Add office photos
Engaged Employer

Wipro

3.7
based on 52.2k Reviews
Video summary
Filter interviews by

2500+ Fisage Solutions Interview Questions and Answers

Updated 11 Feb 2025
Popular Designations

Q1. Triangle Star Pattern Task

Your task is to print a triangle pattern using stars (*) for a given integer N, which represents the number of rows.

Input:

Integer N (Total number of rows)

Output:

The triangle patte...read more
View 10 more answers

Q2. Encode The String Problem Statement

Given a string S of length N, encode it using the specified rules related to vowels and consonants.

Explanation:

Follow these encoding rules:

  1. If the character is a vowel, ch...read more
View 2 more answers

Q3. Knapsack Problem Statement

There is a potter with a limited amount of pottery clay (denoted as 'K' units) who can make 'N' different items. Each item requires a specific amount of clay and yields a certain prof...read more

Add your answer

Q4. Minimum Operations to Make Strings Equal

Given two strings, A and B, consisting of lowercase English letters, determine the minimum number of pre-processing moves required to make string A equal to string B usi...read more

View 3 more answers
Discover Fisage Solutions interview dos and don'ts from real experiences

Q5. Linear Search Problem Statement

Given a random integer array/list ARR of size N, and an integer X, you are required to search for the integer X in the given array/list using Linear Search.

Return the index at w...read more

Add your answer

Q6. Sum of Two Numbers Represented as Arrays

Given two numbers in the form of two arrays where each element of the array represents a digit, calculate the sum of these two numbers and return this sum as an array.

E...read more

Add your answer
Are these interview questions helpful?

Q7. Reverse Array Elements

Given an array containing 'N' elements, the task is to reverse the order of all array elements and display the reversed array.

Explanation:

The elements of the given array need to be rear...read more

View 7 more answers

Q8. K-th Permutation Sequence Problem Statement

Given two integers N and K, your task is to find the K-th permutation sequence of numbers from 1 to N. The K-th permutation is the K-th permutation in the set of all ...read more

View 4 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. Chocolate Distribution Problem

You are given an array/list CHOCOLATES of size 'N', where each element represents the number of chocolates in a packet. Your task is to distribute these chocolates among 'M' stude...read more

View 2 more answers

Q10. Ninja and Substrings Problem Statement

Ninja has to determine all the distinct substrings of size two that can be formed from a given string 'STR' comprising only lowercase alphabetic characters. These substrin...read more

View 2 more answers

Q11. Shopping Options Problem Statement

Given arrays representing the costs of pants, shirts, shoes, and skirts, and a budget amount 'X', determine the total number of valid combinations that can be purchased such t...read more

Add your answer

Q12. Count Number of Subsequences Problem Statement

Given an array of non-negative integers A and an integer P, determine the total number of subsequences of A such that the product of any subsequence does not excee...read more

Add your answer

Q13. Merge Sort Problem Statement

You are given a sequence of numbers, ARR. Your task is to return a sorted sequence of ARR in non-descending order using the Merge Sort algorithm.

Explanation:

The Merge Sort algorit...read more

Add your answer

Q14. Minimum Operations Problem Statement

You are given an array 'ARR' of size 'N' consisting of positive integers. Your task is to determine the minimum number of operations required to make all elements in the arr...read more

Ans.

The minimum number of operations needed to make all elements of the array equal by performing addition, multiplication, subtraction, or division on any element.

  • Iterate through the array and find the maximum and minimum values

  • Calculate the difference between the maximum and minimum values

  • Check if the difference is divisible by the length of the array

  • If divisible, return the difference divided by the length

  • If not divisible, return the difference divided by the length plus one

Add your answer

Q15. Minimum Cost to Buy Oranges Problem Statement

You are given a bag of capacity 'W' kg and a list 'cost' of costs for packets of oranges with different weights. Each element at the i-th position in the list indic...read more

Add your answer

Q16. Mindbending Product Problem Statement

You are given an array ARR of size N. Your task is to create a Product Array P of the same size such that P[i] is the product of all the elements in ARR except ARR[i]. Note...read more

Add your answer

Q17. Difference between compiler and interpreter. Why do you apply to IT, from your respective branch?

Ans.

Compiler translates entire code into machine language while interpreter translates line by line.

  • Compiler generates an executable file while interpreter does not.

  • Compiler takes more time to analyze and translate the code while interpreter takes less time.

  • Compiler produces faster and efficient code while interpreter produces slower code.

  • Examples of compilers are GCC, Clang, and Visual C++ while examples of interpreters are Python, Ruby, and JavaScript.

View 5 more answers

Q18. 2. What is Cloud Technology. What is Microsoft Intune. If we can manage applications using MAM then why do we need MDM?

Ans.

Cloud technology is the delivery of computing services over the internet. Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) solution.

  • Cloud technology allows users to access data and applications from anywhere with an internet connection.

  • Microsoft Intune is a cloud-based solution that allows organizations to manage mobile devices and applications.

  • MAM allows organizations to manage and secure applications and data on mobile...read more

View 7 more answers

Q19. Bubble Sort Problem Statement

Sort an unsorted array of non-negative integers using the Bubble Sort algorithm, which swaps adjacent elements if they are not in the correct order to sort the array in non-decreas...read more

View 2 more answers

Q20. Hatori's Parade Student Selection

Hatori, the class teacher, has 'N' students and aims to select the maximum number of students for the Republic Day parade. The condition for selection is that the absolute diff...read more

Add your answer

Q21. Palindromic Substrings Problem Statement

Given a string STR, your task is to find the total number of palindromic substrings of STR.

Example:

Input:
STR = "abbc"
Output:
5
Explanation:

The palindromic substring...read more

Add your answer

Q22. Prime Numbers Retrieval Task

You are provided with a positive integer 'N'. Your objective is to identify and return all prime numbers that are less than or equal to 'N'.

Example:

Input:
T = 1
N = 10
Output:
2, 3...read more
Add your answer

Q23. Binary to Decimal Conversion Challenge

Transform a given binary number 'N', represented as an integer, into its equivalent decimal format and display the result.

Input:

An integer N in the Binary Format

Output:...read more

Add your answer

Q24. Star Pattern Problem Statement

The task is to print a star pattern as described.

Example:

Input:
T = 1 
N = 4
Output:
 *
**
***
****
Explanation:

The dots in the figure represent spaces. For N = 4, the pattern co...read more

Add your answer

Q25. Star Pattern Generation

Develop a function to print star patterns based on the given number of rows 'N'. Each row in the pattern should follow the format demonstrated in the example.

The picture illustrates an ...read more

Add your answer

Q26. What’s your experience with content management systems/design software/web publishing software?

Ans.

I have extensive experience with various content management systems and design software.

  • Proficient in Adobe Creative Suite, including Photoshop, Illustrator, and InDesign

  • Experience with WordPress, Drupal, and Joomla CMS platforms

  • Familiarity with HTML, CSS, and JavaScript

  • Ability to create and manage content for websites and social media platforms

  • Experience with user experience (UX) design and testing

View 10 more answers

Q27. Determine Pythagoras' Position for Parallelogram Formation

Euclid, Pythagoras, Pascal, and Monte decide to gather in a park. Initially, Pascal, Monte, and Euclid choose three different spots. Pythagoras, arrivi...read more

Add your answer

Q28. Maximal AND Subsequences Problem

Given an array consisting of N integers, your task is to determine how many k-element subsequences of the given array exist where the bitwise AND of the subsequence's elements i...read more

Ans.

The task is to find the maximal AND value and the number of subsequences having this maximal AND value.

  • Iterate through all possible k-element subsequences of the given array

  • Calculate the bitwise AND of each subsequence

  • Track the maximal AND value and the count of subsequences with this value

  • Return the maximal AND value and the count modulo 1000000007

Add your answer

Q29. What automation framework have you worked on?

Ans.

I have worked on multiple automation frameworks including Selenium, Appium, and TestNG.

  • I have experience in creating and maintaining automated test scripts using Selenium WebDriver for web applications.

  • I have also worked with Appium for mobile automation testing.

  • TestNG has been my preferred choice for test management and reporting.

  • I have also integrated automation scripts with CI/CD pipelines using tools like Jenkins.

  • I have experience in creating custom frameworks using Java ...read more

View 6 more answers

Q30. 1. OOPs concept 2. Difference between Encapsulation and Abstraction? 3. What is an array? How it's different from Array list? 4. Explain about the data structures you have used? 5. What is foreign key?

Ans.

Interview questions for Project Engineer position

  • OOPs concept includes inheritance, polymorphism, encapsulation, and abstraction

  • Encapsulation is hiding the implementation details while abstraction is hiding unnecessary details

  • Array is a collection of similar data types while ArrayList is a dynamic array that can grow or shrink

  • Data structures used may include linked lists, stacks, queues, and trees

  • Foreign key is a column in a table that refers to the primary key of another tab...read more

Add your answer

Q31. Time to Burn Tree Problem

You are given a binary tree consisting of 'N' unique nodes and a start node where the burning will commence. The task is to calculate the time in minutes required to completely burn th...read more

Add your answer

Q32. Longest Common Subsequence Problem Statement

Given two Strings STR1 and STR2, determine the length of their longest common subsequence.

A subsequence is a sequence derived from another sequence by deleting some...read more

Add your answer

Q33. Segregate Odd-Even Problem Statement

In a wedding ceremony at NinjaLand, attendees are blindfolded. People from the bride’s side hold odd numbers, while people from the groom’s side hold even numbers. For the g...read more

Add your answer

Q34. Why did you choose this programming language over other programming languages?

Ans.

I chose this programming language because of its versatility and popularity in the industry.

  • The language has a wide range of applications and can be used for various purposes.

  • It has a large community of developers who contribute to its development and provide support.

  • The language is constantly evolving and adapting to new technologies and trends.

  • Examples of its popularity and versatility can be seen in its use in web development, data analysis, and machine learning.

View 1 answer

Q35. Which is the most comfortable Windows OS for you to work on? ...What is the use of DHCP? ...What is the basic use of DNS at workstations? ...What do you understand by a Default Gateway? ...How can we track the...

read more
Ans.

The most comfortable Windows OS for me to work on is Windows 10.

  • Windows 10 is user-friendly and has a familiar interface.

  • It offers improved security features compared to previous versions.

  • Windows 10 provides regular updates and compatibility with modern software.

  • It has a wide range of hardware and software support.

  • Windows 10 includes useful features like Cortana and virtual desktops.

View 1 answer

Q36. Count Subsequences Problem Statement

Given an integer array ARR of size N, your task is to find the total number of subsequences in which all elements are equal.

Explanation:

A subsequence of an array is derive...read more

Add your answer

Q37. Count Equal Elements Subsequences

Given an integer array/list ARR of size N, your task is to compute the total number of subsequences where all elements are equal.

Explanation:

A subsequence of a given array is...read more

Add your answer

Q38. What's IP address and why is it required?

Ans.

An IP address is a unique numerical identifier assigned to devices connected to a network to enable communication.

  • IP stands for Internet Protocol

  • It is required for devices to communicate with each other over a network

  • It consists of a series of numbers separated by dots

  • There are two types of IP addresses - IPv4 and IPv6

  • Examples of IP addresses are 192.168.0.1 and 2001:0db8:85a3:0000:0000:8a2e:0370:7334

View 30 more answers

Q39. What is Stp and how it is work? What is root bridge

Ans.

STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks. It elects a root bridge to manage the network.

  • STP is a network protocol used to prevent loops in Ethernet networks.

  • It works by creating a loop-free logical topology by blocking redundant paths.

  • STP elects a root bridge, which becomes the central point of the network.

  • The root bridge is the bridge with the lowest bridge ID.

  • STP uses Bridge Protocol Data Units (BPDUs) to exchange informati...read more

View 4 more answers

Q40. Check Duplicate Within K Distance

Given an array of integers arr of size N and an integer K, determine if there are any duplicate elements within a distance of K from each other in the array. Return "true" if s...read more

Add your answer

Q41. Merge Sort Algorithm Problem Statement

Your task is to sort a sequence of numbers stored in the array ‘ARR’ in non-descending order using the Merge Sort algorithm.

Explanation:

Merge Sort is a divide-and-conque...read more

Add your answer

Q42. What is constarints, what is commit command in sql, write syntax of join operation and one programming question write a code for reverse an array

Ans.

Answering technical interview questions on SQL and programming

  • Constraints are rules applied to columns in a database table to ensure data integrity

  • COMMIT command is used to save changes made to a database

  • JOIN operation is used to combine rows from two or more tables based on a related column

  • Code for reversing an array: reverseArray(arr) {return arr.reverse();}

Add your answer

Q43. How do you capture a client’s voice?

Ans.

Capturing a client's voice involves active listening, empathy, and understanding their needs and preferences.

  • Listen actively to their feedback and concerns

  • Ask open-ended questions to encourage them to share their thoughts

  • Empathize with their perspective and show that you understand their needs

  • Use their language and tone in your communication

  • Take note of their preferences and incorporate them into your strategy

  • Collect data through surveys, focus groups, and social media monito...read more

View 16 more answers

Q44. Merge Two Sorted Arrays Problem Statement

Given two sorted integer arrays ARR1 and ARR2 of size M and N, respectively, merge them into ARR1 as one sorted array. Assume that ARR1 has a size of M + N to hold all ...read more

Add your answer

Q45. Maximum Difference Problem Statement

Given an array ARR of N elements, your task is to find the maximum difference between any two elements in ARR.

If the maximum difference is even, print EVEN; if it is odd, p...read more

Add your answer

Q46. Count Diagonal Paths

You are given a binary tree. Your task is to return the count of the diagonal paths to the leaf of the given binary tree such that all the values of the nodes on the diagonal are equal.

Inp...read more

Add your answer

Q47. Balanced Parentheses Combinations

Given an integer N representing the number of pairs of parentheses, find all the possible combinations of balanced parentheses using the given number of pairs.

Explanation:

Con...read more

Add your answer

Q48. Reverse Only Letters Problem Statement

You are given a string S. The task is to reverse the letters of the string while keeping non-alphabet characters in their original position.

Example:

Input:
S = "a-bcd"
Ou...read more
Add your answer

Q49. Ninja and Alien Language Order Problem

An alien dropped its dictionary while visiting Earth. The Ninja wants to determine the order of characters used in the alien language, based on the given list of words fro...read more

Add your answer

Q50. Kth Largest Element Problem Statement

Ninja enjoys working with numbers, and Alice challenges him to find the Kth largest value from a given list of numbers.

Input:

The first line contains an integer 'T', repre...read more
Add your answer

Q51. Remove Leaf Nodes from a Tree

In this problem, you are tasked to remove all the leaf nodes from a given generic tree. A leaf node is defined as a node that does not have any children.

Note:

The root itself can ...read more

Add your answer

Q52. XOR Pair Grouping Problem

You are given an array A of size N. Determine whether the array can be split into groups of pairs such that the XOR of each pair equals 0. Return true if it is possible, otherwise retu...read more

Add your answer

Q53. Nth Term of Geometric Progression Problem

Given the first term A, the common ratio R, and an integer N, your task is to find the Nth term of a geometric progression (GP) series.

Explanation:

The general form of...read more

Add your answer

Q54. How to calculate timing of Incident which assigned to multiple group

Ans.

To calculate the timing of an incident assigned to multiple groups, determine the start and end times for each group and calculate the total duration.

  • Identify the groups to which the incident is assigned

  • Determine the start time and end time for each group's involvement

  • Calculate the duration for each group

  • Sum up the durations to get the total timing of the incident

View 2 more answers

Q55. Write a program to remove duplicate character in a string if there are multiple users in an application, and if the buttons in the applications are specific to particular user, you need to perform operation in...

read more
Ans.

Questions related to Selenium Automation and software testing

  • To remove duplicate characters in a string, use a loop and a hashset

  • To perform operations on specific buttons for a user, use conditional statements

  • To switch to a particular tab, use the window handle

  • 500 error code in Postman validation indicates a bad request

  • Primary key is a unique identifier for a record in a database

  • Roles and responsibilities in a project depend on the project and team

Add your answer

Q56. How do you prioritize projects?

Ans.

Prioritizing projects involves assessing their importance, urgency, and impact on business goals.

  • Identify the goals and objectives of the company

  • Assess the importance and urgency of each project

  • Consider the impact of each project on business goals

  • Allocate resources based on priority

  • Regularly review and adjust priorities as needed

View 12 more answers

Q57. 7.A user has received a zip file in Outlook, which is a managed app. Will the user be able to open that zip file?

Ans.

It depends on the app's settings and the user's permissions.

  • If the managed app allows opening zip files and the user has permission to do so, then they can open it.

  • If the app does not allow opening zip files or the user does not have permission, then they cannot open it.

  • The user should check with their IT department or the app's documentation to determine if zip files are allowed.

  • If the zip file contains a potentially harmful file type, the app may block it from being opened.

View 2 more answers

Q58. 1 introduction 2 what is the features of Java 3 what are the differences between C++ and Java 4 OOP concepts including oops pullers 5 why Java is not 100% object oriented programming 6 why Java is platform inde...

read more
Add your answer

Q59. What are the different kinds of inheritance?

Ans.

There are 5 types of inheritance in object-oriented programming.

  • Single inheritance: a subclass inherits from a single superclass.

  • Multiple inheritance: a subclass inherits from multiple superclasses.

  • Multilevel inheritance: a subclass inherits from a superclass, which in turn inherits from another superclass.

  • Hierarchical Inheritance: multiple subclasses inherit from a single superclass.

  • Hybrid inheritance: a combination of multiple and multilevel inheritance.

View 1 answer

Q60. String Palindrome Verification

Given a string, your task is to determine if it is a palindrome considering only alphanumeric characters.

Input:

The input is a single string without any leading or trailing space...read more
Add your answer

Q61. How many Google maping .. types are there ..

Ans.

There are several types of Google mapping, including Google Maps, Google Earth, and Google Street View.

  • Google Maps is a web-based mapping service that provides directions, traffic information, and satellite imagery.

  • Google Earth is a virtual globe that allows users to explore the Earth's surface using satellite imagery and aerial photography.

  • Google Street View provides panoramic views of streets and locations using 360-degree street-level imagery.

  • Other types of Google mapping ...read more

View 3 more answers

Q62. how you will print even number of elements in an array.

Ans.

Loop through the array and print only even indexed elements.

  • Use a for loop to iterate through the array.

  • Use the modulus operator to check if the index is even.

  • Print the element if the index is even.

Add your answer

Q63. What is main difference between recursion and dynamic programming and which is better in terms of time complexity?

Ans.

Recursion is a technique of solving a problem by breaking it down into smaller subproblems. Dynamic programming is a method of solving a problem by breaking it down into smaller subproblems and storing the solutions to those subproblems to avoid redundant calculations.

  • Recursion involves solving a problem by breaking it down into smaller subproblems and calling the function recursively until the base case is reached.

  • Dynamic programming involves solving a problem by breaking it...read more

Add your answer

Q64. How to rectify data recovery, dual monitor connection

Ans.

To rectify data recovery, dual monitor connection, check cables, update drivers, and use data recovery software.

  • Check cables and connections for dual monitor setup

  • Update drivers for graphics card and monitor

  • Use data recovery software to recover lost data

  • Ensure proper backup procedures are in place to prevent data loss

View 3 more answers

Q65. The ages of Raj and Sakshi are in the ratio of 8:7 and on adding their ages we get 60. Determine the ratio of their ages after 6 years.

Ans.

Ratio of ages of Raj and Sakshi is 8:7 and their sum is 60. Find their ratio after 6 years.

  • Let the ages of Raj and Sakshi be 8x and 7x respectively

  • Their sum is 60, so 15x = 60

  • Hence, x = 4

  • After 6 years, Raj's age will be 8x+6 and Sakshi's age will be 7x+6

  • The ratio of their ages after 6 years will be (8x+6):(7x+6)

View 1 answer

Q66. How to make a thread safe object in Java?

Ans.

To make a thread safe object in Java, use synchronization or locks.

  • Use synchronized keyword to ensure only one thread can access the object at a time.

  • Use locks to provide more fine-grained control over synchronization.

  • Use thread-safe data structures like ConcurrentHashMap or AtomicInteger.

  • Avoid using static variables or mutable shared state.

  • Consider using immutable objects or thread-local variables.

  • Test the thread safety of your code using tools like JUnit or stress testing.

  • D...read more

View 1 answer

Q67. What is the relation between Incident and change?

Ans.

Incidents can trigger changes to prevent future incidents.

  • Incidents can reveal weaknesses in the system that require changes to prevent future incidents.

  • Changes can also cause incidents if not properly managed.

  • Incident and change management processes should be closely integrated.

  • For example, a major incident caused by a software bug may require a change to the code to prevent it from happening again.

  • Similarly, a change to a server configuration may cause an incident if not pr...read more

View 2 more answers

Q68. What is DDOS Attack and what you will use to prevent it.

Ans.

DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.

  • DDOS stands for Distributed Denial of Service

  • Attackers use multiple devices to send a huge amount of traffic to the target server or network

  • It can cause the server or network to crash or become unavailable to legitimate users

  • Prevention measures include using firewalls, load balancers, and DDOS mitigation services

Add your answer

Q69. What do u know about printer...? How many types of printer are there?

Ans.

Printers are output devices that produce hard copy output from computers. There are several types of printers.

  • Types of printers include inkjet, laser, thermal, and dot matrix.

  • Inkjet printers use liquid ink sprayed through microscopic nozzles onto paper.

  • Laser printers use toner powder and heat to fuse the toner onto paper.

  • Thermal printers use heat to transfer ink onto paper.

  • Dot matrix printers use a print head that strikes an ink ribbon to create dots on paper.

  • Printers can als...read more

View 6 more answers

Q70. What is the difference between encapsulation and polymorphism?

Ans.

Encapsulation is hiding implementation details while polymorphism is using a single interface for multiple types.

  • Encapsulation is achieved through access modifiers like private, protected, and public.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • Encapsulation is about data hiding and abstraction while polymorphism is about behavior.

  • Example of encapsulation: a class with private variables and public methods to access them.

  • Examp...read more

View 1 answer

Q71. What are firewalls and application gateways and the difference between them?

Ans.

Firewalls and application gateways are both security measures used to protect networks, but they differ in their approach.

  • Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

  • Application gateways, also known as application-level gateways or application layer firewalls, operate at the application layer of the OSI model and can inspect and filter traffic based on the specific application bein...read more

View 1 answer

Q72. Program to check if two given matrices are identical

Ans.

Program to check if two given matrices are identical

  • Check if the dimensions of both matrices are same

  • Iterate through each element of both matrices and compare them

  • If all elements are same, matrices are identical

View 1 answer

Q73. If you have learn anew programing language for this job,what wil do ?

Ans.

I would take the initiative to learn the new programming language as quickly as possible.

  • Research the best resources for learning the language

  • Practice coding in the new language regularly

  • Seek guidance and mentorship from experienced programmers

  • Attend workshops and conferences to enhance knowledge

  • Apply the new language in real-world projects to gain experience

View 2 more answers

Q74. Tell me some keywords to make a thread safe program in java ?

Ans.

Keywords for thread safe program in Java

  • Synchronization using synchronized keyword

  • Using volatile keyword for shared variables

  • Using atomic classes for thread safe operations

  • Using thread safe collections like ConcurrentHashMap

  • Using locks and semaphores for synchronization

  • Avoiding shared mutable state

  • Using immutable objects

  • Using thread local variables

View 3 more answers

Q75. What are the kinds of data stored by MS Excel?

Ans.

MS Excel can store various types of data including numbers, text, dates, and formulas.

  • Numeric data such as sales figures, budgets, and inventory levels

  • Text data such as customer names, product descriptions, and employee information

  • Date and time data such as order dates, delivery dates, and project deadlines

  • Formulas and functions for calculations and data analysis

  • Charts and graphs for visual representation of data

View 5 more answers

Q76. Which programming language are you comfortable with?

Ans.

I am comfortable with multiple programming languages including Java, Python, and C++.

  • Proficient in Java, Python, and C++

  • Experience with web development languages such as HTML, CSS, and JavaScript

  • Familiarity with database languages such as SQL

  • Comfortable with object-oriented programming and software development principles

View 1 answer

Q77. ALM process? Suppose there is only dev and prod environment how we can create test environment for tester?

Ans.

To create a test environment for testers in a dev and prod setup, we can follow the ALM process.

  • Create a separate branch from the dev environment codebase for testing purposes

  • Deploy the branch to a separate environment for testing

  • Once testing is complete, merge the branch back into the dev environment

  • Deploy the updated dev environment to the prod environment

  • Ensure proper version control and documentation throughout the process

Add your answer

Q78. What are AL/ML and their differences?

Ans.

AL/ML are Artificial Intelligence and Machine Learning respectively. AL is a broader term while ML is a subset of AL.

  • AL involves creating intelligent machines that can perform tasks without human intervention

  • ML is a subset of AL that involves training machines to learn from data and improve their performance

  • AL includes various techniques such as rule-based systems, expert systems, and natural language processing

  • ML includes techniques such as supervised learning, unsupervised ...read more

View 3 more answers

Q79. Explain your project? What are DDL commands in sql? difference between c++ and java? What is Primary and foreign key? Joins in sql explain types of joins?

Ans.

Answering questions related to project, SQL commands, and programming languages.

  • Project involved developing a web application using Java and MySQL database.

  • DDL commands in SQL are used to define the structure of a database.

  • C++ is a compiled language while Java is an interpreted language.

  • Primary key uniquely identifies a record while foreign key establishes a relationship between two tables.

  • Joins in SQL are used to combine data from two or more tables based on a related column...read more

Add your answer

Q80. What is GPS in mapping and what is pinpoint

Ans.

GPS in mapping is a technology that uses satellites to determine location. Pinpoint is the exact location on a map.

  • GPS stands for Global Positioning System and uses satellites to determine location

  • Pinpoint is the exact location on a map, often marked with a pin or marker

  • GPS in mapping allows for accurate navigation and location tracking

  • Examples of GPS mapping applications include Google Maps and Waze

View 1 answer

Q81. What is zonning .And have you ever been part of upgradation ?

Ans.

Zoning is a method of dividing a storage area network (SAN) into smaller, isolated sections to improve performance and security.

  • Zoning is used to control access to specific resources within a SAN.

  • It can be done at the port level, device level, or WWN level.

  • Zoning can be hard or soft, depending on whether it is enforced by hardware or software.

  • Upgrading a SAN may require changes to zoning configurations to accommodate new hardware or software.

  • I have been part of SAN upgrades t...read more

Add your answer

Q82. 1. Why I choose Transition Management 2. Explain RFP/RFI process in detail. 3. How to calculate exact Transition duration while solutioning. 4. How to conclude with FTE count. 5. What are general problems faced...

read more
Ans.

Transition Manager interview questions on choosing transition management, RFP/RFI process, transition duration calculation, FTE count, and general problems faced during execution.

  • I chose Transition Management because of my interest in managing change and ensuring smooth transitions.

  • RFP/RFI process involves creating a request for proposal or information to solicit bids from vendors, evaluating the responses, and selecting the best fit.

  • Transition duration can be calculated by c...read more

Add your answer

Q83. How do you pull some specific data from a table based on given conditions ?

Ans.

To pull specific data from a table based on given conditions, use SQL SELECT statement with WHERE clause.

  • Identify the table and columns containing the data

  • Specify the conditions using operators such as =, >, <, LIKE, etc.

  • Use SELECT statement with WHERE clause to retrieve the data

  • Example: SELECT * FROM table_name WHERE column_name = 'condition'

  • Use AND or OR operators to combine multiple conditions

Add your answer

Q84. ...What do you understand by a Default Gateway? ...How can we track the path of the packet going to its destination?

Ans.

Default Gateway is the IP address of the router that connects a device to other networks. We can track packet path using Traceroute.

  • Default Gateway is the first point of contact for a device when it tries to connect to other networks.

  • It acts as a mediator between the device and other networks.

  • It helps in routing the traffic to the correct destination.

  • Traceroute is a tool that can be used to track the path of a packet going to its destination.

  • It works by sending packets with i...read more

View 1 answer

Q85. What exactly is NLP? Explain for a layman

Ans.

NLP stands for Natural Language Processing. It is a field of study that focuses on making computers understand human language.

  • NLP involves teaching computers to understand and interpret human language, both written and spoken.

  • It is used in various applications such as chatbots, virtual assistants, and language translation software.

  • NLP uses techniques such as sentiment analysis, named entity recognition, and part-of-speech tagging to analyze and understand language.

  • Examples of...read more

Add your answer

Q86. Are you ready to sign the service bonds?

Ans.

Yes, I am willing to sign the service bonds.

  • I understand the importance of service bonds in ensuring job security and commitment to the company.

  • I am confident in my abilities to fulfill the responsibilities of the Project Engineer role and am committed to staying with the company for the duration of the bond.

  • I am open to discussing the terms and conditions of the bond before signing.

Add your answer

Q87. Are all inheritance applicable in Python?

Ans.

No, not all inheritance is applicable in Python.

  • Python supports single inheritance, where a class can inherit from only one parent class.

  • Multiple inheritance is also possible, but it can lead to the diamond problem.

  • Python also supports multilevel inheritance, where a class can inherit from a parent class, which in turn can inherit from another parent class.

  • Inheritance can be used to reuse code and create a hierarchy of classes.

  • Example: class B inherits from class A - class B(...read more

Add your answer

Q88. What is mortgage value

Ans.

Mortgage value refers to the monetary worth of a property that is used as collateral for a loan.

  • Mortgage value is the assessed value of a property that determines the maximum loan amount a borrower can obtain.

  • It is based on factors such as the property's location, size, condition, and market trends.

  • Lenders typically lend a percentage of the mortgage value, known as loan-to-value ratio.

  • For example, if a property's mortgage value is $200,000 and the lender offers an 80% loan-to...read more

View 34 more answers

Q89. Who are the members and providers in insurance?

Ans.

Members are individuals or entities who purchase insurance policies while providers are companies that offer insurance policies.

  • Members can be individuals, families, or businesses.

  • Providers can be insurance companies, brokers, or agents.

  • Examples of insurance providers include State Farm, Allstate, and Geico.

  • Examples of insurance members include individuals who purchase health insurance or businesses that purchase liability insurance.

View 7 more answers
Q90. Can you share your screen and write a demo code based on dynamic memory allocation?
Add your answer

Q91. Which programming language do you refer,

Ans.

I prefer Python for its simplicity and versatility.

  • Python is easy to learn and has a large community for support.

  • It can be used for a variety of tasks such as web development, data analysis, and automation.

  • Python also has many libraries and frameworks available for use.

  • Other languages I am familiar with include Java and C++.

View 1 answer

Q92. 3.What is the difference between Passcode and PIN?

Ans.

Passcode and PIN are both used for authentication, but they differ in their length and complexity.

  • A passcode is typically longer than a PIN and can include letters, numbers, and symbols.

  • A PIN is usually a 4-6 digit number.

  • Passcodes are generally considered more secure than PINs.

  • Examples of passcodes include the password for your email account or the code to unlock your phone.

  • Examples of PINs include the code to access your bank account or the PIN to unlock your SIM card.

View 2 more answers

Q93. Reverse the each word of the string

Ans.

Reverse each word of a given string.

  • Split the string into words using space as a delimiter.

  • Reverse each word using built-in functions or loops.

  • Join the reversed words to form the final string.

View 1 answer

Q94. What is time complexity of bubble sort? Can we do anything to reduce time in bubble sort?

Ans.

Bubble sort has a time complexity of O(n^2). It can be optimized by adding a flag to check if any swaps were made.

  • Bubble sort compares adjacent elements and swaps them if they are in the wrong order.

  • It repeats this process until the array is sorted.

  • Adding a flag to check if any swaps were made can reduce the time complexity to O(n) in the best case.

  • However, in the worst case, it still has a time complexity of O(n^2).

Add your answer

Q95. What are the access specifiers?

Ans.

Access specifiers are keywords in object-oriented programming languages that determine the visibility of class members.

  • Access specifiers are used to restrict access to class members.

  • There are three access specifiers: public, private, and protected.

  • Public members can be accessed from anywhere in the program.

  • Private members can only be accessed within the class.

  • Protected members can be accessed within the class and its subclasses.

  • Example: class MyClass { public: int x; private:...read more

View 1 answer

Q96. What is difference between service catalog and order guide and record producer

Ans.

Service catalog, order guide, and record producer are different components in ServiceNow for managing and fulfilling service requests.

  • Service catalog is a centralized repository of services that users can request.

  • Order guide is a collection of related services grouped together for easy selection and ordering.

  • Record producer is a form-based interface that allows users to create records in different tables.

  • Service catalog provides a self-service portal for users to browse and r...read more

View 1 answer

Q97. what is the difference between overloading and overriding?

Ans.

Overloading is when multiple methods have the same name but different parameters, while overriding is when a subclass provides a specific implementation of a method already defined in its superclass.

  • Overloading is compile-time polymorphism, while overriding is runtime polymorphism.

  • Overloading is achieved within the same class, while overriding occurs between a superclass and its subclass.

  • Overloading is used to provide different ways of calling the same method, while overridin...read more

View 6 more answers

Q98. What is the difference between Saving and current account

Ans.

Saving account is for saving money and earning interest while current account is for frequent transactions.

  • Saving account earns interest while current account does not.

  • Saving account has a limit on the number of transactions while current account does not.

  • Current account is meant for frequent transactions while saving account is not.

  • Saving account has a higher interest rate than current account.

  • Examples of saving accounts include fixed deposit accounts, recurring deposit acco...read more

View 4 more answers

Q99. What is array, diffrence between C and C++, what is object oriented programming, what projects who have worked on.

Ans.

Questions on arrays, C/C++, OOP, and past projects for Project Engineer role.

  • An array is a collection of similar data types stored in contiguous memory locations.

  • C is a procedural language while C++ is an object-oriented language.

  • Object-oriented programming is a programming paradigm that uses objects to represent and manipulate data.

  • Examples of past projects worked on should be provided.

Add your answer

Q100. What are the steps involved in program execution? When is the memory allocated to the program variables?

Ans.

Program execution involves several steps, including compilation, linking, loading, and execution. Memory is allocated to program variables during runtime.

  • Compilation: Source code is translated into machine code or bytecode.

  • Linking: Object files and libraries are combined to create an executable file.

  • Loading: The executable file is loaded into memory.

  • Execution: The program instructions are executed by the CPU.

  • Memory Allocation: Memory is allocated to program variables during r...read more

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Fisage Solutions

based on 4.2k interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 706 Interview Questions
3.9
 • 341 Interview Questions
4.2
 • 295 Interview Questions
4.4
 • 202 Interview Questions
3.2
 • 164 Interview Questions
4.0
 • 134 Interview Questions
View all
Top Wipro Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter