Faster and better experience!
i
Wipro
Filter interviews by
In ADF, an activity represents a single unit of work or a task within a data flow or pipeline.
Types of Activities: ADF supports various activities like Copy Activity for data movement, Data Flow for data transformation, and Execute Pipeline for orchestrating workflows.
Integration with Services: Activities can integrate with services like Azure Blob Storage, SQL Database, and more, enabling seamless data operations...
ADF (Application Development Framework) is a framework for building enterprise applications with a focus on productivity and reusability.
Model-View-Controller (MVC) Architecture: ADF uses MVC to separate application logic, user interface, and data management, enhancing maintainability.
Data Binding: ADF provides robust data binding capabilities, allowing UI components to be easily linked to data sources, simplifyin...
Decision making and conditional execution in programming allow code to execute different paths based on specific conditions.
If-Else Statements: These are used to execute a block of code if a condition is true, and another block if it is false. Example: if (x > 10) { ... } else { ... }
Switch Statements: This allows multi-way branching based on the value of a variable. Example: switch (day) { case 1: ...; break; ...
Catch and persistent refer to error handling and data storage strategies in programming, enhancing reliability and performance.
Catch: A mechanism to handle exceptions or errors in code, preventing crashes and allowing for graceful recovery. Example: try-catch blocks in Java.
Persistent: Refers to data that remains available even after the program ends, often stored in databases or files. Example: saving user prefer...
An abstract class is a class that cannot be instantiated and is designed to be subclassed, providing a base for derived classes.
Cannot be Instantiated: Abstract classes cannot create objects directly; they must be subclassed. Example: 'abstract class Animal { }'.
Contains Abstract Methods: They can have abstract methods (without implementation) that must be implemented by subclasses. Example: 'abstract void makeSou...
Path param is part of the URL path, while request param is part of the query string in the URL.
Path param is used to identify a specific resource in the URL path, while request param is used to provide additional data to the server.
Path param is defined in the URL path itself, like /users/{id}, while request param is appended to the URL as key-value pairs, like ?name=John&age=30.
Path param is typically used for ma...
Program to check if input is a palindrome or not
Create a function that takes a string input
Remove all non-alphanumeric characters and convert to lowercase
Compare the original string with its reverse to check if it's a palindrome
ADLS stands for Azure Data Lake Storage, a scalable and secure data lake platform for big data analytics.
ADLS is a cloud-based storage solution provided by Microsoft Azure.
It is designed for big data analytics and can handle massive amounts of data.
ADLS offers features like high availability, security, and scalability.
Example: ADLS Gen2 is a combination of Azure Blob Storage and Azure Data Lake Storage capabilitie...
ArrayList is a dynamic array in Java that can grow or shrink in size as needed.
ArrayList is a class in Java that implements the List interface.
It allows for dynamic resizing, unlike regular arrays.
Elements can be added, removed, or accessed using index positions.
Example: ArrayList<String> names = new ArrayList<String>();
A software engineer is a professional who designs, develops, and maintains software applications and systems.
Designs and develops software applications
Writes code to implement software solutions
Tests and debugs software to ensure functionality
Collaborates with team members to create software products
Stays updated on new technologies and trends in the field
I appeared for an interview in Apr 2025, where I was asked the following questions.
Wipro is a global information technology, consulting, and business process services company based in India, known for innovation.
Global Presence: Wipro operates in over 50 countries, providing services to clients across various industries, including healthcare and finance.
Diverse Services: The company offers a wide range of services, including IT consulting, application development, and business process outsourcing.
Sus...
In five years, I envision myself as a senior software engineer, leading projects and mentoring junior developers while enhancing my skills.
Career Advancement: I aim to progress to a senior software engineer role, where I can take on more responsibilities and lead projects.
Mentorship: I want to mentor junior developers, sharing my knowledge and helping them grow in their careers, similar to how I was guided.
Technical Ex...
Red is a primary color associated with strong emotions, danger, and energy, often used in design and symbolism.
Symbolism: Red often represents love, passion, and anger, making it a powerful color in art and design.
Cultural Significance: In many cultures, red is associated with good fortune and celebration, such as in Chinese New Year.
Psychological Impact: Red can increase heart rate and evoke strong emotions, often use...
College days were filled with both challenges and triumphs, shaping my personal and professional growth significantly.
Academic Achievements: I excelled in my programming courses, particularly in algorithms, which fueled my passion for software development.
Team Projects: Collaborating on a capstone project with classmates taught me the importance of teamwork and effective communication.
Extracurricular Activities: I join...
I appeared for an interview in Apr 2025, where I was asked the following questions.
Round one is aptitude test , because based on the thinking
Coding is main because to create any websites or any development we need coding skills
We need this group discussion because we must speak in front of many members without fear.
I applied via Campus Placement
Program to check if input is a palindrome or not
Create a function that takes a string input
Remove all non-alphanumeric characters and convert to lowercase
Compare the original string with its reverse to check if it's a palindrome
HashMap is a key-value pair data structure while HashSet is a collection of unique elements.
HashMap stores key-value pairs while HashSet stores unique elements
HashMap allows duplicate values but keys must be unique, HashSet does not allow duplicates
Example: HashMap<String, Integer> map = new HashMap<>(); HashSet<String> set = new HashSet<>()
Path param is part of the URL path, while request param is part of the query string in the URL.
Path param is used to identify a specific resource in the URL path, while request param is used to provide additional data to the server.
Path param is defined in the URL path itself, like /users/{id}, while request param is appended to the URL as key-value pairs, like ?name=John&age=30.
Path param is typically used for mandato...
I applied via LinkedIn and was interviewed in Jul 2024. There were 2 interview rounds.
A software engineer is a professional who designs, develops, and maintains software applications and systems.
Designs and develops software applications
Writes code to implement software solutions
Tests and debugs software to ensure functionality
Collaborates with team members to create software products
Stays updated on new technologies and trends in the field
The best software developer is subjective and can vary based on individual preferences and criteria.
The best software developer is someone who consistently produces high-quality code that meets project requirements.
They have strong problem-solving skills and the ability to think critically about complex issues.
Effective communication and collaboration with team members are also important qualities of a great software d...
It is a friendly way of wishing a software engineer to have a good day.
It is a common phrase used to wish someone well in their day.
It shows a positive and friendly attitude towards the software engineer.
It can help create a positive work environment and boost morale.
A software engineer is responsible for designing, developing, and maintaining software applications and systems.
Designing and developing software applications
Testing and debugging code
Collaborating with team members
Updating and maintaining existing software
Implementing new features and functionalities
The best software engineer is someone who is highly skilled, adaptable, and passionate about problem-solving.
Highly skilled in programming languages and technologies
Adaptable to new technologies and able to learn quickly
Passionate about problem-solving and finding innovative solutions
Good communication and teamwork skills
Experience in relevant industry or domain (e.g. web development, mobile apps, AI)
Continuous learnin...
I appeared for an interview in Mar 2025, where I was asked the following questions.
A MAC address is a unique identifier for network interfaces, used for communication within a local network.
Unique Identifier: Each MAC address is unique to a network interface, ensuring that devices can be accurately identified on a local network.
Format: MAC addresses are typically represented as six groups of two hexadecimal digits, separated by colons or hyphens (e.g., 00:1A:2B:3C:4D:5E).
Layer 2 Communication: MAC ad...
A threat is a potential danger that can exploit vulnerabilities to cause harm or damage to systems, data, or individuals.
Threats can be intentional, such as hacking or malware attacks.
They can also be unintentional, like natural disasters or human error.
Examples include phishing attacks, where attackers trick users into revealing sensitive information.
Another example is ransomware, which encrypts data and demands payme...
A passive attack involves eavesdropping or monitoring data without altering it, aiming to gather information stealthily.
Passive attacks do not modify or disrupt the data being transmitted.
Common examples include network traffic analysis and packet sniffing.
Attackers may use tools like Wireshark to capture sensitive information.
These attacks can lead to data breaches if sensitive information is collected.
OSI stands for Open Systems Interconnection, a conceptual framework for understanding network communication.
Developed by ISO (International Organization for Standardization) in the late 1970s.
Consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.
Each layer serves a specific function and communicates with the layers directly above and below it.
Example: The Transport layer ...
An active attack involves an attacker attempting to alter system resources or affect their operation.
Types of active attacks include modification of data, denial of service, and masquerading.
Example: A man-in-the-middle attack where an attacker intercepts and alters communication between two parties.
Example: A denial-of-service attack that overwhelms a server, making it unavailable to legitimate users.
Active attacks ca...
Subnetting is the process of dividing a network into smaller, manageable sub-networks to improve performance and security.
Subnetting helps in efficient IP address management by reducing wastage.
It enhances network security by isolating segments of the network.
For example, a Class C network with 256 addresses can be divided into smaller subnets.
Subnet masks (like 255.255.255.0) define the network and host portions of an...
The best network device for transferring data depends on the specific use case, but routers and switches are commonly used.
Routers connect multiple networks and direct data traffic efficiently.
Switches operate within a single network, managing data packets between devices.
For wireless data transfer, access points enhance connectivity and range.
Firewalls protect data during transfer by filtering traffic based on securit...
A subnet is a segmented piece of a larger network, allowing for efficient IP address management and improved security.
Subnets divide a larger network into smaller, manageable sections.
Each subnet has a unique subnet mask that defines its range of IP addresses.
Example: In a Class C network, 192.168.1.0/24 can be subnetted into 192.168.1.0/26 and 192.168.1.64/26.
Subnets enhance security by isolating network segments.
Rout...
A network is a collection of interconnected devices that communicate and share resources.
Networks can be wired (e.g., Ethernet) or wireless (e.g., Wi-Fi).
The Internet is the largest example of a global network.
Local Area Networks (LANs) connect devices within a limited area, like an office.
Wide Area Networks (WANs) connect devices over larger distances, such as cities or countries.
Protocols like TCP/IP govern how data ...
I applied via Recruitment Consulltant and was interviewed in Jul 2024. There was 1 interview round.
The date format in Tosca for 2 workdays from today needs to be calculated.
Calculate today's date
Add 2 workdays to the current date
Format the resulting date in Tosca format
The question is asking for the current date plus 2 weeks.
Use a programming language's date manipulation functions to get the current date.
Add 2 weeks to the current date to get the desired date.
Consider leap years and different month lengths when calculating the date.
Developed a web-based project management tool for tracking tasks and deadlines
Used HTML, CSS, and JavaScript for front-end development
Implemented backend functionality using Node.js and MongoDB
Incorporated user authentication and authorization features
Utilized RESTful APIs for communication between front-end and back-end
The map function in Java is used to apply a function to each element in a collection and return a new collection with the results.
Map function is part of the Java Stream API.
It takes a lambda function as an argument to define the transformation to be applied.
Example: List<Integer> numbers = Arrays.asList(1, 2, 3); List<Integer> squaredNumbers = numbers.stream().map(n -> n * n).collect(Collectors.toList());
ArrayList is a dynamic array in Java that can grow or shrink in size as needed.
ArrayList is a class in Java that implements the List interface.
It allows for dynamic resizing, unlike regular arrays.
Elements can be added, removed, or accessed using index positions.
Example: ArrayList<String> names = new ArrayList<String>();
Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based Applications.
Spring Boot simplifies the process of creating Spring applications by providing a set of default configurations.
It allows for easy setup of Spring projects with minimal configuration.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow, making it easy to deploy applications.
It promotes convent...
The duration of Wipro Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 1k reviews
Rating in categories
Project Engineer
32.9k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
22.6k
salaries
| ₹5.8 L/yr - ₹23 L/yr |
Senior Associate
21.8k
salaries
| ₹0.9 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20k
salaries
| ₹5 L/yr - ₹19.5 L/yr |
Technical Lead
19.4k
salaries
| ₹10 L/yr - ₹38 L/yr |
TCS
Infosys
Tesla
Amazon