logo

Wipro Interview Preparation and Recruitment Process


About Wipro


Wipro Limited is an Indian multinational technology company headquartered in Bengaluru, India. It is a leading global provider of information technology (IT), consulting, and business process services. Founded on December 29, 1945, by MH Hasham Premji as Western India Vegetable Products Limited, the company initially focused on manufacturing cooking oils. After Hasham Premji's death in 1966, his son Azim Premji took over as chairperson at the age of 21 and shifted the company’s focus toward the IT and computing industry during the 1970s and 1980s, a period when this sector was emerging in India.

Wipro Interview Questions

Today, Wipro is recognized as one of India’s major Big Tech companies, alongside firms like TCS, Infosys, and HCL Technologies. It operates in over 60 countries, serving clients across industries such as financial services, healthcare, manufacturing, retail, and telecommunications. Wipro’s service offerings include cloud computing, cybersecurity, digital transformation, artificial intelligence, robotics, data analytics, IT consulting, software development, system integration, and business process outsourcing (BPO). The company employs approximately 234,000 people worldwide as of March 2024, with women making up 36.6% of its workforce.

Wipro’s evolution includes key milestones: it changed its name to Wipro Products Limited in 1977 and then to Wipro Limited in 1982. By the 1990s, it had become a prominent player in India’s IT sector, and in 1998, it was the country’s second-largest software exporter. In 2000, Wipro listed its American Depositary Shares on the New York Stock Exchange (NYSE), and by 2004, it became the second Indian IT company to surpass $1 billion in annual revenue. In 2012, Wipro demerged its non-IT businesses—such as consumer care, lighting, and infrastructure engineering—into a separate entity called Wipro Enterprises, allowing it to focus solely on IT services.

The company’s equity shares are traded on the Bombay Stock Exchange (BSE) and the National Stock Exchange of India (NSE), where it is part of the NIFTY 50 index. As of March 2024, the promoter group, led by Azim Premji, holds a 72.88% stake in Wipro. Known for its commitment to sustainability and innovation, Wipro has also faced challenges, such as criticism in 2023 for reducing new hires’ salary packages by 50%, prompting backlash from employee unions. Despite this, it continues to secure significant deals, like a £500 million, 10-year contract with the UK’s Phoenix Group in 2025, reinforcing its global presence and growth trajectory.


Wipro Recruitment Process


Eligibility Criteria :


* Candidates with a B.E./B.Tech degree or a 5-year integrated M.Tech degree are eligible.
* Except for Fashion Technology, Textile Engineering, Agriculture, and Food Technology, all branches are permitted to appear for the recruitment process.
* The offer is conditional on all backlogs being cleared.
* A maximum of three years of an educational gap will be permitted (10th to graduation)
* 60 percent or higher in tenth grade and twelfth grade.
* Graduation: 60% or 6.0 CGPA or equivalent, as determined by your university's requirements.

1. Interview Rounds


Online Assessment Round :

The online assessment test is the first step in the recruitment process. The candidates who clear this round are called for the technical interview rounds. The test is divided into 3 sections:

* Aptitude : The Aptitude Test is the initial step in the Wipro hiring process. This round is broken down into three sections:

* Quantitative Aptitude : The candidate's mathematical abilities will be tested in this phase. Time, Speed & Distance, Number Series, Simple & Compound Interest, Probability, Permutation & Combination, Ratios & Proportions, and Percentages are all covered in the Quantitative Aptitude section.

* Logical Reasoning : The portion will assess the candidate's ability to think critically and logically. In this part, you will be asked questions about the following topics: Coding, Decoding, Series, Analogy and Visual Reasoning, Data Sufficiency, Data Interpretation, ?Data Arrangements, Logical Word Sequence, ?Statements and Inferences, ?Inequalities.

* Verbal Ability : This section will assess the candidates' English abilities. The following subjects will be the focus of the questions in this section:  Error-Spotting, Sentence Improvement, Sentence Completion, and Para-Jumbles among others.

* Essay writing : An Essay Writing test is included in the writing portion, and it can be based on any topic or scenario. Candidates must write a 200-400 word essay on the assigned topic. It's also a computer-based examination. A good Wipro essay will feature the following: Excellent planning (structure of the essay), Proper phrasing (grammar, punctuations, and spelling errors), and good vocabulary.

* Coding : Candidates can take the coding assessment in any of the following programming languages: Java, C, C++, or Python. Fundamentals of Programming must be mastered in at least one programming language of his/her choice. Generally, two or three coding questions are asked in this round. The following are the topics that must be mastered: Decision Making, Looping, Functions,  Arrays, and Strings.
The online assessment round can be skipped for experienced folks based on company requirements and job profiles.

Technical Interview Round

* Candidates who pass the online assessment round will be called to face-to-face technical interviews.

* Your technical abilities are evaluated during a technical interview, which is usually related to the technical knowledge required for the position that you have applied for. The questions will put your problem-solving and numerical reasoning skills to the test. Interviewers are interested in how candidates approach problems, construct their thought process, and display personal qualities such as communication, in addition to technical knowledge (which is vital).

* The technical face-to-face interview is the most crucial step in the process. You should be familiar with computer fundamentals such as OOPS, DBMS, CN,  OS, etc, and be able to explain them to the interviewer. It is necessary to be familiar with a programming language. Make sure you know at least one programming language. You do not need to be fluent in all programming languages, but at least one, such as C++, Java, or Python, should be familiar to you. You can be asked to write code too. Your problem-solving skills will also be evaluated by the interviewer. You'll be asked about your previous projects and professional experiences, including what you did, how you employed technology, and how successful you were.

* The number of technical interviews to be conducted will be based on your performances in previous rounds, job profile, and company requirements.

HR interview round

Every organization conducts an HR interview round to assess your personality, strengths, shortcomings, and ability to handle the task, as well as to assess your background and determine if you're the ideal fit for this position. The HR round will be held for candidates who have cleared the technical interview.  They can also ask questions about Wipro’s history, including when it was created, its goals, principles, and organizational structure, among other things.

Examine your resume to ensure that you have included all relevant information about yourself and that the information you have provided is accurate to the best of your knowledge. Prepare yourself to respond to any question that may be posed based on your résumé. Be confident and truthful about anything you answer. If you're preparing for an HR interview, you can expect to be asked some of the following questions:

* Please tell me about yourself. (This is the very first question, and it will almost certainly be asked in each round of the interview. Telling the interviewer about your hobbies, skill sets, strengths, qualifications, and successes is the ideal method to answer this question. Start with your current position, achievements, past work history, and academic and personal details if you're an experienced professional.)

* What is your expectation with respect to this role?

* Why are you interested in working for Wipro?

* Are you willing to relocate to various parts of India?

* Tell me about your internships and projects.

* Why are you looking for a job change? (This is a popular question among experienced professionals looking for a change. The simplest way to respond to this question is to say that you are leaving your current job to pursue a promotion. Make sure you don't criticize or undermine the company where you're now employed.)

2. Interview Process


The Wipro Recruitment Process generally consists of three rounds of selection:

* Online assessment round
* Technical interview round
* HR interview round.

Wipro Interview Questions :

1 .
What are the functionalities of an operating system?
These are some major functionalities of an operating system:

* The operating system shares the Computer's memory and sharing of the central processing unit time by various applications and peripheral devices.
* An operating system provides a user interface, i.e., graphical user interface and command line.
* An operating system includes functionality for booting the computer.
* Perform some basic tasks, i.e., managing the peripheral devices.
* It provides file management which refers to the way that operating system stores, retrieves, manipulates, and saves data.
2 .
What is the difference between UNIQUE key and PRIMARY key constraints?
Difference between unique key and primary key constraints :

Unique key Primary key
A table can contain multiple unique keys. A table can contain only one primary key.
NULL values are allowed. NULL values are not allowed.
It helps to maintain a unique data in a column of a table. It helps to identify a unique row from a table.
For MS SQL server databases, a unique constraint will generate a unique NON-CLUSTERED INDEX Primary key will generate a unique CLUSTERED INDEX
3 .
What is the use of a CSS preprocessor? When should a pre-processor be utilised in a project, according to you?
CSS preprocessors are scripting languages that augment CSS's standard functionality. They allow us to employ variables, nesting, inheritance, mixins, functions, and mathematical operations in our CSS code. CSS preprocessors make it simple to automate repetitive activities, eliminate code bloat and errors, develop reusable code snippets, and maintain backward compatibility.

The benefits and drawbacks of using a preprocessor vary depending on the type of project, but the following are some of the benefits and drawbacks.

Advantages :

* You may add variables and functions to CSS with CSS Preprocessor, which gives it a new dimension and scope, making development easier and more efficient. It also improves the organization and cleanliness of your code.

* CSS Preprocessors is a unique feature that allows you to combine numerous stylesheets into one. You can make separate files for each screen or page, then combine them in the main CSS file.

* The CSS Preprocessor assists you in avoiding repetitions. Instead of rewriting common styles, you can write them once and then import them.

* CSS class nesting makes it simple to target DOM elements and saves time. It's also a lot easier to alter CSS files due to nesting.


Disadvantages :

* Preprocessing tools are required for preprocessors. The time they take to recompile can be lengthy.

* Although the source files may be small, the output CSS may be large, causing the request to take longer to finish.

Choosing a preprocessor comes down to personal choice, and it might be instructive to see how a developer could choose one over the other for your project.
4 .
How do the commands DROP, TRUNCATE, and DELETE differ in SQL?
DROP TRUNCATE DELETE
DROP is used for deleting a database, table, or a view TRUNCATE is used for deleting all rows of a table DELETE can either delete all of the rows at once or one by one. i.e., we can use it according to our needs.
No data can be rollbacked No data can be rollbacked Data can be rollbacked
It is a Data Definition Language (DDL) command It is a Data Definition Language (DDL) command It is a Data Manipulation Language (DML) command.
It deletes the entire structure of the table. It preserves the structure of the table. It does not affect the structure of the table.
5 .
What is SQL Profiler?
SQL Server Profiler is a graphical user interface for SQL Trace (SQL Trace is a built-in SQL Server application that monitors and records database activity in SQL Server 6.5. This tool can show server activity, set filters to focus on the operations of specific users, applications, or workstations, and filter SQL commands) that helps in monitoring a Database Engine or Analysis Services instance. You can record and store information about each event to a file or table for subsequent analysis.

The SQL Profiler software allows us to track SQL Server connections and determine actions such as which SQL Scripts are executing, unsuccessful jobs, and so on. SQL databases and their environments are monitored, analyzed, troubleshooted, and tuned with this tool.
6 .
How can you delete the duplicate row in a table?

To delete duplicate rows from a table in SQL, you can use different methods depending on your database system (MySQL, PostgreSQL, SQL Server, Oracle, etc.). Here are common approaches:

1. Using ROW_NUMBER() (Preferred Method)

If your database supports ROW_NUMBER(), you can use it to identify and remove duplicates efficiently.

WITH CTE AS (
    SELECT 
        *, 
        ROW_NUMBER() OVER (PARTITION BY column1, column2 ORDER BY id) AS rn
    FROM table_name
)
DELETE FROM table_name
WHERE id IN (SELECT id FROM CTE WHERE rn > 1);
* Explanation :
  • PARTITION BY column1, column2 groups duplicate rows based on selected columns.

  • ROW_NUMBER() assigns a unique row number within each group.

  • Deletes rows where rn > 1, keeping only the first occurrence.


2. Using DISTINCT to Create a New Table (Safe Method)

If direct deletion is risky, create a new table with only distinct records.

CREATE TABLE new_table AS
SELECT DISTINCT * FROM table_name;

DROP TABLE table_name;
ALTER TABLE new_table RENAME TO table_name;

* This ensures only unique records remain.


3. Using DELETE with GROUP BY (For Simple Cases)

For databases that don’t support ROW_NUMBER(), you can delete duplicates using GROUP BY and HAVING.

DELETE FROM table_name 
WHERE id NOT IN (
    SELECT MIN(id)
    FROM table_name 
    GROUP BY column1, column2
);

* Keeps only the row with the minimum id and deletes the rest.

7 .
What is stored procedure? Explain with example.
Stored procedures are a batch of SQL statements that can be executed in a couple of ways. Most of the DBMS support stored procedures; however, not all do. The stored procedure increases the reusability as here the code or the procedure is stored into the system and used again and again that makes the work easy.

Syntax :
CREATE PROCEDURE procedure_name  
AS  
sql_statement  
GO;  ?


To execute a stored procedure :

EXEC procedure_name; ?
 
Create a table and use this syntax for example.
8 .
What is a process and what is a thread?
A thread is a lightweight sub-process, the smallest unit of processing. It is a separate path of execution.

Threads are independent that means if there is an exception in one thread, it doesn't affect other threads. It uses a shared memory area.

The process is heavyweight and can consists of multiple threads. It is a small part of a program.
9 .
What are the advantages of a thread? How does the multithreading look like?
These are the following advantages of a Thread :

* It provides efficient communication.
* It minimizes the context switching time.
* By using thread, we can get the concurrency within a process.
* Thread allows utilization of multiprocessor architectures to a greater scale and efficiency.
* A process which executes multiple threads simultaneously is known as multithreading.
* A thread is a lightweight sub-process, the smallest unit of processing.

To achieve multitasking in java, we have two ways :

Multiprocessing and multithreading

One process may contain more than one thread and execute simultaneously is known as multi-threading.
10 .
What are stack and Queue and its applications?
Stack :

1. The stack is an ordered list in which, insertion and deletion can be performed only at one end that is called a top.
2. The stack is a recursive data structure having a pointer to its top element.
3. Stacks are sometimes called as Last-In-First-Out (LIFO) lists, i.e., the element which is inserted first in the stack will be deleted last from the stack.

Applications of Stack :

1. Recursion
2. Expression evaluations and conversions
3. Parsing
4. Browsers
5. Editors
6. Tree Traversals

Queue :

1. A queue can be defined as an ordered list which enables insert operations to be performed at one end called REAR and delete operations to be performed at another end called FRONT.
2. The queue is referred to be as the First-In-First-Out list.
3. For example, people waiting in line for a rail ticket form a queue.

Applications of Queue :

1. The queues are widely used as waiting lists for a single shared resource like a printer, disk, CPU.
2. The queues are used in the asynchronous transfer of data (where data is not being transferred at the same rate between two processes), e.g., Pipes, file IO, sockets.
3. The queues are used as buffers in most of the applications like MP3 media player, CD player, etc.
4. The queues are used to maintain the playlist in media players to add and remove the songs from the playlist.
5. The queues are used in operating systems for handling interrupts.
11 .
What are Multi-Processing and Multitasking?
Multitasking : As the name indicates multiple tasks run on a single CPU. We use multitasking to utilize the CPU.

Multitasking can be achieved in two ways :

* Process-based Multitasking (Multiprocessing)
* Thread-based Multitasking (Multithreading)

Multi-processing : Multi-processing refers to the ability of a system to support more than one central processing unit at the same time.

Multithreading : As the name indicates multiple threads run concurrently.

A thread is a lightweight sub-process, the smallest unit of processing.
12 .
What are the benefits of Hybrid Clouds in Cloud Computing?
A hybrid cloud is computing, storage, and service environment that combines on-premises infrastructure, private cloud services, and a public cloud (such as Amazon Web Services (AWS) or Microsoft Azure) with orchestration among the platforms. Hybrid cloud infrastructure is one that combines public clouds, on-premises computing, and private clouds in your cloud server.

The real value of cloud services comes from their ability to enable a fast-paced digital company to change. There are two agendas in every technology management organization: the IT agenda and the business transformation agenda. Traditionally, the IT agenda has been concentrated on cost-cutting. Digital business transformation plans, on the other hand, are concentrated on making money through investments.

The main advantage of a hybrid cloud is its flexibility. To acquire the agility it requires for a competitive advantage, your company may desire (or need) to integrate public clouds, private clouds, and on-premises resources.
13 .
What is EUCALYPTUS in cloud computing? List some of its functionalities.
Eucalyptus is commercial and open-source computer software for creating private and hybrid cloud computing environments that are compatible with Amazon Web Services (AWS). It was created by the company Eucalyptus Systems. Eucalyptus stands for Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems. Eucalyptus enables application workloads to be flexibly scaled up or down by pooling compute, storage, and network resources.

Some of its functionalities are :

* Users can configure computing, network, and storage resources using the Eucalyptus User Console. Using built-in key management and encryption capabilities, development and test teams may control virtual instances.

* Eucalyptus can run a variety of virtual machine images, including Windows and Linux. Users can create a library of Eucalyptus Machine Images (EMIs) that are detached from infrastructure details, allowing them to run on Eucalyptus clouds.

* Eucalyptus supports storage area network devices that use storage arrays to boost performance and reliability. Direct-attached storage is also supported by Eucalyptus.

* New features for AWS compatibility have been added to Eucalyptus 3.3. Resource tagging, for example, allows application developers and cloud managers to add configurable metadata tags to resources like firewalls, load balancers, Web servers, and particular workloads to help them be more easily identified.

* Maintenance Mode in Eucalyptus 3.3 allows cloud managers to do maintenance on Eucalyptus clouds with no interruption to instances or cloud applications.

* Better image management and migrating tools, warm upgrade capabilities, a hybrid cloud user console to handle both Eucalyptus and AWS resources, Identity and Access Management (IAM) roles, and enhanced High Availability (HA) capabilities are among the new features in Eucalyptus 3.4.
14 .
Explain the Project Management Life Cycle method in context to Project Management.
The Project Management Life Cycle is a set of activities/tasks that must be completed in order for project objectives or targets to be met. This assists in organizing and streamlining the efforts required to complete the project into a sequence of logical and doable actions. The Project Management Life Cycle is divided into four simple phases, as follows:

Initiation : It's the first and most important step in the project's life cycle, where the project's initial scope is determined and resources are allocated.

Planning : This step requires you to jot down a sufficient amount of detail for the project in order to plan time, cost, and resources. It calculates the amount of work required and effectively manages risk.

Executing : This step contains the processes that are utilized to complete the project management plan's work. It's all about meeting the project's goals. It also entails monitoring, assessing, and regulating the project's progress. You must also promptly recognize possible problems and take necessary action.

Closure : This step is a crucial aspect of project management, and it is responsible for completing all project activities. This entails completing all activities across all the steps, disbanding the project team, and using the project closure report to sign off on the project with the customer.
15 .
What do you understand about RAID in context to Project Management?
RAID stands for Risk, Actions, Issues, and Dependencies in project management. These are extremely crucial aspects for a project manager to understand.

* Risks are potential pitfalls that could have a good or negative impact on the project, causing the final product to deviate from the original design.

* The tasks that you do during the project are referred to as actions.

* Issues are roadblocks that you may encounter over the course of the project that must be effectively resolved or the project will be derailed or fail.

* Decisions are the actions/tasks you choose in the project.
16 .
What is indexing, what are the advantages and disadvantages of it?
Indexes are special lookup tables. It is used to retrieve data from the database very fast.

An Index is used to speed up select queries and where clauses. But it shows down the data input with insert and update statements. Without affecting the data, we can create or drop indexes

An index in a database is just like an index in the back of a book.

Indexing can be of the following types

Primary index, secondary index, and clustering index.

The advantages of indexes are as follows :

* An index makes it possible to retrieve data quickly.
* Index's use in queries usually results in much better performance.
* They can be used for sorting. A post-fetch-sort operation can be eliminated.
* Index guarantees uniquely identifiable records in the database.


The disadvantages of indexes are as follows :

* Indexes decrease the performance on inserts, updates, and deletes.
* Indexes take up space (this increase with the number of fields used and the length of the fields).
* Databases will have monocase values in fields that are indexed.
17 .
What is De-Normalization where does it have?
Denormalization is the process of boosting up database performance and adding of redundant data which helps to get rid of complex data. Denormalization is a part of database optimization technique. This process is used to avoid the use of complex and costly joins.

Denormalization doesn't refer to the thought of not to normalize instead of that denormalization takes place after normalization. In this process, firstly the redundancy of the data will be removed using normalization process than through denormalization process we will add redundant data as per the requirement so that we can easily avoid the costly joins.
18 .
What are the Different Objects in DBMS?
A database objects use to store or reference data in the database. Any statement which is written with CREATE Command is known as the database object.

Different types of object in DBMS are:

View : This object is used to create a view in the database. It is a logical table based on another view. A table on which view is based is called the base table.

Table : we can create a table in a database by using the CREATE TABLE statement.

Sequence : This object command used to create a sequence in the database. It is a user-created database object which is shared by multiple users to generate unique integers.

Index : A database object can create indexes in the database by using an index. Indexes are used for fast retrieval of rows from a table.

Synonym : This object is also used for creating indexes in the database. By synonym, you can easily access the objects
19 .
What are Self-Join and Outer Join, where do you use it?

Self-Join: A self-join is a join which joins the table with itself, means that each row of the table is combined with itself and with every other row of the table. The table contains a FOREIGN KEY which references its PRIMARY KEY.

It shows the one-to-many relationship in a table also known as a unary relationship.

Now come to SQL outer join, all the content of both tables is integrated together either they are matched or not.

An outer join is of two types:

1. Left outer join (also known as left join): this join returns all the rows from left table combine with the matching rows of the right table. If you get no matching in the right table, it returns NULL values.

Syntax: Left outer join

  • SELECT table1.column1, table2.column2.....
  • FROM table1
  • LEFTJOIN table2
  • ON table1.column_field = table2.column_field;

2. Right outer join (also known as right join): this join returns all the rows from right table are combined with the matching rows of left table .If you get no column matching in the left table .it returns null value.

Basic syntax for right joins :

  • SELECT table1.column1, table2.column2.....
  • FROM table1
  • RIGHT JOIN table2
  • ON table1.column_field = table2.column_field;
20 .
Explain some differences between TRUNCATE and DELETE commands with their syntax?
There is a slight difference b/w delete and truncate statement. The DELETE statement only removes the rows from the table based on the condition defined by WHERE clause or remove all the rows from the table when the condition is not specified.

But it does not free the space containing by the table.

Syntax :
DELETE FROM table_name [WHERE condition];

But if you do not specify the WHERE condition, it will remove all the rows from the table.
DELETE FROM table_name;

The TRUNCATE statement : It is used to delete all the rows from the table and free the containing space.

Syntax :
TRUNCATE TABLE employee;
21 .
Define memory management in C.
When you run a program, it loads into your computer memory and starts execution by sending and receiving the instructions from the computer's processor. When your program needs to run a function, then it loads at another part of the memory till it runs and releases that memory when the task is complete.

Now, talk about the concept of dynamic memory allocation in c language, which enables the C programmer to allocate memory at runtime. Dynamic memory allocation in c language is possible by four functions of stdlib.h header file.

* malloc()
* calloc()
* realloc()
* free()
22 .
What is the difference between Abstract classes and interface?
Java interface should be implemented using the keyword "implements"; A Java abstract class should be extended using the keyword "extends."

An Interface can extend interface only; Abstract class have two properties, it can extend only one java class but implement more than one interface at a time.
23 .
Explain precondition and postcondition to a member function in the context of C++ programming language.
A precondition is a condition that must be met before a member function may be called. If preconditions are never false, a class is appropriately used. If a precondition fails to hold, the following function is not executed. For example, before inserting an element into a stack, we call the isfull() to check if the stack is full or not. Here, the isfull() is an example of a precondition.

A post-condition is a condition that must be true when a member function is exited if the precondition was true when the function was entered. For a code to be correctly implemented, the post-conditions must never be false For example, we know that isempty() must always hold after placing an element onto the stack. This is a push operation post-condition.
24 .
What makes a block-level element different from an inline element in HTML?
Block Inline

A block-level element is drawn as a block that will always start on a new line and will stretch to occupy the full width available to it, i.e. the width of its container.

Examples of block-level elements by default: <div>, <img>, <section>, <form>, <nav>.

Inline items are drawn where they are defined and take up only the space that is required. Looking at how text flows on a page is the simplest approach to understand how they work.

Examples of inline elements by default: <span>, <b>, <strong>, <a>, <input>.

25 .
Describe the main differences between the LocalStorage and SessionStorage objects in context to HTML.
The following are the main distinctions between localStorage and sessionStorage objects :

* The data stored in the localStorage object has no expiration date. The sessionStorage object, on the other hand, keeps data for a single session.

* When a browser window is closed, data in a localStorage object is not deleted. In the case of sessionStorage objects, however, the data is destroyed when the browser window is closed.

* SessionStorage data is only available in the browser's current window. The data in the localStorage, on the other hand, can be shared across several browser windows.
26 .
What are the advantages and disadvantages of indexing in DBMS?
Indexing is a technique for improving the database performance by reducing the number of disc accesses needed when a query is run. It's a data structure strategy for finding and accessing data in a database rapidly.

The following are some of the benefits of indexes :

* An index allows data to be retrieved quickly.
* When an index is used in a query, the performance usually improves dramatically.
* They're good for sorting. It is possible to eliminate the need for a post-fetch-sort procedure.
* The index ensures that each record in the database is uniquely identified.

The cons of indexing are :

* Inserts, updates, and deletes are all slowed down by indexes.
* Indexes take up a lot of space (this increases with the number of fields used and the length of the fields).
27 .
What makes a macro faster than a function in the C programming language?

Macros are sections of code in a programme that have been given a name. The compiler substitutes this name with the real piece of code whenever it encounters this name. To define a macro, use the '#define' directive. Macros can be defined either before or within the main method.

Code 1 :
//C
#include  
#include  
#define HRS 24      //Macro  
int main()  
{  
    printf("%d", HRS);  
    return 0;  
}
 
Output :
24

Explanation :

In the above code, we defined a macro named HRS to have a value of 24. Now, when we call the macro in the printf function, 24 gets printed in the output terminal.

The above code can be inferred to be the following code without the use of macros.

Code 2 :
//C
#include  
int hrs()  
{  
    return 24;  
}  
int main()  
{  
    printf("%d", hrs());  //calling  
    return 0;  
}
 
Output :
24

Explanation :

Here, we defined a function named HRS. When we call the HRS function in the printf function, the function returns 24 and so 24 is printed on the output terminal.

Macros are pre-processed, which implies that all macros are processed before the code is compiled, and functions are processed after the code is compiled.
28 .
What are the differences between an object-oriented programming language and object-based programming language?
The following are the main differences between object-oriented and object-based languages.

* Object-oriented languages adhere to all Object Oriented Programming concepts, but object-based languages do not adhere to all Object Oriented Programming concepts such as inheritance, polymorphism, etc.
* Object-oriented languages lack built-in objects, but object-based languages do. For example, JavaScript contains a built-in window object.
* Java, C#, Smalltalk, and others are examples of object-oriented programming languages while JavaScript, VBScript, and others are examples of object-based languages.
29 .
Name the operators that can't be overloaded.
These are the following operators that can't be overloaded.

Scope Resolution operator (::)

Pointer-to-member Operator (.*)

Member Access or Dot Operator (.)

Ternary or conditional operator (?:)

Object size Operator (sizeof)

Object type operator (typeid)
30 .
How is C++ struct different from C++ class?
A struct is a bundle. It is a combination of all related elements that need to work together in a particular context. Such as, the restricted number of arguments context can pass to a function:

If you don't specify the access modifier, visibility (public, private or protected) of the members will be public in the struct and private in the class.

The visibility by default goes just a little further than members: for inheritance, if you don't specify anything then the struct will inherit publicly from its base class, while the class will do private inheritance:
31 .
What is DOM?
DOM stands for Document Object Model. It is a programming API for the HTML and XML documents. DOM provides the logical structure of the document and the way in which a document is accessed and manipulated.

DOM represents a table in the hierarchical form.
32 .
What is polymorphism?
In an object-oriented programming language, polymorphism is a characteristic which means one name with many forms.

We can say that polymorphism shows different behavior in a different scenario.

There are two types of Polymorphism.

Compile time polymorphism: It is known as method overloading.
Runtime polymorphism: it is also known as method overriding.
33 .
How can you make a request for garbage collection in Java?
There are two ways to ask the JVM to run the Garbage Collection.

The garbage collection methods are available in the Runtime class given by Java. For any Java program code, the Runtime class is a singleton. A singleton instance of the Runtime class is returned by the function getRuntime(). This instance of Runtime can be used to call the gc() function to request garbage collection.
Request the JVM to perform GC using the System class System.gc() function.

 public class Sample
{
    public static void main(String[] args) throws InterruptedException
    {
        Sample s1 = new Sample();
        Sample s2 = new Sample();
          
        // Making the reference variable as null
        s1 = null;
          
        // Calling the system call function for garbage collection
        System.gc();
          
        // Making the reference variable as null
        s2 = null;
          
        // Calling for garbage collection through the getRuntime() method
        Runtime.getRuntime().gc();
      
    }
      
    @Override
    // This method is called on object once before garbage collecting it
    protected void finalize() throws Throwable
    {
        System.out.println("Garbage collector has been called");
        System.out.println("The Object whose garbage has been collected is : " + this);
    }
}

Output :
Garbage collector has been called
The Object whose garbage has been collected is : Sample@4251f172
Garbage collector has been called
The Object whose garbage has been collected is : Sample@481e8172


Explanation :
In the above code, we create two instances of a class and then re-initialize it to null. Then we call for the garbage collection using the two methods specified above. Thus, we get the above output.
34 .
What Is The List Interface?
List Interface is the subinterface of Collection. It contains methods to insert and delete elements on an index basis. It is a factory of List-Iterator interface. Lists may contain duplicate items. The List interface includes operations for the following:

* Positional Access : Manipulate elements based on their numerical position in the list.

* Search : Search for specified objects in the list and return its numerical position.

*
List Iteration : Extend Iterator semantics to take advantage of the list's sequential nature.

* Range-view :
Perform arbitrary range operations on the list.

List Interface declaration

public interface List<E> <strong>extends</strong> Collection<E>
35 .
What is an Iterator Interface?
An iterator is a Java interface, and it has methods to iterate on elements of collections.

You can create your iterator object by calling iterator() method present in collection interface.

The methods of the interface are :

hasNext() : To know if any other elements left in the collection.

next () : Returns the next element.

remove () : To remove the current element from the collection(better not use that method).
36 .
What Is The Vector Class?
Vector implements List interface and maintains insertion order. Array list and vector class both are similar but with few differences.

Vector is synchronized : Vector is slow because it is synchronized, i.e., in multithreading environment; it will hold the other threads in runnable or non-runnable state until current thread releases the lock of the object.

Vector is a legacy class

Vector increments 100% means doubles the array size if the total number of elements exceeds than its capacity.
37 .
What is the major difference between yield () and sleep ()?

Sleep () method in Java has two variants one which takes millisecond as sleeping time while other which takes both millisecond and nanosecond for the sleeping duration.

Yield () method pause all the currently executing thread, and give a chance to execute those threads or processes that need to be run. The current thread will continue to run again if no other thread is available to execute.

38 .
What Are Wrapped Classes?

Wrapper class in Java provides the mechanism to convert primitive into object and object into primitive. The eight classes of the java.lang package is known as wrapper classes in java.

The list of eight wrapper classes is given below :

Primitive Type Wrapper class
Boolean Boolean
Char Character
Byte Byte
Short Short
Int Integer
Long Long
Float Float
Double Double
39 .
What are the different types of Shells in Linux?
SHELL is a program that acts as the interface between the user and the operating system. It is a command-line interface to the Unix operating system. It collects data from you and runs programs depending on that data. The output of the program is displayed once it has completed its execution.

Shell allows us to run commands, programs, and shell scripts. Kernel maintains resources between processes and regulates all-important computer operations. It also restricts hardware access, organizes all performing utilities, and manages resources between processes. Only kernel users have access to the operating system's utilities.

Types of Shells :

The C Shell : It included aliases and command history, among other features. It has features like built-in math and C-like expression syntax that make programming easier.

The Bourne Shell : It's the very first UNIX shell. It is more convenient and faster. It lacks interactive features such as the ability to recall past commands. It also has no built-in support for arithmetic and logical expressions. It is the default shell for the Solaris operating system.

The Korn Shell : The Bourne shell is a subset of it. As a result, everything in the Bourne shell is supported. It includes interactive elements. Built-in arithmetic and C-like arrays, functions, and string manipulation facilities are among the features. It is more efficient than a C shell. It works with scripts written in the C shell.

The GNU Bourne-Again Shell : It can be used with the Bourne shell. It incorporates Korn and Bourne shell features.
40 .
List the important functionalities/features of an operating system.
The following are some of the most important features of an operating system :

* The operating system allows diverse applications and peripheral devices to share the computer's memory and central processing unit time.

* Between the user and the computer hardware, an Operating System serves as a communication bridge (interface). A user interface, such as a graphical user interface or a command line, is provided by an operating system.

* The ability to boot the computer is part of an operating system.

* It manages the peripheral devices and does some simple activities like keeping a track of all devices connected to the system, designating a program called the Input/Output Controller that is responsible for every device, and so on.

* It offers file management, which is the process by which an operating system maintains, fetches, manipulates, and saves data.
41 .
What are the advantages and disadvantages of time slicing in CPU Scheduling in OS?
Time slicing allows a task to run for a set amount of time before returning to the pool of ready tasks. The scheduler then determines the executable job depending on the priority and a variety of other factors. A task in a time-slicing method runs for a predetermined amount of time. If there is another task with a higher priority after that task is completed, the scheduler runs the priority task next, based on priority and other considerations.

The advantages of time slicing in CPU Scheduling are :

* CPU resources are distributed fairly. The kernel of our CPUs does not simply allocate all of our PCs' resources to a single task or service. Because the CPU is always running multiple processes that are required for it to function, our kernel manages these processes without delay.
* It prioritizes all processes equally. The CPU accomplishes this by running processes one at a time, slice by slice. A time slice is a brief period of time that is allotted to a process and executed by the CPU.
* It's simple to integrate into the system.
* After a process has run for a set amount of time, it is interrupted and another process runs for the same amount of time. To save the states of preempted processes, the context switching approach is utilised. Hence, the states of the preempted processes are not lost.


The disadvantages of time slicing in CPU Scheduling are :

* The processor output will be delayed if the slicing time is short.
* It spends a lot of time switching between contexts.
* The time quantum/slice has a significant impact on process management.
* Processes do not have defined priorities.
* Priority is not given to more vital jobs.
* It's challenging to come up with an adequate time quantum/slice.
42 .
What are the collections API?
The Collection in Java is a framework that provides an architecture to store and manipulate the group of objects.

All the operations that you perform on a data such as searching, sorting, insertion, manipulation, deletion, etc. can be achieved by Java Collections.

Java Collection means a single unit of objects. Java Collection framework provides many interfaces (Set, List, Queue, Deque, etc.) and classes (ArrayList, Vector, LinkedList, PriorityQueue, HashSet, LinkedHashSet, TreeSet, etc.)

Collection framework has :

* Interfaces and its implementations, i.e., classes
* Algorithm
43 .
How many number of bits are used to represent a character in Unicode, ASCII, UTF-32, UTF-16, And UTF-8 characters?
Unicode requires 16 bits (2 bytes) to represent a character, ASCII requires 7 or 8 bits, and UTF-8 requires 8, 16 and 18-bit pattern.

UTF=16 requires 16 bits and 32 bits pattern.

UTF-32 requires 32 bits pattern
44 .
What are the major differences between preemptive scheduling and time slicing?
Preemptive scheduling :

Under primitive scheduling, the highest priority task executes until it enters the waiting or dead states or any other higher priority task comes into existence.

Time slicing :

A task executes for a fixed period of time and then reenters again in the pool of ready tasks to execute the remaining task later. The scheduler then determines that which task should execute next, based on priority and other factors.
45 .
Define Order of precedence and Associativity, how are they used?

Order of precedence is used with the operators. When a number of operators are used in an expression, it evaluates with the priority of the operators.

Associativity is used to check whether an expression is evaluated from left-to-right or right-to-left.

Order of precedence example:

(5 > 2 + 5 && 4)  

 

The given expression is equivalent to:

(5 > (2 + 5)) && 4)  

The expression (2 + 5) will executes first and the result will be 7
Then after first part of the expression (5 > 7) executes and gives 0 (false) as an output
Finally, (0 && 4) executes and gives 0 (false).

Associativity:

4 * 2 / 4  

 

Here, operators * and / have the same precedence. Both "*" and "/" are left to right associative, i.e., the expression on the left is executed first and moves towards the right.

Thus, the expression above is equivalent to :

((4 * 2) / 4)  
i.e., (4 * 2) executes first and the result will be 8 (true)  
then, (8 / 4) executes and the final output will be 2 (true)  
46 .
What is Hashing technique in the data structure?
Hashing is a faster searching technique. The process of mapping a large amount of data item to a smaller table with the help of a hashing function is called hashing. In other words, hashing is a technique to convert a range of key values into a range of indexes of an array.

In terms of java: Hashing is a way to assign a unique code for any variable or object after applying any function or algorithm on its properties.
47 .
Get the nth Fibonacci number in O(n) time and O(1) space complexity.
//Javascript
function fib(n){
  let [x, y] = [0, 1]
  while (n > 0){
    [x, y] = [y, x + y]
    n -= 1
  }
  return x
}

This solution has a linear time complexity of O(n) and a constant space complexity of O(1). The number of loops required to determine the nth fib number will still increase linearly as n increases, but as we extend the sequence out, we are overriding the previous numbers in the sequence, keeping the space complexity constant for any input n. It is often referred to as the Iterative Top-Down Approach.
48 .
What are the differences between error and exception in Java?
An error occurs when a user performs an unauthorised action that causes the code to behave abnormally. Errors in programming are frequently unnoticed until the code is compiled or run. Some of the errors make it impossible to compile or run a program. As a result, errors should be removed before compiling and running a program. Out of memory and system crash are two examples of errors.

In Java, an exception is an unwelcome or unexpected occurrence that occurs during the program execution, or during run time, and disturbs the usual flow of the program's instructions. Exceptions are circumstances that arise during the program execution and may result in its termination. However, try, catch, and throw keywords can be used to recover them.

Unchecked exceptions (exceptions which are not checked at compile time), such as ArrayIndexOutOfBoundException, are known to the compiler at runtime, whereas checked exceptions (exceptions which are checked at compile time), such as IOException, are known to the compiler at compile time.

Errors Exceptions
It is not feasible to recover from an error during compilation and execution. Exceptions can be recovered by utilising a try-catch block or by throw keyword.
In Java, all errors are of the unchecked type. There are exceptions for both checked and unchecked types.
The environment in which the code is running is the most common cause of errors. Exceptions are generated by the code itself.

Errors can arise both at compile and run time.

Compile Time: eg Syntax Error

Run Time: Logical Error.

All exceptions occur at runtime.
Errors are defined in the java.lang.Error package. Exceptions are defined in the java.lang.Exception package
Examples : java.lang.StackOverflowError, java.lang.OutOfMemoryError Examples : Checked Exceptions : SQLException, IOException Unchecked Exceptions : ArrayIndexOutOfBoundException, NullPointerException, ArithmeticException.
49 .
Differentiate between strings and char arrays in Java.
Strings Character Arrays
A string is a sequential collection of characters that are represented as a single data type. A Character Array is a collection of char data types in sequential order.
Strings are immutable which means the data or state of a String object can't be modified once it has been created; instead, a new String object is generated. Character Arrays are mutable which means the contents of a char array can be changed.
Strings can be used with built-in functions like substring() and charAt(). In Java, there are no built-in functions for working with Character Arrays.
The '+' operator can be used to join two strings together to generate a new one. Appending two Character Arrays with '+' is not possible.
The charAt() method is used to access characters in a String at a specific index. [] can be used to access the characters in a Character Array in the same way it can in any other language.
Strings can be stored in memory in any manner. Character Array elements are sequentially stored at increasing memory places.
The String Constant Pool contains all Strings. The Heap contains all Character Arrays.

The toCharArray() function of the String class can be used to transform a String into a Character Array.

Eg: String s = “GEEKS”;

char [] ch = s.toCharArray();

The code above converts a string into a char array.

A String Constructor can be used to transform a Character Array to a String.

Eg: char[] a = {‘G’, ‘E’, ‘E’, ‘K’, ‘S’};

String A = new String(a);

The code above converts a char array into a string.

50 .
What do you understand about Stack Unwinding in C++?
Stack Unwinding is the process of eliminating function entries from the function call stack at runtime. Exception Handling is often associated with Stack Unwinding. When an exception occurs in C++, the function call stack is searched linearly for the exception handler, and any entries before the function with the exception handler are deleted from the function call stack. If the exception is not handled in the same code, stack unwinding is required (where it is thrown).
51 .
Explain free() vs delete () in C++.
Both delete() and free() are used to dynamically deallocate memory.

* The free() function is a C library function that can also be used in C++, whereas the keyword "delete" is a C++ keyword.

* The delete operator deletes a pointer that was allocated using the new operator or a NULL pointer, whereas the free() function deletes a pointer that was allocated with the malloc(), calloc(), or realloc() functions or a NULL pointer.

* The delete operator in C++ invokes the class's destructor when it destroys the allocated memory, but the free() function does not; it just frees the memory from the heap.
52 .
Write the code to find the LCM of an array of numbers.
We know that LCM (x, y) = (x * y) / GCD (x, y). We have to extend this idea to an array of numbers.

Let's imagine we have an array arr[] with n members for which the LCM must be calculated.

Our algorithm's major steps are as follows:

Set res = arr[0] as the first value.

Iterate over all of the array's elements, from i = 1 to i = n-1.

Our lcm, which is stored in res, is LCM of (arr[0], arr[1],........, arr[i-1]) at the ith iteration. LCM (arr[0], arr[1],...., arr[i]) = LCM (ans, arr[i]). As a result, we only need to do res = LCM (ans, arr[i]) = (ans * arr[i]) / gcd at the i'th iteration (ans, arr[i]).

//C++ program to find the LCM of n elements of an array
#include <bits/stdc++.h>
using namespace std;
 
typedef long long int ll;
 
//the function that finds
//GCD of 'x' and 'y'
int GCD(int x, int y)
{
    if (y == 0)
        return x;
    return GCD(y, x % y);
}
 
//Driver Code
int main()
{
    int a[] = { 11, 7, 3, 9, 4 };
    int len = sizeof(a) / sizeof(a[0]);
    
    // Initializing result which will store the lcm
    ll res = a[0];
 
    // res contains LCM of a[0], ..a[i]
    // after i'th iteration,
    for (int i = 1; i < len; i++)
        res = (((a[i] * res)) /
                (GCD(a[i], res)));
 
    cout<<res<<endl;
    return 0;
}

Output :
2772
53 .
Explain copy constructor vs assignment operator in C++.
A copy constructor is a member function that uses another object of the same class to initialise an object. Assignment operators are used to giving a variable a value. The assignment operator's left side operand is a variable, while the assignment operator's right side operand is a value.
// C++
#include
#include
 
using namespace std;
 
class IB
{
    public:
    IB() {}
    IB(const IB &b)
    {
        cout<<"Copy constructor is called "<<endl;
    }
      
    IB& operator = (const IB &b)
    {
        cout<<"Assignment operator is called "<<endl;
        return *this;
    }
};
 
// Driver code
int main()
{
    IB b1, b2;
    b2 = b1;
    IB b3 = b1;
    getchar();
    return 0;
}

Output :
Assignment operator is called
Copy constructor is called

When a new object is generated from an existing object as a copy of the old object, the copy constructor is called. When an already initialised object is given a new value from another object, the assignment operator is used.
54 .
Describe the three levels of data abstraction?

Data abstraction in DBMS is a process of hiding irrelevant details from users. Because database systems are made of complex data structures, so it makes accessible the user interaction with the database.

Following are three levels of data abstraction:

Physical level: It is the lowest level of abstraction. It describes how data are stored.

Logical level: It is the next higher level of abstraction. It describes what data are stored in the database and what the relationship among those data is.

View level: It is the highest level of data abstraction. It describes only part of the entire database.

55 .
Is it possible to declare an anonymous class which implements an interface and extends a class?

Yes, it is possible to declare an anonymous class that both implements an interface and extends a class in Java. However, since Java does not support multiple inheritance, the anonymous class can only extend one class and optionally implement one or more interfaces.

Syntax
Superclass obj = new Superclass() {
    @Override
    public void methodFromSuperclass() {
        System.out.println("Overridden method from superclass");
    }
    
    @Override
    public void methodFromInterface() {
        System.out.println("Implemented method from interface");
    }
};
Example: Implementing an Interface While Extending a Class
// Parent class
class Parent {
    void show() {
        System.out.println("Parent class method");
    }
}

// Interface
interface MyInterface {
    void display();
}

public class Main {
    public static void main(String[] args) {
        // Anonymous class extending Parent and implementing MyInterface
        Parent obj = new Parent() {
            @Override
            public void show() {
                System.out.println("Overridden show() from anonymous class");
            }

            public void display() {
                System.out.println("Implemented display() from anonymous class");
            }
        };

        obj.show(); // Calls overridden method

        // To call display(), we need a type cast
        if (obj instanceof MyInterface) {
            ((MyInterface) obj).display();
        }
    }
}
Key Points :
  • The anonymous class extends Parent.

  • It implements MyInterface.

  • Since the reference type is Parent, we need typecasting to call interface methods.

Wipro MCQ :

1 .
Find the antonym for "focus."
A)
Fixate
B)
Converge
C)
Concentrate
D)
Disorganize

Correct Answer :   Disorganize

2 .
Animals : Oil
A)
Plants : Coal
B)
Cow : Milk
C)
Fire : Smoke
D)
Produce : Manure

Correct Answer :   Plants : Coal

3 .
Find the synonym for ostentatious.
A)
Calm
B)
Glittery
C)
Cultivate
D)
Moderate

Correct Answer :   Glittery

4 .
Defect : Reunite
A)
Exhort : Encourage
B)
Formant : Rebellion
C)
Expend : Replenish
D)
Encroachment : Occupy

Correct Answer :   Expend : Replenish

5 .
Find the missing word in the set Pooch : dog :: ...?... : cat
A)
Hyena
B)
Hound
C)
Civet
D)
None of the above

Correct Answer :   Civet

6 .
After six months of coding practice, he has become much "Deft" with the technology.
A)
inert
B)
Agile
C)
Sluggish
D)
Stagnant

Correct Answer :   Agile

7 .
We should work on this section and "intensify" the changes as soon as Possible.
A)
Boost
B)
Lessen
C)
Quicken
D)
Deepen

Correct Answer :   Lessen

8 .
To be in the doldrums:
A)
To be in low spirits
B)
To remain neutral
C)
To initiate a social conversation or interaction
D)
A process that helps to know if something is correct

Correct Answer :   To be in low spirits


Explanation : Ramana is in the doldrums after he is getting fail in the exam.

9 .
Hear it on the grapevine:
A)
To be in low spirits.
B)
Cannot judge something primarily on appearance.
C)
To hear rumours about something or someone.
D)
To perform Action or for communications need more than one person.

Correct Answer :   To hear rumours about something or someone.


Explanation : I heard it on the grapevine that the price of the petrol had reached up to 100 rupees per litre.

10 .
Chip on your shoulder:
A)
To disclose a secret
B)
Complaining about a loss from the past
C)
When anyone is upset about anything that happened a while ago
D)
When anyone receives the same treatment, usually negative, that he/she gives to others

Correct Answer :   When anyone is upset about anything that happened a while ago


Explanation : They have a chip on their shoulder that for being rejected in the dance competition.

11 .
Pedantic
A)
Obscure
B)
Abstruse
C)
Obnoxious
D)
Imprecise

Correct Answer :   Imprecise

12 .
Beating around the bush:
A)
Avoiding the main topic
B)
Possible obstacles in your path
C)
To hear rumours about something or someone
D)
A person upset about something that happened previously.

Correct Answer :   Avoiding the main topic


Explanation : The central government is beating around the bush when the citizens ask the reason for continuously increasing the price of petrol and diesel.

13 .
Come hell or high water:
A)
Being serious or dedicated
B)
Possible obstacles in your path (will not stop you)
C)
Something good and useful that has not
D)
A huge amount of money given to a person when he/she leaves a company or retires

Correct Answer :   Possible obstacles in your path (will not stop you)


Explanation : I decided that come hell or high water I will become a Cricketer.

14 .
The sum of a number and its two preceding numbers is equal to 36. Find the number:
A)
12
B)
11
C)
10
D)
9

Correct Answer :   11


Explanation : Let's take a number: 10
Two preceding number of 10 will be 11 and 12
The sum of all three will be 33 which are not correct as per the given question.
Let's take another number: 11
Two preceding number of 11 will be 12 and 13
The sum of all three will be 36.
Hence, 11 is the right option.

15 .
Sanjay invested an amount of Rs 12,960 for two years on compound interest and received an amount of RS 17,640 on maturity. What is the rate of interest per annum?
A)
4%
B)
5%
C)
10%
D)
Data Inadequate

Correct Answer :   10%


Explanation : A=P (1+r/100)2
17640/12960= (1+r/100)2
441/324= (1+r/100)2
21/18)2= (1+r/100)2
r=10%

16 .
The tank has six pipes fitted in them. Some of them are for inlet purpose and rest for outlet purpose. Each inlet pipe can fill the tank in 12 hours, and each outlet pipe can empty the tank in 8 hours. On opening all the pipes, an empty tank is filled in 12 hours. How many inlet pipes and outlet pipes are there?
A)
2,3
B)
5,2
C)
4,4
D)
4,2

Correct Answer :   4,2


Explanation : Suppose the number of inlet pipes is A, and the number of outlet pipes is B
A / 12 - B / 8 = 1/12
2B - 3B = 2
let's take A = 4 and B = 2. Then the condition will be full-filled.
Thus, Inlet pipe: A = 4 and outlet pipe: B=2

17 .
A reservoir is provided by two pipes X and Y. X can fill the reservoir 5 hours faster than Y. If both together fill the reservoir in 6 hours, the reservoir will be filled by Y alone in
A)
15 hours
B)
12 hours
C)
10 hours
D)
8 hours

Correct Answer :   15 hours


Explanation : If a is the speed then speed of X= a + 5 and Y = a
Time taken by A and B will be a and a + 5 resp.
1/a + 1/a + 5 = 1/6 ; a2 - 7a - 30 = 0
x = -3 or x = 10.
Time can't be negative, i.e., x =10.
Hence the pipe X can fill the reservoir in 10 hours, and Y can fill it in 10+5=15 hours.

18 .
A boat takes 38 hours for traveling downstream from point X to point Y and coming back to a point Z midway between X and Y. If the stream velocity is 4km/h and the boat speed in still water is 14 km/h, find the distance between X and Y?
A)
200 km
B)
220 km
C)
260 km
D)
360 km

Correct Answer :   360 km


Explanation : Boat Speed for downstream = 14 + 4 = 18 km/hr
Boat speed for upstream = 14 - 4 = 10 km/hr
Distance = x
x / 18 + (x /2)/10 = 38
x = 360 km

19 .
The speed of a boat is 8 km/h in still water, and the speed of the current is 4 km/h. If the time taken to reach a certain distance upstream is 18 hours, the time it will take to go the same distance downstream is
A)
3 hours
B)
3.5 hours
C)
6 hours
D)
6.5 hours

Correct Answer :   6 hours


Explanation : Upstream speed of a boat = 8 - 4 = 4 km/hr
downstream speed of a boat = 8 + 4 = 12 km/hr
suppose the distance = x
Then for Upstream case: x / 4 = 18. Hence, x = 72 km
Now the time taken to go the same distance downstream: Time = 72/12 = 6 hrs

20 .
A man can swim 10.5 km/h in still water, and he finds that it takes him twice as long to swim up as to swim down the river. The speed of the stream is
A)
1.75 km/h
B)
2 km/h
C)
2.5 km/h
D)
3.5 km/h

Correct Answer :   3.5 km/h


Explanation : Let the speed of stream be N. Then for downstream, 10.5 + N = D
and for upstream, 10.5 - N = U
so we get, D + U = 21
But, it takes him double as long to swim up as to swim down the river.
2U+ U = 21; U = 7. Thus, 10.5 - N = 7
S=3.5 km/h

21 .
Look at this series: 57, 57, 40, 40, 23, 23,... What will next?
A)
06
B)
12
C)
14
D)
18

Correct Answer :   06

22 .
Which pair is not following the series? AZ GW MT SP YN
A)
GW
B)
YN
C)
MT
D)
SP

Correct Answer :   YN

23 .
If all the letters of the words are changed to the next letter of the English alphabetical series, how many vowels will appear in words? (Same or different vowel)
A)
One
B)
Two
C)
Three
D)
More than three

Correct Answer :   More than three


Explanation : The changed words are as follows: OBN HFU GBO DVC NJE. Out of all these five English words we have four vowels OUOE
Hence the right answer is D. More than three