Add office photos
Engaged Employer

TCS

3.7
based on 89.7k Reviews
Video summary
Filter interviews by

20+ Wipro Interview Questions and Answers

Updated 25 Nov 2024
Popular Designations

Q1. What programming language you know , and can code in ?

Ans.

I am proficient in Python and can code in Java and C++.

  • Proficient in Python, can code in Java and C++

  • Experience in developing web applications using Flask and Django frameworks

  • Familiarity with data analysis libraries like Pandas and Numpy

  • Experience in developing GUI applications using PyQt and Tkinter

  • Knowledge of version control systems like Git and SVN

Add your answer

Q2. What Oops concepts polymorphism and encapsulation mean , differentiate them

Ans.

Polymorphism and encapsulation are two important OOP concepts. Polymorphism allows objects to take on multiple forms, while encapsulation ensures data security.

  • Polymorphism allows objects to be treated as if they are of different types, depending on the context in which they are used.

  • Encapsulation is the practice of hiding data and methods within a class, so that they cannot be accessed or modified from outside the class.

  • Polymorphism and encapsulation work together to create ...read more

Add your answer

Q3. WHAT ARE DIFFERENCES AND SIMILARITY BETWEEN C AND C++?

Ans.

C is a procedural language while C++ is an object-oriented language. C++ is an extension of C.

  • C++ supports classes and objects while C does not.

  • C++ has better support for polymorphism and inheritance than C.

  • C++ has a standard template library (STL) which provides a collection of classes and functions for common programming tasks.

  • C++ is more complex than C and requires more knowledge of object-oriented programming concepts.

  • Both languages are compiled languages and have similar...read more

Add your answer

Q4. Define oops concept , print an array in reverse order, what is os?

Ans.

Oops concept is a programming paradigm that focuses on objects and their interactions. Printing an array in reverse order involves iterating through the array and printing each element in reverse order. OS stands for Operating System.

  • Oops concept involves encapsulation, inheritance, and polymorphism.

  • To print an array in reverse order, start from the last element and iterate backwards.

  • Operating System is a software that manages computer hardware and software resources.

  • Example:...read more

Add your answer
Discover Wipro interview dos and don'ts from real experiences

Q5. WHAT ARE FOUR BASIC PRINCIPLES OF OOPS?

Ans.

Four basic principles of OOPS are encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: bundling of data and methods that manipulate the data within a single unit

  • Inheritance: ability of a class to inherit properties and characteristics from a parent class

  • Polymorphism: ability of objects to take on multiple forms or have multiple behaviors

  • Abstraction: hiding of complex implementation details and providing a simpler interface for the user

View 1 answer

Q6. What is logical volume , group and physical volume

Ans.

Logical volume, group, and physical volume are components of logical volume management used in storage systems.

  • Logical volume: A virtual storage device created by combining multiple physical volumes.

  • Volume group: A collection of physical volumes grouped together to form a pool of storage.

  • Physical volume: A physical storage device such as a hard drive or SSD that is part of a volume group.

  • Example: In Linux, Logical Volume Management (LVM) is used to manage logical volumes, vol...read more

Add your answer
Are these interview questions helpful?

Q7. What is lvm and how to redize it

Ans.

LVM (Logical Volume Manager) is a tool used to manage disk space by creating logical volumes from physical volumes.

  • LVM allows for dynamic resizing of logical volumes without the need to unmount the filesystem

  • To resize an LVM volume, first resize the filesystem within the volume, then resize the logical volume itself

  • Use commands like lvextend and resize2fs to resize LVM volumes

Add your answer

Q8. Explain BGP, OSPF, DMZ , OSI, VLAN,VTP, Monitoring tool

Ans.

BGP, OSPF, DMZ, OSI, VLAN, VTP, and Monitoring tools are key networking concepts and tools used in system administration.

  • BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.

  • OSPF (Open Shortest Path First) is a link-state routing protocol used to determine the best path for data packets in a network.

  • DMZ (Demilitarized Zone) is a network segment that separates an internal network from an external ne...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. WHAT IS POLYMORPHISM?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • It is achieved through method overloading and method overriding.

  • Example: A shape class can have different subclasses like circle, square, triangle, etc. and all can be treated as shapes.

  • Polymorphism helps in achieving code reusability and flexibility.

View 1 answer

Q10. Group policy , How to implement them

Ans.

Group policies are implemented through Active Directory to manage user and computer settings in a network environment.

  • Create a new Group Policy Object (GPO) in Active Directory

  • Link the GPO to the appropriate Organizational Unit (OU)

  • Configure the settings within the GPO using Group Policy Management Console (GPMC)

  • Apply the GPO to the desired users or computers

  • Use Group Policy Preferences to deploy settings like mapped drivers, printers, etc.

Add your answer

Q11. What isfile oernission and scrip

Ans.

File permissions determine who can access, modify, or execute files on a system. Scripts are executable files containing a series of commands.

  • File permissions control access to files and directories on a system

  • There are three types of permissions: read, write, and execute

  • Permissions are set for three categories of users: owner, group, and others

  • Scripts are executable files that contain a series of commands to be executed by the system

  • Scripts can automate tasks or perform spec...read more

Add your answer

Q12. What are various types of RC in TR

Ans.

Various types of RC in TR include Remote Control, Release Candidate, and Root Cause.

  • Remote Control: Refers to controlling a device or system from a distance.

  • Release Candidate: A version of software that is ready for testing before final release.

  • Root Cause: The underlying cause of a problem or issue.

Add your answer

Q13. Different Linux Commands and their use cases

Ans.

Various Linux commands and their use cases

  • ls - list directory contents

  • cd - change directory

  • pwd - print working directory

  • cp - copy files and directories

  • mv - move or rename files and directories

  • rm - remove files and directories

  • grep - search for patterns in files

  • chmod - change file permissions

  • ps - display information about running processes

  • top - display and update sorted information about processes

  • df - report file system disk space usage

  • tar - manipulate archive files

  • ssh - secure...read more

Add your answer

Q14. What is lnode, filesystem

Ans.

lnode is a data structure representing a file or directory in a filesystem.

  • lnode contains metadata about the file or directory, such as permissions, owner, size, and timestamps.

  • Filesystems organize and manage data on storage devices, providing a way to store, retrieve, and manage files.

  • Examples of filesystems include ext4, NTFS, and FAT32.

Add your answer

Q15. What is network bonding

Ans.

Network bonding is the process of combining multiple network interfaces together to increase bandwidth and provide redundancy.

  • Network bonding is also known as link aggregation or port trunking.

  • It can be used to increase network throughput by combining the bandwidth of multiple interfaces.

  • Provides fault tolerance by ensuring network connectivity even if one interface fails.

  • Common bonding modes include active-backup, balance-rr, balance-xor, and 802.3ad.

  • Examples of network bond...read more

Add your answer

Q16. What do you mean by VPN

Ans.

VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.

  • VPN creates a secure and encrypted connection between the user's device and the private network

  • It helps in protecting sensitive data from unauthorized access

  • VPN can be used to access resources remotely, bypass geo-restrictions, and enhance privacy online

  • Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost

Add your answer

Q17. What is the port number of udp

Ans.

The port number of UDP is 17.

  • UDP uses port number 17 for communication.

  • UDP is a connectionless protocol, so it does not require a specific port number for each connection.

  • Port number 17 is commonly used for the Daytime Protocol.

  • UDP port numbers range from 0 to 65535.

Add your answer

Q18. explain concepts you know in python

Ans.

Python concepts include data types, loops, functions, classes, and libraries.

  • Data types: int, float, str, list, tuple, dict, set

  • Loops: for loop, while loop

  • Functions: defining functions, passing arguments, returning values

  • Classes: creating classes, defining methods, inheritance

  • Libraries: importing and using libraries like math, os, and datetime

Add your answer

Q19. What is https and http

Ans.

HTTP is a protocol used for transferring data over the internet, while HTTPS is a secure version of HTTP that encrypts data.

  • HTTP stands for Hypertext Transfer Protocol and is used for transmitting data over the internet

  • HTTPS is a secure version of HTTP that uses encryption to protect data

  • HTTPS is commonly used for secure transactions such as online banking or shopping

  • HTTP operates on port 80, while HTTPS operates on port 443

Add your answer

Q20. Describe about linux, Windows?

Ans.

Linux and Windows are two popular operating systems used in computers.

  • Linux is open-source and free while Windows is proprietary and paid.

  • Linux is known for its stability, security, and flexibility while Windows is known for its user-friendliness and compatibility with most software.

  • Linux uses a command-line interface (CLI) while Windows uses a graphical user interface (GUI).

  • Linux is commonly used in servers and supercomputers while Windows is commonly used in personal comput...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Wipro

based on 37 interviews
3 Interview rounds
Resume Shortlist Round
Technical Round
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top System Administrator Interview Questions from Similar Companies

3.7
 • 53 Interview Questions
3.0
 • 17 Interview Questions
4.4
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter