i
Wipro
Filter interviews by
posted on 8 Nov 2019
I applied via Walk-in and was interviewed in May 2019. There were 5 interview rounds.
Booting process is the sequence of events that occur when a computer system is turned on.
BIOS/UEFI firmware initializes hardware components
Bootloader loads the kernel into memory
Kernel initializes system processes and drivers
Init system starts user space processes and services
Graphical user interface (GUI) is loaded for user interaction
I have worked on Red Hat Enterprise Linux versions 6, 7, and 8.
I have experience with installation, configuration, and maintenance of Red Hat Enterprise Linux servers.
I have worked with Red Hat Enterprise Linux 6, 7, and 8 in both physical and virtual environments.
I have experience with package management, user management, and security hardening on Red Hat Enterprise Linux.
I have also worked with Red Hat Satellite for ...
Free up disk space by identifying and removing unnecessary files.
Identify large files and delete them
Remove old log files
Clear cache and temporary files
Compress large files
Move files to another disk or server
Sticky bit and SGID are special permissions in Linux file system.
Sticky bit is denoted by 't' in file permission and restricts deletion of files in a directory by non-owners.
SGID is denoted by 's' in file permission and sets the group ID of newly created files to the group of the parent directory.
SGID can also be used on executable files to allow users to run them with the permissions of the group that owns the file.
SG...
Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.
Zombie process is waiting for its parent to read its exit status
Orphan process is adopted by init process (PID 1)
Zombie process can be removed by killing its parent process
Orphan process can continue running even after its parent has terminated
RAID stands for Redundant Array of Independent Disks. It is a data storage technology that combines multiple physical disks into a single logical unit.
There are several types of RAID, including RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, and more.
RAID 0 offers no redundancy but provides improved performance by striping data across multiple disks.
RAID 1 provides mirroring of data across two disks, offering redundancy but n...
Network bonding is the process of combining multiple network interfaces into a single logical interface.
Network bonding provides redundancy and increased bandwidth.
There are different bonding modes such as active-backup, balance-rr, and LACP.
Bonding can be configured using the ifenslave utility or through network configuration files.
Examples of network interfaces that can be bonded include Ethernet, Wi-Fi, and InfiniBa...
systemd is a system and service manager while services are individual programs that run in the background.
systemd is responsible for managing the system's startup and shutdown processes
services are individual programs that run in the background and can be managed by systemd
systemd can start, stop, restart, enable, and disable services
services can be configured to start automatically at boot time using systemd
systemd pr...
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
There were a total of seven sections: verbal ability, logical reasoning, arithmetic problems, verbal reasoning, puzzles, pseudocodes, and essay writing, with each section having its own cutoff scores.
I was interviewed in Oct 2024.
I was interviewed in Jul 2024.
Lambda expression is a concise way to represent an anonymous function in programming languages.
Lambda expressions are used to create functions without a name.
They are often used in functional programming languages like Python and Java.
Lambda expressions can take parameters and return a value.
Example: (x, y) -> x + y is a lambda expression that takes two parameters and returns their sum.
Hibernate is better than JDBC due to its object-relational mapping capabilities, automatic table creation, and improved performance.
Hibernate provides object-relational mapping (ORM) which simplifies database interactions by mapping Java objects to database tables, eliminating the need for manual SQL queries.
Hibernate can automatically generate SQL queries based on the Java objects, reducing the amount of code that nee...
Filter names starting with A from a list of strings
Iterate through the list of strings
Check if each string starts with 'A'
Add the string to a new list if it starts with 'A'
I applied via TCS and was interviewed in Dec 2024. There was 1 interview round.
Hash technology is a method used to convert data into a fixed-size string of characters, typically used for data security and integrity.
Hash technology uses algorithms to generate a unique fixed-size string of characters from input data.
It is commonly used for data security, password storage, digital signatures, and data integrity verification.
Examples of hash algorithms include MD5, SHA-1, and SHA-256.
Blockchain is a decentralized, distributed ledger technology used to securely record transactions across multiple computers.
Decentralized database
Consensus mechanism
Immutable record of transactions
Cryptographic security
Smart contracts
Examples: Bitcoin, Ethereum
DML stands for Data Manipulation Language, used to manage data in a database.
DML is a subset of SQL (Structured Query Language) used to insert, update, delete, and retrieve data in a database.
Examples of DML commands include INSERT, UPDATE, DELETE, and SELECT.
DML is essential for managing and manipulating data within a database system.
Binary to decimal conversion involves multiplying each digit by 2 raised to the power of its position.
To convert binary to decimal, start from the rightmost digit and multiply each digit by 2 raised to the power of its position.
Add all the results together to get the decimal equivalent.
For example, to convert binary 1011 to decimal: 1*2^3 + 0*2^2 + 1*2^1 + 1*2^0 = 11.
Iterate through array and compare each element to find the maximum number.
Iterate through the array using a loop.
Compare each element to a variable storing the current maximum number.
Update the variable if a larger number is found.
Return the maximum number at the end.
Basic HTML code for inserting image and creating a table
Use <img> tag to insert an image with src attribute
Use <table>, <tr>, <td> tags to create a table structure
Specify image source and table content within respective tags
I applied via Campus Placement and was interviewed in Nov 2024. There were 2 interview rounds.
Its very easy
Basic maths questions learned up to 10
Basic Apptitude questions
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
Grant SFTP access exclusively to user David
Create a new group specifically for David, e.g. 'davidgroup'
Set the ChrootDirectory in the SSH configuration file to restrict David's access to a specific directory
Add David to the 'davidgroup' and configure the necessary permissions for SFTP access
To lock a user out after 6 unsuccessful password attempts for 30 minutes, modify the PAM configuration file.
Edit the PAM configuration file (/etc/pam.d/common-auth) to include the 'pam_tally2' module.
Set the 'deny' option in the 'pam_tally2' module to lock the user out after 6 failed attempts.
Specify the 'unlock_time' option in the 'pam_tally2' module to set the duration of the lockout period to 30 minutes.
Example: aut
based on 8 reviews
Rating in categories
Project Engineer
32.6k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23k
salaries
| ₹5.8 L/yr - ₹22.5 L/yr |
Senior Associate
21.2k
salaries
| ₹0.8 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.5k
salaries
| ₹5 L/yr - ₹19 L/yr |
Technical Lead
18.6k
salaries
| ₹8.3 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon