
Wipro


100+ Wipro Software Engineer Interview Questions and Answers
Q101. Normalisation and denormalization in sql
Normalization is the process of organizing data in a database while denormalization is the process of intentionally introducing redundancy into a database.
Normalization is used to eliminate data redundancy and improve data integrity.
Denormalization is used to improve query performance by reducing the number of joins needed.
Normalization involves breaking down a table into smaller tables and establishing relationships between them.
Denormalization involves adding redundant data...read more
Q102. Program on reverse string
Program to reverse a string
Create an empty string to store the reversed string
Loop through the original string from end to start
Append each character to the empty string
Return the reversed string
Q103. String vs StringBuilder vs StringBuffer
String is immutable, StringBuilder is mutable and faster, StringBuffer is thread-safe.
String is immutable, meaning once created, it cannot be changed. StringBuilder and StringBuffer are mutable, allowing for modifications.
StringBuilder is faster than StringBuffer because it is not thread-safe. StringBuffer is thread-safe but slower due to synchronization.
Use StringBuilder for single-threaded operations where speed is important. Use StringBuffer for multi-threaded operations w...read more
Q104. What is soft ware
Software refers to a collection of programs, data, and instructions that enable a computer to perform specific tasks.
Software is a set of instructions that tell a computer what to do.
It includes programs, data, and documentation.
Examples of software include operating systems, applications, and games.
Q105. What is a adls
ADLS stands for Azure Data Lake Storage, a scalable and secure data lake platform for big data analytics.
ADLS is a cloud-based storage solution provided by Microsoft Azure.
It is designed for big data analytics and can handle massive amounts of data.
ADLS offers features like high availability, security, and scalability.
Example: ADLS Gen2 is a combination of Azure Blob Storage and Azure Data Lake Storage capabilities.
Q106. Explain SAP internal table
SAP internal table is a data structure used to store data within a program in SAP systems.
Internal tables are used to store data temporarily within a program
They can be defined with different types like standard, sorted, hashed
Data can be accessed using index or key
Example: DATA: itab TYPE TABLE OF string.
Q107. Introducing ur self in description
I am a passionate software engineer with experience in developing web applications using various technologies.
Experienced in front-end development with HTML, CSS, and JavaScript
Proficient in back-end development with Node.js and Express
Familiar with database management using SQL and MongoDB
Strong problem-solving skills and ability to work in a team environment
Q108. Your current Ctc and expected
Current Ctc: $80,000 Expected Ctc: $100,000
Current Ctc: $80,000
Expected Ctc: $100,000
Q109. @Controller vs @RestController
Both are used in Spring MVC for handling HTTP requests, but @RestController is used for RESTful web services.
Both are annotations used in Spring MVC
@Controller is used for handling HTTP requests and returning views
@RestController is used for RESTful web services and returns data in JSON/XML format
In @RestController, @ResponseBody is not required as it is included by default
Q110. What is Netbanking
Netbanking is an online banking service that allows customers to perform various financial transactions through the internet.
Netbanking enables customers to access their bank accounts and perform activities such as checking account balance, transferring funds, paying bills, and managing investments.
It provides a convenient and secure way for customers to manage their finances without visiting a physical bank branch.
Customers can access netbanking services through a web browse...read more
Q111. what is p2p cycle?
P2P cycle stands for Procure to Pay cycle, which is the process of purchasing goods or services from a supplier.
P2P cycle involves requisitioning, purchasing, receiving, and paying for goods or services.
It starts with creating a purchase requisition, followed by supplier selection and purchase order creation.
Goods are received, invoices are matched with purchase orders, and payments are made to the supplier.
The cycle ends with reconciliation and reporting of the transactions.
Q112. What is arraylist
ArrayList is a dynamic array in Java that can grow or shrink in size as needed.
ArrayList is a class in Java that implements the List interface.
It allows for dynamic resizing, unlike regular arrays.
Elements can be added, removed, or accessed using index positions.
Example: ArrayList
names = new ArrayList ();
Q113. What is spring boot
Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based Applications.
Spring Boot simplifies the process of creating Spring applications by providing a set of default configurations.
It allows for easy setup of Spring projects with minimal configuration.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow, making it easy to deploy applications.
It promotes convention over configuration, reducing the need for boilerplate ...read more
Q114. Precompiler process in db2
Precompiler process in DB2 is used to translate embedded SQL statements into standard SQL statements.
Precompiler process is used to check syntax and semantics of embedded SQL statements.
It translates embedded SQL statements into standard SQL statements.
Precompiler generates host language calls to the DB2 runtime.
Precompiler helps in improving performance by reducing runtime overhead.
Q115. Steps in cobol db2 pgm
Steps in COBOL DB2 program involve defining the program structure, connecting to DB2, executing SQL statements, and handling results.
Define the program structure including data division, working-storage section, and procedure division.
Connect to DB2 using EXEC SQL statements.
Execute SQL statements to interact with the database.
Handle the results of the SQL statements, such as fetching data or updating records.
Q116. Describe OOPs concept
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs focuses on creating objects that interact with each other to solve complex problems
Key principles include encapsulation, inheritance, and polymorphism
Encapsulation allows data hiding and abstraction, protecting data from outside interference
Inheritance enables the creation of new classes based on existing ones, promoting code reusability
Polymorphi...read more
Q117. Describe OOPS CONCEPTS
OOPS concepts are the fundamental principles of Object-Oriented Programming.
Encapsulation - bundling of data and methods that manipulate the data
Inheritance - creating new classes from existing ones
Polymorphism - ability of objects to take on many forms
Abstraction - hiding implementation details and showing only functionality
Q118. Describe MVVM Architecture
MVVM is an architectural pattern used in software development that separates the user interface from the business logic.
Model represents the data and business logic
View displays the data and interacts with the user
ViewModel acts as a mediator between the Model and View, handling user inputs and updating the Model
Q119. What is Stream API
Stream API is a feature in Java that allows processing collections of objects in a functional style.
Stream API provides a way to perform operations on collections of objects in a declarative way.
It supports functional-style operations like map, filter, reduce, and forEach.
Stream API can be used to process large amounts of data efficiently.
Example: List
names = Arrays.asList("Alice", "Bob", "Charlie"); Stream stream = names.stream();
Q120. Internal working of hash map
Hash map is a data structure that stores key-value pairs using a hash function to map keys to indices in an array.
Hash map uses a hash function to compute an index for a given key.
Collisions can occur when two keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Hash map provides constant time complexity for insertion, deletion, and retrieval of key-value pairs.
Java's HashMap class and Python's dict type are examples of hash maps...read more
Q121. Longest common prefixs
Find the longest common prefix among an array of strings.
Iterate through the characters of the first string and compare with the corresponding characters of other strings.
Stop when a mismatch is found or when reaching the end of the shortest string.
Return the prefix found so far.
Q122. Left view of Binary Tree
The left view of a binary tree is the set of nodes visible when the tree is viewed from the left side.
Traverse the tree in a level order manner and keep track of the first node at each level.
Use a queue data structure to store nodes at each level.
Example: For a binary tree with root node 1, left child 2, and right child 3, the left view would be [1, 2].
Q123. Describe application lifecycle
Application lifecycle refers to the stages an application goes through from development to retirement.
The lifecycle includes planning, development, testing, deployment, maintenance, and retirement.
During planning, requirements are gathered and a plan is created.
Development involves writing code and creating the application.
Testing ensures the application works as intended.
Deployment involves making the application available to users.
Maintenance involves fixing bugs and making...read more
Q124. {DATE[][+2w][]}
The question is asking for the current date plus 2 weeks.
Use a programming language's date manipulation functions to get the current date.
Add 2 weeks to the current date to get the desired date.
Consider leap years and different month lengths when calculating the date.
Top HR Questions asked in Wipro Software Engineer
Interview Process at Wipro Software Engineer

Top Software Engineer Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

