i
Wissen
Infotech
Filter interviews by
Migration mapping in Shargate involves defining data transformations for seamless data transfer between systems.
Identify source and target data structures for mapping.
Use Shargate's mapping interface to create transformation rules.
Example: Map 'firstName' from source to 'givenName' in target.
Test the mapping with sample data to ensure accuracy.
Deploy the mapping configuration for production use.
PowerShell scripts can automate backend tasks, manage servers, and interact with databases efficiently.
Automate server management: Use scripts to start, stop, or configure services. Example: `Stop-Service -Name 'wuauserv'`.
Database interaction: Use PowerShell to connect to SQL databases and execute queries. Example: `Invoke-Sqlcmd -Query 'SELECT * FROM Users'`.
File management: Automate file operations like copying...
Java is a high-level, object-oriented programming language designed for portability, performance, and ease of use.
Platform-independent: Write once, run anywhere (WORA) - Java code can run on any device with a Java Virtual Machine (JVM).
Object-oriented: Supports concepts like inheritance, encapsulation, and polymorphism, making code reusable and modular.
Rich API: Provides a vast set of libraries for tasks like netw...
Java Collections like Set do not allow duplicate values, ensuring unique elements in the collection.
1. Set Interface: The primary collection that prevents duplicates.
2. HashSet: Implements Set, uses a hash table for storage. Example: Set<String> set = new HashSet<>();
3. TreeSet: Implements Set, stores elements in a sorted order. Example: Set<Integer> treeSet = new TreeSet<>();
4. LinkedHashS...
The ASCII value of the character 'a' is 97, which is part of the standard ASCII table used in computing.
ASCII stands for American Standard Code for Information Interchange.
Each character in the ASCII table is assigned a unique integer value.
For example, the ASCII value of 'A' is 65, and 'b' is 98.
ASCII values range from 0 to 127 for standard characters.
I expect a salary that reflects my skills and market standards, while being open to negotiation based on the company's budget.
Research industry standards: For example, if the average salary for an Associate Engineer in my area is $70,000, I would base my expectations around that.
Consider my experience: If I have relevant internships or projects, I might expect a salary on the higher end of the scale.
Be flexible: I...
Calculate iterations needed for a virus to infect all cells in a matrix of 0s, 1s, and 2s.
Use BFS or DFS to spread the virus from each cell with value 2.
Count iterations until no more cells can be infected.
Example: For matrix [[0,1,2],[0,0,1],[1,0,0]], it takes 3 iterations.
Palo Alto and Fortigate are leading firewall solutions with distinct features and capabilities for network security.
Palo Alto offers advanced threat prevention with its App-ID technology, allowing granular control over applications.
Fortigate provides integrated security features, including antivirus and intrusion prevention, in a single appliance.
Palo Alto's user interface is known for its intuitive design, making...
Layer 2 deals with data link protocols, while Layer 3 focuses on network routing and addressing.
Layer 2 (Data Link Layer) is responsible for node-to-node data transfer and error detection/correction.
Layer 3 (Network Layer) handles packet forwarding, including routing through different networks.
Examples of Layer 2 protocols include Ethernet and PPP (Point-to-Point Protocol).
Examples of Layer 3 protocols include IP ...
Stateful firewalls track active connections, while stateless firewalls filter packets based on predefined rules without connection context.
Stateful firewalls maintain a state table to track active connections.
Stateless firewalls filter packets based solely on rules without context.
Example of stateful: Cisco ASA, which tracks sessions and allows return traffic.
Example of stateless: Basic packet filtering routers th...
I applied via Referral and was interviewed in Aug 2024. There were 2 interview rounds.
A service account is a special account used by a service or application to access resources on a network.
Service accounts are used to run services or applications with the necessary permissions and access rights.
Service accounts are often used in database administration to allow the database service to interact with the operating system.
Service accounts can be configured with specific permissions and restrictions to li...
Replication can be configured by setting up a publication, creating a subscription, and initializing the subscription.
Set up a publication by selecting the database objects to replicate and defining the publication properties.
Create a subscription by specifying the subscriber server, database, and synchronization schedule.
Initialize the subscription by generating a snapshot of the publication and applying it to the sub...
Truncate is faster and cannot be rolled back, while delete is slower and can be rolled back.
Truncate is a DDL command, while delete is a DML command.
Truncate removes all rows from a table, while delete removes specific rows based on a condition.
Truncate resets identity column values, while delete does not.
Truncate cannot be used with a WHERE clause, while delete can.
Truncate is faster than delete as it does not log ind...
Team dynamics refer to the interactions and relationships among team members that impact team performance and effectiveness.
Effective communication is key for successful team dynamics
Establishing clear roles and responsibilities helps avoid conflicts
Encouraging collaboration and mutual respect fosters a positive team environment
I appeared for an interview in May 2025, where I was asked the following questions.
My father was a dedicated engineer, specializing in safety systems for industrial applications, ensuring workplace safety and efficiency.
He worked on designing safety protocols for manufacturing plants.
He implemented risk assessment strategies to minimize workplace hazards.
He collaborated with teams to develop emergency response plans.
He conducted training sessions for employees on safety practices.
I appeared for an interview in Apr 2025, where I was asked the following questions.
The ASCII value of the character 'a' is 97, which is part of the standard ASCII table used in computing.
ASCII stands for American Standard Code for Information Interchange.
Each character in the ASCII table is assigned a unique integer value.
For example, the ASCII value of 'A' is 65, and 'b' is 98.
ASCII values range from 0 to 127 for standard characters.
Java Collections like Set do not allow duplicate values, ensuring unique elements in the collection.
1. Set Interface: The primary collection that prevents duplicates.
2. HashSet: Implements Set, uses a hash table for storage. Example: Set<String> set = new HashSet<>();
3. TreeSet: Implements Set, stores elements in a sorted order. Example: Set<Integer> treeSet = new TreeSet<>();
4. LinkedHashSet: M...
I appeared for an interview in Apr 2025, where I was asked the following questions.
I appeared for an interview in Apr 2025, where I was asked the following questions.
I appeared for an interview in Mar 2025, where I was asked the following questions.
Calculate iterations needed for a virus to infect all cells in a matrix of 0s, 1s, and 2s.
Use BFS or DFS to spread the virus from each cell with value 2.
Count iterations until no more cells can be infected.
Example: For matrix [[0,1,2],[0,0,1],[1,0,0]], it takes 3 iterations.
I appeared for an interview in Mar 2025, where I was asked the following questions.
Layer 2 deals with data link protocols, while Layer 3 focuses on network routing and addressing.
Layer 2 (Data Link Layer) is responsible for node-to-node data transfer and error detection/correction.
Layer 3 (Network Layer) handles packet forwarding, including routing through different networks.
Examples of Layer 2 protocols include Ethernet and PPP (Point-to-Point Protocol).
Examples of Layer 3 protocols include IP (Inte...
Stateful firewalls track active connections, while stateless firewalls filter packets based on predefined rules without connection context.
Stateful firewalls maintain a state table to track active connections.
Stateless firewalls filter packets based solely on rules without context.
Example of stateful: Cisco ASA, which tracks sessions and allows return traffic.
Example of stateless: Basic packet filtering routers that bl...
Palo Alto and Fortigate are leading firewall solutions with distinct features and capabilities for network security.
Palo Alto offers advanced threat prevention with its App-ID technology, allowing granular control over applications.
Fortigate provides integrated security features, including antivirus and intrusion prevention, in a single appliance.
Palo Alto's user interface is known for its intuitive design, making it e...
I applied via Approached by Company and was interviewed before Nov 2022. There was 0 interview round.
I faced a major challenge when a critical system outage occurred, impacting multiple users and requiring swift resolution.
Identified the issue quickly by analyzing system logs and user reports.
Coordinated with the IT team to implement a temporary workaround while investigating the root cause.
Communicated regularly with affected users to keep them informed and manage expectations.
Documented the incident thoroughly for f...
All maths questions and coding questions
Array problems, agular basic, JS snippets
Top trending discussions
Some of the top questions asked at the Wissen Infotech interview -
The duration of Wissen Infotech interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 48 interview experiences
Difficulty level
Duration
based on 566 reviews
Rating in categories
Hyderabad / Secunderabad,
Bangalore / Bengaluru
7-10 Yrs
Not Disclosed
Hyderabad / Secunderabad,
Bangalore / Bengaluru
9-14 Yrs
₹ 25-30 LPA
Software Engineer
421
salaries
| ₹5.1 L/yr - ₹12.5 L/yr |
Senior Software Engineer
273
salaries
| ₹11.7 L/yr - ₹20.2 L/yr |
Junior Software Engineer
243
salaries
| ₹2.8 L/yr - ₹6.2 L/yr |
Associate Software Engineer
207
salaries
| ₹4 L/yr - ₹8.7 L/yr |
Lead Engineer
96
salaries
| ₹22.1 L/yr - ₹38.8 L/yr |
Wissen Technology
ITC Infotech
Cybage
3i Infotech