DXC Technology Interview Preparation and Recruitment Process


About DXC Technology


DXC Technology is an American multinational IT services and consulting company headquartered in Ashburn, Virginia. It was formed on April 3, 2017, through the merger of Computer Sciences Corporation (CSC) and the Enterprise Services business unit of Hewlett Packard Enterprise (HPE). The company provides a wide range of business-to-business IT services, focusing on helping global companies manage their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private, and hybrid clouds.

DXC Technology Interview Preparation

DXC operates in two main segments : Global Business Services (GBS) and Global Infrastructure Services (GIS). GBS offers solutions like analytics, software engineering, consulting, and industry-specific services such as insurance software and business process outsourcing. GIS focuses on IT outsourcing, cloud infrastructure, security services, and modern workplace solutions. The company serves clients across various industries, including insurance, healthcare, aerospace, manufacturing, banking, and the public sector.

As of November 2024, DXC employs over 125,000 people across more than 70 countries, with a significant presence in India, where over 43,000 employees work across 12 sites in seven major cities. The company has pursued growth through acquisitions, such as Luxoft in 2019, and partnerships with leading technology providers. DXC is also known for initiatives like the Dandelion Program, which supports employment for individuals with autism, and has earned recognition for its workplace culture and services, including being named a Leader in Gartner’s 2025 Magic Quadrant for Outsourced Digital Workplace Services.

Publicly traded on the New York Stock Exchange under the ticker symbol DXC, the company has evolved under leaders like Mike Salvino (CEO from 2019 to 2024) and Raul Fernandez, who took over as president and CEO in February 2024. DXC also engages in high-profile sponsorships, such as with Manchester United and Team Penske in motorsports, reflecting its global brand presence.



DXC Technology Recruitment Process


1. Eligibility Criteria.


Most of the new qualification standards of other companies are the same as those of DXC Technology. Before applying for the recruitment process, candidates must review the following eligibility criteria (both graduation and general criteria):

Graduation Criteria : The graduation criteria for the DXC Technology Recruitment Process are as follows :

Criteria of Graduation Details
Branch of Study or Department of Study
  1. Bachelor's of Engineering (B.E.) or Bachelor's of Technology (B. Tech) in any one of the following branches of study: CSE/ECE/IT/EEE/TELECOM/EI
  2. M.Sc (Master of Science) in Computer Science or Information Technology or any other related fields.
Mode of Study  Full-Time courses recognised by the Central or State governments of India.  (Not the part-time or correspondence courses available.)
Percentage criteria with which Graduation needs to be done Minimum Sixty Percent (60%)
Backlogs No Backlogs should be active during the DXC Technology Recruitment Process.


Academic Criteria : Given below is the mandatory academic criteria for the DXC Technology Selection Process :

* Percentage required in 10th Standard and 12th Standard Examinations :  Minimum Sixty Percent (60%)

Required Skills : The skills which are required for the DXC Technology Recruitment Process are as follows:-

* Technical Skills : Operating Systems, Computer Networks, Data Structures and Algorithms, Automata and Compiler Design, Database Management System, Object Oriented Programming and command in one Programming Language at least like Python, Java, C ++, etc.

* Soft Skills : Excellent communication and writing skills.

* Personal Skills : One should have a technical bent of mind, have exceptional organizational and detail-oriented skills and Professionalism in one's attitude toward one's work should be there.

* Other Skills : Should have flexibility in the day and night shifts and should be able to perform one's task in an independent manner.


2. Interview Rounds.


1. Online Test (Coding and Aptitude Round) : The DXC Technology Online Test is a 100-minute online test administered on the Aspiring Minds (AMCAT) platform. The rough pattern for this online round can be seen in the table given below :

Topic Time Duration Number of Questions
English 15 minutes 12
Logical Reasoning 14 minutes 14
Quantitative Aptitude 16 minutes 16
Automata Fix (Debugging, Code Reuse, Coding) 20 minutes 7
Essay Writing 20 minutes 1
Computer Programming Multiple Choice Questions 15 minutes 12


There is no negative marking in this round and switching between different topics is also not allowed. Note that this round is eliminative in nature and only those candidates who ace this round are interviewed for the job opening. Therefore, doing well in this round is extremely important. The difficulty of this online round ranges from easy to medium and anyone with an average IQ and having a good grasp of Computer Science Fundamentals should be able to clear this round pretty easily.  

This round can be skipped for experienced folks as seems necessary to the Recruiters.

2. Technical Interview Rounds : The first round of the DXC Technology Hiring Process is followed by a series of Technical Interview Rounds, in which candidates are asked a few questions about Data Structures and Algorithms. They may also be requested to code their answers for the interviewers at DXC Technology, with the interviewers evaluating the code quality, logic, and other factors.

Following that, a series of questions are asked to assess the candidate's technical expertise. Candidates may be requested to write down SQL queries for various sorts of Relational Database activities. Questions concerning a candidate's past experience, as well as any Cloud-based technology, may be asked. Knowing how APIs work and how distributed systems are designed can be a significant bonus in this interview, letting the candidate stand out in the eyes of the interviewers.

During these rounds, questions about any part of the candidate's education are likely to be asked. You must have a thorough understanding of computer science fundamentals to pass these DXC Technology walk-in interview rounds. Data structures, algorithms, database management systems, operating systems, networking, object-oriented programming concepts, and their favourite programming languages, such as C++, Java, Python, and others, should all be familiar to candidates.

If the candidate is an experienced Software Engineer, a few Unit Testing questions, Functional Testing questions, and other questions may be asked during this round. The panel will also question you on your résumé, so be sure you understand what you have written. The DXC technical interview questions also are of the difficulty level between easy to medium. These rounds are also eliminative in nature usually.

3. The Human Resources (HR) or Behavioral Round : The final few rounds (one or two in number usually) of the DXC Technology Recruitment Process are the Human Resources or HR round, which aim to establish whether or not the candidate is a cultural fit for DXC Technology. In order to ace these interviews, candidates should understand more about DXC Technology and DXC Technology tools. You can read more about them on their website. In these rounds, one can be asked puzzle based questions in order to see how smart the candidate is in general and how well he or she reacts to awkward and difficult situations. Some of the questions that may be asked during the Human Resources or HR round are as follows:

* What are your strengths and weaknesses?
* Why DXC Technology?
* Give me some background about DXC Technology.
* What value do you contribute to DXC Technology, and what is your vision for making a difference in the world while working there?
* Is it possible for you to relocate to another part of India?
* Explain who you are and what you know about yourself
* What makes you want to work at DXC Technology?
* How much do you think you will get paid? This is a difficult question to answer. This question is posed to even the most seasoned staff and therefore, before answering this question, you might want to find out what the company's average employee salary is.

If an applicant fits all of the aforementioned requirements and has shown exceptional technical abilities in earlier rounds, he or she will most probably be hired at DXC Technology, India.


3. Interview Process.


At DXC Technology, the interview process usually contains three rounds:

* Online Test.
* Technical Interviews.
* Behavioural or Human Resources (HR) Round.

DXC Technology Interview Questions :

1 .
What are the unary operations in Relational Algebra in context to SQL.
In Relational Algebra, one operand operations are known as unary operations. The procedures PROJECTION, SELECTION, and RENAME are unary operations in relational algebra:

The SELECT operation : The SELECT operation selects a subset of tuples from a relation that fulfils a set of criteria. The SELECT operation is a filter that keeps only those tuples that fulfil a set of criteria. Alternatively, you may use the SELECT method to limit the tuples to those that fulfil the criteria. The SELECT operation can be thought of as dividing the relation horizontally into two groups of tuples: those that meet the criteria and are selected, and those that do not and are rejected.

The PROJECT operation : If a relation is viewed as a table, the SELECT operation selects certain rows while discarding others. In contrast, the PROJECT operation selects a subset of the table's columns while rejecting the remainder. We can use the PROJECT operation to project a relation over just a few of its attributes if we're just interested in a few of them. As a result, the result of the boperation can be viewed as a vertical partition of the relation into two relations: one with the needed columns (attributes) and the operation's result, and the other with the rejected columns.

The RENAME operation :
It is occasionally simple and suitable to break a complicated chain of operations and rename it as a relation with new names. Renaming a relationship can be done for a variety of reasons, including :

* It is possible that we'll want to save a relation as the result of a relational algebra expression.
* It is possible that we'll want to join a relation to itself.
2 .
What are your thoughts on Servlet Collaboration?
The process of communicating information among the servlets of a Java web application is known as servlet collaboration. Method invocations allow information to be sent from one servlet to another. The Servlet API (Application Programming Interface) of Java is the primary method for achieving Servlet Collaboration, and it exposes two interfaces.

* javax.servlet.RequestDispatcher
* javax.servlet.http.HttpServletResponse

These two interfaces include the methods for achieving the purpose of servlet information sharing.
3 .
What do you understand about inline functions?
In C or C++, an inline function is a function that is declared using the keyword "inline." It has two functions:

It is a compiler directive that requests that the compiler replace the body of the function inline by performing inline expansion, that is, placing the function code at the location of each function call, thus reducing the overhead of a function call (it is not mandatory for the compiler to comply with the request of the inline function). In this way, it is analogous to the register storage class specifier, which also provides an optimization indication. For frequent calls to the same function, inline functions are typically employed.

The keyword "inline" has a second goal: to change the behaviour of links. The C/C++ separate compilation and linkage architecture requires this, in part because the function's definition (body) must be reproduced in all translation units where it is used to allow inlining during compilation, which causes a collision during linking if the function has external linkage (it violates uniqueness of external symbols). C and C++ (as well as dialects such as GNU C and Visual C++) handle this in different ways.

Given below is an example to understand inline functions in a better way :
inline void multiplyNums(int x,  int y)
{
   int answer = x * y;
   printf("Product of the two numbers given is: %d", answer);
}

Let us assume that the above inline function is called at someplace in the main function of our C program as shown below:
int i = 20;
int j = 40;
multiplyNums(i, j);

Note that the "multiplyNums(i, j);" function call will be replaced by the following piece of code in the main function itself by the C compiler:
int i = 20;
int j = 40;
int answer = i * j;
printf("Product of the two numbers given is: %d", answer);
4 .
What do you understand about Network Reliability? State the criteria to check the network reliability.
Network dependability refers to the network's capacity to perform the requested operation through a network, such as communication. In order for a network to function well, it must be reliable. The network monitoring systems and devices are necessary for the network to be reliable. The network monitoring system detects network faults, while network devices ensure that data reaches its intended destination.

The following factors can be used to assess a network's reliability :

* Downtime : Downtime is defined as the amount of time it takes for a network to recover.

* Failure Frequency : This is the number of times a network fails to work as anticipated.

* Catastrophe : It means that the network has been hit by an unforeseen incident, such as a fire or an earthquake.
5 .
What do you mean by the BPaaS solution?
BPaaS is nothing but Business Process as a Service. In other words, it is the automated delivery of business processes from the cloud. BPaas can be connected with other SaaS, PaaS, and IaaS services. With a PaaS solution, companies can access people, processes, and technology as a pay-per-use service. Thus, businesses can only access resources based on demand, reducing costs dramatically.
6 .
What are the Different Unary Operations that you know?
Basically, unary operators act on a single operand and produce a new value. Know that unary operations have equal precedence and follow right-to-left associativity.

Unary operations are listed as follows:

* Unary Minus (-)
* Unary plus (+)
* Prefix Increment (++)
* Prefix Decrement (--)
* Logical Negation - NOT (!)
* Bitwise negation (~)
* Address of Operator (&)
* Indirection (*)
* Size of Operator - the size of(expression )
7 .
What do you understand by OOP and SOP?
OOP stands for Object-Oriented Programming, in which developers use a set of objects while developing programs. In OOP, data is represented as attributes, and code is represented as methods. Here, objects communicate within themselves by passing messages. Besides, you can easily modify programs in Object-Oriented Programming.

On the other hand, SOP stands for Structured-Oriented Programming, in which developers use a set of functions or modules while developing programs. In SOP, each function or module acts as a sub-program. Whenever functions are required, they are called by the main program. Unlike OOP, it is challenging to modify programs in the SOP.
8 .
What are the types of Operating Systems?
Given below are the various Operating Systems used in computer applications:

* Batch Operating System
* Time-sharing or multitasking Operating System
* Distributed Operating System
* Network Operating Systems
* Real-time Operating Systems
* Mobile Operating Systems
9 .
What is Demand Paging in OS?
In-demand paging, the pages of the secondary memory are loaded into the main memory based on demands. In other terms, it is the process of loading pages into the main memory on-demand. With demand paging, we can have a large virtual memory. Also, we can run programs that are larger than physical memory. On the whole, we can say it simplifies page transfer.
10 .
What do you understand by a Process Scheduler in Operating Systems, and mention the different Scheduling Algorithms?
A Process scheduler assigns various processes to the CPU based on scheduling algorithms.

Following are the six scheduling algorithms of Operating Systems.

* First Come First Serve Scheduling (FCFS)
* Shortest Job Next Scheduling (SJN)
* Priority Scheduling
* Shortest remaining time
* Round Robin Scheduling (RR)
* Multiple level queues scheduling
11 .
What is RTOS, and mention its types?
RTOS is known as a Real-Time Operating System. It supports accepting and processing real-time events within a short time. RTOS is specially used in environments where processing time must be short. That is why RTOS is mainly employed in air traffic control systems, industrial control, telephone switching equipment, etc.

Know that the following are the three types of RTOS.

* Hard Real-Time Operating System
* Soft Real-Time Operating System
* Firm Real-Time Operating System
12 .
What is VPN, and mention its different types?
VPN is the Virtual Private Network used to establish a protected network while using public networks. VPN uses the encryption method to protect your data and network. All you have to notice here is that encryption takes place in real-time. Mainly, VPN helps to hide IP addresses by hiding your location. As a result, you can restrict unauthorized people from entering your network and accessing data.

The following types of VPN;

PPTP : Point-to-Point Tunnelling Protocol

L2TP : Layer-2 Tunnel Protocol

Open VPN : Open source VPN

SSTP : Secure Socket Tunnelling Protocol

IKE2 : Internet Key Exchange version 2
13 .
What are the layers of OSI model?
Layers of OSI model are :

* Application layer ( 7th Layer)
* Presentation layer (6th Layer)
* Session layer (5th Layer)
* Transport layer(4th Layer)
* Network layer(3rd Layer)
* Data Link layer (2nd Layer)
* Physical layer(1st Layer)
14 .
What is UNIX?

UNIX is a powerful, multitasking, multi-user operating system originally developed in the 1970s at Bell Labs by a team including Ken Thompson, Dennis Ritchie, and others. It was designed to be portable, modular, and flexible, making it a cornerstone of modern computing. Written primarily in the C programming language, UNIX introduced key concepts like a hierarchical file system, a shell for command-line interaction, and the idea of treating everything (files, devices, etc.) as a file. These innovations have influenced virtually every operating system since.

Unlike single-user systems of its time, UNIX allowed multiple users to run programs simultaneously, which made it ideal for servers, mainframes, and later, workstations. Its portability—thanks to being rewritten in C—let it spread across different hardware platforms, from minicomputers to modern PCs. Over time, UNIX evolved into various flavors, like BSD (Berkeley Software Distribution), Solaris, HP-UX, and AIX, each tailored for specific needs or vendors.

A defining feature is its philosophy: simple, reusable tools that do one thing well, connected via pipes and scripts. For example, commands like ls, grep, and awk (on UNIX-like systems) reflect this approach. It’s also open and extensible, which led to the rise of UNIX-like systems, most notably Linux, though Linux isn’t "true" UNIX—it’s a clone built from scratch to mimic UNIX behavior.

Today, UNIX and its derivatives power much of the internet, enterprise servers, and even macOS (which is UNIX-based, certified under the POSIX standard). It’s less common on consumer desktops but remains critical in high-performance computing, cloud infrastructure, and embedded systems. Its legacy is in its stability, security, and the way it shaped software development—think of it as the quiet backbone of tech that’s been around longer than most of us.

15 .
What is the purpose of DESC in SQL?

In SQL, DESC stands for "descending" and is used primarily in the ORDER BY clause to sort the result set in descending order.


* Usage
SELECT * FROM employees
ORDER BY salary DESC;

* This query will return all employees sorted by their salary, from highest to lowest.


* Common Use Cases
  1. Sorting numbers from largest to smallest:

    SELECT * FROM products ORDER BY price DESC;
    
  2. Sorting dates from newest to oldest:

    SELECT * FROM orders ORDER BY order_date DESC;
    
  3. Alphabetical order reversed (Z to A):

    SELECT * FROM customers ORDER BY last_name DESC;
    

* Contrast with ASC:
  • ASC = ascending order (default)

  • DESC = descending order

16 .
Which operator in SQL performs pattern-matching?

In SQL, the LIKE operator is used to perform pattern matching in WHERE clauses.

* Syntax
SELECT * FROM table_name
WHERE column_name LIKE 'pattern';
* Pattern Wildcards
Symbol Description
% Matches zero or more characters
_ Matches a single character
* Examples
  1. Find names starting with "A":

    SELECT * FROM employees
    WHERE name LIKE 'A%';
    
  2. Find names ending with "son":

    SELECT * FROM employees
    WHERE name LIKE '%son';
    
  3. Find names containing "ann":

    SELECT * FROM employees
    WHERE name LIKE '%ann%';
    
  4. Find 5-letter names where the second letter is "a":

    SELECT * FROM employees
    WHERE name LIKE '_a___';
    

* Case Sensitivity
  • In SQL Server: LIKE is case-insensitive by default.

  • In PostgreSQL/MySQL: It may be case-sensitive depending on collation/settings.

For more advanced pattern matching, SQL also supports regular expressions using REGEXP or SIMILAR TO (depending on the database system).

17 .
What is a Virtual Private Network (VPN)? Explain the different types of VPNs.
A Virtual Private Network creates a private network from a public internet connection, allowing users to exchange data in a secure manner with a high level of privacy. One of the major applications of Virtual Private Network is to allow telecommuting workers to have access to resources that may otherwise not be accessible on a public network. A VPN utilizes tunnel technology that helps hide online activity, thus offering privacy. There are two main types of VPNs, which are as follows-

* Access VPN- Access VPN is useful for connecting to the internet for users with remote mobiles and telecommuters. Popular for being a low-cost solution, access VPN offers a host of connectivity options and can be substituted for ISDN (Integrated Services Digital Network) or a dial-up connection.

* Site to Site VPN- Commonly also known as Router-to-Router VPN, this type of VPN connects the network of two or more offices from different locations. This is of two types- intranet VPN and extranet VPN. While intranet VPN provides internal connectivity within the company, extranet VPN is used to connect different stakeholders, from suppliers, customers, partners, etc. with the help of dedicated connections over shared infrastructure.
18 .
What are abstract classes? Can objects or instances of abstract classes be created?
An abstract class is a class with abstract methods. In abstract classes, the methods are declared; however, they’re not defined. When utilizing a certain method in a subclass of the abstract class, one needs to specify the method solely in the subclass.

Objects and instances cannot be created when utilizing abstract classes because an abstract class cannot be completely implemented. Therefore, instances cannot be produced.
19 .
What are the benefits of using a VPN?
Using a Virtual Private Network can offer various benefits, some of which are as follows :

* VPN, as opposed to wide area network or WAN, can be used more conveniently to connect different offices from several geographical locations in a remote manner.

* VPNs are a preferred choice when users seek a secure connection, especially when making online transactions as it acts as a tunnel, making a public network private. It is also used to exchange data between workplaces across the globe in a secure manner.

* A Virtual Private Network can help safeguard all the information pertaining to an organization from potential threats or data breaches and third-party access.

* A VPN can also be used for maintaining anonymity when online by hiding the identity of the user through encryption.
20 .
What is Network Reliability? What are the criteria for checking the network reliability?
A network’s capacity to be able to perform an operation that has been requested, through a network is known as network reliability. It is extremely crucial for a network to be reliable or dependable for it to function well, and this is made possible with the help of network monitoring systems.

These systems can help with the detection of faults in the network and network devices help in ensuring that the data is sent to the intended destination. A network’s reliability can be assessed through various parameters, such as downtime, failure frequency, and catastrophe. Downtime is the time that a network takes to recover. Failure frequency is the number of times a network encounters failure in performing as anticipated. Catastrophe is when an unforeseen incident hits a network.
21 .
Mention the different layers of the TCP/IP model?
The TCP/IP model, which underpins modern internet communication, is typically described in four layers. Each layer handles a specific aspect of data transmission across networks. Here they are, from bottom to top:

Network Interface Layer (or Link Layer) : Handles the physical connection between devices and the transmission of raw data over a network medium (e.g., Ethernet, Wi-Fi). It deals with hardware-specific details like MAC addresses, framing, and error detection. Think of it as the layer that gets bits onto the wire or airwaves.

Internet Layer :
Responsible for addressing, routing, and moving packets across different networks. The Internet Protocol (IP) lives here, with IPv4 and IPv6 being the key players. It’s about getting data from source to destination, regardless of the path, and doesn’t care about the content—just the delivery. Protocols like ICMP (for diagnostics) also sit here.

Transport Layer :
Manages end-to-end communication between devices. This is where TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) come in. TCP ensures reliable delivery with error checking, sequencing, and retransmission, while UDP is lighter and faster but doesn’t guarantee delivery—perfect for streaming or gaming. It’s the layer that decides how data is sent and reassembled.

Application Layer :
The top layer, where user-facing services and applications interact with the network. It includes protocols like HTTP (web browsing), FTP (file transfer), SMTP (email), and DNS (domain name resolution). This layer formats data into something meaningful for apps or users, relying on the layers below to handle the heavy lifting of transport.
Unlike the seven-layer OSI model, TCP/IP is more practical and streamlined, merging some functions (like OSI’s session and presentation layers) into its application layer. It’s the real-world blueprint that makes the internet tick.
22 .
What do you understand about Data Independence?
Data independence is a notion that states that changes in data at one level of a three-tier DataBase Management System design should not affect data at another level. There are two types of data independence:  Physical data independence and Conceptual data independence.

Physical Data Independence : Any change in the physical location of tables and indexes should have no impact on the conceptual level or the external display of data, according to Physical Data Independence. The majority of Database Management Systems offer this data independence, which is straightforward to establish.

Conceptual Data Independence : Data at the conceptual and external levels must be independent, according to Conceptual Data Independence. Any changes to the conceptual schema should have no effect on the external schema. Changing the appearance of a table by adding or removing features, for example, should have no impact on the user's view of the table. This type of independence, however, is more difficult to accomplish than physical data independence since changes in conceptual schema are mirrored in the user's view.
23 .
What is DNS (Domain Name System)? How does it work?

Great question! Let's break it down:

What is DNS (Domain Name System)?

DNS is like the phonebook of the internet. It translates human-readable domain names (like www.google.com) into IP addresses (like 142.250.190.68) that computers use to identify each other on the network.


How Does DNS Work? (Step-by-Step)

Here’s what happens when you type a website into your browser:

1. User types a URL (e.g., www.example.com)

Your browser checks if it already has the IP address cached.

2. Check Local DNS Cache

If the address is in your local system's DNS cache, it’s used immediately.

3. Query Sent to Recursive DNS Resolver

If not cached, your request goes to your ISP's recursive DNS resolver (or a custom one like Google's 8.8.8.8).

4. Resolver contacts Root DNS Server

The resolver asks a Root DNS server:

“Where can I find .com domains?”

The root server responds with the address of a Top-Level Domain (TLD) server for .com.

5. Resolver contacts TLD DNS Server

Next, the resolver asks the .com TLD server:

“Where is example.com?”

The TLD server responds with the address of the Authoritative DNS server for example.com.

6. Resolver contacts Authoritative DNS Server

The resolver then asks:

“What’s the IP for www.example.com?”

The Authoritative DNS server responds with the actual IP address.

7. Return IP to Browser

The IP is passed back through the resolver to your browser, which then connects to the website's server using that IP.

8. Website Loads

Your browser now knows where to go, and the page begins loading.


Summary :
Component Role
DNS Resolver Asks other servers and finds the answer
Root Server Points to TLD servers
TLD Server Points to authoritative servers
Authoritative Server Has the final answer (IP address)
24 .
What happens when we try to connect to any website, for instance, when we try to visit www.facebook.com ?
When we try to connect to any website, for instance, when we try to visit www.facebook.com the following steps take place :

* The browser cache is first checked to see if the content is fresh and whether it is present in the browser cache or not. If it is present in the browser cache, then it is displayed.

* If not present in the browser cache, the browser checks if the URL's IP address is in the cache (browser and OS), and if it is not, it asks the Operating System to perform a DNS (Domain Name System) search using UDP (User Datagram Protocol ) to obtain the URL's (Uniform Resource Locator) associated IP address from the DNS server, and then establishes a new TCP connection.

* Three-way handshaking establishes a new TCP connection between the browser and the server.

* The TCP connection is used to send an HTTP request to the server.

* The web servers on the Servers process HTTP requests and respond with HTTP responses.

* The browser decodes the server's HTTP answer and decides whether to close or reuse the TCP connection for future requests.

* If the data in the response is cacheable, browsers will save it.

* The response is decoded by the browser.
25 .
Differentiate between Object-Oriented Programming (OOP) and Structure Oriented Programming (SOP).
The key differences between Object-Oriented Programming  (OOP) and Structure Oriented Programming  (SOP) are as follows :

Object-Oriented Programming (OOP) Structure Oriented Programming (SOP)
Object-Oriented Programming (OOP) is a programming style that focuses on objects rather than functions and procedures. Structure Oriented Programming (SOP) provides a logical structure to a program by dividing it into functions.
It uses a bottom-up approach. It uses a top-down approach.
Data hiding can be implemented using Object Oriented Programming or OOP. Data hiding cannot be implemented using Structure Oriented Programming or SOP.
Object-Oriented Programming or OOP possesses the ability to solve issues of any complexity. Structure Oriented Programming or SOP can tackle problems of moderate difficulty only.
Redundancy can be reduced by reusing code in Object-Oriented Programming. It does not support code reusability.
26 .
What are scheduling algorithms? Explain the FCFS Scheduling Algorithm.
What are Scheduling Algorithms?

Scheduling algorithms are methods used by operating systems to decide the order in which processes are executed on the CPU. Since the CPU can only handle one process at a time (in a single-core system), the OS must schedule multiple processes in a fair and efficient way.

These algorithms are crucial in managing:

  • CPU utilization

  • Throughput

  • Waiting time

  • Response time

  • Fairness


Types of Scheduling Algorithms (Briefly)
  1. FCFS (First-Come, First-Served)

  2. SJF (Shortest Job First)

  3. Round Robin

  4. Priority Scheduling

  5. Multilevel Queue Scheduling

  6. Multilevel Feedback Queue


FCFS (First-Come, First-Served) Scheduling
Definition :

FCFS is the simplest scheduling algorithm. The process that arrives first gets executed first, just like standing in a queue.


How FCFS Works :
  • The CPU keeps a queue of processes.

  • Each process is executed to completion in the order of arrival.

  • Non-preemptive: Once a process starts running, it cannot be interrupted.


Example :
Process Arrival Time Burst Time (Execution Time)
P1 0 ms 5 ms
P2 1 ms 3 ms
P3 2 ms 8 ms


Execution Order:
P1 → P2 → P3


Gantt Chart :
| P1 |     P2     |       P3       |
0    5           8                16

Key Metrics :
Process Waiting Time Turnaround Time
P1 0 5
P2 4 7
P3 6 14
  • Waiting Time (WT) = Time spent waiting in the queue

  • Turnaround Time (TAT) = Completion Time – Arrival Time


Advantages of FCFS :
  • Simple to understand and implement.

  • Fair in the sense that each process gets a turn.


Disadvantages :
  • Convoy effect: A long process can delay all others.

  • Not optimal in terms of average waiting time.

  • No consideration for priority or burst time.

27 .
What are the different types of Real Time Operating Systems (RTOS)?

Great question! Real-Time Operating Systems (RTOS) are specialized OSes designed to run applications with precise timing and high reliability. They're often used in embedded systems, robotics, automotive systems, medical devices, and industrial automation.

What is an RTOS?

An RTOS ensures that critical tasks are executed within a predictable time frame. The key feature is determinism—knowing that something will happen at the exact time it's supposed to.


Types of Real-Time Operating Systems

There are three main types of RTOS based on how they handle tasks and timing:


1. Hard Real-Time Systems :
  • Strict timing constraints: Missing a deadline is considered a system failure.

  • Used in critical systems like:

    • Pacemakers

    • Flight control systems

    • Nuclear plant control

* Pros: Highly reliable
* Cons: Expensive and complex to design


2. Soft Real-Time Systems :
  • Deadlines are important but not absolutely mandatory.

  • Occasional deadline misses are tolerated, but performance should degrade gracefully.

  • Used in:

    • Online video streaming

    • VoIP

    • Multimedia systems

* Pros: Easier to develop, more flexible
* Cons: Not suitable for mission-critical applications


3. Firm Real-Time Systems :
  • Similar to soft real-time, but missing a deadline renders the result useless (though the system won’t crash).

  • Missed deadlines are not catastrophic, but are not acceptable either.

  • Used in:

    • Industrial automation

    • Control systems where occasional failures can be tolerated

* Pros: Balance between strictness and practicality
* Cons: Harder to balance scheduling and load


Comparison Table :
Feature Hard RTOS Firm RTOS Soft RTOS
Deadline Miss Not allowed Allowed but invalidates task Allowed occasionally
Critical Usage Yes Sometimes No
System Failure on Miss Yes No No
28 .
Describe the advantages and disadvantages of using Object-Oriented Programming Languages.
The following are some of the advantages of using Object-Oriented Programming Languages :

* Object-Oriented Programming Languages (OOPLs) take a bottom-up approach to programming, allowing programmers to simulate the real world and its constituents.
* The use of Object-Oriented Programming Languages decreases the quantity of code that programmers write.
* Without compromising other features, code can be readily altered and extended. Object-Oriented Programming Languages (OOPLs) divide a huge problem into smaller chunks.
* The user is not exposed to unnecessary data when abstraction is used.
* Object-Oriented Programming Languages necessitate a lengthy and thorough design phase, resulting in a superior design with fewer flaws.
* It enables the reusability of code.
* Object-Oriented Programming Languages allow programmers to reach their goals more quickly.

The following are some of the disadvantages of using Object-Oriented Programming Languages :

* In order to employ these languages, a lot of planning is required.
* These are not appropriate for minor issues since they lead to overcomplication.
* In Object-Oriented Programming Languages, classes have a propensity to be too broad.
* Programs created in Object-Oriented Programming Languages might take a lot of memory in some cases, which is obviously undesirable.
29 .
What is a Bootstrap Program in Operating Systems?
When a computer system starts, a program is responsible for the initialization of the operating system, and this program is known as bootstrap program. In other words, a bootstrap program is the first program that runs upon the booting of a computer system. A bootstrap program is stored in the boot blocks, on a specific disk at a certain location, and it completely decides the functionality and performance of the operating system.

When a computer system starts, the Bootstrap program reads the operating system, after which it loads into the RAM of the system. Once this happens, other systems, such as the keyboard, mouse, graphic card, etc. start.
30 .
What are your thoughts on Servlet Collaboration?

Servlet collaboration is an important concept in Java-based web applications, especially when multiple servlets need to work together to process a single client request or share data. It’s all about enabling communication between servlets to build modular, maintainable, and efficient web applications.


What is Servlet Collaboration?

Servlet collaboration refers to interaction between two or more servlets in a web application. It allows servlets to:

  • Share data

  • Forward requests

  • Include responses


Why is it Useful?
  • Promotes modularity (each servlet handles a specific task)

  • Improves code reuse

  • Helps in building layered architectures (e.g., input validation, processing, and display handled by separate servlets)


Techniques for Servlet Collaboration
1. Request Dispatching

Uses the RequestDispatcher interface to:

  • forward(): Transfers control to another servlet or JSP

  • include(): Includes output of another resource in the response

RequestDispatcher rd = request.getRequestDispatcher("SecondServlet");
rd.forward(request, response);  // or rd.include(request, response);
2. Using Shared Data (Request/Session/Application scope)
  • Request scope: For short-lived data (current request only)

  • Session scope: For user-specific data across multiple requests

  • Application scope: For global data shared by all servlets

request.setAttribute("name", "Alice");

Then another servlet can access:

String name = (String) request.getAttribute("name");
Advantages :
  • Cleaner separation of concerns

  • Easier maintenance and testing

  • Promotes reusability of servlet logic


Potential Downsides
  • Over-collaboration can lead to tight coupling

  • Requires good design discipline to avoid spaghetti-like dependencies

31 .
Why do you want to choose DXC Technology as your place of work?
DXC technology helps in the digital transformation of businesses. It helps companies around the globe streamline their business practices. I admire DXC Technologies' ability to automate highly complicated business workflows with modern and path-breaking technology. Using data analysis, DXC Technology provides solutions oriented to the customer's needs and makes everyone’s job easier to perform.
32 .
Is the DXC Technology interview easy?
The interview at DXC Technology consists of a total of 3 rounds. Coding and Aptitude round, the Technical round, and finally, the HR round. The overall Interview process can be ranged from beginner to medium level. Some coding knowledge before the interview is recommended to crack the interview. Questions related to SQL queries, API workaround, and cloud-based architecture are asked; hence, it is advised that the applicant has some expertise in these fields.
33 .
What are the three components of the DXC Technology operating model?
CxO & Board executives layer, Digital transformation Execution Layer, and Business Units layer are the three components of DXC Technology. These three layers work in conjunction to serve the businesses and customers.
34 .
Where do you see yourself in five years?
Candidates can convey positively that they are aiming for a long-term position in the company. The answer should be in a confident and enthusiastic tone. For example, I enjoy solving problems in a guided and logical way and would like it if that were a part of my job. In 5 years, I expect to have acquired the necessary experience to become a valuable asset to the company.
35 .
What are DXC CLEAR values?
DXC's clear values define the core values of the organization.

C - Client Focused

L - Leadership

E - Execution

A - Aspiration

R - Results

DXC Technology MCQ :

1 .
A 2% error in excess is found while measuring the side of a square. So, find the percentage of error in the calculated area of the square.
A)
1.03%
B)
2.30%
C)
3%
D)
4.04%

Correct Answer :   4.04%


Explanation : Percentage error in the calculated area = (2+ 2+ (2×2/100))% = 4.04%

2 .
After rolling twice a dice, what will be the probability of getting a sum equals to 9?
A)
1/3
B)
1/5
C)
1/9
D)
2/5

Correct Answer :   1/9


Explanation : Total number of possible outcomes of rolling a dice = 6
So, Total number of possible outcomes after rolling twice a dice, n(S) = 36
E = Getting sum of nine when two dice fall= { (3,6), (4,5), (5,4), (6,3) }
Hence, n(E) = 4
P(E)= n(E)/n(S)= 4/36 = 1/9

3 .
Shyam will complete work in 20 days. If Ram is 25% more efficient than Shyam, then how many days he will take to complete the work?
A)
14
B)
16
C)
18
D)
20

Correct Answer :   16


Explanation : Work done by Shyam in one day = 1/20
Work done by Ram in one day = (1/20) × (125/100) = 5/80 = 1/16
So, Ram can complete the work in 16 days.

4 .
Manish is aged three times more than his son Suresh. After eight years, he would be two and a half time of Suresh's age. After further eight years, how many times would he be of Suresh's age?
A)
2 times
B)
3 times
C)
4 times
D)
5 times

Correct Answer :   2 times


Explanation : Suppose that Suresh's present age= x
Then, Manish's present age =3x + x= 4x
After eight years, Manish's age= (2 + ½ ) times of Suresh's age
=> ( 4x + 8) = ( 2 + ½ ) ( x + 8)
=> 4x + 8 = 5/2 ( x + 8)
=> 8x + 16 = 5x + 40
=> 3x = 40 ? 16 =24
=> x = 24 / 3 = 8
After further eight years,
Suresh's age = x + 8+ 8= 8+ 8+ 8= 24
Manish's age = 4x+ 8+ 8= 4×8+ 8+ 8= 48
Manish's age/ Suresh's age = 48/24 = 2

5 .
The Compound Interest on Rs. 30,000 at 7% per annum is Rs. 4347. The period(in years) is :
A)
1
B)
2
C)
3
D)
3.5

Correct Answer :   2


Explanation : Let the period be n years
Then amount after n years= Rs.(30000+ 4347)= 34347
P(1+ R/100)^T = 34347
30000(1+ 7/100)^n = 34347
30000(107/100)^n = 34347
(107/100)^n = 34347/30000= 11449/10000= (107/100)^2
n = 2 years

6 .
Anu is Babita's sister. Geeta is Babita's mother. Deepak is Geeta's father. Ekta is Deepak's mother. Then, how is Anu related to Deepak?
A)
Daughter
B)
Grandfather
C)
Grandfather
D)
Granddaughter

Correct Answer :   Granddaughter


Explanation : Anu is the sister of Babita and Babita is the daughter of Geeta. So Anu is the daughter of Geeta. Also, Deepak is the father of Geeta. So, Anu is the granddaughter of Deepak.

7 .
Corpulent is same as:
A)
Lean
B)
Gaunt
C)
Obese
D)
Emaciated

Correct Answer :   Obese

8 .
Which one is the simplest file structure?
A)
Random
B)
Indexed
C)
Sequential
D)
None of the above

Correct Answer :   Sequential

9 .
If CANDLE is coded as EDRIRL, how can FRIEND be written in that code?
A)
HUMJTK
B)
ESJFME
C)
DEQJQM
D)
DCQHQK

Correct Answer :   HUMJTK


Explanation : See the code, the first letter is the second alphabet, the second letter is the third alphabet, the third letter is the fourth alphabet and so on after the corresponding letter in the word.

10 .
Find the odd one out :
A)
Tone
B)
EAR
C)
Echo
D)
Resonance

Correct Answer :   EAR