TCS Digital Interview Questions 2018

There is no information on TCS Digital Written test or TCS Digital Interview Questions for Freshers and TCS Digital Enterprise Interview Questions and Answers

TCS digital has changed the pattern from 2018 onwards.

TCS Digital Enterprise Interview Questions and Answers

Interview Pattern in 2017

  • Number of Interview Rounds – 2
    • Technical Interview – 2 Rounds
    • HR Interview – 1 Rounds

Even the package was lesser last year, it was about 6 LPA.

Interview Pattern in 2018

  • Number of Interview Rounds – 2
    • Technical Interview – 1 or 2 Rounds (We are not sure as this is the first time exam is being conducted)
    • HR Interview – 1 Rounds

Glassdoor is a good website for checking previous question. But, we think there also fake information is uploaded by someone.

TCS Digital interview will be like any other Dream company interview.

They will not ask coding questions on Artificial intelligence, cloud computing, Data mining etc.

You can expect a EEE student to know about machine learning coding etc right?

Rather questions in the exam will consist of –

For non CS/IT branches

  • C Programming
  • OOPS concept and coding
  • Data Structures (Very imp)
  • Puzzles
  • Basic definitions of Data Analytics, Artificial Intelligence, Cloud Computing etc.

For CS/IT Branches

  • C Programming
  • OOPS concept and coding
  • Data Structures (Very imp)
  • DBMS (Very Important)
  • Operating System
  • Networking (important)
  • Puzzles
  • Basic definitions of Data Analytics, Artificial Intelligence, Cloud Computing etc.

For all the above we suggest geeksforgeeks.

Basic definitions that will be useful (They will not expect you to know anything more than the definitions in the exam for this)

TCS Digital Interview Fresher Questions

TCS Digital Interview Questions and AnswersProbability of being askedDifficultyValid for Non CS/IT
C ProgrammingHighMediumYes
OOPS concept and coding
Data Structures (Very imp)Very HighMedium to HighYes
DBMS (Very Important)Very HighMediumNo
Operating SystemLowMediumNo
Networking (important)MediumMediumNo
Basic definitions of Data Analytics, Artificial Intelligence, Cloud Computing etc.Medium (just basics)LowYes

What is Cloud Computing?

It is advance stage technology implemented so that the cloud provides the services globally as per the user requirements. It provides a method to access several servers worldwide.

What are the benefits of cloud computing?

The main benefits of cloud computing are:

  1. Data backup and storage of data
  2. Powerful server capabilities.
  3. Incremented productivity.
  4. Cost effective and time saving.

Companies like Amazon which owns AWS, Microsoft which owns Azure, VMware which provides cloud desktop. Google which provides various cloud solutions like Google Drive, Slides/Docs/ Google Cloud platform etc are example of such.

What are the Cloud Service Models? (Not relevant but it would be good if you know and you tell on your own somewhere in the interview, interviewer may get impressed)

  • Infrastructure as a service
  • (IaaS) Platform as a service
  • (PaaS) Software as a service (SaaS)

What is Digital Technology?

When TCS will come to your campus they will have a presentation about TCS Digital. According to TCS Digital Technology are the blend of these five –

  • Data
  • Cloud
  • Intelligence
  • Inter connectivity
  • Visual Computing

This information they will cover in the presentation.

It was seen in VIT, Vellore where TCS asked this question in the presentation open to all and the student who answered it was directly called for interview and was asked to skip the Online test.

Ques. What is artificial Intelligence?

Artificial intelligence (AI) makes it possible for machines to learn from experience, adjust to new inputs and perform human-like tasks. Most AI examples that you hear about today – from chess-playing computers to self-driving cars – rely heavily on deep learning and natural language processing. Using these technologies, computers can be trained to accomplish specific tasks by processing large amounts of data and recognizing patterns in the data.


Why is artificial intelligence important? (Not Important and will not be asked but you can tell to impress the interviewer if any such topic comes)

  • AI automates repetitive learning and discovery through data. But AI is different from hardware-driven, robotic automation. Instead of automating manual tasks, AI performs frequent, high-volume, computerized tasks reliably and without fatigue. For this type of automation, human inquiry is still essential to set up the system and ask the right questions.
  • AI adds intelligence to existing products. In most cases, AI will not be sold as an individual application. Rather, products you already use will be improved with AI capabilities, much like Siri was added as a feature to a new generation of Apple products. Automation, conversational platforms, bots and smart machines can be combined with large amounts of data to improve many technologies at home and in the workplace, from security intelligence to investment analysis.
  • AI adapts through progressive learning algorithms to let the data do the programming. AI finds structure and regularities in data so that the algorithm acquires a skill: The algorithm becomes a classifier or a predicator. So, just as the algorithm can teach itself how to play chess, it can teach itself what product to recommend next online. And the models adapt when given new data. Back propagation is an AI technique that allows the model to adjust, through training and added data, when the first answer is not quite right.
  • AI analyzes more and deeper data using neural networks that have many hidden layers. Building a fraud detection system with five hidden layers was almost impossible a few years ago. All that has changed with incredible computer power and big data. You need lots of data to train deep learning models because they learn directly from the data. The more data you can feed them, the more accurate they become.
  • AI achieves incredible accuracy though deep neural networks – which was previously impossible. For example, your interactions with Alexa, Google Search and Google Photos are all based on deep learning – and they keep getting more accurate the more we use them. In the medical field, AI techniques from deep learning, image classification and object recognition can now be used to find cancer on MRIs with the same accuracy as highly trained radiologists.

What is Machine Learning?

Machine learning is an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. Machine learning focuses on the development of computer programs that can access data and use it learn for themselves.

The process of learning begins with observations or data, such as examples, direct experience, or instruction, in order to look for patterns in data and make better decisions in the future based on the examples that we provide. The primary aim is to allow the computers learn automatically without human intervention or assistance and adjust actions accordingly.

What is Big Data?

Big data is a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and strategic business moves.

Why Is Big Data Important?

The importance of big data doesn’t revolve around how much data you have, but what you do with it. You can take data from any source and analyze it to find answers that enable 1) cost reductions, 2) time reductions, 3) new product development and optimized offerings, and 4) smart decision making. When you combine big data with high-powered analytics, you can accomplish business-related tasks such as:

  • Determining root causes of failures, issues and defects in near-real time.
  • Generating coupons at the point of sale based on the customer’s buying habits.
  • Recalculating entire risk portfolios in minutes.
  • Detecting fraudulent behavior before it affects your organization.

What is deep Learning?

Deep learning is a machine learning technique that teaches computers to do what comes naturally to humans: learn by example. Deep learning is a key technology behind driverless cars, enabling them to recognize a stop sign, or to distinguish a pedestrian from a lamppost. It is the key to voice control in consumer devices like phones, tablets, TVs, and hands-free speakers. Deep learning is getting lots of attention lately and for good reason. It’s achieving results that were not possible before.

What is cyber security?

Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

In a computing context, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity.

What are different types of cyber attacks? (Not Important but good to know)


If you’ve ever seen an antivirus alert pop up on your screen, or if you’ve mistakenly clicked a malicious email attachment, then you’ve had a close call with malware. Attackers love to use malware to gain a foothold in users’ computers—and, consequently, the offices they work in—because it can be so effective.

“Malware” refers to various forms of harmful software, such as viruses and ransomware. Once malware is in your computer, it can wreak all sorts of havoc, from taking control of your machine, to monitoring your actions and keystrokes, to silently sending all sorts of confidential data from your computer or network to the attacker’s home base.

Attackers will use a variety of methods to get malware into your computer, but at some stage it often requires the user to take an action to install the malware. This can include clicking a link to download a file, or opening an attachment that may look harmless (like a Word document or PDF attachment), but actually has a malware installer hidden within.


Of course, chances are you wouldn’t just open a random attachment or click on a link in any email that comes your way—there has to be a compelling reason for you to take action. Attackers know this, too. When an attacker wants you to install malware or divulge sensitive information, they often turn to phishing tactics, or pretending to be someone or something else to get you to take an action you normally wouldn’t. Since they rely on human curiosity and impulses, phishing attacks can be difficult to stop.

In a phishing attack, an attacker may send you an email that appears to be from someone you trust, like your boss or a company you do business with. The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected on your account). In the email, there will be an attachment to open or a link to click. Upon opening the malicious attachment, you’ll thereby install malware in your computer. If you click the link, it may send you to a legitimate-looking website that asks for you to log in to access an important file—except the website is actually a trap used to capture your credentials when you try to log in.

In order to combat phishing attempts, understanding the importance of verifying email senders and attachments/links is essential. 

SQL Injection Attack

SQL (pronounced “sequel”) stands for structured query language; it’s a programming language used to communicate with databases. Many of the servers that store critical data for websites and services use SQL to manage the data in their databases. A SQL injection attack specifically targets this kind of server, using malicious code to get the server to divulge information it normally wouldn’t. This is especially problematic if the server stores private customer information from the website, such as credit card numbers, usernames and passwords (credentials), or other personally identifiable information, which are tempting and lucrative targets for an attacker.

An SQL injection attack works by exploiting any one of the known SQL vulnerabilities that allow the SQL server to run malicious code. For example, if a SQL server is vulnerable to an injection attack, it may be possible for an attacker to go to a website’s search box and type in code that would force the site’s SQL server to dump all of its stored usernames and passwords for the site.

Cross-Site Scripting (XSS)

In an SQL injection attack, an attacker goes after a vulnerable website to target its stored data, such as user credentials or sensitive financial data. But if the attacker would rather directly target a website’s users, they may opt for a cross-site scripting attack. Similar to an SQL injection attack, this attack also involves injecting malicious code into a website, but in this case the website itself is not being attacked. Instead, the malicious code the attacker has injected only runs in the user’s browser when they visit the attacked website, and it goes after the visitor directly, not the website.

One of the most common ways an attacker can deploy a cross-site scripting attack is by injecting malicious code into a comment or a script that could automatically run. For example, they could embed a link to a malicious JavaScript in a comment on a blog.

Cross-site scripting attacks can significantly damage a website’s reputation by placing the users’ information at risk without any indication that anything malicious even occurred. Any sensitive information a user sends to the site—such as their credentials, credit card information, or other private data—can be hijacked via cross-site scripting without the website owners realizing there was even a problem in the first place.

Denial-of-Service (DoS)

Imagine you’re sitting in traffic on a one-lane country road, with cars backed up as far as the eye can see. Normally this road never sees more than a car or two, but a county fair and a major sporting event have ended around the same time, and this road is the only way for visitors to leave town. The road can’t handle the massive amount of traffic, and as a result it gets so backed up that pretty much no one can leave.

That’s essentially what happens to a website during a denial-of-service (DoS) attack. If you flood a website with more traffic than it was built to handle, you’ll overload the website’s server and it’ll be nigh-impossible for the website to serve up its content to visitors who are trying to access it.

This can happen for innocuous reasons of course, say if a massive news story breaks and a newspaper’s website gets overloaded with traffic from people trying to find out more. But often, this kind of traffic overload is malicious, as an attacker floods a website with an overwhelming amount of traffic to essentially shut it down for all users.

In some instances, these DoS attacks are performed by many computers at the same time. This scenario of attack is known as a Distributed Denial-of-Service Attack (DDoS). This type of attack can be even more difficult to overcome due to the attacker appearing from many different IP addresses around the world simultaneously, making determining the source of the attack even more difficult for network administrators.

Session Hijacking and Man-in-the-Middle Attacks

When you’re on the internet, your computer has a lot of small back-and-forth transactions with servers around the world letting them know who you are and requesting specific websites or services. In return, if everything goes as it should, the web servers should respond to your request by giving you the information you’re accessing. This process, or session, happens whether you are simply browsing or when you are logging into a website with your username and password.

The session between your computer and the remote web server is given a unique session ID, which should stay private between the two parties; however, an attacker can hijack the session by capturing the session ID and posing as the computer making a request, allowing them to log in as an unsuspecting user and gain access to unauthorized information on the web server. There are a number of methods an attacker can use to steal the session ID, such as a cross-site scripting attack used to hijack session IDs.

An attacker can also opt to hijack the session to insert themselves between the requesting computer and the remote server, pretending to be the other party in the session. This allows them to intercept information in both directions and is commonly called a man-in-the-middle attack.

What is IOT i.e. Internet of Things?

Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet. The ‘thing’ in IoT could be a person with a heart monitor or an automobile with built-in-sensors, i.e. objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention. The embedded technology in the objects helps them to interact with internal states or the external environment, which in turn affects the decisions taken.

  • Applications include –
  • Smart homes
  • Wearable (Smart watches)
  • Manufacturing Industries’
  • Transportation
  • Agriculture
  • Retail Industries
  • Healthcare etc.

AR vs VR vs MR

A lot of people use the term “virtual reality” for different types of “Immersive Experiences”. This includes augmented and mixed reality as well as 360° video. Although they each offer alternate or altered reality experiences, they are quite different and too frequently are the technologies confused with one another.

  1. Virtual Reality
  2. Augmented Reality
  3. Mixed Reality
  4. 360° Video

Virtual Reality

In its simplest form, Virtual Reality (VR) transposes the user to an alternate world. The real world which the user is in, does not exist. This is done through live video or computer generated graphics and uses closed head-mounted displays (HMD’s) that completely blind the user from seeing anything in the real-world. The Oculus Rift, Playstation VR, HTC Vive, Google Daydream, Gear VR are examples of HMD’s.
* The differences in HMD’s will be explained in an upcoming article from BluFocus.

Non-Interactive VR:

With non-interactive VR applications and content, the user is a spectator in another world. They sit back and can look anywhere as if they were there. But they cannot interact (other than point and click). They are still fully immersed though and with added components such as immersive audio, the user is fully engulfed into a different reality thus altering the user’s senses, etc.

Types of Non-Interactive VR:

Experience — These are experiences which allow the user to feel actively involved and engaged but still in an entirely passive role.

Examples of Experience VR: Oculus Dreamdeck, G2A Land, Face Your Fears, Everest VR

Storytelling and Story Enabling — Examples are movies, short stories and narrative pieces. This is another important subject regarding the art of storytelling vs. story enabling with VR. Both deal with a certain plot the author has introduced, but while storytelling gives no control to the user, story enabling allows the user to interact with the story; thus giving them choices and some amounts of freedom to engage.

It is argued that this type of “VR Cinema” is yet to be discovered because current storytellers are unable to see beyond conventional cinematic processes which dictate every part of how the story is told. Creators of cinema content for the virtual realm are yet to be born.

Interactive VR

This type of experience gives the user interactive abilities while in their alternate world. Users can fully immerse themselves in their alternate realities by moving forward or backwards, sideways, up and down. This immersion expands the user’s senses and they can also interact with objects by holding, throwing, pushing and pulling.

Most of this is not real-world but instead computer generated using high powered game engine PC’s that allow for real time rendering.

Augmented Reality

This adds to our reality. It supplements the real world with digital objects. It does not take us elsewhere but instead enhances our present. It literally “augments” our reality instead of blocking out the world.

With AR, computer generated graphics overlay the current reality and provide enhancing data that can be used regularly in day-to-day life. Examples of AR have been seen in movies for quite some time such as The Terminator, Minority Report and others.

The digital object overlays can be text data, 3D objects or video such as with Google Glass notifications or on the head-up displays (HUD) in cars which provide valuable information to a driver.

As Tim Cook, CEO of Apple said, “AR allows individuals to be present in the world but hopefully allows an improvement on what’s happening presently”.

Mixed Reality

MR is a mixture of VR and AR where virtual objects interact with real world objects. An example would be if you placed a virtual object (a cup for example) onto a real-world object (a table). The cup would remain in that same position as you walk or change locations. Basically, the virtual object attaches itself to the real-world object and it becomes part the real-world. Take a look at the Magic Beans demo or Bridge Engine Demo for awesome examples.

Examples of Mixed Reality: Microsoft HoloLens, ODG headsets, Google Glass, Magic Beans Demo

360° Content

360° content can be easily created using the plethora of 360° camera’s on the market today. Typically, this is a 2 step process where multiple cameras or lenses capture an image from a different angle and are then stitched together to create a single image that can be projected into a 360° environment. There are many challenges in filming and stitching 360° video that will be discussed in a later article.

360° content utilizes “live” video, or even pre-rendered computer generated graphics. It can be of concerts, car rides, drone videos, and so much more.

Is 360° content VR?

The main argument is that if the user views 360° content within a VR headset, like the Oculus Rift, is it not technically VR because the user is then immersed into an alternate world with no visibility of the “real world”?

No. This isn’t VR.

Why? Well, because true VR utilizes sensors to track your head movements giving you the illusion that you are in this alternate world. When your head moves, the view of the world moves as well, affecting both your subconscious and conscious mind. It also tracks your position in space and requires highly powered computers with head-mounted displays such as the Rift, Vive or PS VR to give precise displays of individual frames that accurately match the head’s position.

With 360° content, you are not fully immersed. You can look up, down and around but you can’t move forward. And frame rates are no where near in comparison therefore not tricking your brain into really believing you are in another world.

360° content at its most basic can be viewed without a headset on applications such as YouTube, Facebook posts or through websites requiring mouse movements to navigate.

Written Test Questions

Sample Questions 1

The words Play and King can be related to through a set of words in a specific order (path) as below –

Play, Game, Chess, King

  1. The score increases if you can relate them in more than one way.
  2. A shorter path gets higher score than a longer path.
  3. Use new-line between paths. Use comma between phrases in a path.
  • Thus Play, Chess, King will get higher score

Sample Question 2

Air and Armageddon

Armageddon basically means end of the world.

  • Air, Pollution, Armageddon
  • Air, Climate change, Armageddon
  • Air, Oxygen, Oxygen depletion, Armageddon
  • Air, Ozone, Ozone Depletion, Armageddon

Sample Question 3

The words Ocean and Cube can be related through a set of words/phrases in a specific order (path) as below:

Ocean, Water, Ice, Ice cube, Cube

Sample Questions 4

In a similar way, relate Alert and Timeline.

  1. Alert, Facebook, Timeline
  2. Alert, humans, armageddon, timeline
  3. Alert, Meeting, change, timeline
  4. Alert, browser, facebook, timeline

Group the following 16 pictures into 3 categories of 4 pictures each. The purpose of the remaining 4 pictures is to mislead you.

List of items – TCS Analytical Image Categorisation Questions and Answers

Now our basic aim is to categorise into 3 categories for 4 each –

Note – These are 16 pictures, we have to catergorize in any order, its not like we have to pick 1 from each row. We can even find a relationship that has 4 picture in 1 singular row itself.

Now a lot of you may think first as politician as first category –

Category 1

  1. Mahatma Gandhi
  2. John F kennedy
  3. Indira Gandhi
  4. Jawahar Lal Nehru
  5. Abraham Lincoln
  6. Donald Trump

These are politicians

. But, they asked us to do 4 but these are six.

So let’s try again

Dead politician

as category will remove donald trump as he is alive.

But now again its 5 people we want 4

Dead Male Politician

Are Mahatma Gandhi, John F Kennedy, Jawahar Lal Nehru and Abrahan Lincoln.

Category 2

Some of you may think in terms of horoscopes also that image in row1 and column 3 is a horoscope and row 3 column 2 and row 4 column 2 is also. But, with horoscopes we cant make it 4. So let’s try something else –


The following 4 have horns –

  1. Image Row 1 Column 3
  2. Image R2C3
  3. Image R4C2
  4. Image R4C4

Category 3

One category is abstract which is basically something that is random and doesnt make sense R1C2, R1C4, R3C1and R3C1.

Category 4

One Category is Animals but there are 5 animals.

Lets exclude fish then there are 4 mammals.

Category 5

Black and white –

R2C1, R2C4, R3C3, R3C4.

Comment down at the end of the page and help others if you can make new categories of 4. We help you, you help us.

TCS Analytical and Logical Digital Problems previous year

What comes to your mind when you see the following picture? The more answers you give (that are suggested by the picture) the better.

More marks more answers

For image 1

  • Save the planet
  • Green Planet
  • Blue Planet
  • Harmony and Humanity
  • Inter racial peace(Notice children are of different colors i.e. race)
  • Childeren
  • Earth
  • Recycling
  • Sustainibility
  • + Comment down more relationships

Image 2

  • Pencil
  • Crayon
  • Rectangle
  • Triangle
  • Rocket
  • Nail (Nail used in walls)
  • Shapes and Blocks
  • Knife
  • Sharpness (Can use Adjective)
  • + Comment down more relationships in the comment sectionTCS Analytical and Logical Digital Problems previous year

In this section TCS basically wants to recruit people who have high deductive logic which is a great skill in artificial intelligence and since one of the profile that they are offering is AI in TCS Digital this is crucial.

We will walk through the Reading Comprehension and find the Solutions with you. Those technologies are marked in Green in bracket as soon as we see them. We also suggest you to write on a paper the technology that you notice while reading the RC simultaneously.

Your Reading comprehension in the paper will also be about the business of a client which maybe a company like Tesla, Mercedes, Nestle, or govt organisation like Finance ministry, sports ministry, BCCI, FIFA etc or maybe a business problem like this one below –

Question 1

Life sciences companies are focusing on keeping patients digitally informed with accurate medical information on diseases, related drugs, and devices through microsites (web development), mobile apps (Android, iOS, Swift, Java), and informative videos(Social Media, YouTube). Rather than replacing healthcare providers (HCPs), the digital medium will complement the quality of healthcare available for patients. Platforms or patient healthcare portals such as ChARM PHR help users manage not just their personal health records and medication history but also care plans, immunization records, health and wellness tips, and so on (Database, DBMS, Hadoop, distributed databases, non-relational databases, visualization). patients like me and other such patient networking portals connect people with similar medical conditions(semantic nets, Deep Learning, neural networks, behavioral analytics) and help them better understand medication regime, side effects, and cost impact, among others.

In such patient networks, some members are key influencers or ‘digital opinion leaders’. Life sciences companies can collaborate with these community leaders to share their opinions and information related to new therapies, trials, and care methods with others. Social networking sites can also provide information on specific campaigns to access drug vouchers(Digital Marketing), coupons, health-tips, and so on. Companies are leveraging social media channels by creating community pages for disease condition information well within the required compliance and regulation. Unimetric’s report on pharma-social-media-trends states that most of the pharmaceutical companies are active on five out of six social networks with the majority preferring Twitter, LinkedIn, Facebook and YouTube. MerckEngage is one such communication channel available across social media.

Digital technologies are now being leveraged to reduce medication non-adherence too with mobile-based trackers and schedulers, sensor-based devices such as inhalers, smart pillbox, and smart pills. Sensor-enabled medical devices such as oximeter and blood glucose monitor are capturing vital health stats for patients using their smartphones(IOT, Nudging). These are transmitted to physicians and care teams, who provide patient-specific recommendations.

We have found some new answers and some common answers that TCS also gave in Sample Test.

Now the answers given by TCS are the follows –

IOT, connected cars, Nudging, social media, distributed databases, non-relational databases, visualization, chatbots, semantic nets, Deep Learning, neural networks, speech technologies, behavioral analytics, cloud computing, Hadoop, mobile technologies, gesture detection, collaborative technologies, knowledge engineering, speech technologies, language translation, simulation.

Outcome – We did see IOT hadoop etc. But, we strongly believe that connected cars is nowhere releated to the above Reading Comprehension.

But, yes we do found some decent things.

  1. They talked about programming languages like Hadoop, DBMS
  2. They talked about new data mining technologies like behavorial analytics
  3. They talked about AI Technologies like – semantic nets, Deep Learning, neural networks, speech technologies
  4. They talked about Artificial Intelligence

If you think that they will need a website or mobile app then the client or problem they are talking about in the reading comprehension will definitely have Database technologies like – Hadoop, DBMS, RDBMS, Database, SQL, NoSQL, Oracle, Cloud Computing (To store Data).

If they need website then definitely they need – Web development, HTML, CSS, mentioned new techs like Angular JS, ReactJS etc

If they(business) need customer support then to reduce client cost on hiring people they can have chat bots, speech technologies, language translation

If they need smart data analytics then you should include knowledge connection, neural networks etc.

Basically TCS Digital is hiring people to work on – Data mining, Data Analytics, Artificial Intelligence, Machine Learning, Devops, Chat bots etc.

So mention technologies that you think have emerged in last 10 years in IT.

Few more example would be IOT, Self driving, Car pooling, Image recognition, automation, robotics, Electric cars etc.

Type 2

Computer vision is a branch of computer science aims to enable computers to recognise and process images in a way that human vision does. It is similar to imparting intelligence and instincts that humans possess into a computer. Computer vision is closely related to artificial intelligence, as the computer must interpret and discern what it sees, perform the required analysis and provide insights for decision making; e.g., computer vision for driverless cars perform functions such object detection (road, traffic lights, pedestrians etc.), motion & speed detection, path prediction. Obviously this needs to be done real time and across all the entities in the ecosystem, so there is a huge amount of data to process in a very short time.

Deep learning is a popular set of methods used to achieve this. Scientists collect sizeable sets of data and use it in part to train the computer vision algorithm and in part to test the algorithm. Subsequently they build the ‘decision-making’ capability based on the algorithm’s outputs, e.g., intelligence added to stop the car once a pedestrian is detected crossing the road in front.

As a computer vision expert, you have recently attended the World Ophthalmic Federation summit, where a proposal has been tabled to develop ‘Nethra’- computer vision-enabled goggles for visually impaired. The federation has collected a dataset of 1,000,000 images taken from various head-mounted cameras simulating the typical paths of visually impaired pedestrians in New York City. Some images have multiple objects in front, other images do not, some are.

Arrange the items below in order of what you would do to build the solution:

  1. Scale the object localization to support multiple objects
  2. Validate the accuracy of the model using the test data
  3. Build an image classifier that detects different types of objects
  4. Split the Data into a training and test set with ratio 70:30
  5. Build an object localization mechanism

This one we leave to the students comment down your answer in the comment section below with explanations.

Also, we will tomorrow post Coding Dashboard for TCS digital also. Book mark PrepInsta we are the most visited Placement Preparation website in India.