TCS NQT Technical Interview Questions and Answers

TCS NQT Technical Interview Questions and Answers 2024

The technical round is the second step of the TCS NQT Interview process. This is one of the most difficult stages of the hiring process. The interview questions are primarily about data structures and algorithms, DBMS, operating systems, networking, OOPS, and programming languages.

On this page, you will find the most asked technical questions in the TCS NQT Technical Interview.

TCS NQT Technical Interview Questions

TCS NQT Online Test Pattern

TCS NQT Pattern 2024

Top 24 TCS NQT Technical Interview Questions

Question 1: Define Cloud Computing.


Cloud computing is a technique of delivering information technology (IT) services that use web-based tools and apps to access resources from the Internet rather than a direct connection to a server.

Question 2:- Explain the functionality of the linked list?


A linked list is a type of linear data structure in which the members are not stored in contiguous memory locations and are linked using pointers.

Question 3: What is a conversion constructor?


Convertors are constructors that convert the types of their parameters into a class type. Constructors like this are used by the compiler to execute implicit class-type conversions. These conversions are performed by invoking the constructor that corresponds to the list of values/objects assigned to the object.

Questions 4: What is JDK?


A cross-platform software development environment called the Java Development Kit (JDK) provides a selection of tools and libraries required for creating Java-based software applications and applets. Along with the JRE and the JVM (Java Virtual Machine), it is a fundamental Java package (Java Runtime Environment).

Question 5: What are differences between virtual function and pure virtual function.

Virtual Function Pure Virtual Function
A member function of a base class that can be redefined by a derived class is known as a virtual function. A member function of a base class that is a pure virtual function must have its definition in the derived class because else the derived class will likewise become abstract.
Virtual functions in classes do not make them abstract. Base class with only virtual functions is made abstract.

Question 6: What are the types of protocols?


  • Transmission Control Protocol (TCP)
  • Internet Protocol (IP)
  • User Datagram Protocol (UDP)
  • Post office Protocol (POP)
  • Simple mail transport Protocol (SMTP)
  • File Transfer Protocol (FTP)
  • HyperText Transfer Protocol (HTTP)
  • HyperText Transfer Protocol Secure (HTTPS)
  • Telnet
  • Gopher

Question 7: What are the uses of Cloud Computing?


  • Create fresh services and apps
  • Data storage, backup, and recovery
  • hosting a website or a blog
  • Playback of audio and video

Question 8: Define IoT & list down its applications?


The Internet of Things (IoT) is a network of physical objects, including furniture, cars, appliances, and other things, that are connected to one another and share data. These objects are embedded with electronics, software, sensors, actuators, and connectivity.


  • Smart homes
  • Wearable (Smartwatches)
  • Manufacturing Industries
  • Transportation
  • Agriculture
  • Healthcare.

Questions 9: What is a command-line argument?


Command-line arguments in C refer to getting the arguments from a command prompt. There are three arguments in the main function in C. Some of the command-line arguments are:

  • Argument counter
  • Argument vector
  • Environment vector

Question 10: What are DDL, DML, and DCL commands in my SQL?


DDL: It consists of the SQL commands required to define the database structure and is known as Data Definition Language when extended. It only serves to construct and modify the structure of database objects in the database and deals with descriptions of the database schema.

DDL Commands:

  • DROP

DML: These SQL instructions, which constitute the majority of SQL statements, deal with manipulating the data that is already there in the database and are part of the DML or Data Manipulation Language.

DML Commands:

  • LOCK

DCL: There are commands in DCL that deal directly with the rights, permissions, and other controls of the database system, such as GRANT and REVOKE.

DCL Commands:


Question 11: What are the types of Cyberattacks?


  • Malware attack –Malware carries out unauthorized operations on the victim’s system in a typical cyberattack.
  • Spoofing – A spoofing attack occurs when a person or computer effectively assumes the identity of another by fabricating data in order to obtain an unfair advantage.
  • Phishing – the dishonest act of sending emails from what appear to be trustworthy businesses to trick recipients into disclosing personal information like passwords and credit card data.

Question 12: What are the four basic principles of OOPS?


Object-oriented programming has four basic principles:

  • Encapsulation
  • Polymorphism
  • Inheritance
  • Abstraction

Question 13: Write a program to check palindromes in C and C++.

Question 14: What is IP Address?


Any device on a network can be identified by its IP address, which stands for Internet Protocol. IP addresses are used by computers to connect with one another on different networks and the internet.

Question 15: Explain the use of the join() function in Python.


Join() is a string function in Python that essentially returns a string value. It offers a versatile approach to concatenating the strings and is also concatenated with the iterable’s elements.

Question 16: Mention different types of operators in Python.


Different types of operations in python are 

  • Arithmetic Operators
  • Relational Operators
  • Assignment Operators
  • Logical Operators
  • Membership Operators
  • Identity Operators
  • Bitwise Operators

Question 17: Mention use of help() and dir() function in Python.


Help() function: The help() function in Python is used to display the documentation string and to make helping operations for keywords, modules, and attributes easier.

Dir() function: The defined symbols are displayed using Python’s dir() function.

Question 18: What are the differences between Compiler and Interpreter?

Interpreter Compiler
Only one program statement is converted at a time by the interpreter into machine code. The entire program is scanned by the compiler, which then instantly converts it all to machine code.
An interpreter analyses the source code in a relatively little amount of time. However, the process takes much longer to complete overall. It takes a long time for a compiler to examine the source code. However, the process is completed in a substantially shorter amount of time overall.
No intermediary code is produced by an interpreter. As a result, an interpreter has a very high memory efficiency. A compiler creates intermediate object code at all times. It will require an additional connection. So, additional memory is required.

Question 19: Write the program to print the following pattern using C++.

Enter the row 5

1 2
1 2 3 
1 2 3 4
1 2 3 4 5
using namespace std;

int main() 
   int i,  j, n;
   for(i=1; i<=n; i++)
       for(j=1; j<=i; j++)

Question 20: What is a Hash Query?


The use of a query string hash (QSH) is a crucial method for securing HTTP requests sent through a browser and preventing URL manipulation.

Question 21: Define Big Data analytics.


Big Data is just data that is really large. incredibly large but expanding quickly over time. In other words, this type of data is too massive and complicated to be stored or processed effectively using any of the conventional data management techniques.

Question 22: Write a binary search program using C++.

// Binary Search implimentation in C++ (Recursive)
// Time Complexity : O(N)
// Space Complexity : O(1)
// Auxiliary Space Complexity : O(N) due to function call stack
using namespace std;

int binarySearch(int array[], int left, int right, int item){
    if (right >= left){
        // calculation of new mid
        int mid = left + (right - left)/2;

        // returns position where found
        if (array[mid] == item)
            return mid+1;
        // goes to recursive calls in left half
        if (array[mid] > item)
            return binarySearch(array, left, mid-1, item);
        // goes to recursive calls in right half
            return binarySearch(array, mid+1, right, item);
    // if element is not found we return -1
       return -1;
int main(){
    int array[10] = {3, 5, 7, 9, 12, 15, 16, 18, 19, 22};
    int item = 15;
    int position = binarySearch(array, 0, 10, item);

    if(position == -1)
        cout<<"Not Found";
        cout<<"We found the item "<< item <<" at position "<< position;

Question 23: Define Augmented Reality.


The term “augmented reality” (AR) refers to a group of technologies that combine computer-generated content with the viewer’s natural senses.

Question 24: What are the data types present in JavaScript?


The two types of data types present in JavaScript are

  • Primitive data type
  • Non-primitive data type