0% found this document useful (0 votes)
3 views5 pages

02 Tcs Interview

Uploaded by

Shivam Pandey33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views5 pages

02 Tcs Interview

Uploaded by

Shivam Pandey33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Difference between long and double:


 long and double are used in different contexts.
 long is a data type used for integer values, typically a 32-bit or 64-bit
integer depending on the system.
 double is a data type used for floating-point (decimal) values, providing
more precision than the float data type.
2. On-demand services and normalization:
 On-demand services often involve normalization to ensure data
consistency and integrity.
 Normalization is the process of organizing data in a database to reduce
redundancy and improve data integrity.
 On-demand services may use normalization techniques to store and
retrieve data efficiently, avoiding duplication and inconsistencies.
3. Difference between C, Java, and C++:
 C is a procedural programming language.
 Java is an object-oriented programming language with a strong emphasis
on platform independence.
 C++ is an extension of C with additional features, including object-
oriented programming.
4. Antivirus vs. Firewall:
 Antivirus: Software designed to detect, prevent, and remove malicious
software (malware) from a computer or network.
 Firewall: A security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
5. Nested Loop:
 A loop inside another loop is called a nested loop.
 It allows the execution of a set of statements multiple times within the
body of another loop.
6. Function Overloading:
 Function overloading is the ability to define multiple functions with the
same name but different parameters.
 The compiler determines which function to call based on the number and
types of arguments provided.
7. Malloc vs. Calloc:
 malloc: Allocates a specified number of bytes of memory but does not
initialize the memory content.
 calloc: Allocates a specified number of blocks of memory, each with a
specified number of bytes, and initializes the memory content to zero.
8. Built-in functions in C:
 Standard functions provided by the C programming language, such as
printf, scanf, strlen, etc.
9. Tokenization in C:
 Tokenization is the process of breaking a program into smaller units called
tokens.
 In C, tokens include keywords, identifiers, operators, constants, and special
symbols.
10. Token in C:
 A token is a basic building block of a C program, representing a unit of
meaning (e.g., a keyword, identifier, or operator).
11. Method Overloading vs. Method Overriding:
 Method Overloading: Involves defining multiple methods with the same
name but different parameters within the same class.
 Method Overriding: Involves providing a specific implementation for a
method in a subclass that is already defined in its superclass.
12. Garbage Collection:
 Garbage Collection is a process in which the runtime environment
automatically deallocates memory occupied by objects that are no longer
reachable or in use by the program.
13. Multiple Inheritance in Java:
 Java does not support multiple inheritance through classes, but it supports
it through interfaces.
 A class can implement multiple interfaces, inheriting their method
signatures.
14. Passband Filter:
 A filter that allows signals within a certain frequency range, known as the
passband, to pass through while attenuating signals outside this range.
15. Modulation:
 Modulation is the process of varying a carrier signal's properties (e.g.,
amplitude, frequency, or phase) to transmit information.
16. Static vs. Dynamic Memory Allocation:
 Static Memory Allocation: Memory is allocated at compile-time and is
fixed during program execution.
 Dynamic Memory Allocation: Memory is allocated at runtime, allowing
flexibility in managing memory.
17. Purpose of Register:
 Registers are small, fast storage locations in a CPU used to store
intermediate data during program execution, providing faster access than
main memory.
18. Joins and its Types:
 Joins in databases combine records from two or more tables based on a
related column.
 Types include INNER JOIN, LEFT JOIN (or LEFT OUTER JOIN), RIGHT JOIN
(or RIGHT OUTER JOIN), and FULL JOIN (or FULL OUTER JOIN).
19. Structure vs. Array:
 Array: A collection of elements of the same data type stored in contiguous
memory locations.
 Structure: A composite data type that groups different variables under a
single name.
20. Macros:
 Macros in C are preprocessor directives that define a symbol or perform
text replacement before compilation.
21. Algorithm for Pascal Triangle and Palindrome:
 Pascal Triangle: Each number is the sum of the two directly above it in the
triangle.
 Palindrome: A sequence of characters that reads the same forward and
backward.
22. Local vs. Global Variable:
 Local Variable: Declared inside a function and can only be accessed within
that function.
 Global Variable: Declared outside any function and can be accessed
throughout the program.

1. Limitations of CSS:
 Limited layout control compared to table-based layouts.
 Lack of variables for easy value reuse.
 Limited conditional logic.
 Cross-browser compatibility issues.
 Limited support for complex calculations.
2. DOM (Document Object Model):
 DOM is a programming interface for web documents.
 It represents the structure of a document as a tree of objects, allowing
scripts to dynamically modify the content, structure, and style of a
document.
3. Pointers:
 Pointers in programming languages store the memory address of another
variable.
 They enable dynamic memory allocation and manipulation.
4. Null Pointer:
 A pointer that does not point to any memory location.
 Attempting to dereference a null pointer can lead to undefined behavior.
5. Python:
 Python is a high-level, interpreted, and general-purpose programming
language known for its simplicity and readability.
6. Python Casting:
 Casting in Python involves converting one data type to another.
 Examples include int(), float(), and str().
7. List:
 A built-in data structure in Python that stores ordered and mutable
sequences of elements.
8. Tuples:
 Similar to lists but immutable in Python.
 Defined using parentheses.
9. Dictionary vs. Tuple:
 Dictionary: An unordered collection of key-value pairs.
 Tuple: An ordered and immutable collection of elements.
10. Compilers for Python:
 CPython, Jython, IronPython, PyPy, etc.
11. Advantages of Frameworks in Python:
 Rapid development.
 Code reuse.
 Enhanced security.
 Maintenance efficiency.
12. Stack, Queue, and LinkedList:
 Stack: Last In, First Out (LIFO) data structure.
 Queue: First In, First Out (FIFO) data structure.
 LinkedList: A data structure consisting of nodes where each node points to
the next in the sequence.
13. Regular Expression:
 A sequence of characters defining a search pattern.
 Used for pattern matching within strings.
14. HTML and CSS Tags:
 HTML tags define the structure of a webpage (e.g., <div>, <p>).
 CSS tags (selectors) style HTML elements (e.g., #id, .class).
15. Software Development Life Cycle (SDLC) Steps:
 Planning, Analysis, Design, Implementation, Testing, Deployment,
Maintenance.
16. Authentication and Authorization:
 Authentication: Verifying the identity of a user.
 Authorization: Granting access rights based on the user's identity and
permissions.
17. DBMS vs. RDBMS:
 DBMS (Database Management System): Manages databases but may not
support relationships between tables.
 RDBMS (Relational Database Management System): Manages databases
with support for relationships between tables.
18. ACID Properties:
 Atomicity, Consistency, Isolation, Durability.
 Guarantees the reliability of transactions in a database system.
19. IoT (Internet of Things):
 A network of interconnected devices that communicate and share data to
perform tasks.
 Example: Smart home devices, wearable technology.
20. Denormalization:
 The process of intentionally introducing redundancy in a database for
performance optimization.
 Used to speed up data retrieval at the cost of increased storage.
21. File Opening in C++:
 File opening in C++ involves using the fstream library and functions like
open().
22. Constructor:
 A special member function in a class used for initializing the object's state.
 Invoked automatically when an object is created.

You might also like