TCS
20+ Wipro Interview Questions and Answers
Q1. What programming language you know , and can code in ?
I am proficient in Python and can code in Java and C++.
Proficient in Python, can code in Java and C++
Experience in developing web applications using Flask and Django frameworks
Familiarity with data analysis libraries like Pandas and Numpy
Experience in developing GUI applications using PyQt and Tkinter
Knowledge of version control systems like Git and SVN
Q2. What Oops concepts polymorphism and encapsulation mean , differentiate them
Polymorphism and encapsulation are two important OOP concepts. Polymorphism allows objects to take on multiple forms, while encapsulation ensures data security.
Polymorphism allows objects to be treated as if they are of different types, depending on the context in which they are used.
Encapsulation is the practice of hiding data and methods within a class, so that they cannot be accessed or modified from outside the class.
Polymorphism and encapsulation work together to create ...read more
Q3. WHAT ARE DIFFERENCES AND SIMILARITY BETWEEN C AND C++?
C is a procedural language while C++ is an object-oriented language. C++ is an extension of C.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance than C.
C++ has a standard template library (STL) which provides a collection of classes and functions for common programming tasks.
C++ is more complex than C and requires more knowledge of object-oriented programming concepts.
Both languages are compiled languages and have similar...read more
Q4. Define oops concept , print an array in reverse order, what is os?
Oops concept is a programming paradigm that focuses on objects and their interactions. Printing an array in reverse order involves iterating through the array and printing each element in reverse order. OS stands for Operating System.
Oops concept involves encapsulation, inheritance, and polymorphism.
To print an array in reverse order, start from the last element and iterate backwards.
Operating System is a software that manages computer hardware and software resources.
Example:...read more
Q5. WHAT ARE FOUR BASIC PRINCIPLES OF OOPS?
Four basic principles of OOPS are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling of data and methods that manipulate the data within a single unit
Inheritance: ability of a class to inherit properties and characteristics from a parent class
Polymorphism: ability of objects to take on multiple forms or have multiple behaviors
Abstraction: hiding of complex implementation details and providing a simpler interface for the user
Q6. What is logical volume , group and physical volume
Logical volume, group, and physical volume are components of logical volume management used in storage systems.
Logical volume: A virtual storage device created by combining multiple physical volumes.
Volume group: A collection of physical volumes grouped together to form a pool of storage.
Physical volume: A physical storage device such as a hard drive or SSD that is part of a volume group.
Example: In Linux, Logical Volume Management (LVM) is used to manage logical volumes, vol...read more
Q7. What is lvm and how to redize it
LVM (Logical Volume Manager) is a tool used to manage disk space by creating logical volumes from physical volumes.
LVM allows for dynamic resizing of logical volumes without the need to unmount the filesystem
To resize an LVM volume, first resize the filesystem within the volume, then resize the logical volume itself
Use commands like lvextend and resize2fs to resize LVM volumes
Q8. Explain BGP, OSPF, DMZ , OSI, VLAN,VTP, Monitoring tool
BGP, OSPF, DMZ, OSI, VLAN, VTP, and Monitoring tools are key networking concepts and tools used in system administration.
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.
OSPF (Open Shortest Path First) is a link-state routing protocol used to determine the best path for data packets in a network.
DMZ (Demilitarized Zone) is a network segment that separates an internal network from an external ne...read more
Q9. WHAT IS POLYMORPHISM?
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It is achieved through method overloading and method overriding.
Example: A shape class can have different subclasses like circle, square, triangle, etc. and all can be treated as shapes.
Polymorphism helps in achieving code reusability and flexibility.
Q10. Group policy , How to implement them
Group policies are implemented through Active Directory to manage user and computer settings in a network environment.
Create a new Group Policy Object (GPO) in Active Directory
Link the GPO to the appropriate Organizational Unit (OU)
Configure the settings within the GPO using Group Policy Management Console (GPMC)
Apply the GPO to the desired users or computers
Use Group Policy Preferences to deploy settings like mapped drivers, printers, etc.
Q11. What isfile oernission and scrip
File permissions determine who can access, modify, or execute files on a system. Scripts are executable files containing a series of commands.
File permissions control access to files and directories on a system
There are three types of permissions: read, write, and execute
Permissions are set for three categories of users: owner, group, and others
Scripts are executable files that contain a series of commands to be executed by the system
Scripts can automate tasks or perform spec...read more
Q12. What are various types of RC in TR
Various types of RC in TR include Remote Control, Release Candidate, and Root Cause.
Remote Control: Refers to controlling a device or system from a distance.
Release Candidate: A version of software that is ready for testing before final release.
Root Cause: The underlying cause of a problem or issue.
Q13. Different Linux Commands and their use cases
Various Linux commands and their use cases
ls - list directory contents
cd - change directory
pwd - print working directory
cp - copy files and directories
mv - move or rename files and directories
rm - remove files and directories
grep - search for patterns in files
chmod - change file permissions
ps - display information about running processes
top - display and update sorted information about processes
df - report file system disk space usage
tar - manipulate archive files
ssh - secure...read more
Q14. What is lnode, filesystem
lnode is a data structure representing a file or directory in a filesystem.
lnode contains metadata about the file or directory, such as permissions, owner, size, and timestamps.
Filesystems organize and manage data on storage devices, providing a way to store, retrieve, and manage files.
Examples of filesystems include ext4, NTFS, and FAT32.
Q15. What is network bonding
Network bonding is the process of combining multiple network interfaces together to increase bandwidth and provide redundancy.
Network bonding is also known as link aggregation or port trunking.
It can be used to increase network throughput by combining the bandwidth of multiple interfaces.
Provides fault tolerance by ensuring network connectivity even if one interface fails.
Common bonding modes include active-backup, balance-rr, balance-xor, and 802.3ad.
Examples of network bond...read more
Q16. What do you mean by VPN
VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.
VPN creates a secure and encrypted connection between the user's device and the private network
It helps in protecting sensitive data from unauthorized access
VPN can be used to access resources remotely, bypass geo-restrictions, and enhance privacy online
Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost
Q17. What is the port number of udp
The port number of UDP is 17.
UDP uses port number 17 for communication.
UDP is a connectionless protocol, so it does not require a specific port number for each connection.
Port number 17 is commonly used for the Daytime Protocol.
UDP port numbers range from 0 to 65535.
Q18. explain concepts you know in python
Python concepts include data types, loops, functions, classes, and libraries.
Data types: int, float, str, list, tuple, dict, set
Loops: for loop, while loop
Functions: defining functions, passing arguments, returning values
Classes: creating classes, defining methods, inheritance
Libraries: importing and using libraries like math, os, and datetime
Q19. What is https and http
HTTP is a protocol used for transferring data over the internet, while HTTPS is a secure version of HTTP that encrypts data.
HTTP stands for Hypertext Transfer Protocol and is used for transmitting data over the internet
HTTPS is a secure version of HTTP that uses encryption to protect data
HTTPS is commonly used for secure transactions such as online banking or shopping
HTTP operates on port 80, while HTTPS operates on port 443
Q20. Describe about linux, Windows?
Linux and Windows are two popular operating systems used in computers.
Linux is open-source and free while Windows is proprietary and paid.
Linux is known for its stability, security, and flexibility while Windows is known for its user-friendliness and compatibility with most software.
Linux uses a command-line interface (CLI) while Windows uses a graphical user interface (GUI).
Linux is commonly used in servers and supercomputers while Windows is commonly used in personal comput...read more
More about working at TCS
Interview Process at Wipro
Top System Administrator Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month