TCS Digital Enterprise Interview Questions and Answers
TCS Digital Interview Questions 2018
There is no information on TCS Digital Written test or TCS Digital Interview Questions for Freshers.
TCS digital has changed the pattern from 2018 onwards.
Interview Pattern in 2017
- Number of Interview Rounds – 2
- Technical Interview – 2 Rounds
- HR Interview – 1 Rounds
Even the package was lesser last year, it was about 6 LPA.
Interview Pattern in 2018
- Number of Interview Rounds – 2
- Technical Interview – 1 or 2 Rounds (We are not sure as this is the first time exam is being conducted)
- HR Interview – 1 Rounds
Glassdoor is a good website for checking previous question. But, we think there also fake information is uploaded by someone.
TCS Digital interview will be like any other Dream company interview.
They will not ask coding questions on Artificial intelligence, cloud computing, Data mining etc.
You can expect a EEE student to know about machine learning coding etc right?
Rather questions in the exam will consist of –
For non CS/IT branches
- C Programming
- OOPS concept and coding
- Data Structures (Very imp)
- Basic definitions of Data Analytics, Artificial Intelligence, Cloud Computing etc.
For CS/IT Branches
- C Programming
- OOPS concept and coding
- Data Structures (Very imp)
- DBMS (Very Important)
- Operating System
- Networking (important)
- Basic definitions of Data Analytics, Artificial Intelligence, Cloud Computing etc.
For all the above we suggest geeksforgeeks.
Basic definitions that will be useful (They will not expect you to know anything more than the definitions in the exam for this)
TCS Digital Interview Fresher Questions
|TCS Digital Interview Questions and Answers||Probability of being asked||Difficulty||Valid for Non CS/IT|
|OOPS concept and coding||Medium||Medium||Yes|
|Data Structures (Very imp)||Very High||Medium to High||Yes|
|DBMS (Very Important)||Very High||Medium||No|
|Basic definitions of Data Analytics, Artificial Intelligence, Cloud Computing etc.||Medium (just basics)||Low||Yes|
What is Cloud Computing?
It is advance stage technology implemented so that the cloud provides the services globally as per the user requirements. It provides a method to access several servers worldwide.
What are the benefits of cloud computing?
The main benefits of cloud computing are:
- Data backup and storage of data
- Powerful server capabilities.
- Incremented productivity.
- Cost effective and time saving.
Companies like Amazon which owns AWS, Microsoft which owns Azure, VMware which provides cloud desktop. Google which provides various cloud solutions like Google Drive, Slides/Docs/ Google Cloud platform etc are example of such.
What are the Cloud Service Models? (Not relevant but it would be good if you know and you tell on your own somewhere in the interview, interviewer may get impressed)
- Infrastructure as a service
- (IaaS) Platform as a service
- (PaaS) Software as a service (SaaS)
What is Digital Technology?
When TCS will come to your campus they will have a presentation about TCS Digital. According to TCS Digital Technology are the blend of these five –
- Inter connectivity
- Visual Computing
This information they will cover in the presentation.
It was seen in VIT, Vellore where TCS asked this question in the presentation open to all and the student who answered it was directly called for interview and was asked to skip the Online test.
Ques. What is artificial Intelligence?
Artificial intelligence (AI) makes it possible for machines to learn from experience, adjust to new inputs and perform human-like tasks. Most AI examples that you hear about today – from chess-playing computers to self-driving cars – rely heavily on deep learning and natural language processing. Using these technologies, computers can be trained to accomplish specific tasks by processing large amounts of data and recognizing patterns in the data.
Why is artificial intelligence important? (Not Important and will not be asked but you can tell to impress the interviewer if any such topic comes)
- AI automates repetitive learning and discovery through data. But AI is different from hardware-driven, robotic automation. Instead of automating manual tasks, AI performs frequent, high-volume, computerized tasks reliably and without fatigue. For this type of automation, human inquiry is still essential to set up the system and ask the right questions.
- AI adds intelligence to existing products. In most cases, AI will not be sold as an individual application. Rather, products you already use will be improved with AI capabilities, much like Siri was added as a feature to a new generation of Apple products. Automation, conversational platforms, bots and smart machines can be combined with large amounts of data to improve many technologies at home and in the workplace, from security intelligence to investment analysis.
- AI adapts through progressive learning algorithms to let the data do the programming. AI finds structure and regularities in data so that the algorithm acquires a skill: The algorithm becomes a classifier or a predicator. So, just as the algorithm can teach itself how to play chess, it can teach itself what product to recommend next online. And the models adapt when given new data. Back propagation is an AI technique that allows the model to adjust, through training and added data, when the first answer is not quite right.
- AI analyzes more and deeper data using neural networks that have many hidden layers. Building a fraud detection system with five hidden layers was almost impossible a few years ago. All that has changed with incredible computer power and big data. You need lots of data to train deep learning models because they learn directly from the data. The more data you can feed them, the more accurate they become.
- AI achieves incredible accuracy though deep neural networks – which was previously impossible. For example, your interactions with Alexa, Google Search and Google Photos are all based on deep learning – and they keep getting more accurate the more we use them. In the medical field, AI techniques from deep learning, image classification and object recognition can now be used to find cancer on MRIs with the same accuracy as highly trained radiologists.
What is Machine Learning?
Machine learning is an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. Machine learning focuses on the development of computer programs that can access data and use it learn for themselves.
The process of learning begins with observations or data, such as examples, direct experience, or instruction, in order to look for patterns in data and make better decisions in the future based on the examples that we provide. The primary aim is to allow the computers learn automatically without human intervention or assistance and adjust actions accordingly.
What is Big Data?
Big data is a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and strategic business moves.
Why Is Big Data Important?
The importance of big data doesn’t revolve around how much data you have, but what you do with it. You can take data from any source and analyze it to find answers that enable 1) cost reductions, 2) time reductions, 3) new product development and optimized offerings, and 4) smart decision making. When you combine big data with high-powered analytics, you can accomplish business-related tasks such as:
- Determining root causes of failures, issues and defects in near-real time.
- Generating coupons at the point of sale based on the customer’s buying habits.
- Recalculating entire risk portfolios in minutes.
- Detecting fraudulent behavior before it affects your organization.
What is deep Learning?
Deep learning is a machine learning technique that teaches computers to do what comes naturally to humans: learn by example. Deep learning is a key technology behind driverless cars, enabling them to recognize a stop sign, or to distinguish a pedestrian from a lamppost. It is the key to voice control in consumer devices like phones, tablets, TVs, and hands-free speakers. Deep learning is getting lots of attention lately and for good reason. It’s achieving results that were not possible before.
What is cyber security?
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.
In a computing context, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity.
What are different types of cyber attacks? (Not Important but good to know)
If you’ve ever seen an antivirus alert pop up on your screen, or if you’ve mistakenly clicked a malicious email attachment, then you’ve had a close call with malware. Attackers love to use malware to gain a foothold in users’ computers—and, consequently, the offices they work in—because it can be so effective.
“Malware” refers to various forms of harmful software, such as viruses and ransomware. Once malware is in your computer, it can wreak all sorts of havoc, from taking control of your machine, to monitoring your actions and keystrokes, to silently sending all sorts of confidential data from your computer or network to the attacker’s home base.
Attackers will use a variety of methods to get malware into your computer, but at some stage it often requires the user to take an action to install the malware. This can include clicking a link to download a file, or opening an attachment that may look harmless (like a Word document or PDF attachment), but actually has a malware installer hidden within.
Of course, chances are you wouldn’t just open a random attachment or click on a link in any email that comes your way—there has to be a compelling reason for you to take action. Attackers know this, too. When an attacker wants you to install malware or divulge sensitive information, they often turn to phishing tactics, or pretending to be someone or something else to get you to take an action you normally wouldn’t. Since they rely on human curiosity and impulses, phishing attacks can be difficult to stop.
In a phishing attack, an attacker may send you an email that appears to be from someone you trust, like your boss or a company you do business with. The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected on your account). In the email, there will be an attachment to open or a link to click. Upon opening the malicious attachment, you’ll thereby install malware in your computer. If you click the link, it may send you to a legitimate-looking website that asks for you to log in to access an important file—except the website is actually a trap used to capture your credentials when you try to log in.
In order to combat phishing attempts, understanding the importance of verifying email senders and attachments/links is essential.
SQL Injection Attack
SQL (pronounced “sequel”) stands for structured query language; it’s a programming language used to communicate with databases. Many of the servers that store critical data for websites and services use SQL to manage the data in their databases. A SQL injection attack specifically targets this kind of server, using malicious code to get the server to divulge information it normally wouldn’t. This is especially problematic if the server stores private customer information from the website, such as credit card numbers, usernames and passwords (credentials), or other personally identifiable information, which are tempting and lucrative targets for an attacker.
An SQL injection attack works by exploiting any one of the known SQL vulnerabilities that allow the SQL server to run malicious code. For example, if a SQL server is vulnerable to an injection attack, it may be possible for an attacker to go to a website’s search box and type in code that would force the site’s SQL server to dump all of its stored usernames and passwords for the site.
Cross-Site Scripting (XSS)
In an SQL injection attack, an attacker goes after a vulnerable website to target its stored data, such as user credentials or sensitive financial data. But if the attacker would rather directly target a website’s users, they may opt for a cross-site scripting attack. Similar to an SQL injection attack, this attack also involves injecting malicious code into a website, but in this case the website itself is not being attacked. Instead, the malicious code the attacker has injected only runs in the user’s browser when they visit the attacked website, and it goes after the visitor directly, not the website.
Cross-site scripting attacks can significantly damage a website’s reputation by placing the users’ information at risk without any indication that anything malicious even occurred. Any sensitive information a user sends to the site—such as their credentials, credit card information, or other private data—can be hijacked via cross-site scripting without the website owners realizing there was even a problem in the first place.
Imagine you’re sitting in traffic on a one-lane country road, with cars backed up as far as the eye can see. Normally this road never sees more than a car or two, but a county fair and a major sporting event have ended around the same time, and this road is the only way for visitors to leave town. The road can’t handle the massive amount of traffic, and as a result it gets so backed up that pretty much no one can leave.
That’s essentially what happens to a website during a denial-of-service (DoS) attack. If you flood a website with more traffic than it was built to handle, you’ll overload the website’s server and it’ll be nigh-impossible for the website to serve up its content to visitors who are trying to access it.
This can happen for innocuous reasons of course, say if a massive news story breaks and a newspaper’s website gets overloaded with traffic from people trying to find out more. But often, this kind of traffic overload is malicious, as an attacker floods a website with an overwhelming amount of traffic to essentially shut it down for all users.
In some instances, these DoS attacks are performed by many computers at the same time. This scenario of attack is known as a Distributed Denial-of-Service Attack (DDoS). This type of attack can be even more difficult to overcome due to the attacker appearing from many different IP addresses around the world simultaneously, making determining the source of the attack even more difficult for network administrators.
Session Hijacking and Man-in-the-Middle Attacks
When you’re on the internet, your computer has a lot of small back-and-forth transactions with servers around the world letting them know who you are and requesting specific websites or services. In return, if everything goes as it should, the web servers should respond to your request by giving you the information you’re accessing. This process, or session, happens whether you are simply browsing or when you are logging into a website with your username and password.
The session between your computer and the remote web server is given a unique session ID, which should stay private between the two parties; however, an attacker can hijack the session by capturing the session ID and posing as the computer making a request, allowing them to log in as an unsuspecting user and gain access to unauthorized information on the web server. There are a number of methods an attacker can use to steal the session ID, such as a cross-site scripting attack used to hijack session IDs.
An attacker can also opt to hijack the session to insert themselves between the requesting computer and the remote server, pretending to be the other party in the session. This allows them to intercept information in both directions and is commonly called a man-in-the-middle attack.
What is IOT i.e. Internet of Things?
Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet. The ‘thing’ in IoT could be a person with a heart monitor or an automobile with built-in-sensors, i.e. objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention. The embedded technology in the objects helps them to interact with internal states or the external environment, which in turn affects the decisions taken.
- Applications include –
- Smart homes
- Wearable (Smart watches)
- Manufacturing Industries’
- Retail Industries
- Healthcare etc.
AR vs VR vs MR
A lot of people use the term “virtual reality” for different types of “Immersive Experiences”. This includes augmented and mixed reality as well as 360° video. Although they each offer alternate or altered reality experiences, they are quite different and too frequently are the technologies confused with one another.
- Virtual Reality
- Augmented Reality
- Mixed Reality
- 360° Video
In its simplest form, Virtual Reality (VR) transposes the user to an alternate world. The real world which the user is in, does not exist. This is done through live video or computer generated graphics and uses closed head-mounted displays (HMD’s) that completely blind the user from seeing anything in the real-world. The Oculus Rift, Playstation VR, HTC Vive, Google Daydream, Gear VR are examples of HMD’s.
* The differences in HMD’s will be explained in an upcoming article from BluFocus.
With non-interactive VR applications and content, the user is a spectator in another world. They sit back and can look anywhere as if they were there. But they cannot interact (other than point and click). They are still fully immersed though and with added components such as immersive audio, the user is fully engulfed into a different reality thus altering the user’s senses, etc.
Types of Non-Interactive VR:
Experience — These are experiences which allow the user to feel actively involved and engaged but still in an entirely passive role.
Examples of Experience VR: Oculus Dreamdeck, G2A Land, Face Your Fears, Everest VR
Storytelling and Story Enabling — Examples are movies, short stories and narrative pieces. This is another important subject regarding the art of storytelling vs. story enabling with VR. Both deal with a certain plot the author has introduced, but while storytelling gives no control to the user, story enabling allows the user to interact with the story; thus giving them choices and some amounts of freedom to engage.
It is argued that this type of “VR Cinema” is yet to be discovered because current storytellers are unable to see beyond conventional cinematic processes which dictate every part of how the story is told. Creators of cinema content for the virtual realm are yet to be born.
This type of experience gives the user interactive abilities while in their alternate world. Users can fully immerse themselves in their alternate realities by moving forward or backwards, sideways, up and down. This immersion expands the user’s senses and they can also interact with objects by holding, throwing, pushing and pulling.
Most of this is not real-world but instead computer generated using high powered game engine PC’s that allow for real time rendering.
This adds to our reality. It supplements the real world with digital objects. It does not take us elsewhere but instead enhances our present. It literally “augments” our reality instead of blocking out the world.
With AR, computer generated graphics overlay the current reality and provide enhancing data that can be used regularly in day-to-day life. Examples of AR have been seen in movies for quite some time such as The Terminator, Minority Report and others.
The digital object overlays can be text data, 3D objects or video such as with Google Glass notifications or on the head-up displays (HUD) in cars which provide valuable information to a driver.
As Tim Cook, CEO of Apple said, “AR allows individuals to be present in the world but hopefully allows an improvement on what’s happening presently”.
MR is a mixture of VR and AR where virtual objects interact with real world objects. An example would be if you placed a virtual object (a cup for example) onto a real-world object (a table). The cup would remain in that same position as you walk or change locations. Basically, the virtual object attaches itself to the real-world object and it becomes part the real-world. Take a look at the Magic Beans demo or Bridge Engine Demo for awesome examples.
Examples of Mixed Reality: Microsoft HoloLens, ODG headsets, Google Glass, Magic Beans Demo
360° content can be easily created using the plethora of 360° camera’s on the market today. Typically, this is a 2 step process where multiple cameras or lenses capture an image from a different angle and are then stitched together to create a single image that can be projected into a 360° environment. There are many challenges in filming and stitching 360° video that will be discussed in a later article.
360° content utilizes “live” video, or even pre-rendered computer generated graphics. It can be of concerts, car rides, drone videos, and so much more.
Is 360° content VR?
The main argument is that if the user views 360° content within a VR headset, like the Oculus Rift, is it not technically VR because the user is then immersed into an alternate world with no visibility of the “real world”?
No. This isn’t VR.
Why? Well, because true VR utilizes sensors to track your head movements giving you the illusion that you are in this alternate world. When your head moves, the view of the world moves as well, affecting both your subconscious and conscious mind. It also tracks your position in space and requires highly powered computers with head-mounted displays such as the Rift, Vive or PS VR to give precise displays of individual frames that accurately match the head’s position.
With 360° content, you are not fully immersed. You can look up, down and around but you can’t move forward. And frame rates are no where near in comparison therefore not tricking your brain into really believing you are in another world.
360° content at its most basic can be viewed without a headset on applications such as YouTube, Facebook posts or through websites requiring mouse movements to navigate.