Add office photos
Engaged Employer

Wipro

3.7
based on 53.2k Reviews
Video summary
Filter interviews by

2500+ BENGAL BUILDING SOLUTIONS Interview Questions and Answers

Updated 2 Mar 2025
Popular Designations

Q101. What are the steps involved in program execution? When is the memory allocated to the program variables?

Ans.

Program execution involves several steps, including compilation, linking, loading, and execution. Memory is allocated to program variables during runtime.

  • Compilation: Source code is translated into machine code or bytecode.

  • Linking: Object files and libraries are combined to create an executable file.

  • Loading: The executable file is loaded into memory.

  • Execution: The program instructions are executed by the CPU.

  • Memory Allocation: Memory is allocated to program variables during r...read more

Add your answer

Q102. What is the difference between impact and urgency?

Ans.

Impact refers to the extent of the consequences caused by an incident, while urgency refers to the time sensitivity of resolving the incident.

  • Impact is about the severity and extent of the damage caused by an incident.

  • Urgency is about the time sensitivity and the need for immediate action to resolve the incident.

  • Impact is measured in terms of the disruption caused to the business or services.

  • Urgency is measured in terms of the time constraints and the impact on business opera...read more

View 1 answer

Q103. If we have a input file with one record and lookup file with 5 records and input record matches with all 5 records in lookup file. How many records will you get in output

Ans.

The output will have 5 records.

  • The input record matches with all 5 records in the lookup file.

  • Each match will result in a separate record in the output.

  • Therefore, the output will have 5 records.

View 1 answer

Q104. Write the code:- count number of characters and alphabets in string.

Ans.

Code to count number of characters and alphabets in a string.

  • Use the len() function to count the total number of characters in the string.

  • Use isalpha() function to check if a character is an alphabet or not.

  • Loop through each character in the string and increment the count of alphabets if it is an alphabet.

  • Return the total count of characters and alphabets in the string.

Add your answer
Discover BENGAL BUILDING SOLUTIONS interview dos and don'ts from real experiences

Q105. What will you do if your system is infected with the malware and how will you backup

Ans.

If infected with malware, isolate system, run antivirus scan, remove malware, backup data to external device.

  • Isolate infected system from network to prevent further spread of malware

  • Run antivirus scan to detect and remove malware

  • If antivirus scan fails, use malware removal tools or seek professional help

  • Backup important data to external device before attempting any fixes

  • Ensure backup device is not infected with malware before restoring data

View 2 more answers

Q106. Tell me about OOPS concepts in python.

Ans.

OOPS concepts in Python include inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance allows a class to inherit properties and methods from a parent class.

  • Encapsulation refers to the practice of hiding implementation details from the user.

  • Polymorphism allows objects to take on multiple forms or behaviors.

  • Abstraction involves creating a simplified representation of complex real-world objects.

  • Python supports all four OOPS concepts and allows for easy implementat...read more

View 17 more answers
Are these interview questions helpful?

Q107. 19c upgradation steps Challanges faced during upgradation. Dataguard configuration Opatch rollback steps. RMAN duplication

Ans.

Upgrading to Oracle Database 19c and related challenges

  • Ensure compatibility of existing applications with 19c

  • Perform pre-upgrade tasks such as backup and patching

  • Upgrade the database using DBUA or manual methods

  • Address challenges such as deprecated features and changes in behavior

  • Configure Data Guard for high availability and disaster recovery

  • Rollback an OPatch using the -rollback option

  • Use RMAN duplication to create a copy of the database for testing or reporting

Add your answer

Q108. What is class? what is an operating system? what do you know about the OSI model? what is difference between compilers and interpreters? what do you know about SDLC?

Ans.

A class is a blueprint for creating objects in object-oriented programming.

  • A class defines the properties and behaviors of an object.

  • It serves as a template for creating multiple instances of objects.

  • Objects are instances of a class.

  • Classes can have attributes (variables) and methods (functions).

View 2 more answers
Share interview questions and help millions of jobseekers 🌟

Q109. How to achieve parallel testing in selenium using Java?

Ans.

Achieve parallel testing in Selenium using Java

  • Use TestNG framework to execute tests in parallel

  • Create multiple instances of WebDriver

  • Use ThreadLocal to maintain thread safety

  • Use Selenium Grid to distribute tests across multiple machines

  • Configure TestNG XML file to specify parallel execution mode

Add your answer

Q110. What is your experience with database management systems?

Ans.

I have extensive experience with database management systems.

  • Proficient in SQL and NoSQL databases

  • Designed and implemented database schemas

  • Optimized database performance through indexing and query optimization

  • Experience with MySQL, MongoDB, and PostgreSQL

  • Familiarity with data warehousing and ETL processes

View 3 more answers

Q111. What do you know about insurance?

Ans.

Insurance is a contract between an individual and an insurance company, providing financial protection against potential losses.

  • Insurance is a form of risk management.

  • It involves the transfer of risk from an individual to an insurance company.

  • Insurance policies provide financial compensation in case of specified events or losses.

  • Types of insurance include life, health, property, auto, and liability insurance.

  • Premiums are paid by the insured to the insurance company in exchang...read more

View 3 more answers

Q112. differences between credit card and debit card

Ans.

Credit cards allow borrowing money while debit cards use funds from a linked account.

  • Credit cards charge interest on unpaid balances while debit cards do not.

  • Credit cards offer rewards and cashback while debit cards do not.

  • Credit cards have a credit limit while debit cards do not.

  • Credit cards can be used to build credit history while debit cards cannot.

  • Examples of credit cards include Visa, Mastercard, and American Express while examples of debit cards include Visa Debit, Mas...read more

View 19 more answers

Q113. In a page there are two login button available, So will it have same ID?

Ans.

No, the two login buttons should not have the same ID.

  • IDs should be unique for each element on a page

  • Having two elements with the same ID can cause issues with locating and interacting with the elements

View 1 answer

Q114. Write a program for the Fibonacci series up to nth term.

Ans.

Program to generate Fibonacci series up to nth term.

  • Declare variables for first and second terms of the series

  • Use a loop to generate the series up to nth term

  • Print the series as output

View 1 answer

Q115. Can you explain real-life examples of where OOPs concepts?

Ans.

OOPs concepts are used in various real-life scenarios such as software development, game development, and automation.

  • In software development, OOPs concepts are used to create reusable code and improve code organization.

  • In game development, OOPs concepts are used to create game objects with properties and behaviors.

  • In automation, OOPs concepts are used to create modular and scalable code for testing and scripting.

Add your answer

Q116. Can you define AI in terms of security with suitable examples. And with a solution approach. Is AI a threat? Elaborate. What libraries of Python can be used so for security purposes?

Ans.

AI in security involves using machine learning algorithms to detect and prevent cyber threats.

  • AI can analyze large amounts of data to identify patterns and anomalies that may indicate a security breach.

  • Examples include using AI to detect malware, phishing attacks, and network intrusions.

  • AI can also be used to automate threat response and enhance incident response capabilities.

  • Python libraries like TensorFlow, Keras, and Scikit-learn can be used for building AI-based security ...read more

View 1 answer

Q117. Difference between singly linked list and doubly linked list , OOP concepts , Prime number logic ,Armstrong number logic

Ans.

Explaining the difference between singly and doubly linked lists and discussing OOP concepts, prime number and Armstrong number logic.

  • Singly linked list has one pointer to the next node while doubly linked list has two pointers to the next and previous nodes.

  • OOP concepts include encapsulation, inheritance, and polymorphism.

  • Prime number logic involves checking if a number is only divisible by 1 and itself.

  • Armstrong number logic involves checking if a number is equal to the sum...read more

Add your answer

Q118. What experience do you have working with technologies like Javascript , Html , CSS , NodeJs ?

Ans.

I have extensive experience working with Javascript, HTML, CSS, and NodeJs in various projects.

  • Developed interactive web applications using Javascript, HTML, and CSS

  • Utilized NodeJs for server-side development and building APIs

  • Implemented responsive design techniques with CSS frameworks like Bootstrap

  • Integrated front-end and back-end technologies to create seamless user experiences

Add your answer

Q119. How to populate manager using Server side code

Ans.

To populate manager using server-side code, you can query the user table and retrieve the manager's details based on the user's ID.

  • Use GlideRecord to query the user table

  • Retrieve the manager's details using the user's ID

  • Set the manager field with the retrieved manager's details

View 2 more answers

Q120. What all authentication measures did you take in your projects?

Ans.

I implemented multiple authentication measures in my projects to ensure secure access.

  • Implemented password-based authentication with strong password policies

  • Utilized two-factor authentication for an added layer of security

  • Implemented biometric authentication using fingerprint or facial recognition

  • Used multi-factor authentication to combine multiple authentication methods

  • Implemented single sign-on (SSO) for seamless and secure access across multiple systems

  • Implemented role-bas...read more

Add your answer

Q121. Os installed and networking , what is hardware

Ans.

Hardware refers to the physical components of a computer system, such as the motherboard, CPU, RAM, and hard drive.

  • Hardware is the physical components that make up a computer system

  • Examples of hardware include the motherboard, CPU, RAM, hard drive, and network interface card

  • Hardware is essential for a computer system to function properly

  • Hardware can be upgraded or replaced to improve performance or fix issues

View 2 more answers

Q122. What is the Lifecycle of MIM

Ans.

The lifecycle of Major Incident Manager (MIM) involves several stages from identification to resolution.

  • Identification of major incidents

  • Logging and categorizing incidents

  • Assigning resources and forming an incident management team

  • Investigation and analysis of incidents

  • Implementing temporary workarounds or fixes

  • Communicating with stakeholders and providing updates

  • Resolving the incident and restoring normal service

  • Conducting post-incident reviews and documenting lessons learned

View 3 more answers

Q123. If we give you different domain rather then your preferred domain will you work on it ?

Ans.

Yes, I am open to working on different domains as it will broaden my knowledge and skills.

  • I am always eager to learn new things and take on new challenges.

  • Working on a different domain will give me the opportunity to expand my knowledge and skills.

  • I am confident that I can adapt quickly and efficiently to a new domain.

  • Examples: If I have experience in software engineering and I am asked to work on a networking project, I will be willing to learn and work on it.

  • Examples: If I ...read more

Add your answer

Q124. 5) what all db activities can be part of transaction group ?

Ans.

DB activities that can be part of a transaction group

  • Insertion of data into a table

  • Updating data in a table

  • Deletion of data from a table

  • Creating or dropping a table

  • Altering the structure of a table

  • Executing stored procedures

  • Executing functions

  • Executing triggers

View 1 answer

Q125. Explain the Order to Cash Flow ? How you book the order ? How you Invoice the order ? Scenario Based Question about If customer reject the invoice, what's the next step ?

Ans.

Order to Cash Flow involves booking orders, invoicing customers, and handling rejections.

  • Booking the order involves capturing customer details, product/service details, quantity, pricing, and delivery terms.

  • Invoicing the order includes generating an invoice with all relevant details, such as customer name, order details, pricing, and payment terms.

  • If a customer rejects the invoice, the next step is to investigate the reason for rejection, address any issues, and reissue the i...read more

View 2 more answers

Q126. What is Testing? And why we use testing? What bugs do you find in website? Share your toughest experience of solving a bug and what functions did you used while solving it?

Ans.

Testing is the process of evaluating a system or component to find defects and ensure its quality.

  • Testing is done to identify defects or bugs in a system or component.

  • It helps in ensuring the quality and reliability of the software.

  • Testing involves executing test cases and comparing the actual results with expected results.

  • Different types of testing include functional testing, performance testing, security testing, etc.

  • Bugs commonly found in websites include broken links, inc...read more

View 1 answer

Q127. return index of the elements whose sum is equal to given sum in an array

Ans.

Return index of elements whose sum is equal to given sum in an array.

  • Iterate through the array and check if the sum of any two elements is equal to the given sum.

  • If yes, return the indices of those two elements.

  • If no such pair exists, return an empty array.

Add your answer

Q128. Do you have any technical certifications? How many programming languages do you know? What are the different types of OS you are comfortable working with? What is the extent of your technical expertise? How man...

read more
Ans.

I have technical certifications and experience with multiple OS and development tools.

  • I have a certification in CompTIA A+ and am working towards my Network+ certification.

  • I am proficient in Java, Python, and C++.

  • I am comfortable working with Windows, MacOS, and Linux operating systems.

  • My technical expertise includes troubleshooting hardware and software issues, network connectivity, and system administration.

  • I have used development tools such as Eclipse, Visual Studio, and G...read more

Add your answer

Q129. Tell me about your college? What are the advantages of autonomous College?

Ans.

Autonomous colleges are independent and have more academic freedom.

  • Autonomous colleges have the freedom to design their own courses and syllabus.

  • They can also conduct their own exams and evaluate students.

  • This allows for more flexibility and innovation in teaching methods.

  • Autonomous colleges are also able to respond more quickly to changes in the industry and job market.

  • Examples of autonomous colleges include Indian Institute of Technology (IIT) and Indian Institute of Manage...read more

Add your answer

Q130. what is the difference between class and objects?

Ans.

A class is a blueprint for creating objects, while an object is an instance of a class.

  • A class defines the properties and methods that objects of that class will have.

  • An object is created from a class and has its own unique set of values for the properties defined in the class.

  • Multiple objects can be created from the same class.

  • Classes can inherit properties and methods from other classes.

  • Example: A class 'Car' can have properties like 'make', 'model', and 'year', while an ob...read more

View 2 more answers

Q131. What is the use of stack memory, data memory and program memory?

Ans.

Stack, data and program memory are used in software engineering for storing and managing data and instructions.

  • Stack memory is used for storing local variables and function calls.

  • Data memory is used for storing global and static variables.

  • Program memory is used for storing the executable code of the program.

  • Examples of stack memory usage include recursion and function calls.

  • Examples of data memory usage include global variables and constants.

  • Examples of program memory usage i...read more

Add your answer

Q132. What is the difference between C and C++?

Ans.

C++ is an extension of C with object-oriented programming features.

  • C++ supports classes and objects while C does not.

  • C++ has better support for polymorphism and inheritance.

  • C++ has a standard template library (STL) which provides useful data structures and algorithms.

  • C++ is more complex than C and requires more knowledge to use effectively.

Add your answer

Q133. What is durability in acid properties

Ans.

Durability in acid properties refers to the ability of a material to withstand the corrosive effects of acid.

  • Durability is important in industries that use acids, such as chemical manufacturing and mining.

  • Materials with high durability in acid properties include stainless steel and certain types of plastics.

  • Durability can be measured through tests such as the ASTM G31 standard.

  • Factors that affect durability include concentration and temperature of the acid, as well as the mat...read more

Add your answer

Q134. Who will you escalate first when a client reports an incident?

Ans.

I will escalate the incident to the project manager first.

  • Escalate the incident to the project manager for immediate action.

  • Project manager can assess the severity of the incident and coordinate with the client.

  • If necessary, involve higher management or relevant stakeholders based on the project's escalation process.

Add your answer

Q135. what is NAT gateway and where it is used.

Ans.

NAT gateway is a managed service that allows instances in a private subnet to connect to the internet.

  • NAT gateway acts as a gateway for instances in a private subnet to access the internet.

  • It provides a public IP address to instances in the private subnet.

  • It helps in controlling the inbound and outbound traffic for instances in the private subnet.

  • It is used in scenarios where instances in a private subnet need to access the internet but do not have a public IP address.

  • It is a...read more

Add your answer

Q136. How do you define Digital Transformation strategy for a client ?

Ans.

Digital Transformation strategy for a client involves identifying areas of improvement and implementing technology solutions to enhance business operations.

  • Understand the client's business goals and objectives

  • Identify areas of improvement and pain points

  • Evaluate existing technology infrastructure

  • Develop a roadmap for implementing new technology solutions

  • Ensure alignment with business strategy and goals

  • Provide training and support for employees

  • Continuously monitor and evaluate...read more

Add your answer

Q137. What do you know about Wipro?

Ans.

Wipro is an Indian multinational corporation that provides information technology, consulting and business process services.

  • Founded in 1945 by M.H. Hasham Premji

  • Headquartered in Bangalore, India

  • Employs over 190,000 people worldwide

  • Provides services in various industries including healthcare, finance, and retail

  • Has partnerships with major technology companies such as Microsoft and SAP

Add your answer

Q138. What is static and dynamic memory allocation?

Ans.

Static memory allocation is done at compile-time, while dynamic memory allocation is done at runtime.

  • Static memory allocation is used for variables that are fixed in size and do not change during program execution.

  • Dynamic memory allocation is used for variables that can change in size during program execution.

  • Static memory allocation is faster than dynamic memory allocation.

  • Dynamic memory allocation is useful when the size of the data is not known at compile-time.

  • Examples of ...read more

Add your answer

Q139. What are noises in data set and how to classify data for the training of model

Ans.

Noises in data set are irrelevant or erroneous data. Data classification is done based on features and labels.

  • Noises are irrelevant or erroneous data that can affect the accuracy of the model

  • Data classification is done based on features and labels

  • Features are the input variables and labels are the output variables

  • Data can be classified as categorical or numerical

  • Categorical data can be further classified as nominal or ordinal

  • Numerical data can be further classified as discret...read more

Add your answer

Q140. What is Google mapping

Ans.

Google Maps is a web mapping service developed by Google. It offers satellite imagery, street maps, 360° panoramic views of streets, real-time traffic conditions, and route planning.

  • Provides detailed maps and satellite imagery of locations worldwide

  • Offers real-time traffic updates and route planning

  • Includes 360° panoramic views of streets

  • Can be used for navigation and exploring new places

  • Has features like Street View, indoor maps, and local business information

View 2 more answers

Q141. what is oops. explain pillars of oops. Why we need oops in programming?

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • Pillars of OOPs: Inheritance, Encapsulation, Polymorphism, Abstraction

  • Inheritance: Allows a class to inherit properties and behavior from another class

  • Encapsulation: Bundling of data with the methods that operate on that data

  • Polymorphism: Ability to present the same interface for different da...read more

Add your answer

Q142. What are the OOPS concepts? Give an real life example of polymorphism.

Ans.

OOPS concepts are fundamental principles of object-oriented programming. Polymorphism allows objects to be treated as instances of their parent class.

  • OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Example: In a real life scenario, a parent class 'Vehicle' can have subclasses like 'Car' and 'Truck'. Both Car and Truck can have a method 'drive()', bu...read more

Add your answer

Q143. Tell me about your self What is inheritance What is polymorphism What is function overloading&Overridden How to select data from table

Ans.

Technical questions related to software engineering

  • Inheritance is a mechanism in OOP where a class inherits properties and methods from another class

  • Polymorphism is the ability of an object to take on multiple forms

  • Function overloading is when multiple functions have the same name but different parameters

  • Function overriding is when a subclass provides a different implementation of a method that is already defined in its superclass

  • To select data from a table, use SQL SELECT st...read more

Add your answer

Q144. What version of SNOW Do we use?

Ans.

We use version X of SNOW.

  • The current version of SNOW we use is X.

  • We upgraded to version X last year.

  • All incidents are logged in SNOW version X.

View 3 more answers

Q145. What are the key factors that need to be in place while creating a client solution?

Ans.

Key factors for creating a client solution

  • Understanding client's needs and goals

  • Identifying potential challenges and limitations

  • Developing a customized solution

  • Ensuring scalability and flexibility

  • Providing ongoing support and maintenance

  • Collaborating with the client throughout the process

View 1 answer

Q146. 8.Can we differ an OS update for an iOS device using an MDM solution? If yes, how can we do so?

Ans.

Yes, we can differ an OS update for an iOS device using an MDM solution.

  • MDM solution allows administrators to control the update process

  • Administrators can choose to delay or skip updates for certain devices

  • This can be done by creating update policies and assigning them to specific devices or groups

  • For example, an organization may choose to delay updates for a few days to ensure compatibility with their internal apps

  • MDM solutions like Jamf, Microsoft Intune, and VMware Workspa...read more

Add your answer

Q147. What is constructor and method overloading overriding what is constructor overloading

Ans.

Constructor and method overloading and overriding are concepts in object-oriented programming.

  • Constructor overloading is when a class has multiple constructors with different parameters.

  • Method overloading is when a class has multiple methods with the same name but different parameters.

  • Method overriding is when a subclass provides its own implementation of a method that is already defined in its superclass.

  • Constructor overloading is used to create objects with different initia...read more

Add your answer

Q148. return the difference between maximum and minimum number’s count in an array.

Ans.

Return the difference between maximum and minimum number's count in an array of strings.

  • Convert the array of strings to an array of integers

  • Use Math.max() and Math.min() to find the maximum and minimum numbers in the array

  • Count the occurrences of the maximum and minimum numbers using a loop

  • Return the difference between the counts

Add your answer

Q149. Write a code to print the difference of a number and reverse that number

Ans.

Code to print the difference of a number and its reverse

  • Convert the number to string

  • Reverse the string

  • Convert the reversed string back to number

  • Subtract the original number from the reversed number

  • Print the result

Add your answer

Q150. Do you know what it is like to work in a plant?

Ans.

Yes, I have experience working in a plant.

  • Working in a plant involves managing and overseeing various engineering projects.

  • It requires knowledge of plant operations, equipment, and processes.

  • Plant engineers are responsible for ensuring the efficiency and safety of plant operations.

  • They collaborate with different teams, such as maintenance, production, and quality control.

  • Examples of plant engineering projects include designing and implementing new production lines, optimizing...read more

Add your answer

Q151. What is the ranges of the private ip addresses

Ans.

Private IP addresses ranges are reserved for internal networks and not routable on the internet.

  • Private IP addresses are used within a local network and are not accessible from the internet

  • There are three ranges of private IP addresses: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255

  • Private IP addresses are commonly used in home and office networks to allow devices to communicate with each other

View 3 more answers

Q152. What is Singleton pattern and how to implement it?

Ans.

Singleton pattern restricts the instantiation of a class to one object.

  • Create a private constructor to restrict object creation.

  • Create a static method to return the single instance of the class.

  • Use lazy initialization to create the instance only when needed.

  • Ensure thread safety by using synchronized keyword or double-checked locking.

  • Commonly used in database connections, logging, and configuration settings.

Add your answer

Q153. I had to write an Essay on 'Is social media a necessary evil."

Ans.

Social media is a necessary evil as it has both positive and negative impacts on society.

  • Social media has revolutionized communication and made it easier to connect with people.

  • It has also provided a platform for businesses to reach a wider audience and for individuals to showcase their talents.

  • However, social media has also been linked to mental health issues such as anxiety and depression.

  • It has also been criticized for spreading fake news and misinformation.

  • Overall, social...read more

Add your answer

Q154. How many databases you are familiar with except MySQL?

Ans.

I am familiar with several databases other than MySQL.

  • I have experience with PostgreSQL, Oracle, MongoDB, and Microsoft SQL Server.

  • I am also familiar with NoSQL databases such as Cassandra and Couchbase.

  • I have worked with various cloud-based databases like Amazon RDS and Google Cloud SQL.

Add your answer

Q155. What type of source of electrical energy ,what is MCB and why use MCB ,and process of electrical energy generation to consumers

Ans.

MCB is a type of source of electrical energy used for protection against overload and short circuit.

  • MCB stands for Miniature Circuit Breaker.

  • It is a device that automatically switches off the electrical circuit during abnormal conditions such as overload or short circuit.

  • MCBs are commonly used in residential, commercial, and industrial electrical installations.

  • They provide protection to electrical equipment and prevent damage or fire hazards.

  • MCBs are more reliable and faster ...read more

View 1 answer

Q156. Do you have interest in Data science, what related projects have you done previously?

Ans.

Yes, I have a strong interest in data science. I have worked on projects involving predictive analytics and machine learning.

  • Developed a predictive maintenance model for manufacturing equipment

  • Implemented a machine learning algorithm to optimize supply chain logistics

  • Utilized data visualization techniques to identify trends and patterns in customer behavior

Add your answer

Q157. what is EC2 ? why you used it ? How you build and deploy on AWS ?

Ans.

EC2 is a web service that provides resizable compute capacity in the cloud.

  • EC2 stands for Elastic Compute Cloud

  • It allows users to rent virtual computers on which to run their own applications

  • EC2 instances can be easily scaled up or down based on demand

  • To build and deploy on AWS, one can use services like AWS CodeDeploy, AWS CodePipeline, and AWS Elastic Beanstalk

View 2 more answers

Q158. What all colours what they indecate

Ans.

Colors on Google Maps indicate different types of locations and features.

  • Blue: water bodies

  • Green: parks and forests

  • Yellow: areas of interest

  • Orange: shopping areas

  • Red: traffic congestion

  • Gray: areas with limited Street View coverage

View 2 more answers

Q159. 12-whta is in bound and out bound callings?

Ans.

Inbound and outbound callings refer to different types of phone calls made by individuals or organizations.

  • Inbound calling involves receiving incoming calls from customers or clients.

  • Outbound calling involves making outgoing calls to customers or clients.

  • Inbound calls are typically related to customer service, support, or inquiries.

  • Outbound calls are often made for sales, marketing, or follow-up purposes.

  • Examples of inbound calling include answering customer queries or provid...read more

View 7 more answers

Q160. How much time you will take to handle a query or a ticket?

Ans.

The time taken to handle a query or ticket depends on various factors such as complexity, resources available, and priority.

  • The time taken can vary from a few minutes to several hours or even days.

  • Simple queries or tickets that require basic troubleshooting can be resolved quickly.

  • Complex issues that require in-depth analysis or involvement of multiple teams may take longer to resolve.

  • The availability of resources, such as skilled technicians or necessary equipment, can impac...read more

View 1 answer

Q161. What is diff between CTE , Temp table and Table variable

Ans.

CTE, Temp table and Table variable are used to store temporary data in SQL Server.

  • CTE (Common Table Expression) is a temporary named result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement.

  • Temp table is a physical table that is created in the tempdb database and can be used to store temporary data.

  • Table variable is a variable that can store a result set for later use and is similar to a temp table but is stored in memory.

  • CTE is useful for recurs...read more

Add your answer

Q162. What is the programming language of your interest?

Ans.

My programming language of interest is Python.

  • Python is a versatile language used in web development, data analysis, machine learning, and more.

  • It has a simple syntax and is easy to learn for beginners.

  • Python has a large community and a vast library of modules and frameworks.

  • Examples of Python-based frameworks include Django, Flask, and PyTorch.

Add your answer

Q163. Can we have multiple inheritance in java?

Ans.

No, Java doesn't support multiple inheritance.

  • Java only supports single inheritance through classes and interfaces.

  • However, interfaces can be implemented multiple times.

  • To achieve multiple inheritance-like behavior, composition can be used.

Add your answer

Q164. How many words per minute are you able to type?

Ans.

I am able to type 80 words per minute.

  • I have a typing speed of 80 words per minute.

  • I am proficient in touch typing and can accurately type at a fast pace.

  • My typing speed allows me to efficiently complete tasks that require extensive typing, such as data entry or transcription.

  • I have consistently maintained a high typing speed throughout my career.

  • I am confident in my ability to meet deadlines and handle large volumes of typing work.

View 5 more answers

Q165. How to start spring boot application even though a class having error

Ans.

To start Spring Boot app with class error, disable strict classpath checking.

  • Add 'spring.main.lazy-initialization=true' to application.properties.

  • Disable strict classpath checking by adding 'spring.main.allow-bean-definition-overriding=true'.

  • Use 'spring.main.banner-mode=off' to disable banner.

  • Use 'spring.main.web-environment=false' to disable web environment.

  • Use 'spring.main.headless=true' to enable headless mode.

View 1 answer

Q166. What do you mean by deadlock in OS?

Ans.

Deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.

  • Deadlock occurs when two or more processes are stuck in a circular waiting state.

  • It happens when processes compete for resources and each process holds a resource that another process needs.

  • Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.

  • Examples of deadlock include the dining phil...read more

Add your answer

Q167. Which concepts you know about java

Ans.

I know about object-oriented programming, data types, control structures, exception handling, and collections in Java.

  • Object-oriented programming concepts like inheritance, polymorphism, and encapsulation

  • Data types including primitive types, arrays, and strings

  • Control structures like if-else statements, loops, and switch statements

  • Exception handling using try-catch blocks

  • Collections like ArrayList, HashMap, and LinkedList

  • Java frameworks like Spring and Hibernate

View 1 answer

Q168. What is foreign key in dbms

Ans.

A foreign key is a column or set of columns in a database table that refers to the primary key of another table.

  • A foreign key ensures referential integrity between two tables.

  • It is used to establish a relationship between two tables.

  • It helps in maintaining data consistency and accuracy.

  • For example, a customer table may have a foreign key that refers to the primary key of an orders table.

Add your answer

Q169. Should “Social Media” technique be used for educational purposes

Ans.

Yes, social media can be used for educational purposes.

  • Social media provides a platform for sharing educational content and resources.

  • It allows for collaboration and communication among students and teachers.

  • Social media can enhance learning through interactive discussions and real-time feedback.

  • It can also help in reaching a wider audience and promoting educational initiatives.

  • Examples include educational YouTube channels, online courses on platforms like Coursera, and educa...read more

Add your answer

Q170. List is an interface or a class in java collection?

Ans.

List is an interface in java collection.

  • List is a part of the Java Collection Framework.

  • It is an ordered collection of elements.

  • It allows duplicate elements and null values.

  • Some common implementations of List are ArrayList, LinkedList, and Vector.

View 1 answer

Q171. Explain about Adapter Design pattern ? Why you have used it and explain in depth ? Is it possible to replace it ?

Ans.

Adapter pattern converts the interface of a class into another interface that clients expect.

  • Adapter pattern is used to make incompatible interfaces work together.

  • It is used when we want to reuse an existing class that doesn't have the interface we need.

  • It involves creating a wrapper class that translates the interface of one class into another interface.

  • An example is using a USB to Ethernet adapter to connect a computer to a network.

  • It is possible to replace it with other pa...read more

Add your answer

Q172. Give me the real example of equivalence partitioning?

Ans.

Equivalence partitioning is a technique used in software testing to divide input data into groups that are expected to exhibit similar behavior.

  • Dividing input data into groups that are expected to behave similarly

  • Testing only one input from each group

  • Examples: age groups, income brackets, product categories

Add your answer

Q173. How to check uptime of Routers & Switches

Ans.

To check uptime of Routers & Switches, use the show version command.

  • Log in to the device using SSH or Telnet.

  • Enter the show version command.

  • Look for the line that starts with 'uptime'.

  • The uptime will be displayed in the format of days, hours, minutes, and seconds.

  • Alternatively, you can use network monitoring tools like Nagios, PRTG, or SolarWinds to monitor uptime.

  • These tools can provide alerts when a device goes down or when uptime falls below a certain threshold.

View 1 answer
Q174. What are joins in database management systems?
Ans.

Joins in database management systems are used to combine rows from two or more tables based on a related column between them.

  • Joins are used to retrieve data from multiple tables based on a related column.

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • INNER JOIN returns rows when there is at least one match in both tables.

  • LEFT JOIN returns all rows from the left table and the matched rows from the right table.

  • RIGHT JOIN returns all rows from the...read more

View 1 answer
Q175. What do you mean by multitasking and how does it work?
Ans.

Multitasking refers to the ability to perform multiple tasks simultaneously or switch between tasks quickly.

  • Multitasking involves dividing your attention and focus between different tasks at the same time.

  • It can be achieved by efficiently managing time, prioritizing tasks, and staying organized.

  • Examples include checking emails while on a conference call, or listening to music while working on a project.

Add your answer

Q176. Why do we need OOPs?

Ans.

OOPs is needed for better code organization, reusability, and maintainability.

  • OOPs allows for code organization by breaking down complex systems into smaller, manageable objects.

  • It promotes reusability by allowing objects to be used in different parts of the codebase.

  • Inheritance and polymorphism in OOPs enable code reuse and reduce redundancy.

  • Encapsulation in OOPs protects data and provides a clear interface for interacting with objects.

  • OOPs facilitates maintainability by mak...read more

View 1 answer

Q177. What is pop and imap and smtp and all protocol port number

Ans.

POP, IMAP, and SMTP are email protocols used for sending and receiving emails. Each protocol uses different port numbers.

  • POP (Post Office Protocol) is used for downloading emails from a server to a client. It uses port number 110.

  • IMAP (Internet Message Access Protocol) is used for accessing emails on a server from a client. It uses port number 143.

  • SMTP (Simple Mail Transfer Protocol) is used for sending emails from a client to a server. It uses port number 25.

  • Secure versions ...read more

Add your answer

Q178. What are the conditions of Deadlock? How it can be avoided?

Ans.

Deadlock occurs when two or more processes are blocked, waiting for each other to release resources.

  • Conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.

  • Deadlock can be avoided by using techniques such as resource allocation graph, banker's algorithm, and deadlock detection and recovery.

  • Resource allocation graph is a directed graph that shows the allocation and request of resources by processes.

  • Banker's algorithm is a resource allocati...read more

Add your answer

Q179. What is a DNS DHCP networking troubleshoot active directory

Ans.

DNS, DHCP, networking, troubleshooting, and Active Directory are all related to managing and troubleshooting network services and infrastructure.

  • DNS (Domain Name System) is responsible for translating domain names into IP addresses.

  • DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network.

  • Networking involves the design, implementation, and management of computer networks.

  • Troubleshooting is the process of identifying and re...read more

View 3 more answers

Q180. Why do we considering 60% for IRA assets, 70% for stocks and Large deposit definition

Ans.

Assets are considered differently based on their liquidity and volatility.

  • IRA assets are considered less liquid and more stable, hence 60% is considered

  • Stocks are more volatile and hence only 70% is considered

  • Large deposit definition varies based on the bank's policy

  • This approach helps in assessing the risk associated with different types of assets

View 2 more answers

Q181. What is fraud and different ways on how we can try to stop it

Ans.

Fraud is a deliberate deception for personal gain. It can be stopped by implementing fraud prevention measures.

  • Fraud can occur in various forms such as identity theft, credit card fraud, insurance fraud, etc.

  • To prevent fraud, companies can implement measures such as background checks, fraud detection software, and employee training.

  • Consumers can protect themselves by being cautious of suspicious emails, phone calls, and websites, and regularly monitoring their financial accou...read more

View 1 answer

Q182. which language is faster python or java and why do you say that

Ans.

Java is generally faster than Python due to its compiled nature and optimized execution.

  • Java is a compiled language, while Python is an interpreted language.

  • Java code is converted into bytecode and then executed by the Java Virtual Machine (JVM), which allows for faster execution.

  • Python code is interpreted line by line, resulting in slower execution compared to Java.

  • Java has better performance for computationally intensive tasks and large-scale applications.

  • Python, on the oth...read more

View 1 answer

Q183. How to stag a server in VM and physical environment.

Ans.

Staging a server in VM and physical environment

  • Create a VM with the same specifications as the physical server

  • Install the same operating system and software on both the VM and physical server

  • Configure the VM to mimic the network settings of the physical server

  • Test the applications and services on the VM before deploying to the physical server

  • Ensure that the VM and physical server have the same hardware and software configurations

  • Use tools like VMware vSphere or Microsoft Hype...read more

Add your answer

Q184. what is polymorphism?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A parent class Animal can have child classes like Dog, Cat, and Bird. Each child class can have its own implementation of the method 'makeSound', but they can all be called using the same method name.

  • Polymorphism makes code more flexible and reusab...read more

View 5 more answers

Q185. What is the full form of OOPS? What is a class? What is an object? List the types of inheritance supported in C++. What is the role of protected access specifier? What is encapsulation? What is abstraction? Wha...

read more
Ans.

OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.

  • A class is a blueprint or template for creating objects that defines its properties and methods.

  • An object is an instance of a class that has its own state and behavior.

  • C++ supports single, multiple, and multilevel inheritance.

  • The protected access specifier allows access to the member variables and functions within the class and its derived classes.

  • Encapsulation is ...read more

View 1 answer

Q186. What is a shallow copy and deep copy?

Ans.

Shallow copy and deep copy are two ways of copying objects in programming.

  • Shallow copy creates a new object but references the same memory location as the original object.

  • Deep copy creates a new object and allocates new memory for it, copying the values of the original object.

  • Shallow copy is faster and uses less memory, but changes to the original object affect the copied object.

  • Deep copy is slower and uses more memory, but changes to the original object do not affect the cop...read more

Add your answer

Q187. Give an example of data abstraction.

Ans.

Data abstraction is the process of hiding complex implementation details and providing a simplified interface.

  • Abstraction allows users to interact with complex systems without needing to understand the underlying complexity.

  • An example of data abstraction is using a smartphone. Users can make calls, send messages, and use apps without knowing the intricate details of how the device works.

  • Another example is a car dashboard. It provides essential information like speed, fuel lev...read more

View 1 answer

Q188. What are the risks associated with payroll industry.

Ans.

The risks associated with the payroll industry include compliance issues, data security breaches, and errors in processing.

  • Compliance issues: Payroll regulations and tax laws are constantly changing, and non-compliance can result in penalties and legal consequences.

  • Data security breaches: Payroll systems contain sensitive employee information, making them a target for hackers and identity theft.

  • Processing errors: Mistakes in payroll calculations or payments can lead to financ...read more

View 1 answer

Q189. how do you connect data bricks with storage account

Ans.

To connect data bricks with storage account, you need to create a storage account and configure it in the data bricks workspace.

  • Create a storage account in Azure portal

  • Get the connection string of the storage account

  • In the data bricks workspace, go to 'Storage' and click on 'Create'

  • Select the storage account type and provide the connection string

  • Test the connection and save the configuration

View 1 answer

Q190. How will you retrieve all the values from the drop down?

Ans.

To retrieve all values from a drop down, we can use the getOptions() method and store the values in an array of strings.

  • Locate the drop down element using any of the locators

  • Create a Select class object by passing the drop down element as a parameter

  • Use the getOptions() method to retrieve all the options from the drop down

  • Store the options in an array of strings

Add your answer

Q191. Please explain the P2P Cycle ?

Ans.

The P2P Cycle refers to the end-to-end process of purchasing goods or services, from requisition to payment.

  • The cycle starts with a purchase requisition, where a request is made for goods or services.

  • The requisition is then approved by the appropriate authority.

  • A purchase order is created based on the approved requisition, specifying the details of the purchase.

  • The purchase order is sent to the supplier or vendor.

  • Upon receiving the goods or services, the receiving department ...read more

View 5 more answers

Q192. 1. Use of Apache Spark - Dataframe, Datasets and RDD. 2. Transformations and Actions in Spark. 3. Optimization in Spark 4. HIVE - Dynamic and Static Partitioning. 5. HIVE - Partitioning and Bucketing. 6. SQL -...

read more
Ans.

Questions related to Apache Spark, HIVE, and SQL.

  • Apache Spark is a distributed computing framework used for big data processing.

  • Dataframe, Datasets, and RDD are the core abstractions in Spark.

  • Transformations and Actions are the two types of operations in Spark.

  • Optimization techniques like caching, partitioning, and broadcasting can improve Spark performance.

  • HIVE is a data warehousing tool that uses SQL-like syntax to query data stored in Hadoop.

  • Dynamic and Static Partitioning...read more

Add your answer

Q193. How the screenshot is taken and what is the use of it

Ans.

Screenshots are captured images of the current screen. They are used for documentation, troubleshooting, and sharing information.

  • Screenshots can be taken using built-in tools like Snipping Tool or keyboard shortcuts like Print Screen.

  • Screenshots can be used to document software bugs or errors for troubleshooting purposes.

  • Screenshots can be shared with others to provide visual information or instructions.

  • Screenshots can be used for training or educational purposes.

  • Screenshots ...read more

View 1 answer
Q194. What is the solution to the automata coding question?
Ans.

The solution to the automata coding question involves designing a finite state machine to recognize a specific pattern or language.

  • Understand the requirements of the automata problem and define the states, transitions, and final states.

  • Implement the finite state machine using a programming language like Python or C++.

  • Test the automata with different inputs to ensure it correctly recognizes the desired pattern.

  • Optimize the automata design for efficiency if needed.

  • Example: Desi...read more

Add your answer

Q195. what is the importance of polymorphism?

Ans.

Polymorphism allows objects of different classes to be treated as if they were of the same class.

  • Polymorphism enables code reuse and flexibility in object-oriented programming.

  • It allows for the creation of generic code that can work with objects of different classes.

  • Examples include method overloading and overriding, and interfaces in Java.

  • Polymorphism can improve code readability and maintainability.

  • It is a key concept in inheritance and abstraction.

View 1 answer

Q196. Differences between OOP and Functional Orientated Program.

Ans.

OOP focuses on objects and their interactions, while functional programming emphasizes on functions and their behavior.

  • OOP uses classes and objects to encapsulate data and behavior, while functional programming uses pure functions.

  • In OOP, objects have state and behavior, while in functional programming, functions have no side effects.

  • OOP emphasizes on inheritance and polymorphism, while functional programming emphasizes on higher-order functions and recursion.

  • Examples of OOP ...read more

Add your answer

Q197. 5. What do you know about java programming language

Ans.

Java is a popular object-oriented programming language used for developing various applications.

  • Java is platform-independent and can run on any operating system

  • It is used for developing web, mobile, and desktop applications

  • Java is known for its security features and is widely used in enterprise applications

  • It follows the OOPs concept and supports multithreading

  • Some popular Java frameworks include Spring, Hibernate, and Struts

Add your answer

Q198. What is c language? When c language developed

Ans.

C language is a high-level programming language used for system programming and application development.

  • Developed by Dennis Ritchie at Bell Labs in 1972

  • Used for developing operating systems, compilers, and embedded systems

  • Influenced the development of many other programming languages such as C++, Java, and Python

View 1 answer

Q199. 1.What is DR and how you handle it.

Ans.

DR stands for Disaster Recovery. It involves implementing strategies and procedures to ensure business continuity in the event of a disaster.

  • DR is the process of preparing for and recovering from a disaster that affects the availability of IT infrastructure and services.

  • It includes creating backup systems, replicating data, and establishing failover mechanisms.

  • DR plans should be regularly tested and updated to ensure effectiveness.

  • AWS provides various services like AWS Backup...read more

View 1 answer

Q200. What is besic concept in account

Ans.

The basic concept in accounting is the double-entry system, which involves recording every transaction in two accounts: debit and credit.

  • Double-entry system is the foundation of accounting

  • Every transaction is recorded in two accounts: debit and credit

  • Debit refers to the left side of an account and credit refers to the right side

  • Debit and credit must always balance

  • Examples: recording a sale, paying rent, receiving payment from a customer

View 3 more answers
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at BENGAL BUILDING SOLUTIONS

based on 4.3k interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.6
 • 4.5k Interview Questions
4.1
 • 2.2k Interview Questions
4.0
 • 570 Interview Questions
3.4
 • 166 Interview Questions
3.3
 • 142 Interview Questions
3.8
 • 135 Interview Questions
View all
Top Wipro Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter