i
Wipro
Filter interviews by
Effort estimation for software module development
Break down the module into smaller tasks
Estimate time required for each task
Consider dependencies and risks
Use historical data and expert judgment
Adjust estimates based on complexity and team experience
Use tools like PERT, COCOMO, or function points
Regularly review and update estimates
A data center basic data flow design involves the movement of data between servers, storage devices, and networks.
Data is received from external sources and processed by servers
Processed data is stored in storage devices
Data is retrieved from storage devices and sent to networks for distribution
Networks transmit data to end-users or other systems
Data is constantly monitored and managed for security and efficiency
A DMZ is a network segment that separates an organization's internal network from an untrusted network.
DMZ stands for Demilitarized Zone
It is created to provide an additional layer of security to an organization's network
It is typically used to host publicly accessible servers such as web servers, email servers, etc.
Traffic to and from the DMZ is heavily monitored and restricted to prevent unauthorized access to the in...
APM stands for Application Performance Management. Sync of DC to DR is done for disaster recovery purposes.
APM is the monitoring and management of performance and availability of software applications.
Sync of DC to DR is done to ensure that in case of a disaster, the secondary data center has the most up-to-date data.
This is typically done through replication technologies such as synchronous or asynchronous replication...
Sandboxing is a security mechanism used to isolate programs or processes from the rest of the system.
It creates a virtual environment for testing and running untrusted code
It prevents malicious code from accessing sensitive data or resources
It is commonly used in web browsers to prevent malware from infecting the system
Examples include Docker containers, virtual machines, and chroot jails
A routing algorithm is a process of determining the best path for data to travel from one network to another.
Routing algorithms are used in computer networks to determine the most efficient path for data to travel.
Examples of routing algorithms include OSPF, BGP, and RIP.
Routing algorithms work by analyzing network topology and selecting the best path based on factors such as distance, bandwidth, and cost.
Some routing ...
SIEM is a security tool that collects and analyzes security events. Two factor authentication adds an extra layer of security. SSL is a protocol for secure communication.
SIEM stands for Security Information and Event Management
SIEM collects and analyzes security events from various sources
Two factor authentication requires two forms of identification to access a system
SSL stands for Secure Sockets Layer
SSL is a protoco...
Risk management is the process of identifying, assessing, and prioritizing risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and impact of unfortunate events.
Identifying potential risks that could impact the organization
Assessing the likelihood and impact of each risk
Prioritizing risks based on their potential impact
Developing strategies to mitigate ...
I will manage clients by building strong relationships, understanding their needs, providing excellent service, and consistently communicating with them.
Build strong relationships with clients by being responsive and attentive to their needs
Understand the unique needs and goals of each client to tailor solutions accordingly
Provide excellent service by delivering on promises and exceeding expectations
Consistently commun...
What people are saying about Wipro
Wipro interview questions for designations
Get interview-ready with Top Wipro Interview Questions
I applied via Referral
Data warehousing methodologies include Kimball, Inmon, and Data Vault.
Kimball methodology focuses on building data marts first and then integrating them into a data warehouse
Inmon methodology involves building a centralized data warehouse first and then creating data marts
Data Vault methodology focuses on flexibility and scalability by using hubs, links, and satellites
Policy & claim lifecycle in P&C insurance involves stages like underwriting, policy issuance, premium payment, claim filing, investigation, settlement, and closure.
Underwriting: Assessing risk and determining policy terms.
Policy Issuance: Providing the policy to the insured.
Premium Payment: Insured pays the premium to maintain coverage.
Claim Filing: Insured reports a loss or damage.
Investigation: Insurer assesses the c...
GetMapping is a specialized form of RequestMapping used for GET requests in Spring MVC.
GetMapping is a shortcut for @RequestMapping(method = RequestMethod.GET)
RequestMapping can be used for any HTTP method, while GetMapping is specifically for GET requests
GetMapping is more concise and easier to read compared to RequestMapping
I applied via LinkedIn and was interviewed in Apr 2023. There were 5 interview rounds.
Various files such as resumes, cover letters, references, and certifications are typically required for job applications.
Resumes
Cover letters
References
Certifications
based on 36 interviews
3 Interview rounds
based on 264 reviews
Rating in categories
Project Engineer
32.7k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23.1k
salaries
| ₹5.8 L/yr - ₹22.1 L/yr |
Senior Associate
21.3k
salaries
| ₹0.9 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.4k
salaries
| ₹5 L/yr - ₹19.5 L/yr |
Technical Lead
18.7k
salaries
| ₹8.3 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon