i
Wipro
Filter interviews by
I applied via Company Website and was interviewed in Jul 2023. There were 3 interview rounds.
I applied via Approached by Company and was interviewed before Sep 2022. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Apr 2023. There was 1 interview round.
SAP offers various business processes such as procurement, sales, production planning, and financial accounting.
Procurement process involves purchasing goods and services from external vendors.
Sales process includes activities related to selling products or services to customers.
Production planning process focuses on planning and scheduling production activities.
Financial accounting process involves managing financial
S4 implementation methodology and features involve a structured approach to implementing SAP S/4HANA with key features like simplification, innovation, and integration.
S4 implementation methodology follows a structured approach to ensure successful deployment of SAP S/4HANA.
Key features of S4 implementation methodology include simplification of processes, innovation through new technologies, and integration with other ...
What people are saying about Wipro
Unibasic files are used in Unidata database management system and can be of different types.
Unibasic program files (.BASIC)
Compiled Unibasic program files (.UV)
Data files (.DAT)
Index files (.IDX)
Dictionary files (.DICT)
Accounting files (.ACCT)
Report files (.RPT)
Temporary files (.TMP)
Dictionary items can be created using the key-value pair syntax in Python.
Use curly braces {} to create an empty dictionary.
Use square brackets [] to access or add items to the dictionary.
Example: my_dict = {'key1': 'value1', 'key2': 'value2'}
Example: my_dict['key3'] = 'value3'
Wipro interview questions for designations
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
Get interview-ready with Top Wipro Interview Questions
I applied via Approached by Company and was interviewed in Sep 2021. There were 5 interview rounds.
A presentation on a few set topics.
Effort estimation for software module development
Break down the module into smaller tasks
Estimate time required for each task
Consider dependencies and risks
Use historical data and expert judgment
Adjust estimates based on complexity and team experience
Use tools like PERT, COCOMO, or function points
Regularly review and update estimates
A data center basic data flow design involves the movement of data between servers, storage devices, and networks.
Data is received from external sources and processed by servers
Processed data is stored in storage devices
Data is retrieved from storage devices and sent to networks for distribution
Networks transmit data to end-users or other systems
Data is constantly monitored and managed for security and efficiency
A DMZ is a network segment that separates an organization's internal network from an untrusted network.
DMZ stands for Demilitarized Zone
It is created to provide an additional layer of security to an organization's network
It is typically used to host publicly accessible servers such as web servers, email servers, etc.
Traffic to and from the DMZ is heavily monitored and restricted to prevent unauthorized access to the in...
APM stands for Application Performance Management. Sync of DC to DR is done for disaster recovery purposes.
APM is the monitoring and management of performance and availability of software applications.
Sync of DC to DR is done to ensure that in case of a disaster, the secondary data center has the most up-to-date data.
This is typically done through replication technologies such as synchronous or asynchronous replication...
Sandboxing is a security mechanism used to isolate programs or processes from the rest of the system.
It creates a virtual environment for testing and running untrusted code
It prevents malicious code from accessing sensitive data or resources
It is commonly used in web browsers to prevent malware from infecting the system
Examples include Docker containers, virtual machines, and chroot jails
A routing algorithm is a process of determining the best path for data to travel from one network to another.
Routing algorithms are used in computer networks to determine the most efficient path for data to travel.
Examples of routing algorithms include OSPF, BGP, and RIP.
Routing algorithms work by analyzing network topology and selecting the best path based on factors such as distance, bandwidth, and cost.
Some routing ...
SIEM is a security tool that collects and analyzes security events. Two factor authentication adds an extra layer of security. SSL is a protocol for secure communication.
SIEM stands for Security Information and Event Management
SIEM collects and analyzes security events from various sources
Two factor authentication requires two forms of identification to access a system
SSL stands for Secure Sockets Layer
SSL is a protoco...
posted on 5 May 2022
I applied via Company Website and was interviewed in Nov 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jul 2021. There were 5 interview rounds.
based on 36 interviews
3 Interview rounds
based on 264 reviews
Rating in categories
Project Engineer
32.7k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23.1k
salaries
| ₹5.8 L/yr - ₹22.1 L/yr |
Senior Associate
21.3k
salaries
| ₹0.9 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.4k
salaries
| ₹5 L/yr - ₹19.5 L/yr |
Technical Lead
18.7k
salaries
| ₹8.3 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon