be copied from the main memory to a backing store and then copied
back at regular intervals determined by the operating system. Swapping allows more
processes to execute at the same time than memory allows. Swapping allows the
CPU to do numerous jobs at the same time. As a result, procedures don't have to wait
very long to be executed. It aids the CPU's ability to manage several tasks in a single
main memory. It facilitates the creation and use of virtual memory.

32. What is the RR Scheduling Algorithm in OS?


The RR (round-robin) scheduling algorithm was designed with time-sharing systems
in mind. The CPU scheduler goes around a circular queue, allocating CPU to each task
for a time period of up to around 10 to 100 milliseconds.
It is simple and easy to implement. It is preemptive because processes are only
allotted CPU for a certain amount of time. All processes get an equal share of CPU.
Disadvantages include context switches, low throughput, larger waiting time, and
response time.

33. What are interrupts?

Page 23 © Copyright by Interviewbit


TCS Interview Questions

An interrupt is a part of the hardware system that alerts the CPU when it wants to
access a specific resource. This interrupt signal is received by an interrupt handler,
which “tells” the processor to operate in response to the interrupt request.

TCS Interview Preparation


34. Interview Preparation Tips
Finding a suitable career necessitates a great deal of effort and focus. A little bit of
planning ahead of time could considerably improve your chances of making it to the
interview stage. But, in all honesty, it's well worth it!

Page 24 © Copyright by Interviewbit


TCS Interview Questions

The first step in nailing any interview is “Self Confidence.” If you are confident
enough, you have already completed half of the task. Keep a positive attitude
and a smile on your face at all times.
Study your technical subjects thoroughly and practice your responses to
frequent HR and management interview questions. Above all, stay cool and
certain, and you'll have an excellent chance of surviving.
Visit the company's website. Understand the services and product lines that the
company provides its mission and philosophy. Employers expect you to
understand who the company is, what it does, and how it fits into your career
aspirations. These types of company-related questions can be asked in the HR
round.
In your technical interview, your academic projects and mini-projects play a
significant influence. Be highly strong in the fundamentals of the programming
language, regardless of your technical role.
Make Your Resume Perfect. Employers will only take into consideration resumes
and cover letters that are error-free in terms of format, grammar, and spelling.
Resumes should be targeted to the exact position for which you've applied,
highlighting relevant work experience and academic credentials.
Remember to learn about the basic algorithm for Fibonacci sequence, sorting,
the Armstrong Number, prime, palindrome, even, odd, and factorial programs.
Answers should be BRIEF. To convey the essential solution, don't use any
additional word arts. Don't waste time giving useless responses or asking
questions that aren't relevant. Any interviewer who sees you do this will
immediately mark you down on their scorecard.

Frequently Asked Questions


35. Does TCS Nqt have coding questions?
Generally, there will be 2 coding questions in the TCS NQT Online test.TCS has
renamed these questions "Hands-on Coding," although they are still the same TCS
Coding Questions.
The languages that you can utilize for TCS NQT are as follows:

Page 25 © Copyright by Interviewbit


TCS Interview Questions

C
C++
Python
JAVA
Perl

36. Who is eligible for TCS Nqt?


Pre-final and final-year undergraduate, graduate, and diploma students.
Students with any degree or specialization/discipline are welcome to apply.
Freshers (those who have fewer than two years of experience).

37. What is the salary for freshers in TCS?


TCS pays freshers a minimum salary of Rs.3.30 to Rs.3.60 lakhs per year if they pass
all interview rounds, including the NQT, technical round, HR round, and management
round. This is TCS Ninja's initial pay.

38. What kind of coding questions are asked in TCS?


These are the most critical and fundamental TCS NQT coding questions, which serve
as a foundation for solving additional problems :
Reverse a string
Reverse a number
Prime number
Greatest among 10 numbers
Fibonacci series
Swap 2 numbers
Armstrong number
Decimal to binary & vice versa
Average of 2 numbers
Odd-even number
Check leap year
and other basic coding questions.

39. What are the basic questions asked in a TCS interview?

Page 26 © Copyright by Interviewbit


TCS Interview Questions

You will be tested on your programming skills. Computer Networks, DBMS, So ware
Management, Operation Systems, and Cloud Computing are all topics that students
will be asked questions from. Prepare well about projects which you have created.
Prepare the basics of HTML, C, C++, and other computer-related topics. Prepare the
topics which are mentioned in your resume. The most common questions asked in
HR interviews relate to relocation, background, reasons for a job change, expected
salary, and others. They can also ask questions related to the company. Know the
company well.

40. What is TCS ninja?


TCS Ninja is a job role that TCS offers to new employees (freshers).
The TCS Ninja Recruitment eligibility criteria are shown below.
In the Class Xth, Class XIIth, Diploma (if applicable), Graduation, and
Postgraduate examinations, the minimum aggregate (all subjects in all
semesters) scores should be 60 percent or 6 CGPA.
Students in the highest qualification must not have more than one ongoing
backlog, arrear, or ATKT at the time of the TCS Selection process. Keep in mind
that if you're chosen, you shouldn't have any outstanding debts or arrears when
you start working at TCS.
Declaring gaps in education is required (if any). Extended education
(examinations completed a er the Board / University's deadline) should not
result in a break in education. Any gap in education should not last longer than
24 months and should only be taken for legitimate reasons.
To participate in the TCS Ninja recruitment process, students must be between
the ages of 18 and 28.
UG/PG Engineering Courses & Discipline Only B.E. / B.Tech / M.E. / M.Tech / MCA /
M.Sc courses from any university / college specialization are eligible to apply.
Freshers with up to two years of prior work experience are eligible to apply for
the TCS Ninja recruiting process.

41. How many rounds of interviews are there in TCS?


There are 3 rounds of interviews:

Page 27 © Copyright by Interviewbit


TCS Interview Questions

Technical interview
Managerial interview
HR interview
Check out the above section to learn more.

42. Is TCS interview tough for experienced?


It makes no difference if the TCS interview is difficult or simple. The truth is that the
more you prepare, the easier it will be to pass the interview. Acquire sufficient
knowledge about interview stages, rounds, and questions, among other things. The
interview is based on the candidate's CV (prior experience, previous works) and the
job requirements. Questions are posed about programming languages, logical
thinking, and products/so ware/projects on which the candidate has recently or
previously worked.

Page 28 © Copyright by Interviewbit


Links to More Interview
Questions

C Interview Questions Php Interview Questions C Sharp Interview Questions

Web Api Interview Hibernate Interview Node Js Interview Questions


Questions Questions

Cpp Interview Questions Oops Interview Questions Devops Interview Questions

Machine Learning Interview Docker Interview Questions Mysql Interview Questions


Questions

Css Interview Questions Laravel Interview Questions Asp Net Interview Questions

Django Interview Questions Dot Net Interview Questions Kubernetes Interview


Questions

Operating System Interview React Native Interview Aws Interview Questions


Questions Questions

Git Interview Questions Java 8 Interview Questions Mongodb Interview


Questions

Dbms Interview Questions Spring Boot Interview Power Bi Interview Questions


Questions

Pl Sql Interview Questions Tableau Interview Linux Interview Questions


Questions

Ansible Interview Questions Java Interview Questions Jenkins Interview Questions

Page 29 © Copyright by Interviewbit

You might also like