i
Wipro
Filter interviews by
I applied via LinkedIn and was interviewed in Apr 2024. There were 2 interview rounds.
OData create deep entity steps involve creating related entities in a single request.
Use $expand query option to include related entities in the request.
Specify the related entities in the request payload.
Ensure proper navigation properties are set in the request payload.
Example: POST /Orders?$expand=Customer,Products
Example payload: { OrderID: 123, Customer: { CustomerID: 456, Name: 'John Doe' }, Products: [{ ProductI
Types of enhancements and user exits are customizations made to SAP systems to meet specific business requirements.
Enhancements are modifications made to standard SAP programs to add new functionality or customize existing features.
User exits are predefined exit points in SAP programs where custom code can be inserted to meet specific business requirements.
Enhancements can be classified as implicit enhancements, explic...
One of the development challenges I faced was implementing a complex algorithm for real-time data processing.
Understanding the algorithm requirements and constraints
Optimizing the algorithm for efficiency and speed
Testing the algorithm with large datasets to ensure accuracy
Collaborating with team members to troubleshoot and debug any issues
Adobe forms development involves creating interactive forms using Adobe software. Dynamic enable/disable fields allow for conditional interactions.
Adobe forms development involves using Adobe software like Adobe Acrobat or Adobe LiveCycle Designer.
Steps include designing the form layout, adding form fields, setting up form logic, and testing the form.
Dynamic enable/disable fields can be achieved using JavaScript to con...
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology map
It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
OSPF divides the network into areas to reduce
Private IP addresses ranges are reserved for use within private networks and are not routable on the internet.
Private IP address ranges include: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255
These ranges are defined in RFC 1918 and are commonly used in home, office, and enterprise networks
Private IP addresses allow multiple devices to share a single public IP address for in
posted on 10 Sep 2024
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
Check the instant brain power and aptitude test is decide the applicant is suitable or not
What people are saying about Wipro
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
SIEM tools are security information and event management tools used to collect, analyze, and report on security data.
SIEM tools help organizations to detect and respond to security incidents in real-time.
They collect data from various sources such as network devices, servers, and applications.
SIEM tools use correlation rules to identify patterns and anomalies that may indicate a security threat.
Examples of SIEM tools i...
Yes, I have experience writing playbooks rules for automation in various engineering projects.
Yes, I have written playbooks rules using tools like Ansible for automating infrastructure tasks.
I have experience creating rule-based automation scripts to streamline engineering processes.
I can provide examples of playbooks I have written for automating deployment, configuration, and monitoring tasks.
Digital forensics working procedures involve collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner.
Collecting digital evidence from various sources such as computers, mobile devices, and cloud storage.
Preserving the integrity of the evidence by creating forensic images and maintaining a chain of custody.
Analyzing the evidence using specialized tools and techniques to uncover ...
Wipro interview questions for popular designations
Steps for migration from ECC to HANA include data migration, code adaptation, testing, and training.
Perform system assessment to identify customizations and modifications
Convert ABAP code to be compatible with HANA database
Migrate data using tools like SAP LT Replication Server
Perform thorough testing to ensure data integrity and performance
Provide training to users on new HANA features and functionalities
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There were 3 interview rounds.
Some hands on assignment
SCD-2 is a type of slowly changing dimension in data warehousing. Session log is a record of activities performed during a session.
Session log tracks changes made to data during a session
It helps in troubleshooting and auditing data changes
Session log can include details like timestamp, user performing the action, and type of change
It is important for maintaining data integrity in a data warehouse
Routers are devices that direct data packets to their destination, while filters are used to block or allow specific data based on set criteria.
Routers determine the best path for data packets to reach their destination
Filters are used to block or allow specific data based on set criteria
Routers are commonly used in networking to connect multiple devices and manage traffic flow
Filters are often used in email systems to...
Dynamic look up is a process of searching for information or data at runtime based on certain criteria.
Dynamic look up involves searching for data or information based on changing criteria
It is commonly used in programming to retrieve values from a database or list dynamically
An example of dynamic look up is using a search function on a website to find specific products based on user input
I am proficient in using SQL Server for database management.
Proficient in SQL Server for database management
Experience with creating and optimizing databases
Knowledge of SQL queries and stored procedures
Implemented a caching mechanism to improve performance of a data-intensive application
Identified bottleneck in application due to frequent database queries
Researched and implemented caching solution using Redis to store frequently accessed data
Monitored performance metrics to ensure caching was effective
Resulted in significant reduction in database load and improved application response time
In a project, I encountered a critical bug that was causing system crashes. I identified the root cause and implemented a fix to resolve it.
Identify the specific symptoms of the issue and gather relevant data for analysis
Analyze the codebase to pinpoint the root cause of the bug
Develop and test a solution to fix the bug
Implement the fix and monitor the system for any further issues
The duration of Wipro interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 906 interviews
Interview experience
Project Engineer
32.7k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23.1k
salaries
| ₹5.8 L/yr - ₹22.5 L/yr |
Senior Associate
21.3k
salaries
| ₹0.8 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.5k
salaries
| ₹5 L/yr - ₹19.5 L/yr |
Technical Lead
18.7k
salaries
| ₹8.3 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon