TCS NQT Menu9>
- Placement Papers
- What is TCS NQT?
- How To Apply
- Foundation Section
- Aptitude Questions
- English Verbal
- Reasoning Ability
- Advanced Section
- Advanced Quantitative Ability
- Advanced Reasoning Ability
- Advanced Coding
- Coding Questions
- Syllabus 2024
- Recruitment Process
- Registration Process
- Eligibility Criteria
- How to prepare for TCS NQT?
- Interview Questions
- Hiring Process
PREPINSTA PRIME
TCS NQT Technical Interview Questions and Answers
TCS NQT Technical Interview Questions and Answers 2024
The technical round is the second step of the TCS NQT Interview process. This is one of the most difficult stages of the hiring process. The interview questions are primarily about data structures and algorithms, DBMS, operating systems, networking, OOPS, and programming languages.
On this page, you will find the most asked technical questions in the TCS NQT Technical Interview.
TCS NQT Online Test Pattern
Top 24 TCS NQT Technical Interview Questions
Question 1: Define Cloud Computing.
Answer:
Cloud computing is a technique of delivering information technology (IT) services that use web-based tools and apps to access resources from the Internet rather than a direct connection to a server.
Question 2:- Explain the functionality of the linked list?
Answer:
A linked list is a type of linear data structure in which the members are not stored in contiguous memory locations and are linked using pointers.
Question 3: What is a conversion constructor?
Answer:
Convertors are constructors that convert the types of their parameters into a class type. Constructors like this are used by the compiler to execute implicit class-type conversions. These conversions are performed by invoking the constructor that corresponds to the list of values/objects assigned to the object.
Questions 4: What is JDK?
Answer:
A cross-platform software development environment called the Java Development Kit (JDK) provides a selection of tools and libraries required for creating Java-based software applications and applets. Along with the JRE and the JVM (Java Virtual Machine), it is a fundamental Java package (Java Runtime Environment).
Question 5: What are differences between virtual function and pure virtual function.
Virtual Function | Pure Virtual Function |
---|---|
A member function of a base class that can be redefined by a derived class is known as a virtual function. | A member function of a base class that is a pure virtual function must have its definition in the derived class because else the derived class will likewise become abstract. |
Virtual functions in classes do not make them abstract. | Base class with only virtual functions is made abstract. |
Question 6: What are the types of protocols?
Answer:
- Transmission Control Protocol (TCP)
- Internet Protocol (IP)
- User Datagram Protocol (UDP)
- Post office Protocol (POP)
- Simple mail transport Protocol (SMTP)
- File Transfer Protocol (FTP)
- HyperText Transfer Protocol (HTTP)
- HyperText Transfer Protocol Secure (HTTPS)
- Telnet
- Gopher
Question 7: What are the uses of Cloud Computing?
Answer:
- Create fresh services and apps
- Data storage, backup, and recovery
- hosting a website or a blog
- Playback of audio and video
Question 8: Define IoT & list down its applications?
Answer:
The Internet of Things (IoT) is a network of physical objects, including furniture, cars, appliances, and other things, that are connected to one another and share data. These objects are embedded with electronics, software, sensors, actuators, and connectivity.
Applications:
- Smart homes
- Wearable (Smartwatches)
- Manufacturing Industries
- Transportation
- Agriculture
- Healthcare.
Questions 9: What is a command-line argument?
Answer:
Command-line arguments in C refer to getting the arguments from a command prompt. There are three arguments in the main function in C. Some of the command-line arguments are:
- Argument counter
- Argument vector
- Environment vector
Question 10: What are DDL, DML, and DCL commands in my SQL?
Answer
DDL: It consists of the SQL commands required to define the database structure and is known as Data Definition Language when extended. It only serves to construct and modify the structure of database objects in the database and deals with descriptions of the database schema.
DDL Commands:
- CREATE
- DROP
- ALTER
- TRUNCATE
- COMMENT
- RENAME
DML: These SQL instructions, which constitute the majority of SQL statements, deal with manipulating the data that is already there in the database and are part of the DML or Data Manipulation Language.
DML Commands:
- INSERT
- UPDATE
- DELETE
- LOCK
DCL: There are commands in DCL that deal directly with the rights, permissions, and other controls of the database system, such as GRANT and REVOKE.
DCL Commands:
- GRANT
- REVOKE
Question 11: What are the types of Cyberattacks?
Answer
- Malware attack –Malware carries out unauthorized operations on the victim’s system in a typical cyberattack.
- Spoofing – A spoofing attack occurs when a person or computer effectively assumes the identity of another by fabricating data in order to obtain an unfair advantage.
- Phishing – the dishonest act of sending emails from what appear to be trustworthy businesses to trick recipients into disclosing personal information like passwords and credit card data.
Question 12: What are the four basic principles of OOPS?
Answer:
Object-oriented programming has four basic principles:
- Encapsulation
- Polymorphism
- Inheritance
- Abstraction
Question 13: Write a program to check palindromes in C and C++.
#include#include int main() { char str[10] = "naman"; int i, len, flag = 0; len = strlen(str); for (i = 0; i < len; i++) { // Checking if string is palindrome or not if (str[i] != str[len - i - 1]) { flag = 1; break; } } if (flag) printf("%s is not palindrome", str); else printf("%s is palindrome", str); return 0; }
// String palindrome program in c++ #include#include using namespace std; void Lower_case(char str[]){ int i = 0; while (str[i] != '\0') { if (str[i] > 64 && str[i] < 91) str[i] += 32; i++; } } // A function to check if a string str is palindrome void CheckPalindrome(char str[]) { // Start from leftmost and rightmost corners of str int l = 0; int h = strlen(str) - 1; // Keep comparing characters while they are same Lower_case(str); while (h > l) { if (str[l++] != str[h--]) { cout << "The String " << str << " is not a palindrome\n"; return; } } cout << "The String " << str << " is a palindrome"; } // Driver program to test CheckPalindrome function int main() { char str1[50] = "naman"; // size of char string CheckPalindrome(str1); cout<
Question 14: What is IP Address?
Answer:
Any device on a network can be identified by its IP address, which stands for Internet Protocol. IP addresses are used by computers to connect with one another on different networks and the internet.
Question 15: Explain the use of the join() function in Python.
Answer:
Join() is a string function in Python that essentially returns a string value. It offers a versatile approach to concatenating the strings and is also concatenated with the iterable’s elements.
Question 16: Mention different types of operators in Python.
Answer:
Different types of operations in python are
- Arithmetic Operators
- Relational Operators
- Assignment Operators
- Logical Operators
- Membership Operators
- Identity Operators
- Bitwise Operators
Question 17: Mention use of help() and dir() function in Python.
Answer:
Help() function: The help() function in Python is used to display the documentation string and to make helping operations for keywords, modules, and attributes easier.
Dir() function: The defined symbols are displayed using Python’s dir() function.
Question 18: What are the differences between Compiler and Interpreter?
Interpreter | Compiler |
---|---|
Only one program statement is converted at a time by the interpreter into machine code. | The entire program is scanned by the compiler, which then instantly converts it all to machine code. |
An interpreter analyses the source code in a relatively little amount of time. However, the process takes much longer to complete overall. | It takes a long time for a compiler to examine the source code. However, the process is completed in a substantially shorter amount of time overall. |
No intermediary code is produced by an interpreter. As a result, an interpreter has a very high memory efficiency. | A compiler creates intermediate object code at all times. It will require an additional connection. So, additional memory is required. |
Question 19: Write the program to print the following pattern using C++.
Enter the row 5 1 1 2 1 2 3 1 2 3 4 1 2 3 4 5
#includeusing namespace std; int main() { int i, j, n; cin>>n; for(i=1; i<=n; i++) { for(j=1; j<=i; j++) cout<
Question 20: What is a Hash Query?
Answer:
The use of a query string hash (QSH) is a crucial method for securing HTTP requests sent through a browser and preventing URL manipulation.
Question 21: Define Big Data analytics.
Answer:
Big Data is just data that is really large. incredibly large but expanding quickly over time. In other words, this type of data is too massive and complicated to be stored or processed effectively using any of the conventional data management techniques.
Question 22: Write a binary search program using C++.
// Binary Search implimentation in C++ (Recursive) // Time Complexity : O(N) // Space Complexity : O(1) // Auxiliary Space Complexity : O(N) due to function call stack #includeusing namespace std; int binarySearch(int array[], int left, int right, int item){ if (right >= left){ // calculation of new mid int mid = left + (right - left)/2; // returns position where found if (array[mid] == item) return mid+1; // goes to recursive calls in left half if (array[mid] > item) return binarySearch(array, left, mid-1, item); // goes to recursive calls in right half else return binarySearch(array, mid+1, right, item); } // if element is not found we return -1 else return -1; } int main(){ int array[10] = {3, 5, 7, 9, 12, 15, 16, 18, 19, 22}; int item = 15; int position = binarySearch(array, 0, 10, item); if(position == -1) cout<<"Not Found"; else cout<<"We found the item "<< item <<" at position "<< position; }
Question 23: Define Augmented Reality.
Answer:
The term “augmented reality” (AR) refers to a group of technologies that combine computer-generated content with the viewer’s natural senses.
Question 24: What are the data types present in JavaScript?
Answer:
The two types of data types present in JavaScript are
- Primitive data type
- Non-primitive data type
Also Check:-
Also Check:-
30+ Companies are Hiring
Get Hiring Updates right in your inbox from PrepInsta