
Wipro


2500+ Wipro Interview Questions and Answers
Q201. What is besic concept in account
The basic concept in accounting is the double-entry system, which involves recording every transaction in two accounts: debit and credit.
Double-entry system is the foundation of accounting
Every transaction is recorded in two accounts: debit and credit
Debit refers to the left side of an account and credit refers to the right side
Debit and credit must always balance
Examples: recording a sale, paying rent, receiving payment from a customer
Q202. What is a lifecycle of an incident?
The lifecycle of an incident involves several stages from identification to resolution.
Identification: Incident is detected or reported.
Logging: Incident details are recorded in a ticket or incident management system.
Investigation: Incident is analyzed to determine its cause and impact.
Escalation: Incident is escalated to appropriate teams or individuals for resolution.
Resolution: Incident is resolved and services are restored.
Closure: Incident is closed after verifying that ...read more
Q203. What else do you do apart from programming and studies
Apart from programming and studies, I enjoy playing sports, reading books, and volunteering.
Playing sports: I am an avid basketball player and participate in local leagues.
Reading books: I love reading fiction novels and self-help books to expand my knowledge.
Volunteering: I actively volunteer at a local animal shelter, helping with animal care and adoption events.
Q204. What is the difference between Measure and Calculate function?
Measure function involves obtaining a value using a tool or instrument, while Calculate function involves using mathematical operations to determine a value.
Measure function involves using tools or instruments to obtain a value (e.g. measuring tape, ruler)
Calculate function involves using mathematical operations to determine a value (e.g. addition, subtraction, multiplication)
Measure function is more focused on obtaining precise data, while Calculate function is focused on de...read more
Q205. Can we convert a list to a tuple?
Yes, we can convert a list to a tuple.
Use the tuple() function to convert a list to a tuple.
The resulting tuple will have the same elements as the original list.
Tuples are immutable, so any attempt to modify the tuple will result in an error.
Q206. What programming language are you most familiar with?
I am most familiar with Python programming language.
Python is known for its simplicity and readability, making it a popular choice for beginners and experienced programmers alike.
It is widely used in various fields such as web development, data analysis, artificial intelligence, and scientific computing.
Some popular libraries and frameworks in Python include Django, Flask, NumPy, and TensorFlow.
Q207. If you put in an Agile project, Will you be able to do in sprint Automation
Yes, if the automation is planned and executed within the sprint timeline.
Automation should be planned and estimated during sprint planning
Automation scripts should be developed and executed within the sprint timeline
Automation results should be reviewed and reported in sprint review
Automation should not impact the sprint goal or other planned tasks
Q208. Which ratio is used to evaluate the share?
Price-to-earnings (P/E) ratio is used to evaluate the share.
P/E ratio compares the current market price of a share to its earnings per share (EPS).
It helps investors determine if a stock is overvalued or undervalued.
A high P/E ratio may indicate that the stock is overvalued, while a low P/E ratio may indicate that the stock is undervalued.
For example, if a company has a P/E ratio of 20, it means that investors are willing to pay $20 for every $1 of earnings.
However, P/E ratio...read more
Q209. 6.If a device is not enrolled through DEP, can I still block the screen capture feature on an iOS device
Yes, it is possible to block screen capture feature on an iOS device even if it is not enrolled through DEP.
You can use a mobile device management (MDM) solution to block screen capture feature on iOS devices.
MDM solutions like Jamf, Microsoft Intune, and VMware Workspace ONE can help you enforce policies on iOS devices.
You can create a policy in your MDM solution to disable the screen capture feature on iOS devices.
This policy will apply to all iOS devices that are enrolled ...read more
Q210. Do you have any backlogs?
No, I do not have any backlogs.
I have successfully completed all my courses and projects.
I have never failed any subject or exam.
I have always maintained good academic standing.
I have a strong work ethic and prioritize my tasks effectively.
Q211. What is the most complex implementation you did ?
I designed and implemented a complex automation system for a manufacturing plant.
Developed a custom software solution to integrate multiple machines and processes
Implemented real-time monitoring and control of production line
Designed and installed custom hardware components for data collection and analysis
Q212. What is the difference between JDK, JRE, and JVM?
JDK is a development kit, JRE is a runtime environment, and JVM is a virtual machine for running Java programs.
JDK (Java Development Kit) is a software development kit used for developing Java applications. It includes JRE, compiler, debugger, and other tools.
JRE (Java Runtime Environment) is a software package that provides the libraries, Java Virtual Machine (JVM), and other components necessary for running Java applications.
JVM (Java Virtual Machine) is an abstract machine...read more
Q213. What is debit credit card
A debit card is a payment card that deducts money directly from a linked bank account when making a purchase.
Debit cards are linked to a bank account and allow users to make purchases using funds available in the account.
Unlike credit cards, debit cards do not involve borrowing money and require immediate payment.
Debit cards can be used at ATMs to withdraw cash, make online or in-store purchases, and for contactless payments.
Examples of debit card providers include Visa, Mast...read more
Q214. How many engineer required to handle a company or organization of minimum 200/300 workers?
The number of engineers required depends on the nature of work and complexity of the organization.
The type of industry and work being done determines the number of engineers required.
The size of the organization is not the only factor to consider.
A manufacturing company may require more engineers than a service-based company.
The complexity of the organization's processes and systems also plays a role.
A company with advanced technology may require more engineers than a company...read more
Q215. Which cable we are using Switch to Router connectivity
The cable used for Switch to Router connectivity is Ethernet cable.
Ethernet cable is commonly used for connecting switches and routers.
It provides high-speed data transmission and is widely available.
Ethernet cables come in different categories such as Cat5, Cat6, etc.
The choice of cable depends on the network requirements and the distance between the devices.
Q216. Structure of C++ programming and what do you know about C++?
Q217. In route EIGRP route manipulation, which matrix component as a network engineer you will choose to prefer the less preferred route over the successor route?
The feasible distance matrix component is chosen to prefer the less preferred route over the successor route in EIGRP route manipulation.
The feasible distance is the metric used by EIGRP to determine the best route to a destination.
By manipulating the feasible distance, a network engineer can influence the selection of routes.
To prefer a less preferred route over the successor route, the network engineer can increase the feasible distance of the successor route.
This can be ac...read more
Q218. 1 What is PEP 2 EXAMPLE OF PEP 3 TYPE OF RISK CATEGORY 4 SANCTION COUNTRY
PEP stands for Politically Exposed Person. It refers to individuals who hold prominent public positions or have close associations with such individuals.
PEPs are considered high-risk customers due to their potential involvement in corruption, money laundering, and other financial crimes.
Examples of PEPs include heads of state, government officials, and senior executives of state-owned enterprises.
PEPs are categorized as either domestic or foreign, depending on whether they ho...read more
Q219. what is your own creativity in Graphics software
I am highly creative in graphics software and enjoy exploring new techniques and styles.
I have a strong understanding of color theory and composition
I enjoy experimenting with typography and creating unique layouts
I am proficient in Adobe Creative Suite, including Photoshop, Illustrator, and InDesign
I have experience with 3D modeling and animation software such as Blender
I am always looking for ways to push the boundaries and create something truly unique and impactful
Q220. What is the default fob style, used in m. S word?
The question is not relevant as there is no fob style in Microsoft Word.
There is no default fob style in Microsoft Word.
The question may have been intended to ask about a different feature.
It is important to clarify unclear questions in interviews.
Q221. How to improve accuracy for an ICR project? Lifecycle of Abbyy Flexicapture project. The architecture of Abbyy Flexicapture distributed version. How to export via the database?
Improving accuracy for an ICR project involves training the system, optimizing image quality, and using advanced algorithms.
Train the system with a diverse set of data to improve recognition accuracy.
Optimize image quality by using high-resolution images and proper lighting.
Use advanced algorithms such as machine learning and natural language processing.
Regularly review and update the system to ensure accuracy over time.
Abbyy Flexicapture project lifecycle involves planning, ...read more
Q222. Rate yourself in the programming languages you know where 10 means excellent and 0 means poor
Q223. How Pharmacovigilance proves to be an essential asset in determining drug safety and give a brief history of pharmacovigilance .
Pharmacovigilance is essential in determining drug safety. It involves monitoring, assessing, and preventing adverse effects of drugs.
Pharmacovigilance helps in identifying and reporting adverse drug reactions (ADRs) to regulatory authorities.
It involves continuous monitoring of drugs even after they are approved and marketed.
Pharmacovigilance data is used to update drug labels and inform healthcare professionals and patients about potential risks.
It also helps in identifying...read more
Q224. What you Know about work of application support engineer
Application Support Engineers are responsible for troubleshooting and resolving technical issues related to software applications.
Provide technical support to end-users and clients
Identify and resolve software bugs and errors
Collaborate with development teams to enhance application functionality
Document and maintain knowledge base articles for troubleshooting
Monitor application performance and identify areas for improvement
Q225. How to switch to the second window using page Title?
To switch to the second window using page title, we can use getWindowHandles() and switchTo() methods.
Use getWindowHandles() method to get all the window handles
Iterate through the window handles and switch to the desired window using switchTo() method
Use getTitle() method to get the title of each window and compare it with the desired title
Q226. Do you familiar to DHCP how it works?
DHCP is a network protocol that assigns IP addresses automatically to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol
It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS servers automatically
DHCP servers lease IP addresses to devices for a specific period of time
DHCP reduces the need for manual IP address configuration
Example: When a device connects to a Wi-Fi network, DHCP assigns it an IP address from the available pool
Q227. What is decorators, init? List and tuple difference
Decorators in Python are functions that modify the behavior of other functions. __init__ is a special method used for initializing objects. Lists are mutable while tuples are immutable.
Decorators in Python are used to modify the behavior of functions without changing their code.
__init__ is a special method in Python classes used for initializing objects.
Lists in Python are mutable, meaning their elements can be changed after creation.
Tuples in Python are immutable, meaning th...read more
Q228. what is pointer?Why do we need it and the applications of it?
A pointer is a variable that stores the memory address of another variable. It is used to manipulate data indirectly.
Pointers allow for dynamic memory allocation
Pointers can be used to pass data between functions efficiently
Pointers are used extensively in data structures such as linked lists and trees
Q229. 2. How to deal with dynamic drop down in Selenium/ Appium
Dealing with dynamic drop down in Selenium/Appium
Identify the parent element of the drop down
Use findElements() method to get all the child elements
Iterate through the child elements and select the desired option
Use wait() method to handle dynamic loading of options
Use Select class for handling drop downs with select tag
For non-select tag drop downs, use click() method to open the drop down and select the option
Q230. What is Active Directroy ? What is WLAN WAN ? How to Configure router ?
Active Directory is a Microsoft service that manages network resources and user accounts. WLAN WAN is a wireless network technology. Router configuration involves setting up network settings and security protocols.
Active Directory is used to authenticate and authorize users and computers in a network
WLAN WAN is a wireless network that connects devices over a wide area network
Router configuration involves accessing the router's web interface, setting up network settings such a...read more
Q231. Which programming languages do you use regularly in your work
I regularly use Java, Python, and SQL in my work as a Software Developer.
Java
Python
SQL
Q232. Write an Example to expalin Encapsulation
Encapsulation is the process of hiding internal details and providing a public interface for accessing and manipulating data.
Encapsulation helps in achieving data abstraction and data hiding.
It allows for better control over the data by preventing direct access to it.
Encapsulation promotes code reusability and modularity.
Example: A class in object-oriented programming encapsulates data and methods within it, providing access to the data through public methods.
Q233. What technologies were used in the project ?
The project utilized various technologies including CAD software, simulation tools, and project management software.
CAD software such as SolidWorks and AutoCAD were used for designing and modeling
Simulation tools like ANSYS and MATLAB were used for analyzing and testing
Project management software like Microsoft Project was used for scheduling and tracking progress
Q234. What is call by value and call by reference?
Call by value passes a copy of the value to the function, while call by reference passes a reference to the value.
Call by value creates a new copy of the variable and passes it to the function.
Call by reference passes a reference to the original variable to the function.
Call by value is used for simple data types like integers and floats.
Call by reference is used for complex data types like arrays and objects.
Q235. What is the difference between arrays and lost in python? What you mean by x++
Arrays are used to store multiple values in a single variable while lists are a collection of ordered and changeable elements.
Arrays have a fixed size while lists can grow or shrink dynamically
Arrays can only store elements of the same data type while lists can store different data types
x++ is not a valid syntax in Python, use x += 1 instead
Q236. What is BGP and its attributes
BGP is a routing protocol used to exchange routing information between different networks.
BGP stands for Border Gateway Protocol.
It is used to connect different autonomous systems (AS) on the internet.
BGP uses path vector routing to determine the best path for data to travel.
BGP attributes include AS path, next hop, local preference, and origin.
AS path is a list of AS numbers that the route has passed through.
Next hop is the IP address of the next router in the path.
Local pre...read more
Q237. F5 bigip load balancer 5 pool members are configured out of which 2 are down and 3 are up.
2 out of 5 pool members are down in F5 bigip load balancer.
The load balancer is currently using the 3 available pool members to distribute traffic.
The 2 down pool members need to be fixed or removed from the pool to prevent traffic from being directed to them.
The load balancer should be monitored to ensure that it is functioning properly and distributing traffic evenly.
If necessary, additional pool members can be added to the pool to handle increased traffic or to provide red...read more
Q238. What is sap,what is fiscal year variant,document type ,chart of accounts, what is pto p cycle,App,, chusmer vendor,chart of depreciation,asset procurement,document splitting,FCV,
SAP is an ERP software used for managing business operations. Fiscal year variant determines the financial year of a company. Document type is used to classify accounting transactions. Chart of accounts is a list of all G/L accounts used by a company. PtoP cycle refers to the procurement process. Asset procurement is the process of acquiring assets for a company. Document splitting is used to split a document into multiple segments. FCV stands for Foreign Currency Valuation.
S...read more
Various scheduling techniques in operating systems include FCFS, SJF, Round Robin, Priority Scheduling, and Multilevel Queue Scheduling.
First Come First Serve (FCFS) - Processes are executed in the order they arrive.
Shortest Job First (SJF) - Process with the shortest burst time is executed next.
Round Robin - Each process is given a fixed time slice to execute before moving to the next process.
Priority Scheduling - Processes are assigned priorities and the one with the highes...read more
Q240. Based on resume What is Angular? Why it is better than PHP? Features of Angular? Difference between Anglular1.0 and 2.0?
Angular is a popular front-end framework for building web applications.
Angular is a front-end framework developed by Google for building dynamic web applications.
It uses TypeScript for building applications, providing better type checking and error detection.
Angular has features like two-way data binding, dependency injection, and routing.
Angular 2.0 introduced a component-based architecture and improved performance compared to Angular 1.0.
PHP is a server-side scripting langu...read more
Q241. Print a given matrix in spiral form.
The algorithm prints a given matrix in a spiral form.
Iterate through the matrix in a spiral pattern
Keep track of the boundaries of the spiral
Print the elements in the spiral order
Q242. What do you understand by Java virtual machine?
Java virtual machine (JVM) is a virtual machine that enables a computer to run Java programs.
JVM is an abstract machine that provides a runtime environment for Java bytecode to be executed.
It is responsible for converting Java bytecode into machine code that can be understood by the computer's operating system.
JVM is platform-independent, allowing Java programs to run on any device or operating system that has a JVM implementation.
It manages memory, handles garbage collection...read more
Q243. What is the full form of SDLC?
SDLC stands for Software Development Life Cycle.
SDLC is a process used by software development teams to design, develop, and test high-quality software.
It consists of several phases including planning, analysis, design, implementation, and maintenance.
Each phase has its own set of activities and deliverables that must be completed before moving on to the next phase.
SDLC helps ensure that software is developed on time, within budget, and meets the needs of the end-users.
Exampl...read more
Q244. What do you mean by pharmacovigilance or Drug Safety?
Pharmacovigilance or Drug Safety involves monitoring, assessing, and preventing adverse effects of pharmaceutical products.
Pharmacovigilance is the science and activities related to the detection, assessment, understanding, and prevention of adverse effects or any other drug-related problems.
It involves monitoring and collecting data on the safety of drugs and medical devices after they have been approved and marketed.
The goal is to ensure patient safety by identifying and mi...read more
Q245. What's software coding and languages and programming
Software coding involves writing instructions in programming languages to create computer programs.
Software coding is the process of writing instructions that a computer can understand and execute.
Programming languages are used to write these instructions, such as Python, Java, C++, etc.
Coding involves breaking down a problem into smaller steps and writing code to solve each step.
Programmers use various tools and software development environments to write and test their code....read more
Q246. Any real life implementation/use you have done wrt your elective subject?
Yes, I implemented a machine learning model to predict customer churn in a telecom company.
Developed a machine learning model using Python and scikit-learn
Used historical customer data to train the model
Implemented the model in a telecom company to predict customer churn
Provided insights to the company on factors influencing customer churn
Q247. 3) how to achieve load balance and fault tolerance while deploying an application ?
To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.
Implement load balancing to distribute incoming traffic across multiple servers.
Use clustering to group multiple servers together to work as a single unit.
Ensure redundancy by having multiple instances of critical components to handle failures.
Implement fault-tolerant mechanisms like automatic failover and replication.
Regularly moni...read more
Q248. What is a constructor?
A constructor is a special method used to initialize objects in a class.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
Constructors can have parameters to initialize object properties.
They can be overloaded to have multiple versions with different parameters.
Example: public class Car { public Car(String color) { ... } }
Q249. What is a superclass?
A superclass is a class that is inherited by one or more subclasses, providing them with common attributes and behaviors.
A superclass is also known as a base class or parent class.
It defines the common characteristics and behaviors that the subclasses inherit.
Subclasses can add additional attributes and behaviors specific to them.
Superclasses promote code reusability and maintainability.
For example, in a vehicle hierarchy, 'Vehicle' can be a superclass with subclasses like 'C...read more
Q250. What is try/catch block?
A try/catch block is used in programming to handle exceptions and prevent the program from crashing.
A try/catch block is used to catch and handle exceptions in a program.
The code inside the try block is executed, and if an exception occurs, it is caught and handled in the catch block.
The catch block contains the code that handles the exception, such as displaying an error message or logging the error.
Using try/catch blocks helps in preventing the program from crashing and all...read more
Q251. What steps do you take to ensure accurate estimates for a project?
To ensure accurate estimates for a project, I follow these steps:
Gather all project requirements and specifications
Break down the project into smaller tasks
Estimate the time required for each task
Consider any potential roadblocks or delays
Factor in any additional time for testing and revisions
Review and adjust estimates as needed throughout the project
Q252. Linked list vs array list and elaborate the implementation of linked list
Linked list vs array list and implementation of linked list
Array list stores data in contiguous memory locations while linked list stores data in non-contiguous memory locations
Array list has faster access time for elements while linked list has faster insertion and deletion time
Linked list implementation involves creating a node with data and a pointer to the next node, and linking the nodes together
Q253. Self intro ,what is variable , what is class ,
I am a project engineer with knowledge of variables and classes.
A variable is a container that holds a value or reference to a value.
A class is a blueprint for creating objects that defines its properties and methods.
Variables can be declared within a class and used to store values specific to that class.
Classes can be used to create multiple instances of objects with the same properties and methods.
Variables and classes are fundamental concepts in object-oriented programming...read more
Q254. What is vpn and ipsec, ipsec tunnels troubleshooting
VPN is a secure connection between two networks. IPsec is a protocol used to secure the VPN connection.
VPN allows remote access to a network through a secure connection
IPsec provides encryption and authentication for the VPN connection
IPsec tunnels can be troubleshooted by checking the configuration, verifying the network topology, and checking for any firewall or NAT issues
Examples of VPN technologies include OpenVPN, Cisco AnyConnect, and Microsoft DirectAccess
Q255. What are joins in SQL ?
Joins in SQL are used to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query
Common types of joins include inner join, left join, right join, and full outer join
Join conditions are specified using the ON keyword and a comparison operator
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q256. How can Wipro as BPS or technology can survive in the heavy market economy of IT industrial technology?
Wipro can survive in the heavy market economy of IT industrial technology by focusing on innovation, agility, and customer-centric approach.
Investing in research and development to stay ahead of the competition
Embracing agile methodologies to quickly adapt to changing market demands
Fostering a culture of innovation and creativity to drive new ideas and solutions
Providing exceptional customer service to build long-term relationships and loyalty
Expanding into new markets and in...read more
Q257. How are the measures to confirm that all the month end journals are posted accurately?
Monthly journals are confirmed for accuracy through a multi-step process.
All journal entries are reviewed by the Deputy Manager before posting.
A reconciliation is performed between the general ledger and subsidiary ledgers.
A trial balance is generated and reviewed for accuracy.
Any discrepancies are investigated and resolved before finalizing the month-end close.
A post-closing trial balance is generated to ensure all accounts are properly closed.
An external audit is conducted ...read more
Q258. what is your view on the indian rupee vs dollar in the long run
The Indian rupee is expected to depreciate against the dollar in the long run.
The Indian economy is heavily dependent on imports, which puts pressure on the rupee.
The US economy is expected to grow faster than India's, which will strengthen the dollar.
Political and economic instability in India can also weaken the rupee.
However, global events such as trade wars and geopolitical tensions can also impact the exchange rate.
Overall, the rupee is likely to depreciate against the d...read more
Q259. What is EMC networker backup software? explain and type.
EMC Networker is a backup software solution used for data protection and recovery in enterprise environments.
EMC Networker is a backup software developed by EMC Corporation.
It is used for backing up, archiving, and recovering data in enterprise environments.
Networker supports a wide range of operating systems, applications, and storage devices.
It provides features like data deduplication, encryption, and centralized management.
Networker allows for backup to disk, tape, and cl...read more
Q260. What all are shared by parent and child processes immediately after parent executes a fork system call? Cross questioned about the 'copy on write' facility and 'dup' system call
Shared resources between parent and child processes after fork system call
File descriptors
Memory space (copy on write)
Signal handlers
Environment variables
Current working directory
Q261. What's the outout? char *cp; int *ip; cp=(char *)0x100; ip=(int *)cp; ip++; cp++; printf("cp = %x ip = %x", cp, ip);
The code snippet assigns memory addresses to a char pointer and an int pointer, increments them, and prints the values.
cp is assigned the memory address 0x100 as a char pointer
ip is then assigned the value of cp as an int pointer
Both pointers are incremented and their values are printed
Q262. What is oops ? What are the different features of oops?
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
Encapsulation: Hiding the implementation details of an object from the outside world.
Inheritance: The ability of a class to inherit properties and methods from a parent class.
Polymorphism: The ability of an object to take on many forms.
Abstraction: The process of hiding complex implementation details and showing only functionality to the users.
Examples of OOPs languages a...read more
Q263. Tell me about development process SDLC..?
SDLC is a process followed by software development teams to design, develop, test, and deploy high-quality software.
SDLC stands for Software Development Life Cycle
It consists of several phases including planning, analysis, design, implementation, testing, and maintenance
Each phase has its own set of activities and deliverables
The process ensures that the software is developed efficiently, on time, and within budget
Examples of SDLC models include Waterfall, Agile, and DevOps
Q264. How can you replace exists legacy monolithic application with microservices ?
Legacy monolithic applications can be replaced with microservices by breaking down the application into smaller, independent services.
Identify the different functionalities of the monolithic application
Break down the application into smaller, independent services
Use APIs to communicate between the services
Implement containerization and orchestration for scalability and reliability
Gradually migrate functionality to microservices while maintaining backwards compatibility
Example...read more
Q265. WHAT IS HASHING ? AND HASH MAP IN DETAILS ALONG WITH Balanced tree
Hashing is a technique to map data to a fixed size array. Hash Map is a data structure that uses hashing to store key-value pairs.
Hashing is used to quickly retrieve data from a large dataset
Hash function maps data to a fixed size array index
Collisions can occur when multiple data points map to the same index
Hash Map uses key-value pairs to store and retrieve data
Balanced tree is an alternative to Hash Map for efficient data retrieval
Q266. What is AI? What is Machine Learning ? What is Bounding Box , how does it works in Operations or Work Task? How we can work on 3D and 2D projects in AI Using Bounding Box? What is the Purpose of this Process? N...
read moreAI stands for Artificial Intelligence, Machine Learning is a subset of AI that focuses on training machines to learn from data. Bounding Box is a tool used in computer vision tasks to label objects in images or videos.
AI is the simulation of human intelligence processes by machines, such as learning, reasoning, and self-correction.
Machine Learning is a subset of AI that involves training algorithms to learn patterns from data and make predictions or decisions.
Bounding Box is ...read more
Q267. How would you solve a fibonacci series problem?
The Fibonacci series problem can be solved using a recursive function or an iterative loop.
Use a recursive function to calculate the Fibonacci series.
Implement an iterative loop to generate the Fibonacci series.
Store the results in an array for easy access and manipulation.
Q268. What is normalization?
Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.
Normalization helps in reducing data redundancy by breaking down a large table into smaller, more manageable tables.
It ensures that each piece of data is stored only once, reducing storage space and improving efficiency.
Normalization also helps in maintaining data integrity by preventing update anomalies and inconsistencies.
There are different levels of normalizati...read more
Q269. What is database integrity
Database integrity refers to the accuracy and consistency of data stored in a database.
Ensuring data is accurate and consistent
Preventing unauthorized access or modification of data
Maintaining data quality through validation and verification
Implementing backup and recovery procedures
Examples: referential integrity, data constraints, transaction management
Q270. How to respond to client queries over the email?
Respond professionally and promptly to client queries over email.
Acknowledge receipt of the query
Address the query directly and provide relevant information
Be concise and clear in your response
Offer further assistance if needed
Sign off with a professional closing
Q271. DIFFERENCE NACL & SECURITY GROUPS DOCKERS SWARM, HOW DO WE INSTALL JENKINS,
Explanation of NACL, Security Groups, Docker Swarm, and Jenkins installation process.
NACL is a stateless firewall that controls inbound and outbound traffic at the subnet level.
Security Groups are stateful firewalls that control inbound and outbound traffic at the instance level.
Docker Swarm is a container orchestration tool that manages a cluster of Docker hosts.
Jenkins can be installed on a server using a package manager or by downloading and running the Jenkins WAR file.
Je...read more
Q272. Take a topic and asked me to speak on it for 1 minute
Speak on the topic of climate change
Climate change is a global issue caused by human activities
It leads to rising temperatures, sea level rise, and extreme weather events
Reducing carbon emissions and transitioning to renewable energy sources can help mitigate its effects
Examples of climate change impacts include melting glaciers, coral bleaching, and species extinction
Q273. What are the points to validate ICSR case?
Points to validate an ICSR case
Ensure the case meets the criteria for an ICSR
Verify the accuracy and completeness of the information provided
Check for duplicate cases
Assess the causality and seriousness of the adverse event
Ensure the case is reported within the required timeframe
Q274. Tell me the short bone in our body
The short bone in our body is the patella, also known as the kneecap.
The patella is a small, flat, triangular bone located in front of the knee joint.
It acts as a protective shield for the knee joint and helps in the transmission of forces.
The patella is unique as it is a sesamoid bone, meaning it develops within a tendon.
Other examples of short bones include the carpals in the wrist and the tarsals in the foot.
Q275. A procedure that uses standards, rules and techniques to compare facts and how to certify that knowledge.
The procedure described is known as a certification process.
Standards, rules, and techniques are used to evaluate and verify knowledge
Commonly used in industries such as IT, healthcare, and manufacturing
Examples include ISO certification for quality management and medical board certification for doctors
Q276. 1.Slicing in Python? 2.Difference between list and tuple?
Slicing in Python is a way to extract a portion of a sequence, such as a string, list, or tuple.
Slicing is done using the square bracket notation with a start, stop, and step value.
The start index is inclusive, the stop index is exclusive, and the step value determines the increment.
Slicing can be used to extract a subsequence, reverse a sequence, or create a copy of a sequence.
Examples: myList[2:5] returns elements at index 2, 3, and 4. myList[::-1] returns a reversed copy o...read more
Q277. What is stack and heap memory?
Stack and heap memory are two types of memory allocation in computer systems.
Stack memory is used for static memory allocation and is managed by the CPU.
Heap memory is used for dynamic memory allocation and is managed by the programmer.
Stack memory is limited in size and is used for storing local variables and function calls.
Heap memory is larger in size and is used for storing objects and data structures.
Stack memory is faster to access than heap memory.
Heap memory can lead ...read more
Q278. Short term and long term goal
My short term goal is to gain experience and develop my skills in the non-voice process. My long term goal is to take on leadership roles and contribute to the growth of the organization.
Short term goal: Gain experience and develop skills
Long term goal: Take on leadership roles and contribute to organizational growth
Q279. What are the difference between EDR and antivirus? What is unique in EDR and also disadvantages of EDR compare AV.
EDR and antivirus differ in their approach to threat detection and response.
EDR focuses on detecting and responding to advanced threats that may evade traditional antivirus solutions.
EDR uses behavioral analysis and machine learning to identify suspicious activity and respond in real-time.
Antivirus primarily relies on signature-based detection to identify known threats.
EDR provides more detailed information about the nature and scope of an attack, allowing for more effective ...read more
Q280. When you will received class modification exception.
Class modification exception occurs when a class is modified after it has been loaded by the JVM.
This exception is thrown when a class is modified and then reloaded by the JVM.
It can occur when a class is modified during runtime or when a new version of a class is loaded.
This exception can be avoided by using a class loader that isolates the classes from each other.
An example of this exception is when a method is added to a class and then the class is reloaded by the JVM.
Q281. Whats is Vlan & commands to configure vlan
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network, allowing for better network management and security.
VLANs divide a single physical network into multiple virtual networks.
They help in reducing network congestion and improving network performance.
VLANs can be configured on switches using commands like 'vlan database', 'vlan
', and 'interface switchport access vlan '.
Q282. Implementation of factorial, Fibonacci series and prime number.
Factorial, Fibonacci series and prime number implementation.
Factorial: Use recursion or iteration to multiply numbers from 1 to n.
Fibonacci: Use recursion or iteration to add the previous two numbers.
Prime number: Check if a number is divisible by any number less than itself.
Q283. What is features of the C programming language.
C is a procedural programming language known for its efficiency and low-level memory manipulation capabilities.
C is a compiled language
It has a small set of keywords and operators
It supports pointers and low-level memory manipulation
It has a preprocessor for macro expansion
It has a standard library with functions for common tasks
Examples: printf() for output, scanf() for input, malloc() for memory allocation
Q284. Program to check if a year is Leap Year or not
A program to check if a year is a leap year or not.
A year is a leap year if it is divisible by 4, but not divisible by 100, except if it is divisible by 400.
Use modulo operator to check if the year is divisible by 4, 100, and 400.
If the year is divisible by 4 and not by 100, or divisible by 400, then it is a leap year.
Q285. Why do you looking wipro If I give 50 rupees what do buy first
I am looking to join Wipro because of its reputation as a leading company in the industry.
Wipro is known for its strong presence in the IT industry
It offers a wide range of career opportunities and growth prospects
The company has a good work culture and values its employees
Wipro has a strong client base and provides innovative solutions
Joining Wipro would provide me with a platform to enhance my skills and contribute to its success
Q286. What are all the status codes available in API testing
There are several status codes available in API testing to indicate the outcome of a request.
200 - OK: The request was successful
201 - Created: The request was successful and a new resource was created
400 - Bad Request: The request was invalid or could not be understood
401 - Unauthorized: Authentication is required and has failed or has not been provided
403 - Forbidden: The server understood the request but refuses to authorize it
404 - Not Found: The requested resource could ...read more
Q287. What will be the subnet mask for CIDR /29
The subnet mask for CIDR /29 is 255.255.255.248.
CIDR /29 means 29 bits are used for the network portion and 3 bits for the host portion.
To calculate the subnet mask, convert the 29 network bits to 1s and add 3 0s for the host bits.
The result is 255.255.255.248 in dotted decimal notation.
Q288. what is the use of transit gateway
Transit Gateway is a service that simplifies network architecture by allowing customers to connect their VPCs and on-premises networks.
Transit Gateway acts as a hub that connects multiple VPCs and VPN connections.
It simplifies network management by reducing the number of VPN connections needed.
It supports inter-region peering, allowing VPCs in different regions to communicate with each other.
It also supports Direct Connect Gateway, which allows customers to connect their on-p...read more
Q289. 1) what is volume 9A ?
Volume 9A is a guidance document issued by the European Medicines Agency (EMA) for the collection, management, and submission of pharmacovigilance data.
Volume 9A provides instructions on the reporting of adverse drug reactions (ADRs) and other safety-related information.
It outlines the requirements for the electronic submission of pharmacovigilance data to the EMA.
Volume 9A also includes guidelines on the use of the EudraVigilance database for the monitoring and analysis of s...read more
Q290. What is defined as severity and priority?
Severity and priority are used to classify incidents based on their impact and urgency.
Severity refers to the impact an incident has on the business or system.
Priority refers to the urgency with which an incident needs to be resolved.
Both severity and priority are usually classified into levels, such as low, medium, and high.
The severity and priority of an incident can be determined based on factors such as the number of users affected, the criticality of the system, and the ...read more
Q291. Do you know about Business Process Outsourcing?
Business Process Outsourcing (BPO) is the practice of hiring a third-party company to handle non-core business activities.
BPO is commonly used for tasks such as customer service, data entry, and accounting.
It allows companies to focus on their core competencies and reduce costs.
Examples of BPO companies include Accenture, IBM, and Infosys.
BPO can be done domestically or internationally, with countries like India and the Philippines being popular outsourcing destinations.
BPO c...read more
Q292. Place the input word in the given position in a sentence.
A question on placing a word in a sentence
Understand the context of the sentence
Identify the appropriate position for the input word
Ensure proper grammar and syntax
Consider the tone and style of the sentence
Example: 'I want you to place the word 'apple' after the verb.'
Q293. How to install latest security tools in the server.
Security tools can be installed using package managers or manually downloading and installing them.
Use package managers like apt-get, yum, or pacman to install security tools
Manually download and install security tools from their official websites
Regularly update the security tools to ensure the latest security patches are applied
Q294. Will you sign the service bond?
I am willing to sign the service bond.
I understand the importance of a service bond and I am willing to commit to it.
I am confident in my abilities to fulfill the requirements of the position.
I am committed to the success of the project and the company.
I am open to discussing the terms of the service bond.
Q295. Explain all the oops concepts
Object-oriented programming concepts that help in designing and implementing software systems.
Encapsulation: Bundling of data and methods into a single unit (class) to hide implementation details.
Inheritance: Ability to create new classes (derived classes) from existing classes (base classes) to reuse code and extend functionality.
Polymorphism: Ability of objects of different classes to respond to the same message in different ways.
Abstraction: Representing essential features...read more
Q296. What is features of c programming language?
C programming language features include portability, efficiency, flexibility, and low-level access to memory.
Portability: C programs can be run on different platforms with minimal changes.
Efficiency: C is a fast and efficient language, making it suitable for system programming.
Flexibility: C allows for low-level manipulation of hardware and memory.
Low-level access to memory: C provides direct access to memory addresses, allowing for efficient memory management.
Structured prog...read more
Q297. Tell us what you know about DMA and why that is needed?
DMA stands for Direct Memory Access, a feature that allows hardware to access the computer's memory without involving the CPU.
DMA is needed to improve the efficiency of data transfer between devices and memory.
It reduces the workload on the CPU by allowing devices to transfer data directly to and from memory.
Examples of devices that benefit from DMA include hard drives, network cards, and sound cards.
Q298. Write a program to Swap two number without using third variable
Q299. how to connect on-prem to your VPC
To connect on-prem to VPC, use VPN or Direct Connect.
Create a virtual private gateway in VPC
Create a customer gateway on-premises
Create a VPN connection or Direct Connect
Configure routing tables to allow traffic between on-prem and VPC
Q300. Different lifecycle methods of react and where did you implement it?
React has three lifecycle methods: Mounting, Updating, and Unmounting.
Mounting: When a component is being inserted into the DOM. componentDidMount() is an example.
Updating: When a component is being re-rendered. componentDidUpdate() is an example.
Unmounting: When a component is being removed from the DOM. componentWillUnmount() is an example.
I have implemented these methods in various projects, such as using componentDidMount() to fetch data from an API and componentDidUpdate...read more
Top HR Questions asked in Wipro
Interview Process at Wipro

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

