i
TCS
Filter interviews by
Transient variables are not serialized, so they are not transmitted over the network during serialization.
Transient variables are marked with the 'transient' keyword in Java.
They are excluded from the serialization process, meaning their values are not saved.
Example: If a class has a transient variable 'password', it won't be serialized.
When the object is deserialized, transient variables will have their default v...
Effective stress management strategies include mindfulness, exercise, time management, and social support to enhance well-being.
Practice mindfulness and meditation to stay present and reduce anxiety. For example, dedicating 10 minutes daily to deep breathing exercises.
Engage in regular physical activity, such as jogging or yoga, which can boost mood and reduce stress hormones.
Implement time management techniques, ...
Accountability in a professional context means taking responsibility for one's actions and decisions in the workplace.
Accountability involves owning up to mistakes and learning from them, such as an accountant correcting an error in financial reporting.
It fosters trust within a team; for example, a project manager who meets deadlines builds credibility among team members.
Being accountable means following through o...
SAP transaction codes are unique identifiers for specific tasks within the SAP system, streamlining user navigation.
Transaction codes (T-codes) allow users to access specific functions directly, bypassing the menu.
For example, 'FB50' is used for general ledger posting.
T-codes can be customized for user roles to enhance efficiency.
Common T-codes include 'ME21N' for creating purchase orders and 'VA01' for sales orde...
What people are saying about TCS
RGS stands for Regulatory Guidance System, aiding compliance in project management and regulatory frameworks.
RGS helps organizations navigate complex regulatory environments.
It provides a structured approach to ensure compliance with laws and regulations.
For example, in pharmaceuticals, RGS can guide drug approval processes.
RGS can also streamline communication between teams and regulatory bodies.
SQL queries are structured commands used to interact with relational databases, enabling data retrieval, manipulation, and management.
SQL stands for Structured Query Language, used for managing relational databases.
Common SQL operations include SELECT (to retrieve data), INSERT (to add data), UPDATE (to modify data), and DELETE (to remove data).
Example of a SELECT query: SELECT * FROM employees WHERE department = ...
Synthesizing data involves techniques to create synthetic datasets for training machine learning models effectively.
Identify the target variable and features needed for the model.
Use data augmentation techniques, such as rotation or flipping for images.
Employ simulation methods to generate data based on known distributions.
Leverage generative models like GANs (Generative Adversarial Networks) to create realistic s...
KYC ensures customer identity verification, reducing fraud and enhancing trust in financial transactions.
KYC stands for Know Your Customer, a process used by financial institutions to verify the identity of their clients.
It helps prevent identity theft and fraud by ensuring that customers are who they claim to be.
For example, banks require KYC documentation like government-issued IDs and proof of address before op...
@Qualifier is an annotation in Spring Framework used to resolve ambiguity when multiple beans of the same type exist.
@Qualifier is used in dependency injection to specify which bean to inject when multiple candidates are available.
It can be applied to fields, methods, and constructor parameters.
Example: @Autowired @Qualifier("beanName") private MyBean myBean;
It helps in improving code readability and maintainabili...
A firewall is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewalls can be hardware-based, software-based, or a combination of both.
They filter traffic based on IP addresses, protocols, and ports.
Example: A firewall can block traffic from a known malicious IP address.
Firewalls can operate at different layers of the OSI model, such as netw...
I applied via Newspaper Ad and was interviewed in Jun 2023. There were 3 interview rounds.
Group discussion must be required because those candidates measure communicate with each other
One-on-one interactions boost student confidence and comfort, fostering open communication and personalized support.
Personalized Attention: Students feel valued when they receive individual attention, which can enhance their learning experience.
Safe Environment: One-on-one settings create a safe space for students to express their thoughts and concerns without judgment.
Tailored Feedback: Direct feedback helps students ...
I appeared for an interview in Jan 2025.
Case and decode are conditional expressions in PL/SQL used for data manipulation.
CASE is used for conditional logic in SQL statements, while DECODE is used for conditional logic in SELECT statements.
CASE is more flexible and can handle multiple conditions, while DECODE is limited to one condition.
CASE can be used in both SQL and PL/SQL, while DECODE is specific to SQL.
Example of CASE: SELECT CASE WHEN condition1 THEN r...
Primary key uniquely identifies each record in a table, while foreign key establishes a link between two tables.
Primary key ensures uniqueness and cannot have null values
Foreign key establishes a relationship between tables based on the primary key of another table
Example of primary key: EmployeeID in an Employee table
Example of foreign key: DepartmentID in an Employee table linking to DepartmentID in a Department tabl...
Rank assigns unique ranks to each distinct row, while Dense Rank assigns consecutive ranks without gaps.
Rank may have gaps in the ranking sequence, while Dense Rank does not.
Rank assigns the same rank to rows with the same values, while Dense Rank assigns different ranks.
Rank function is non-consecutive, while Dense Rank function is consecutive.
Procedures are used to perform an action, while functions return a value.
Procedures do not return a value, while functions do.
Functions can be called from SQL queries, while procedures cannot.
Functions must return a value, while procedures do not necessarily have to.
No, a package body cannot be used without a package specification.
A package body must always be associated with a package specification.
The package specification defines the public interface of the package, while the package body contains the implementation details.
Attempting to use a package body without a corresponding package specification will result in compilation errors.
Use a SQL query with GROUP BY and HAVING clause to find duplicate values in a database.
Use GROUP BY clause to group the values that are duplicated.
Use HAVING clause to filter out the groups that have more than one occurrence.
Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name HAVING COUNT(*) > 1;
Group by and having clause are used together to filter groups based on specified conditions.
Group by clause is used to group rows that have the same values into summary rows.
Having clause is used to filter groups based on specified conditions.
Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 5000;
Substr function extracts a substring from a string, while Instr function returns the position of a substring within a string.
Substr function syntax: SUBSTR(string, start_position, length)
Example: SUBSTR('Hello World', 7, 5) will return 'World'
Instr function syntax: INSTR(string, substring)
Example: INSTR('Hello World', 'World') will return 7
Writing a SQL query with a subquery involves nesting one query inside another to retrieve specific data.
Start by writing the main query that will retrieve the primary data
Identify the criteria for the subquery to filter the results
Enclose the subquery within parentheses and use it in the WHERE or FROM clause of the main query
Ensure that the subquery returns a single value or a single column result
Char is fixed length, varchar is variable length with max 4000 bytes, varchar2 is variable length with max 32767 bytes.
Char is fixed length and always right-padded with spaces, while varchar and varchar2 are variable length.
Varchar can store up to 4000 bytes of data, while varchar2 can store up to 32767 bytes.
Char is less efficient in terms of storage compared to varchar and varchar2.
No, it is not possible to combine two tables with differing data and columns without utilizing joins.
Joins are necessary to combine tables based on a common column or key.
Different data and columns require a join to match and merge the data properly.
Examples of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Yes, it is possible to update data in a view using INSTEAD OF triggers.
Views are virtual tables that display data from one or more tables.
By using INSTEAD OF triggers, you can update data in a view by specifying the logic to handle the update operation.
The trigger intercepts the update operation on the view and executes the specified logic to update the underlying tables.
For example, you can create an INSTEAD OF trigge...
TCS is a global IT services company known for its innovative solutions and commitment to employee growth.
TCS has a strong reputation in the IT industry for delivering high-quality services.
TCS offers opportunities for professional growth and development through training programs and career advancement.
TCS has a diverse and inclusive work culture that values teamwork and collaboration.
A dynamic cursor in database management allows for the execution of different SQL queries at runtime.
Dynamic cursors are used when the SQL query to be executed is not known until runtime.
They allow for flexibility in querying the database based on user input or other conditions.
Dynamic cursors can be used to handle varying result sets or conditions in a more efficient manner.
Example: Using a dynamic cursor to search fo...
Yes, I have performed performance tuning by identifying bottlenecks and optimizing queries.
Identified slow queries using tools like SQL Trace, Explain Plan, and AWR reports.
Optimized queries by adding indexes, rewriting SQL statements, and reducing unnecessary data retrieval.
Tuned PL/SQL code by using bulk processing, minimizing context switches, and optimizing loops.
Utilized database features like partitioning and mat...
A package in PL/SQL is a collection of related procedures, functions, variables, and other constructs.
A package consists of two parts: package specification and package body.
The package specification defines the public interface of the package, including declarations of variables, constants, cursors, procedures, and functions.
The package body contains the actual implementation of the procedures and functions declared i...
I am excited about the opportunity to work with a global leader like TCS and contribute to innovative projects.
TCS is a renowned global company with a strong reputation in the IT industry
I am impressed by TCS's commitment to innovation and cutting-edge technology
I believe TCS offers great opportunities for professional growth and development
I am excited about the chance to work on diverse and challenging projects at TC...
I prefer to discuss my salary expectations based on the responsibilities and requirements of the position.
Focus on discussing salary expectations based on the job responsibilities and requirements.
Avoid disclosing specific current salary package.
Emphasize the importance of fair compensation based on market rates and skills.
Provide examples of successful projects or achievements that demonstrate your value.
Discuss oppor...
I am looking for a competitive salary package based on my experience and skills.
I am open to discussing salary based on the responsibilities and requirements of the role.
I have researched the average salary range for Plsql Developers in this location.
I am looking for a package that includes benefits such as healthcare, retirement plans, and professional development opportunities.
Yes, I am comfortable with shift work and have experience working various shifts.
I have previous experience working different shifts in my current/previous roles.
I am flexible with my schedule and can easily adapt to changing shift patterns.
I understand the importance of shift work in ensuring 24/7 coverage for critical systems.
Yes, I am open to any location for the Plsql Developer position.
I am willing to relocate for the right opportunity
I am open to working in different cities or countries
I am flexible with travel requirements for the job
posted on 6 Mar 2025
I appeared for an interview in Feb 2025.
I appeared for an interview in Apr 2025, where I was asked the following questions.
I appeared for an interview in Feb 2025.
I follow a structured process to ensure requirements are effectively translated into actionable tasks for the team.
1. Requirement Analysis: Review and clarify requirements with the Product Owner to ensure understanding.
2. Backlog Refinement: Prioritize and break down requirements into user stories and tasks in the product backlog.
3. Sprint Planning: Collaborate with the team to estimate tasks and plan the sprint based ...
Maintaining quality in Sprint demos involves preparation, stakeholder engagement, and continuous feedback.
Conduct thorough sprint reviews to ensure all features are demoed effectively.
Engage stakeholders early to gather feedback and adjust the demo accordingly.
Use real user scenarios during the demo to showcase functionality.
Prepare a clear agenda and objectives for the demo to keep it focused.
Incorporate feedback from...
A Scrum Master's day involves facilitating meetings, coaching teams, and removing obstacles to ensure smooth project delivery.
Start the day with a Daily Stand-up meeting to discuss progress and blockers.
Facilitate Sprint Planning sessions to define the scope of work for the upcoming sprint.
Conduct Sprint Reviews to showcase completed work and gather feedback from stakeholders.
Hold Retrospectives to reflect on the team'...
During PI planning, I facilitate collaboration, align teams, and prioritize work for the upcoming increment.
Preparation: Gather input from stakeholders and teams to define objectives and features.
Team Breakouts: Facilitate sessions where teams estimate and plan their work for the increment.
Dependency Management: Identify and address dependencies between teams to ensure smooth execution.
Review and Adjust: Present plans ...
Faced a conflict over resource allocation in a project, resolved through open communication and collaborative planning.
Identified the conflict during a sprint planning meeting when team members expressed concerns over resource availability.
Facilitated a discussion with stakeholders to understand their priorities and constraints.
Proposed a reallocation of tasks based on team members' strengths and current workloads, ens...
I appeared for an interview in Dec 2024.
API Gateway implementation is a centralized service that routes, manages, and secures API calls.
API Gateway acts as a single entry point for all API calls
It can handle authentication, rate limiting, caching, and request/response transformations
Examples include AWS API Gateway, Apigee, Kong
Circuit breaker is a design pattern used to prevent system overload by temporarily stopping requests to a failing service.
Circuit breaker monitors requests to a service and opens when the service fails repeatedly.
It helps prevent cascading failures and allows the system to gracefully degrade.
Once the circuit breaker is open, it can periodically check if the service has recovered before allowing requests again.
Deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Avoid circular wait by ensuring processes request resources in the same order.
Prevent hold and wait by requiring processes to request all needed resources at once.
Implement a timeout mechanism to break potential deadlocks.
Use resource allocation graphs to detect and prevent deadlocks.
...
Runnable is a functional interface with a single run() method, while Callable is a functional interface with a single call() method.
Runnable is used for tasks that do not return a result, while Callable is used for tasks that return a result.
Callable can throw checked exceptions, while Runnable cannot.
Callable returns a Future object, which can be used to retrieve the result of the computation.
Example: Runnable - execu...
ConcurrentHashMap allows concurrent access and updates, ensuring thread safety without locking the entire map.
Uses a segmented locking mechanism to allow multiple threads to read and write concurrently.
Divides the map into segments, each with its own lock, reducing contention.
Supports operations like put, get, and remove without blocking the entire map.
Example: Inserting elements in a multi-threaded environment allows ...
Profiles in Java are configurations that define the capabilities of a Java platform.
Profiles allow developers to target specific types of devices or applications.
They help in reducing the size of the Java runtime environment by including only the necessary APIs.
Examples include Java SE Embedded Profile for embedded devices and Java SE Compact Profile for resource-constrained environments.
OpenFeign is a declarative web service client used to simplify the process of making HTTP requests in microservices architecture.
OpenFeign allows developers to define RESTful web services as interfaces and automatically generate the necessary implementation code.
It integrates seamlessly with Spring Cloud and other microservices frameworks to facilitate communication between services.
OpenFeign supports features like loa...
Service registry and discovery involves registering services and allowing clients to discover and connect to them.
Implement a service registry where services can register themselves with metadata
Use a service discovery mechanism for clients to find and connect to services
Implement health checks to ensure services are available and healthy
Use a load balancer to distribute traffic among multiple instances of a service
Spring Boot Actuators are built-in tools that provide insight into the running application.
Actuators expose various endpoints to monitor and manage the application.
They can be used to check health, metrics, environment details, and more.
Examples include /actuator/health, /actuator/metrics, and /actuator/env.
Synchronous communication is blocking, while asynchronous communication is non-blocking.
Synchronous communication waits for a response before continuing, while asynchronous communication does not wait.
Examples of synchronous communication include traditional function calls, while examples of asynchronous communication include callbacks and promises.
Synchronous communication can lead to performance issues if there are d...
Excessive use of synchronized blocks and methods in Java can lead to performance issues and potential deadlocks.
Decreased performance due to increased contention for locks
Potential deadlocks if multiple threads are waiting for each other to release locks
Increased complexity and difficulty in debugging and maintaining code
Use synchronized sparingly and consider alternatives like ConcurrentHashMap or Lock interface
The number of threads needed for an application can be determined based on factors like the type of tasks, hardware resources, and performance requirements.
Consider the type of tasks your application needs to perform - CPU-bound tasks may benefit from more threads, while I/O-bound tasks may not.
Take into account the hardware resources available - more threads may be beneficial on a multi-core processor compared to a si...
I appeared for an interview in Feb 2025.
Angular is a powerful framework for building dynamic single-page applications (SPAs) using TypeScript.
Angular provides a structured approach to building web applications, making it easier to manage complex UIs.
It uses components to encapsulate functionality, promoting reusability and maintainability.
Angular's two-way data binding ensures that changes in the UI reflect in the model and vice versa, enhancing user experie...
As a Senior Software Engineer, my day involves coding, collaboration, and continuous learning to deliver high-quality software.
Daily stand-up meetings to discuss progress and blockers.
Code reviews to ensure quality and share knowledge with the team.
Collaborating with product managers to refine requirements and prioritize tasks.
Writing and maintaining unit tests to ensure code reliability.
Participating in sprint plannin...
I could relate to my knowledge.
OOP concepts in Java include classes, objects, inheritance, polymorphism, encapsulation, and abstraction.
Classes: Blueprint for creating objects.
Objects: Instances of classes that encapsulate data and behavior.
Inheritance: Allows a class to inherit properties and methods from another class.
Polymorphism: Ability to present the same interface for different data types.
Encapsulation: Bundling data and methods that operate ...
I have learned Java programming language extensively, including object-oriented programming concepts, data structures, and algorithms.
Extensive knowledge of Java syntax and features
Understanding of object-oriented programming concepts like inheritance, polymorphism, and encapsulation
Experience with data structures such as arrays, linked lists, stacks, and queues
Knowledge of algorithms like sorting, searching, and graph...
I have extensive knowledge in Java programming language, including core concepts, data structures, multithreading, and design patterns.
Strong understanding of core Java concepts such as OOP, inheritance, polymorphism, and encapsulation
Experience with data structures and algorithms in Java, including arrays, linked lists, trees, and graphs
Proficient in multithreading and concurrency in Java, including synchronization an...
Yes, I am open to relocating for the right opportunity.
I am open to relocating for the right job opportunity
I am willing to move to a new location if required for the role
I am flexible and adaptable to new environments
I would address the issue by communicating with my team, seeking feedback, and finding alternative solutions.
Initiate a meeting with the team to discuss the lack of support and understand their perspectives
Seek feedback on how to improve collaboration and address any concerns
Explore alternative solutions or resources to move the project forward
Maintain open communication and transparency throughout the process
I have utilized useState, useEffect, useContext, and useRef hooks in my projects.
useState - for managing state in functional components
useEffect - for handling side effects in functional components
useContext - for accessing context in functional components
useRef - for accessing DOM elements or storing mutable values
Redux is a predictable state container for JavaScript apps. It helps manage the state of an application in a centralized way.
Redux is a state management library commonly used with React to manage the state of an application.
It follows a unidirectional data flow pattern, where the state is stored in a single store and changes are made through actions and reducers.
Redux allows for a more structured way of managing state ...
visibility: hidden hides an element but still takes up space, while display: none hides an element and removes it from the flow of the document.
visibility: hidden hides the element but it still occupies space on the page
display: none hides the element and removes it from the document flow
visibility: hidden elements are still rendered, just not visible
display: none elements are not rendered at all
JavaScript closures, TDZ, hoisting, and the JavaScript engine are key concepts in understanding how JavaScript works.
JavaScript closures are functions that have access to variables from their outer scope even after the outer function has finished executing.
Temporal Dead Zone (TDZ) is the period between entering a scope and the variable being declared where accessing the variable results in a ReferenceError.
Hoisting is ...
Identify the duplicate character in the string.
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
Experienced System Engineer with a strong background in network infrastructure and cloud computing.
Over 5 years of experience in designing, implementing, and maintaining complex IT systems
Proficient in network security protocols and troubleshooting techniques
Skilled in virtualization technologies such as VMware and Hyper-V
Certified in Cisco CCNA and CompTIA Network+
Strong problem-solving and communication skills
I appeared for an interview in Jan 2025.
Directives in Angular are markers on a DOM element that tell Angular to attach a specified behavior to that DOM element or transform it.
Directives are used to create reusable components or add behavior to existing elements.
There are three types of directives in Angular: Component, Structural, and Attribute directives.
Examples of built-in directives in Angular include ngIf, ngFor, and ngStyle.
Pipes are a form of inter-process communication used in Unix-like operating systems to send data between processes.
Pipes allow communication between processes by connecting the standard output of one process to the standard input of another process
There are two types of pipes: unnamed pipes and named pipes (also known as FIFOs)
Unnamed pipes are created using the pipe system call and exist only as long as the processes ...
DI system in Angular is a design pattern where dependencies are injected into a class rather than the class creating them.
DI helps in creating loosely coupled components in Angular applications.
It allows for easier testing and maintenance of code.
Dependencies are provided to a component through its constructor.
Angular's DI system is hierarchical, meaning dependencies can be injected at different levels of the applicati...
An HTTP Interceptor is a middleware component that intercepts incoming and outgoing HTTP requests in an application.
HTTP Interceptors are commonly used in Angular applications to modify or log HTTP requests/responses.
They can be used to add headers, handle errors, or perform authentication.
An example of using an HTTP Interceptor is adding an authorization token to every outgoing request for secure API calls.
localStorage and sessionStorage are both web storage options in JavaScript, but they have different scopes and lifetimes.
localStorage stores data with no expiration date, while sessionStorage stores data for one session only
localStorage data persists even after the browser is closed and reopened, while sessionStorage data is lost when the browser is closed
Both can only store strings, but can be converted to other data ...
Common design patterns in Angular include Singleton, Observer, Factory, and Dependency Injection.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.
Factory pattern is used to create objects without specifying t...
Route guards in Angular are used to control access to certain routes in an application.
Route guards are used to protect routes in Angular applications by controlling whether a route can be activated or not.
There are three types of route guards in Angular: CanActivate, CanActivateChild, and CanDeactivate.
CanActivate guard is used to determine if a route can be activated.
CanActivateChild guard is used to determine if a c...
Methods for communication between components include synchronous and asynchronous communication, message queues, APIs, and web services.
Synchronous communication: Components communicate in real-time, waiting for a response before proceeding.
Asynchronous communication: Components communicate without waiting for a response, allowing for parallel processing.
Message queues: Components send messages to a queue for other com...
The duration of TCS interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 9.2k interview experiences
Difficulty level
Duration
based on 97.6k reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
65.7k
salaries
| ₹5.1 L/yr - ₹16.5 L/yr |
AST Consultant
53.2k
salaries
| ₹8 L/yr - ₹25.3 L/yr |
Assistant System Engineer
33.2k
salaries
| ₹2.7 L/yr - ₹4.9 L/yr |
Associate Consultant
32.4k
salaries
| ₹9 L/yr - ₹33.4 L/yr |
Amazon
Wipro
Infosys
Accenture