
Wipro


200+ Wipro Project Engineer Interview Questions and Answers
Q101. Explain oops concepts in java with real time examples?
OOPs concepts in Java are fundamental principles of object-oriented programming, including inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: Car class inheriting from Vehicle class.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Using private variables and public methods in a class.
Polymorphism: Ability of a method to do different ...read more
Q102. Difference between abtract and interface key words?
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can have constructors, fields, and non-abstract methods, while interfaces cannot.
A class can only extend one abstract class, but it can implement multiple interfaces.
Abstract classes are used to define common characteristics of subclasses, while interfaces are used to define contracts for classes to implement.
Example: abstract class Animal { abstr...read more
Q103. Tell me about python definition
Python is a high-level, interpreted programming language known for its simplicity and ease of use.
Python is an object-oriented language
It has a large standard library
Python is dynamically typed
It is used for web development, data analysis, artificial intelligence, and more
Python code is executed line by line
Q104. Differnce between method overloading and over riding
Method overloading is having multiple methods in the same class with the same name but different parameters, while method overriding is having a method in a subclass with the same name and parameters as a method in the superclass.
Method overloading involves multiple methods with the same name but different parameters.
Method overriding involves a method in a subclass with the same name and parameters as a method in the superclass.
Method overloading is resolved at compile time,...read more
Q105. What are dml statements in SQL?
DML statements in SQL are used to manipulate data in a database, including inserting, updating, deleting, and querying data.
DML stands for Data Manipulation Language.
Common DML statements include INSERT, UPDATE, DELETE, and SELECT.
INSERT is used to add new rows of data into a table.
UPDATE is used to modify existing data in a table.
DELETE is used to remove rows of data from a table.
SELECT is used to retrieve data from a table.
Q106. Tell about oops? Tell about the inheritance in that again
OOPs is a programming paradigm based on the concept of objects. Inheritance is a mechanism of creating a new class from an existing class.
OOPs stands for Object-Oriented Programming.
In OOPs, everything is treated as an object.
Inheritance is a way to create a new class from an existing class.
The new class is called the derived class or subclass.
The existing class is called the base class or superclass.
The derived class inherits all the properties and methods of the base class....read more
Q107. Definition of UNION (user defined data type)
UNION is a user-defined data type that allows storing different data types in the same memory location.
UNION can be used to save memory space by sharing the same memory location for different data types.
It is defined using the 'union' keyword in C programming language.
The size of the union is determined by the largest data type it contains.
Accessing the union members can be done using the dot operator or the arrow operator.
Example: union myUnion { int i; float f; };
Example: m...read more
Q108. What libraries do you use in ML/AI
I use various libraries depending on the project requirements.
For deep learning, I use TensorFlow and Keras
For natural language processing, I use NLTK and spaCy
For computer vision, I use OpenCV and scikit-image
For data manipulation and analysis, I use Pandas and NumPy
For model deployment, I use Flask and Docker
Q109. What is Harshad number?
A Harshad number is a number that is divisible by the sum of its digits.
Also known as Niven numbers.
Examples include 18 (1+8=9, 18/9=2), 54 (5+4=9, 54/9=6), and 120 (1+2+0=3, 120/3=40).
Harshad numbers are used in digital root computations and in creating self-descriptive numbers.
They are named after D. R. Kaprekar's Indian mathematician friend, Harshad.
Harshad numbers can be found in various fields such as number theory, cryptography, and computer science.
Q110. Any active backlog or year gap?
No active backlog or year gap.
I have no active backlog or year gap.
I have been consistently working and improving my skills.
I have completed all my previous projects on time.
I have been attending relevant training and workshops to enhance my knowledge.
Q111. what is string and why it is immutable.
A string is a sequence of characters. It is immutable because once created, its value cannot be changed.
Strings are used to store text data in programming languages.
Immutable means that the value of a string cannot be altered after it is created.
Example: 'hello' is a string, and if you try to change it to 'hallo', a new string will be created instead of modifying the original one.
Q112. What are the types of Joins in SQL
Types of Joins in SQL include Inner Join, Left Join, Right Join, and Full Join.
Inner Join: Returns rows when there is a match in both tables
Left Join: Returns all rows from the left table and the matched rows from the right table
Right Join: Returns all rows from the right table and the matched rows from the left table
Full Join: Returns rows when there is a match in either table
Q113. Types of SQL commands (ddl,dml,dcl,dql,TCL)
SQL commands are classified into DDL, DML, DCL, DQL, and TCL.
DDL (Data Definition Language) commands are used to define the database schema.
DML (Data Manipulation Language) commands are used to manipulate data in the database.
DCL (Data Control Language) commands are used to control access to the database.
DQL (Data Query Language) commands are used to retrieve data from the database.
TCL (Transaction Control Language) commands are used to manage transactions in the database.
Q114. What is java and why we need to use?
Java is a high-level programming language used for developing applications across various platforms.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).
It is object-oriented, allowing for modular and reusable code.
Java is widely used in web development, mobile applications, enterprise software, and more.
It has a large standard library with built-in functions for common tasks.
Java is known for its security features, making it a popu...read more
Q115. Scrum Agile Methodology Difference between agile and scrum Lean Management
Agile methodology is a flexible approach to project management, while Scrum is a specific framework within Agile.
Agile is a mindset that values flexibility, collaboration, and continuous improvement.
Scrum is a framework within Agile that provides a structured approach to project management.
Lean management is a philosophy that focuses on maximizing value while minimizing waste.
Agile and Scrum both prioritize customer satisfaction, teamwork, and adaptability.
Agile is more flexi...read more
Q116. Write a program to find second largest element in array
Program to find second largest element in array
Iterate through the array and keep track of the largest and second largest elements
Handle edge cases like empty array or array with only one element
Consider sorting the array and returning the second last element
Q117. Is java a vulnerable language ?
Java is not inherently vulnerable, but like any language, it can be vulnerable if not used properly.
Java itself is not vulnerable, but the way it is used can introduce vulnerabilities.
Common vulnerabilities in Java applications include SQL injection, cross-site scripting, and insecure deserialization.
Regularly updating Java libraries and frameworks can help mitigate vulnerabilities.
Using secure coding practices and implementing proper input validation can also help prevent vu...read more
Q118. Write trigger to identify BPO and shutdown its business
Use trigger to identify BPO and shutdown its business
Create a trigger on the database table where BPO information is stored
Use SQL query to identify BPO based on specific criteria (e.g. industry type, keywords in company name)
Once BPO is identified, execute a command to shutdown its business operations
Q119. All oops concepts in the language you are comfortable with
Object-oriented programming concepts include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class)
Inheritance: Ability of a class to inherit properties and behavior from another class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
Q120. What is the difference between Truncate and Drop.
Truncate removes all data from a table while Drop deletes the table itself.
Truncate is faster than Drop as it only removes data and not the table structure.
Truncate cannot be rolled back while Drop can be.
Truncate does not activate triggers while Drop does.
Truncate resets the identity of the table while Drop does not.
Q121. Your favorite programming language
My favorite programming language is Python.
Python is easy to learn and has a simple syntax.
It has a large community and a vast number of libraries.
Python is versatile and can be used for web development, data analysis, machine learning, and more.
Q122. Explain about SQL and it types of queries
SQL is a programming language used to manage and manipulate relational databases. It has different types of queries.
SQL stands for Structured Query Language
It is used to manage and manipulate relational databases
Types of queries include SELECT, INSERT, UPDATE, DELETE, JOIN, etc.
SELECT is used to retrieve data from a database
INSERT is used to add new data to a database
UPDATE is used to modify existing data in a database
DELETE is used to remove data from a database
JOIN is used ...read more
Q123. SQL Keys - Difference between Primary key and Foreign key.
Primary key uniquely identifies a record in a table, while foreign key establishes a relationship between two tables.
Primary key ensures each record is unique in a table
Foreign key links a column in one table to a column in another table
Primary key is used to enforce entity integrity, while foreign key enforces referential integrity
Q124. What is Java Collection ?
Java Collection is a framework that provides an architecture to store and manipulate a group of objects.
Java Collection is a group of interfaces, classes, and algorithms that allow you to store and manipulate a group of objects.
It provides various data structures like List, Set, Queue, etc.
It provides algorithms like searching, sorting, and manipulating collections.
It is a part of the Java API and is available in the java.util package.
Q125. Implement add without “+†sign.
Implementing addition without using the + sign.
Use bitwise operators like XOR and AND to perform addition.
Convert the numbers to binary and perform addition bit by bit.
Use recursion to add the numbers.
Use a lookup table to perform addition.
Use the Math library to perform addition using functions like Math.floor and Math.ceil.
Q126. 3. What is binary search ?
Binary search is a search algorithm that finds the position of a target value within a sorted array.
It works by repeatedly dividing in half the portion of the array that could contain the target value.
It has a time complexity of O(log n), making it very efficient for large arrays.
It requires the array to be sorted in ascending or descending order.
Example: Searching for the number 7 in the array [1, 3, 4, 6, 7, 9, 10] would return the index 4.
Q127. What is final,finally,finalize in java
final, finally, and finalize are keywords in Java with different meanings.
final is used to declare a constant value that cannot be changed
finally is used in try-catch blocks to execute code regardless of whether an exception is thrown or not
finalize is a method that is called by the garbage collector before an object is destroyed
All three keywords are unrelated and serve different purposes
Q128. What is array and it's type?
An array is a collection of similar data types stored in contiguous memory locations.
Arrays can be of fixed size or dynamic size.
Arrays can be one-dimensional, two-dimensional, or multi-dimensional.
Examples of arrays include int array, char array, float array, etc.
Q129. what is OSI layer and describe it
OSI layer is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
OSI stands for Open Systems Interconnection
It helps in understanding how different networking protocols work together
Each layer has specific functions and communicates with adjacent layers
Examples of OSI layers include physical layer, data link layer, network layer, transport layer, etc.
Q130. How DNS works and describe it detailed
DNS is a system that translates domain names to IP addresses to locate resources on the internet.
DNS stands for Domain Name System
It translates human-readable domain names (like google.com) to IP addresses (like 172.217.3.206)
DNS servers store DNS records which contain information about domain names and their corresponding IP addresses
There are different types of DNS records such as A, CNAME, MX, TXT, etc.
DNS operates through a hierarchical system of DNS servers, including ro...read more
Q131. Different between string, stringbuilder, stringbuffer.
String, StringBuilder, and StringBuffer are classes used to manipulate strings in Java.
String is immutable, meaning its value cannot be changed once created.
StringBuilder and StringBuffer are mutable, allowing for efficient manipulation of strings.
StringBuilder is not thread-safe, while StringBuffer is thread-safe.
Use StringBuilder for single-threaded operations and StringBuffer for multi-threaded operations.
Q132. Find middle element from the linked list.
To find the middle element of a linked list.
Traverse the linked list using two pointers, one moving at twice the speed of the other.
When the faster pointer reaches the end, the slower pointer will be at the middle element.
If the linked list has even number of elements, there will be two middle elements. In that case, return the second middle element.
Q133. What is Runtime Polymorphism?
Runtime Polymorphism is the ability of an object to take on multiple forms at runtime.
It allows a subclass to provide its own implementation of a method that is already provided by its parent class.
It is achieved through method overriding.
It is also known as Dynamic Polymorphism.
Example: Animal class has a method called makeSound(). Dog and Cat classes extend Animal and provide their own implementation of makeSound().
Example: Shape class has a method called draw(). Circle and...read more
Q134. Rate your C Coding out of 5
I would rate my C coding skills as 4 out of 5.
Proficient in writing efficient and clean C code
Experience in developing complex algorithms and data structures
Familiar with low-level programming and memory management
Able to debug and optimize code for performance
Examples: Implemented a sorting algorithm, optimized memory usage in a large-scale project
Q135. What is Insertion sort
Insertion sort is a simple sorting algorithm that builds the final sorted array one item at a time.
Compares each element with the previous elements and inserts it in the correct position
Best for small arrays or partially sorted arrays
Time complexity is O(n^2)
Example: ['apple', 'banana', 'orange', 'grape'] -> ['apple', 'banana', 'grape', 'orange']
Q136. 4. difference between array and linked list
Array is a collection of elements of the same data type stored in contiguous memory locations, while linked list is a collection of elements called nodes, where each node contains data and a reference to the next node.
Arrays have fixed size, while linked lists can grow dynamically
Accessing elements in an array is faster than in a linked list
Inserting or deleting elements in an array is slower than in a linked list
Arrays are best suited for random access, while linked lists ar...read more
Q137. How many dashboards you created
I have created 5 dashboards for tracking project progress, resource allocation, budget monitoring, risk assessment, and stakeholder communication.
Created dashboards for tracking project progress
Developed dashboards for resource allocation
Designed dashboards for budget monitoring
Implemented dashboards for risk assessment
Utilized dashboards for stakeholder communication
Q138. What is Object-Oriented Programming (OOP)
OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOP focuses on creating objects that interact with each other to solve problems.
Encapsulation, inheritance, and polymorphism are key principles of OOP.
Examples of OOP languages include Java, C++, and Python.
Q139. What are oops describe the paradigm.
Object-oriented programming paradigm focuses on objects and classes to organize code and data.
Objects are instances of classes that encapsulate data and behavior
Classes define the blueprint for creating objects
Inheritance allows classes to inherit properties and methods from other classes
Polymorphism enables objects to be treated as instances of their parent class
Encapsulation restricts access to certain components of an object
Q140. why we use C language?
C language is widely used for its efficiency, portability, and flexibility in programming embedded systems, operating systems, and applications.
Efficiency: C allows for low-level manipulation and direct access to hardware, making it efficient for system programming.
Portability: C code can be easily adapted to different platforms without major modifications.
Flexibility: C supports both procedural and object-oriented programming paradigms, making it versatile for various applic...read more
Q141. What is Array? How to define it?
An array is a data structure that stores a collection of elements of the same type in a contiguous memory location.
Arrays have a fixed size determined at the time of declaration.
Elements in an array are accessed using an index starting from 0.
Example: string[] names = {"Alice", "Bob", "Charlie"};
Q142. Definition of structure and class .
Structure and class are programming concepts used to define custom data types.
A structure is a collection of variables of different data types grouped together under a single name.
A class is a blueprint for creating objects that encapsulate data and behavior.
Structures are used in C programming while classes are used in object-oriented programming languages like Java and C++.
Both structures and classes can have methods and properties.
Structures are value types while classes a...read more
Q143. What are keys?
Keys are objects used to unlock or access something.
Keys can be physical objects like a key to a lock or a keycard to access a building.
Keys can also be digital like a password or encryption key.
Keys are used to unlock or access something that is otherwise restricted or protected.
Keys can be unique to an individual or shared among a group of people.
Q144. What are joins?
Joins are used in SQL to combine data from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables in a single query.
There are different types of joins such as inner join, left join, right join, and full outer join.
The join condition is specified using the ON keyword and the related columns between the tables.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
Q145. What is the React ? State Props Redux Workflow
React is a JavaScript library for building user interfaces.
React is a JavaScript library developed by Facebook for building interactive user interfaces.
State Props are used to pass data from a parent component to a child component in React.
Redux is a predictable state container for JavaScript apps, commonly used with React to manage application state.
Redux Workflow involves actions, reducers, and store to manage the state of a React application.
Q146. Find gcd of two numbers
The greatest common divisor (gcd) of two numbers is the largest positive integer that divides both numbers without leaving a remainder.
The gcd can be found using the Euclidean algorithm.
Start by dividing the larger number by the smaller number.
If the remainder is 0, the smaller number is the gcd.
If the remainder is not 0, replace the larger number with the smaller number and the smaller number with the remainder.
Repeat the process until the remainder is 0.
Q147. how do u make string mutable.
To make a string mutable in programming, use a mutable data structure like StringBuilder in Java or StringBuffer in C++.
Use StringBuilder in Java to create a mutable string: StringBuilder sb = new StringBuilder("hello");
Use StringBuffer in C++ to create a mutable string: StringBuffer sb("world");
Q148. What java is platform indepenedent?
Java is platform independent because of its 'write once, run anywhere' principle.
Java programs are compiled into bytecode which can run on any Java Virtual Machine (JVM) regardless of the underlying platform.
This allows Java programs to be executed on different operating systems without any modifications.
Examples of platform independent Java applications include web applications, mobile apps, and enterprise software.
Q149. Real time examples of overloading and overriding
Overloading is having multiple methods with the same name but different parameters. Overriding is having a method in a subclass with the same name and parameters as a method in the superclass.
Overloading is used to provide different ways of calling the same method with different parameters
Overriding is used to provide a specific implementation of a method in a subclass that is already defined in the superclass
Example of overloading: public void print(int num), public void pri...read more
Q150. What is inheritance, how do implement it
Inheritance is a concept in object-oriented programming where a class can inherit properties and methods from another class.
Inheritance allows a class to reuse code from another class
Subclasses can access the properties and methods of their parent class
Inheritance promotes code reusability and reduces redundancy
Q151. What is Object oriented programming
Object oriented programming is a programming paradigm based on the concept of objects, which can contain data and code.
OOP focuses on creating objects that interact with each other to solve problems
Encapsulation, inheritance, and polymorphism are key principles of OOP
Examples of OOP languages include Java, C++, and Python
Q152. What are the OOPs concepts
OOPs concepts are the fundamental principles of Object-Oriented Programming.
Abstraction
Encapsulation
Inheritance
Polymorphism
Q153. Normalisation and it’s type in DBMS
Normalization is a process of organizing data in a database to reduce redundancy and dependency.
Normalization is used to eliminate data redundancy and improve data integrity.
There are different types of normalization such as 1NF, 2NF, 3NF, BCNF, and 4NF.
1NF ensures that each column in a table contains atomic values.
2NF eliminates partial dependencies by creating separate tables for related data.
3NF eliminates transitive dependencies by creating separate tables for non-key att...read more
Q154. What is encapsulation?
Encapsulation is the process of hiding implementation details and exposing only necessary information to the user.
Encapsulation is a fundamental concept in object-oriented programming.
It helps in achieving data abstraction and information hiding.
It allows for better control over the data and prevents unauthorized access.
An example of encapsulation is a class in Java that has private variables and public methods to access them.
Q155. Do you use Linux?
Yes, I use Linux regularly for development and testing purposes.
I am comfortable with command line interface and various Linux distributions.
I have experience in setting up and configuring servers using Linux.
I have used Linux tools such as Git, Docker, and Jenkins for software development and deployment.
I have also contributed to open source projects hosted on Linux platforms.
Q156. Find the maximum SubarraySum (Kadane's Algo)
Kadane's Algorithm is used to find the maximum subarray sum in an array.
Initialize maxSum and currentSum to 0
Iterate through the array and update currentSum by adding the current element or starting a new subarray
Update maxSum if currentSum is greater than maxSum
Return maxSum as the maximum subarray sum
Q157. Why is java not 100% oop
Java is not 100% OOP because it supports primitive data types and static methods.
Java has primitive data types like int, double, etc. which are not objects.
Java allows static methods which do not require an instance of a class to be called.
Java also has the concept of wrapper classes to convert primitive data types to objects.
Q158. Give real-time example of each oops terms
Real-time examples of OOPs terms
Encapsulation: A car's engine is encapsulated within the hood, hiding its internal workings
Inheritance: A child class 'Dog' inheriting traits from a parent class 'Animal'
Polymorphism: A function 'drawShape()' can behave differently based on the shape passed as argument
Q159. What is bubble sort algorithm
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Compares adjacent elements and swaps them if they are in the wrong order
Repeats the process until the list is sorted
Not efficient for large lists
Example: [5, 3, 8, 4, 2] -> [3, 5, 4, 2, 8] -> [3, 4, 2, 5, 8] -> [3, 2, 4, 5, 8] -> [2, 3, 4, 5, 8]
Q160. What is data encapsulation
Data encapsulation is the process of hiding implementation details and exposing only necessary information.
It is a fundamental concept in object-oriented programming.
It helps in achieving data abstraction and information hiding.
It allows for better control over data and prevents unauthorized access.
Examples include private variables and methods in a class.
It improves code maintainability and reduces complexity.
Q161. Read a string No of words in the string
Count the number of words in a string.
Use the split() method to split the string into an array of words.
Count the length of the array to get the number of words.
Q162. Difference Between dbms and rdbms
DBMS is a software system to manage databases while RDBMS is a type of DBMS that stores data in tables with relations.
DBMS stands for Database Management System while RDBMS stands for Relational Database Management System.
DBMS can manage any type of database while RDBMS is specifically designed to manage relational databases.
DBMS does not enforce any specific data model while RDBMS enforces the relational data model.
DBMS does not support ACID (Atomicity, Consistency, Isolatio...read more
Q163. Write a code for reading a text file.
Code to read a text file in C++
Use ifstream to open the file
Read the file line by line using getline()
Close the file after reading
Q164. What is data abstraction
Data abstraction is the process of hiding implementation details and showing only the necessary information to the user.
Abstraction is used to simplify complex systems
It helps in reducing complexity and increasing efficiency
Examples include object-oriented programming and APIs
Q165. what is array and stack.
An array is a data structure that stores a collection of elements, while a stack is a data structure that follows the Last In First Out (LIFO) principle.
An array is a fixed-size collection of elements of the same data type.
Arrays are accessed using an index, starting from 0.
Example: string[] names = {"Alice", "Bob", "Charlie"};
A stack is a data structure that allows operations at one end only (top).
Stack follows the Last In First Out (LIFO) principle.
Example: Pushing elements...read more
Q166. What databases do you know
I am familiar with databases such as MySQL, Oracle, SQL Server, and MongoDB.
MySQL
Oracle
SQL Server
MongoDB
Q167. What is Trigger in SQL
A trigger in SQL is a set of SQL statements that automatically 'fires' or executes when a specified event occurs in a database.
Triggers can be used to enforce business rules, perform data validation, or maintain referential integrity.
There are two main types of triggers in SQL: 'BEFORE' triggers and 'AFTER' triggers.
Example: A trigger can be set up to automatically update a 'last_modified' timestamp column whenever a row in a table is updated.
Q168. Can you explain about View
A view is a virtual table created by a query that can be used like a table in a database.
Views are used to simplify complex queries by storing them as a virtual table.
Views do not store data themselves, but display data from the underlying tables.
Views can be used to restrict access to certain columns or rows of a table.
Views can be used to join multiple tables and present the data in a single table-like structure.
Q169. Abstract classes and interfaces in java
Abstract classes are classes that cannot be instantiated and may contain abstract methods. Interfaces are similar but can only contain abstract methods and constants.
Abstract classes can have both abstract and non-abstract methods.
Interfaces can only have abstract methods and constants.
A class can implement multiple interfaces but can only extend one abstract class.
Example: abstract class Animal { abstract void makeSound(); } interface Mammal { void eat(); }
Example: class Dog...read more
Q170. inhertence logics and accessing properties
Inheritance logics involve the concept of classes inheriting properties and methods from other classes.
Inheritance allows a subclass to access properties and methods of a superclass.
Subclasses can override inherited methods with their own implementation.
Access modifiers like public, private, and protected control the visibility of inherited properties.
Q171. In c what is function?
In C, a function is a block of code that performs a specific task and can be called multiple times within a program.
Functions in C are defined using a return type, function name, parameters, and a body enclosed in curly braces.
Functions can be called multiple times within a program to perform the same task without rewriting the code.
Functions can return a value using the 'return' keyword, or they can be void if they do not return a value.
Q172. 1. What is collinearity?
Collinearity is a phenomenon where two or more predictor variables in a regression model are highly correlated.
Collinearity can lead to issues such as unstable coefficients and difficulty in interpreting the importance of individual predictors.
It can also result in inflated standard errors and misleading statistical significance.
One common method to detect collinearity is to calculate the variance inflation factor (VIF) for each predictor variable.
Addressing collinearity may ...read more
Q173. can r square be negative?
No, r square cannot be negative in statistics.
R square is a measure of how well the regression line fits the data points.
It ranges from 0 to 1, where 1 indicates a perfect fit.
A negative r square value would indicate that the model is worse than a horizontal line.
Negative r square values are not meaningful in statistical analysis.
Q174. What is oops concepts
Object-oriented programming concepts that focus on data encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class)
Inheritance: Ability of a class to inherit properties and behavior from another class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
Q175. What is dynamic binding
Dynamic binding is the process of linking a method call to the method implementation at runtime.
Dynamic binding allows the method implementation to be determined at runtime based on the actual type of the object being used.
It is commonly used in object-oriented programming languages like Java and C++.
Example: In Java, when a method is overridden in a subclass, the method call is dynamically bound to the subclass implementation at runtime.
Q176. What is dynamic look up
Dynamic look up is a process of searching for information or data at runtime based on certain criteria.
Dynamic look up involves searching for data or information based on changing criteria
It is commonly used in programming to retrieve values from a database or list dynamically
An example of dynamic look up is using a search function on a website to find specific products based on user input
Q177. Which database are you using
I am proficient in using SQL Server for database management.
Proficient in SQL Server for database management
Experience with creating and optimizing databases
Knowledge of SQL queries and stored procedures
Q178. SCD-2, what is session log
SCD-2 is a type of slowly changing dimension in data warehousing. Session log is a record of activities performed during a session.
Session log tracks changes made to data during a session
It helps in troubleshooting and auditing data changes
Session log can include details like timestamp, user performing the action, and type of change
It is important for maintaining data integrity in a data warehouse
Q179. Why python is object oriented?
Python is object oriented because it allows for the creation of classes and objects, enabling code reusability and modularity.
Python supports the creation of classes and objects, which are fundamental concepts in object-oriented programming.
Object-oriented programming in Python allows for code reusability and modularity, making it easier to maintain and scale projects.
Python's object-oriented approach helps in organizing code into logical structures, improving readability and...read more
Q180. What is python scripting
Python scripting is the process of writing scripts or programs using the Python programming language to automate tasks or perform specific functions.
Python scripting allows for automation of repetitive tasks.
It can be used for data manipulation, web scraping, system administration, and more.
Python scripts are typically saved with a .py extension and can be run from the command line or an integrated development environment (IDE).
Q181. To check if two string are anagram.
Check if two strings are anagrams by comparing the sorted characters in each string.
Sort the characters in both strings
Compare the sorted strings to see if they are equal
Return true if they are anagrams, false otherwise
Q182. what is hidden Markov model
A statistical model that uses probability to predict the sequence of hidden states based on observed data.
Used in speech recognition, bioinformatics, and natural language processing.
Consists of a set of states, transition probabilities, and emission probabilities.
The states are not directly observable, but the emissions are.
The model can be trained using the Baum-Welch algorithm.
Q183. What is reinforced learning
Reinforcement learning is a type of machine learning where an agent learns to make decisions by interacting with its environment.
In reinforcement learning, an agent takes actions in an environment to maximize a reward signal.
The agent learns through trial and error, adjusting its actions based on the feedback it receives.
Reinforcement learning has been used in various applications such as game playing, robotics, and autonomous driving.
Examples of reinforcement learning algori...read more
Q184. tell me about oops in java
Object-oriented programming concepts in Java
Encapsulation: bundling data and methods that operate on the data into a single unit
Inheritance: allows a class to inherit properties and behavior from another class
Polymorphism: ability for objects to take on multiple forms
Abstraction: hiding the implementation details and showing only the necessary features
Example: Creating classes like Car, Truck, and Motorcycle that inherit from a Vehicle class
Q185. What are the types of joins
Types of joins include inner join, outer join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables
Outer join: Returns all rows when there is a match in one of the tables
Left join: Returns all rows from the left table and the matched rows from the right table
Right join: Returns all rows from the right table and the matched rows from the left table
Full join: Returns rows when there is a match in one of the tables
Q186. 2. Why wipro ??
Wipro is a leading global information technology, consulting and business process services company.
Wipro has a strong reputation in the industry for delivering quality services
Wipro has a diverse range of clients across various industries
Wipro offers opportunities for career growth and development
Wipro has a strong focus on innovation and technology
Wipro has a positive work culture and values employee satisfaction
Q187. what is cloud computing?
Cloud computing is the delivery of computing services over the internet, including storage, servers, databases, networking, software, and analytics.
Cloud computing allows users to access resources on-demand without the need for physical infrastructure.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Cloud computing offers scalability, flexibility, cost-effectiveness, and increased collaboration.
Data is stored a...read more
Q188. six sigma. difference between agile & waterfall
Agile is iterative and flexible, while Waterfall is linear and rigid. Six Sigma is a data-driven approach to process improvement.
Agile focuses on delivering working software in short iterations, while Waterfall follows a sequential process with distinct phases.
Agile encourages collaboration and adaptability, while Waterfall emphasizes planning and documentation.
Six Sigma uses statistical methods to identify and eliminate defects in a process, with a goal of reducing variabili...read more
Q189. What is inheritance ?
Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.
Allows for code reusability and promotes the concept of 'is-a' relationship
Derived class inherits properties and behaviors of the base class
Can have multiple levels of inheritance
Example: Class 'Car' can inherit from class 'Vehicle' as it is a type of vehicle
Q190. What is multi threading
Multi threading is a programming concept where multiple threads within a process execute independently to improve performance.
Allows for concurrent execution of tasks within a single process
Improves performance by utilizing multiple CPU cores
Requires careful synchronization to avoid race conditions
Examples include web servers handling multiple requests simultaneously
Q191. What are collections in java
Collections in Java are classes and interfaces that provide a way to store and manipulate groups of objects.
Collections provide dynamic data structures like List, Set, and Map.
They offer methods to add, remove, and manipulate elements in the collection.
Examples include ArrayList, LinkedList, HashSet, and HashMap.
Q192. Describe OOPs Concepts
OOPs Concepts are the principles of Object-Oriented Programming that help in designing and implementing software systems.
Encapsulation - bundling of data and methods that operate on that data
Inheritance - ability of a class to inherit properties and methods from a parent class
Polymorphism - ability of objects to take on many forms
Abstraction - hiding of complex implementation details from the user
Objects - instances of classes that encapsulate data and behavior
Classes - bluep...read more
Q193. What is Stack ?
A stack is a data structure that follows the Last In First Out (LIFO) principle, where elements are added and removed from the top.
Elements are added to the top of the stack and removed from the top as well
Common operations on a stack include push (add element), pop (remove element), and peek (view the top element without removing)
Examples of stacks include the call stack in programming and the undo feature in text editors
Q194. How to swap 2 string.
To swap two strings, use a temporary variable to hold one string and then assign the other string to the first variable.
Create a temporary variable to hold one of the strings
Assign the value of the first string to the temporary variable
Assign the value of the second string to the first variable
Assign the value of the temporary variable to the second variable
Q195. What is proc sql explain
PROC SQL is a SAS procedure used for data manipulation and querying using SQL language.
PROC SQL can be used to join tables, filter data, group data, and perform calculations.
It supports various SQL clauses like SELECT, FROM, WHERE, GROUP BY, HAVING, and ORDER BY.
PROC SQL can also create and modify tables, indexes, and views.
It can be used to connect to external databases and query data from them.
PROC SQL is commonly used in SAS programming for data analysis and reporting.
Q196. Interfaces and abstract classes in java
Interfaces define a contract for classes to implement, while abstract classes provide partial implementation.
Interfaces in Java are used to define a contract that classes must implement. They contain method signatures but no implementation.
Abstract classes in Java are used to provide partial implementation for classes. They can have both abstract and concrete methods.
A class can implement multiple interfaces but can only extend one abstract class.
Interfaces are used for achie...read more
Q197. What is dqueue?
dqueue is a data structure that allows insertion and deletion of elements from both ends.
dqueue stands for double-ended queue.
It is also known as deque.
It can be implemented using arrays or linked lists.
Examples of applications include job scheduling and CPU task management.
Operations include push, pop, inject, and eject.
Q198. What is binary tree
A binary tree is a data structure consisting of nodes, where each node has at most two children.
Each node has a left and/or right child node
The left child node is always less than the parent node
The right child node is always greater than the parent node
Used for efficient searching and sorting algorithms
Q199. Any questions?
Yes, I have a few questions regarding the project timeline and budget.
Can you provide more information on the expected timeline for this project?
What is the budget allocated for this project?
Are there any specific milestones or deliverables that need to be met?
What is the scope of the project and what are the expected outcomes?
Are there any potential roadblocks or challenges that we should be aware of?
Q200. Different between router and filter
Routers are devices that direct data packets to their destination, while filters are used to block or allow specific data based on set criteria.
Routers determine the best path for data packets to reach their destination
Filters are used to block or allow specific data based on set criteria
Routers are commonly used in networking to connect multiple devices and manage traffic flow
Filters are often used in email systems to block spam or in firewalls to restrict access to certain ...read more
Top HR Questions asked in Wipro Project Engineer
Interview Process at Wipro Project Engineer

Top Project Engineer Interview Questions from Similar Companies




