i
TCS
Filter interviews by
This program identifies and counts repeating words in a given string, providing insights into word frequency.
Input String: Start with a string containing multiple words, e.g., 'hello world hello'.
Split the String: Use a method to split the string into individual words, resulting in an array: ['hello', 'world', 'hello'].
Count Occurrences: Utilize a data structure (like a dictionary) to count how many times each wor...
The Streams API can be used to find the second highest salary from a list of employee salaries efficiently.
Use Streams: Convert the salary list to a stream using `stream()` method.
Sort and Distinct: Use `sorted()` and `distinct()` to get unique salaries in ascending order.
Skip First: Use `skip(1)` to bypass the highest salary.
Find Second: Use `findFirst()` to retrieve the second highest salary.
Example: `OptionalDo...
Pass by value copies data, while pass by reference shares memory address, affecting original data differently.
Pass by Value: A copy of the variable is made. Changes do not affect the original variable.
Example: In C++, 'int a = 5; func(a);' - 'a' remains 5 after func execution.
Pass by Reference: A reference to the variable is passed. Changes affect the original variable.
Example: In C++, 'int a = 5; func(&a);' -...
A HashMap in Java uses a hash table to store key-value pairs, allowing for efficient data retrieval and storage.
1. HashMap stores data in key-value pairs, where each key is unique.
2. It uses an array of buckets to store the entries, where each bucket can hold multiple entries in case of collisions.
3. The hash function computes an index based on the key's hash code, determining where to store the entry.
4. When a co...
What people are saying about TCS
Reversing a string involves rearranging its characters in the opposite order, which can be done using various programming techniques.
Use built-in functions: Many programming languages have built-in functions to reverse strings. Example: Python's `[::-1]`.
Iterative approach: Loop through the string from the end to the beginning and build a new string. Example: `for i in range(len(s)-1, -1, -1):`.
Recursive method: D...
Identifying and counting special characters in a string is essential for data validation and processing.
Special characters include symbols like @, #, $, %, &, *, etc.
Example: In the string 'Hello@World!', '@' and '!' are special characters.
To count special characters, iterate through the string and check if each character is not alphanumeric.
Example code in Python: sum(1 for char in string if not char.isalnum(...
OOP stands for Object-Oriented Programming.
OOP is a programming paradigm based on the concept of 'objects', which can contain data in the form of fields (attributes or properties) and code in the form of procedures (methods)
Encapsulation, inheritance, and polymorphism are key principles of OOP
Examples of OOP languages include Java, C++, and Python
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit, known as a class.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for data hiding, which prevents outside code from directly accessing an object's internal state.
Methods within a class can be used to control access to the data, ensuring that it is only modified ...
Method overloading is when multiple methods in a class have the same name but different parameters.
Allows multiple methods with the same name but different parameters
Helps improve code readability and maintainability
Example: void print(int num) and void print(String text) in a class
Sort a list of numbers using Java8
Use the stream() method to convert the array to a stream
Use the sorted() method to sort the elements
Use the collect() method to convert the stream back to an array
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
Experienced System Engineer with a strong background in network infrastructure and cloud computing.
Over 5 years of experience in designing, implementing, and maintaining complex IT systems
Proficient in network security protocols and troubleshooting techniques
Skilled in virtualization technologies such as VMware and Hyper-V
Certified in Cisco CCNA and CompTIA Network+
Strong problem-solving and communication skills
I appeared for an interview in Feb 2025.
The Streams API can be used to find the second highest salary from a list of employee salaries efficiently.
Use Streams: Convert the salary list to a stream using `stream()` method.
Sort and Distinct: Use `sorted()` and `distinct()` to get unique salaries in ascending order.
Skip First: Use `skip(1)` to bypass the highest salary.
Find Second: Use `findFirst()` to retrieve the second highest salary.
Example: `OptionalDouble ...
Pass by value copies data, while pass by reference shares memory address, affecting original data differently.
Pass by Value: A copy of the variable is made. Changes do not affect the original variable.
Example: In C++, 'int a = 5; func(a);' - 'a' remains 5 after func execution.
Pass by Reference: A reference to the variable is passed. Changes affect the original variable.
Example: In C++, 'int a = 5; func(&a);' - 'a' ...
As a System Engineer, I design, implement, and maintain complex systems to ensure optimal performance and reliability.
Conduct system analysis to identify requirements and specifications.
Develop and implement system architectures, ensuring scalability and security.
Collaborate with cross-functional teams to integrate hardware and software components.
Perform troubleshooting and root cause analysis to resolve system issues...
I appeared for an interview in Jun 2025, where I was asked the following questions.
I applied via TCS and was interviewed in Dec 2024. There was 1 interview round.
Hash technology is a method used to convert data into a fixed-size string of characters, typically used for data security and integrity.
Hash technology uses algorithms to generate a unique fixed-size string of characters from input data.
It is commonly used for data security, password storage, digital signatures, and data integrity verification.
Examples of hash algorithms include MD5, SHA-1, and SHA-256.
Blockchain is a decentralized, distributed ledger technology used to securely record transactions across multiple computers.
Decentralized database
Consensus mechanism
Immutable record of transactions
Cryptographic security
Smart contracts
Examples: Bitcoin, Ethereum
DML stands for Data Manipulation Language, used to manage data in a database.
DML is a subset of SQL (Structured Query Language) used to insert, update, delete, and retrieve data in a database.
Examples of DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and manipulating data within a database system.
Binary to decimal conversion involves multiplying each digit by 2 raised to the power of its position.
To convert binary to decimal, start from the rightmost digit and multiply each digit by 2 raised to the power of its position.
Add all the results together to get the decimal equivalent.
For example, to convert binary 1011 to decimal: 1*2^3 + 0*2^2 + 1*2^1 + 1*2^0 = 11.
Iterate through array and compare each element to find the maximum number.
Iterate through the array using a loop.
Compare each element to a variable storing the current maximum number.
Update the variable if a larger number is found.
Return the maximum number at the end.
Basic HTML code for inserting image and creating a table
Use <img> tag to insert an image with src attribute
Use <table>, <tr>, <td> tags to create a table structure
Specify image source and table content within respective tags
Seeking new challenges and opportunities for growth.
Desire for new challenges and learning opportunities
Looking for career advancement
Seeking a better work-life balance
Company restructuring or downsizing
Relocation to a new area
My expected salary is based on my experience, skills, and the industry standard for System Engineers.
Consider my years of experience in the field
Research the average salary for System Engineers in the industry
Factor in the cost of living in the location of the job
Negotiate based on additional skills or certifications I bring to the role
I appeared for an interview in Dec 2024.
There are numerous Linux commands with various options for system engineers to manage and troubleshoot systems.
Commands like ls, cd, mkdir for file system operations
Commands like ps, top, htop for process management
Commands like ifconfig, ip, route for network configuration
Commands like grep, sed, awk for text processing
Options like -r for recursive, -f for force, -l for long listing
To configure NFS, NTP, and DNS servers, you need to edit configuration files and restart the respective services.
Edit /etc/exports file for NFS server configuration
Edit /etc/ntp.conf file for NTP server configuration
Edit /etc/named.conf file for DNS server configuration
Restart nfs, ntp, and named services after making changes
I want to join TCS because of its reputation for innovation and growth opportunities.
TCS is known for its cutting-edge technology solutions
I am impressed by TCS's commitment to employee development
I believe TCS will provide me with a challenging and rewarding work environment
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
Workgroup is a peer-to-peer network where each computer has its own security settings, while a domain is a centralized network managed by a server with shared security settings.
Workgroup is decentralized, each computer manages its own security settings
Domain is centralized, managed by a server with shared security settings
Workgroup is suitable for small networks, domain is suitable for larger networks
In a workgroup, us...
A system administrator's routine involves monitoring system performance, troubleshooting issues, implementing security measures, and maintaining backups.
Regularly monitoring system performance and resource usage
Troubleshooting and resolving technical issues as they arise
Implementing and maintaining security measures to protect the system from cyber threats
Performing regular backups and ensuring data integrity
Updating s...
Aptitude tests typically assess quantitative skills and reasoning abilities.
Two programming questions: the first is easy, and the second is medium.
I have a strong background in system engineering with experience in various projects.
Bachelor's degree in Computer Science with a focus on system engineering
Worked on implementing and maintaining network infrastructure for a large corporation
Experience with virtualization technologies such as VMware and Hyper-V
Managed projects involving system upgrades and migrations
Certified in Cisco networking and Microsoft server te...
Java OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Java OOP involves the use of classes and objects.
Encapsulation is a key concept where data is kept private within a class and accessed through public methods.
Inheritance allows one class to inherit attributes and methods from another class.
Polymorphism enables objects to be...
It contains Verbal Ability, Logical Reasoning, Puzzles, Numerical Ability, and programming round in aptitude test programming contains 2 questions 1 is beginner to intermediate, 2nd question is intermediate to master level. (Any programming language)
I am a dedicated and experienced System Engineer with a strong background in network infrastructure and troubleshooting.
Over 5 years of experience in designing, implementing, and maintaining complex systems
Proficient in various operating systems such as Windows, Linux, and Unix
Skilled in network security, virtualization, and cloud computing
Certified in Cisco CCNA and CompTIA Network+
Strong problem-solving and communica...
I am a dedicated and experienced System Engineer with a strong background in network infrastructure and troubleshooting.
Over 5 years of experience in designing, implementing, and maintaining network systems
Proficient in various operating systems such as Windows, Linux, and Unix
Skilled in troubleshooting network issues and providing timely solutions
Certified in Cisco CCNA and CompTIA Network+
Strong communication and tea...
My strengths include problem-solving skills, attention to detail, and strong technical knowledge.
Strong problem-solving skills - I am able to analyze complex issues and come up with effective solutions.
Attention to detail - I pay close attention to the specifics of a project to ensure accuracy and quality.
Strong technical knowledge - I have a solid understanding of various systems and technologies, allowing me to troub...
My greatest weakness is that I tend to be overly critical of my own work.
I have a tendency to spend too much time perfecting a project, which can sometimes lead to delays in completion.
I am working on improving my ability to delegate tasks and trust others to take on more responsibility.
I have been actively seeking feedback from colleagues to help me gain perspective on my work and make necessary improvements.
I have strong knowledge in organization, including project management, time management, and resource allocation.
Experience in creating project plans and timelines
Ability to prioritize tasks and manage deadlines effectively
Skilled in allocating resources efficiently to meet project goals
Familiarity with tools and techniques for organizing and tracking project progress
Strong communication skills to coordinate with team m...
I appeared for an interview before Jul 2024, where I was asked the following questions.
ORM (Object-Relational Mapping) is a programming technique for converting data between incompatible type systems using object-oriented programming.
ORM allows developers to interact with a database using high-level programming languages instead of SQL.
Examples of ORM frameworks include Hibernate (Java), Entity Framework (.NET), and Django ORM (Python).
It simplifies database operations by allowing developers to use objec...
Flask connects to PostgreSQL using libraries like psycopg2 and SQLAlchemy for ORM capabilities.
Use 'psycopg2' to connect: `import psycopg2; conn = psycopg2.connect(database='db', user='user', password='pass', host='localhost')`.
SQLAlchemy for ORM: `from flask_sqlalchemy import SQLAlchemy; db = SQLAlchemy(app)`.
Define models: `class User(db.Model): id = db.Column(db.Integer, primary_key=True)`.
Execute queries: `users = ...
Some of the top questions asked at the TCS System Engineer interview -
The duration of TCS System Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 1.2k interview experiences
Difficulty level
Duration
based on 13.6k reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹3.9 L/yr - ₹8.3 L/yr |
IT Analyst
65.4k
salaries
| ₹7.9 L/yr - ₹14.5 L/yr |
AST Consultant
53.7k
salaries
| ₹12 L/yr - ₹20.6 L/yr |
Assistant System Engineer
33.2k
salaries
| ₹2.5 L/yr - ₹6.3 L/yr |
Associate Consultant
33.2k
salaries
| ₹16.3 L/yr - ₹28.2 L/yr |
Amazon
Wipro
Infosys
Accenture