Do you think IIT Guwahati certified course can help you in your career?
No
Introduction
DXC Technology is a Fortune 500 global leader in IT services. SAP, Oracle, Microsoft, ServiceNow, and Salesforce are among the enterprise applications they develop, integrate, implement, and manage.
In this article, we are going to go through technical DXC interview questions that have been asked previously by the interview panel from their candidates. We hope that these questions will help you with your upcoming DXC interview.
About DXC Technology
DXC Technology is a global leader in IT services and consulting, providing a wide range of services to clients across various industries. Established as a merger between CSC (Computer Sciences Corporation) and the Enterprise Services business of Hewlett Packard Enterprise, DXC Technology delivers mission-critical IT services, driving digital transformation for businesses. The company is known for its expertise in managing and modernizing IT infrastructure, applications, and data across hybrid cloud environments. With a strong global presence, DXC Technology supports businesses in leveraging technology to achieve their strategic objectives.
DXC Technology Recruitment Process
The recruitment process at DXC Technology is structured to identify candidates who align with the company's values and possess the skills necessary to contribute to its success. The process typically involves several rounds, each designed to assess different aspects of a candidate's qualifications.
1. Online Aptitude Test
The first round usually consists of an online aptitude test. This test evaluates a candidate's logical reasoning, quantitative ability, and verbal skills. The aptitude test is crucial as it helps in shortlisting candidates for the next stages of the recruitment process.
2. Technical Interview
The technical interview focuses on assessing a candidate's technical knowledge and problem-solving abilities. Questions may cover topics related to programming, algorithms, data structures, and domain-specific knowledge relevant to the role. This round aims to gauge the candidate's depth of understanding and practical application of technical concepts.
3. HR Interview
The HR interview is conducted to evaluate a candidate's fit within the company culture and their alignment with the company's values. This round often involves questions about the candidate's background, career goals, strengths, weaknesses, and situational responses. The HR interview also serves as an opportunity for candidates to ask questions about the company and the role.
4. Group Discussion or Case Study (optional)
In some cases, a group discussion or case study round may be included. This round assesses a candidate's communication skills, ability to work in a team, and approach to problem-solving. Candidates are typically given a topic or case to discuss with a group, and their performance is evaluated based on their participation and contributions.
5. Final Interview
The final interview is often a combination of technical and HR discussions, and it may include interactions with senior leadership or hiring managers. This round aims to confirm the candidate's suitability for the role and may involve discussions on technical projects, problem-solving scenarios, and career aspirations.
DXC Interview Questions and Answers for Freshers
1. What are your thoughts on OS overlays?
Ans: Overlays are essentially a programming method that divides processes into pieces so that important and required instructions can be saved in memory. It does not require any kind of OS support. It can run programs larger than physical memory by storing only the most important data and instructions at any given time.
2. What exactly is virtual memory?
Ans: An OS memory management technique gives users the illusion of having a large (main) memory. It is simply more space in which more programs can be stored in the form of pages. It allows us to increase the use of physical memory by using a disc while also providing memory protection.
The operating system can manage it in two ways: paging and segmentation. It serves as temporary storage for computer processes alongside RAM.
3. What exactly do you mean by FCFS?
Ans: FCFS (First Come, First Serve) is a type of operating system scheduling algorithm that executes processes in the order in which they arrive. In other words, the process that arrives first will be carried out first. It has no preemptive nature. FCFS scheduling may result in starvation if the first process's burst time is the longest of all jobs.
Burst time refers to the time required by the process to execute in milliseconds. It is also regarded as the simplest and easiest OS scheduling algorithm when compared to others. The FIFO (First In First Out) queue is commonly used to manage FCFS implementation.
4. What exactly is reentrancy?
Ans: Reentrant is simply a function that allows multiple clients to use and share a single copy of a program at the same time. This concept is usually associated with operating system code and has nothing to do with concurrency. It serves two primary purposes:
The program code cannot be changed or modified.
Local data for each client process must be stored on separate discs.
5. What's the distinction between paging and segmentation?
Paging
Segmentation
A programmer cannot see it.
It can be seen by a programmer.
The page size is fixed in this.
The size of the segments, in this case, is not fixed.
In paging, procedures and data cannot be separated.
In segmentation, procedures and data can be separated.
It enables a total of virtual address spaces to traverse the main physical memory.
It allows all programs, data, and codes to be divided into separate address spaces.
In this case, the operating system must keep a free frame.
The operating system must keep a list of holes in the main memory.
The type of fragmentation in paging is internal.
The type of fragmentation in segmentation is external.
6. Are NULL values in a database synonymous with blank space or zero
Ans: No, a NULL value is not the same as zero or blank space because it represents a value that is assigned, unknown, unavailable, or not applicable, whereas blank space represents a character and zero represents a number.
7. Explain the various types of relationships between tables in a DBMS.
Ans: The following are the various types of table relationships in a DBMS system:
One to One Relationship: This type of relationship exists when one row in table X is linked to one row in table Y.
One to Many Relationship: When a single row in table X is related to many rows in table Y, this type of relationship is used.
Many to Many Relationship: When multiple rows in table X can be linked to multiple rows in table Y, this type of relationship is used.
Self-Referencing Relationship: This type of relationship is used when a specific row in table X is linked to another table.
8. Explain the difference between the DELETE and TRUNCATE commands in a database management system.
DELETE COMMAND
TRUNCATE COMMAND
The DELETE command is required to delete rows from a table based on the condition specified in the WHERE clause.
TRUNCATE command: This command is required to remove all data from a database table. It's similar to a DELETE command without a WHERE clause.
It only deletes the rows specified by the WHERE clause.
It deletes all data from a database table.
If necessary, it can be rolled back.
It can be rolled back if necessary.
It keeps a log to lock the row of the table before deleting it, which makes it slow.
It does not keep a log and deletes the entire table at once so that it is fast.
9. What do normalization and denormalization mean?
Ans: Normalization is the process of organizing data into multiple tables to reduce redundancy. Normalization improves disc space utilization and makes database integrity easier to maintain.
Denormalization is the opposite of normalization in that it combines the normalized tables into a single table to speed up data retrieval. By reversing the normalization, we can create a denormalized form of the data using the JOIN operation.
10. What exactly do you mean by "transparent DBMS"?
Ans: A transparent DBMS is a type of DBMS that conceals its physical structure from users. Physical structure or physical storage structure refers to the DBMS memory manager and describes how data is stored on a disc.
DXC Interview Questions For Experienced
11. What is the definition of bootstrapping in compiler design?
Ans: Bootstrapping is a process in compiler design in which a simple language is used to translate more complex programs. This complex program can handle even more complex programs and so on.
12. What is the meaning of Relocatable Machine Code?
Ans: The execution address of the relocatable machine code can be changed. Program code that can be loaded anywhere in memory is referred to as relocatable code. The code is typically divided into control sections, and all memory addresses are expressed relative to the beginning of a control section. As part of the loading process, the compiler/assembler generates a table of all such memory references, which the loader converts into absolute addresses.
13. What are some examples of compiler development tools?
Ans: Here are some examples of compiler construction tools:
Scanner Generator Parser Generator
Engines for syntax-directed translation
Code generators that work automatically
Construction toolkits for compilers
Engines for analyzing data flow.
14. What are the uses of graph Data Structure?
Ans: The uses of the graph data structure are as follows:
Transport grids in which stations are represented as vertices and routes as graph edges
Utility graphs of power or water, with vertices representing connection points and edges representing wires or pipes connecting them.
Social network graphs to determine information flow and hotspots (edges and vertices).
Neural networks in which the vertices represent neurons and the edges represent synapses between them.
15. Can you tell the difference between linear and non-linear data structures?
Ans: A linear data structure is one in which the elements of a data structure result in a sequence or a linear list. Non-linear data structures, on the other hand, traverse nodes in a non-linear fashion. Linear data structures include lists, stacks, and queues, whereas non-linear data structures include graphs and trees.
16. Describe the scenarios in which linked lists can be used over arrays.
Ans: The following are some examples of when we would prefer to use a linked list over an array:
When we don't know the exact number of elements ahead of time.
When we anticipate a large number of add or remove operations.
There are fewer random access operations.
When inserting items anywhere in the middle of a list, such as when implementing a priority queue, a linked list is more appropriate.
17. What distinguishes a stack from a queue?
Ans: In a stack, the most recently added item is removed first, whereas, in a queue, the least recently added item is removed first.
18. What are the distinctions between the B and B+ trees?
Ans: The B tree is an m-way self-balancing tree, with m defining the order of the tree. Btree is an extension of the Binary Search tree with more than one key and more than two children, depending on the number of m. The data is presented in a sorted manner in the B tree, with lower values on the left subtree and higher values on the right subtree.
While the B+ tree is an advanced self-balanced tree as every path from the tree's root to its leaf is of the same length. Because all leaf nodes are the same length, they must all occur at the same level. Some leaf nodes cannot appear on the third level, while others can appear on the second level.
19. Describe the procedure for storing a variable in memory.
Ans: Based on the amount of memory required, a variable is stored in memory. The steps for storing a variable are as follows:
First, the required amount of memory is assigned.
The data is then stored using the data structure in use.
Using concepts such as dynamic allocation ensures high efficiency and that the storage unit can be accessed in real-time based on requirements.
20. What is the time complexity of the HashMap class's basic functions get() and put()?
Ans: If the hash function employed in the hash map distributes elements uniformly among the buckets, the time complexity is O(1).
DXC Interview Questions For Advanced
21. What is the definition of an algorithm?
Ans: Algorithms define how calculations, data processing, automated reasoning, automated decision making, and other tasks should be carried out. A method for calculating a function that can be described in a finite amount of space and time, as well as in a well-defined formal language, is known as an algorithm.
Starting from an initial state and initial input, the instructions describe a computation that, when executed, proceeds through a finite number of well-defined following stages, eventually producing "output" and terminating at a final ending state (possibly empty). The transition from one state to the next is not always predictable; certain algorithms referred to as randomized algorithms, factor in random input.
22. What do you mean by an algorithm's best case, worst case, and average case scenarios?
Ans: The asymptotic analysis defines the mathematical foundation/framing of an algorithm's run-time performance. Using asymptotic analysis, we can readily determine the best case, average case, and worst-case situations of an algorithm.
Algorithm Best-Case Scenario: The best-case scenario for an algorithm is defined as the data arrangement in which the algorithm performs best. For example, in a binary search, the best-case situation is if the target value is in the very center of the data we're looking for. The binary search would have a time complexity of O(1) or continuous-time complexity in the best-case scenario.
Algorithm Worst-Case Scenario: The worst-case scenario of an algorithm is the worst collection of input for that algorithm. If the pivot value is set to the largest or smallest element of a sublist, quicksort may perform poorly. Quicksort will devolve into an algorithm with an O(n2) time complexity, where n is the length of the list to be sorted.
Algorithm Average-Case Scenario: According to computational complexity theory, the average-case complexity of an algorithm is the amount of some computational resource (typically time) used by the process, averaged over all potential inputs. The randomized quicksort algorithm, for example, has an average complexity of O(n*log(n)), where n is the size of the list to be sorted.
23. What are your thoughts on greedy algorithms?
Ans: A greedy algorithm is an algorithm that seeks to select the best optimal decision at each sub-step on the way to a globally optimal solution. This means that, regardless of the consequences, the algorithm chooses the best response accessible at the time.
In other words, when an algorithm seeks a solution, it always chooses the best immediate, or local, choice. Greedy algorithms may find less-than-ideal solutions to some problems while finding the overall, ideal solution to some idealistic problems.
24. Explain how the merge sort algorithm works.
Ans: Merge sort is a computer science-developed general-purpose, comparison-based sorting algorithm. The majority of its implementations provide a stable sort, which means that equal elements in the input and output are sorted in the same order.
The concept of merge sort is,
Divide the unsorted list into n sublists, each containing a single entry (a list of one element is considered sorted).
Repeat the process of merging sublists to create new sorted sublists until only one sublist remains. The sorted list will then be shown.
The Merge Sort Algorithm's time complexity is O(n*log(n)), where n is the length of the list of elements to be sorted, while the Merge Sort Algorithm's space complexity is O(n), or linear space complexity.
25. What exactly is a VPN?
Ans: VPN is an abbreviation for virtual private networks. A virtual private network (VPN) is a technology that establishes a secure, encrypted connection over an insecure network, such as the internet. A Virtual Private Network (VPN) is a method of extending a private network by utilizing a public network, such as the internet.
The name only implies that it is a virtual "private network," implying that a user can be a part of a local network while sitting in a remote location. To establish a secure connection, it employs tunneling protocols.
26. IPsec operates at what layer?
Ans: IPsec operates on the OSI model's layer 3.
27. What are the various factors that influence network security?
Ans: There are primarily two security influencing factors, these are viruses and unauthorized access.
28. What are the various factors that influence network reliability?
Ans: The following factors influence network reliability:
Failure frequency
After-failure network recovery time
29. What exactly is a Tunnel mode?
Ans: This is a data exchange mode in which two communicating computers do not use IPSec. Instead, the gateway that connects their LANs to the transit network creates a virtual tunnel that secures all communication that passes through it using the IPSec protocol.
Tunnel mode is most commonly used between gateways or between end-stations and gateways, with the gateway acting as a proxy for the hosts behind it. Tunnel mode is typically used to encrypt traffic between secure IPSec gateways, such as the Cisco router and the PIX Firewall.
30. What is the primary function of a DNS server?
Ans: DNS is an abbreviation for Domain Name Server. It converts Internet domains and hostnames to IP addresses and the other way around. DNS technology allows you to type names into your Web browsers and our computer will find that address on the Internet for you.
A critical component of the DNS is a global network of DNS servers. It is in charge of assigning domain names and mapping them to Internet resources by appointing an authoritative name server for each domain. The Internet has two main namespaces: the Domain Name System and the Internet Protocol Address Space.
Conclusion
In this article, we've covered the essential technical questions often asked in DXC interviews. We hope this guide has helped your interview preparation and will be valuable for your DXC interview journey. If you're eager to dive deeper into interview prep, be sure to explore our other blogs. You can practice coding questions commonly asked in interviews, review SQL interview questions, OOPS concepts, and much more.
But suppose you have just started your learning process and are looking for questions asked by tech giants like Amazon, Microsoft, Uber, etc. In that case, you must look at the problems,interview experiences, and interview bundle for placement preparations.
Nevertheless, you may consider our paidcourses to give your career an edge over others!
Do upvote our blogs if you find them helpful and engaging!