Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

TCS Interview Questions
Questions Answers Views Company eMail

what is transformer utilisation factor?

3865

A half wave rectifier is used to supply 50vdc to resistive load of 800ohms the semiconductor diode has a forword resistance of 25ohms,calculate ac voltage required?

1 8344

what is need of rectifier in electronics?

4 19969

what is a bleeder resistor?

2100

what is ripple rejection?

1 5091

A 12v regulated dc power supply has a voltage regulation of 0.5% find amagnitude of variation?

1 5726

) Difference between two numbers is 4 and their product is 17. Then find the sum of their squers?

2 16642

) Peter and Paul are two friends. The sum of their ages is 42 years. Peter is twice as old as Paul was when Peter was as old as Paul is now. What is the present age of Peter?

9 25941

A horse chases a pony 2 hours after the pony runs. Horse takes 4 hours to reach the pony. If the average speed of the horse is 81 kmph, what s the average speed of the pony?

2 10522

How to prepare a final account?

4 9876

One day Alice meets pal and byte in fairyland. She knows that pal lies on Mondays, Tuesdays and Wednesdays and tells the truth on the other days of the week byte, on the other hand, lies on Thursdays, Fridays and Saturdays, but tells the truth on the other days of the week. Now they make the following statements to Alice – pal. Yesterday was one of those days when I lie byte. Yesterday was one of those days when I lie too. What day is it???

1 8524

) Six friends decide to share a big cake. Since all of them like the cake, they begin quarreling who gets to first cut and have a piece of the cake. One friend suggests that they have a blindfold friend choose from well shuffled set of cards numbered one to six. You check and find that this method works as it should simulating a fair throw of a die. You check by performing multiple simultaneous trials of picking the cards blindfold and throwing a die. You note that the number shown by the method of picking up a card and throwing a real world die, sums to a number between 2 and 12. Which total would be likely to appear more often – 8,9 or 10?

1 14019

A number when divided by D leaves a remainder of 8 and when divided by 3D leaves a remainder of 21 . What is the remainder left, when twice the number is divided by 3D?

2 6976

How to delete/clear the loaded data in target dataset? plz if u know give the solution with steps wise......?

1 4663

How many types of IP routings?

14 19237

Post New TCS Interview Questions


TCS Interview Questions


Un-Answered Questions

What is extend mode in word?

639


what do you mean by type zero control sytem ?Give an practical example of type zero contol sytem?

2029


What is the difference between execute, executeQuery, executeUpdate?

1082


What is the organizational structure of ps module?

1122


How can I change the default font in word?

630


Stochastic hill climbing chooses at random from among the uphill moves; the probability of selection can vary with the steepness of the uphil1 move. a) True b) False

1972


How to add default rules in transformer?

1274


What is the apk format?

1079


Tell me why does a tilted gyroscope not fall?

963


What is the function of DML Compiler?

1287


good book for material science and catia v 5 high scope domin to make career

1396


how to implement some securty aspect in our application i.e 1.cookie poisioning. 2.data encryption. 3.forcefull browsing 4.sql/code injection 5.securing web app by using web services ........my question is how to implement these thing in our application is this done by hard coding or by help of some tool

2157


What browsers do angular js support?

899


Give differences between Quicksort &Mergesort. When should these sorts be used andwhat is their running time in java?

1296


Define cucumber report?

587