i
Hexaware Technologies
Filter interviews by
Comparable is an interface used for natural ordering, while Comparator is used for custom ordering in Java.
Comparable interface is used to define the natural ordering of objects. It is implemented by the class whose objects are to be sorted.
Comparator interface is used to define custom ordering of objects. It is implemented by a separate class that compares objects based on specific criteria.
Example: Sorting a list of ...
List allows duplicate elements and maintains insertion order, while Set does not allow duplicates and does not maintain order.
List can contain duplicate elements, Set cannot
List maintains insertion order, Set does not guarantee order
List is implemented by classes like ArrayList, LinkedList, Set is implemented by classes like HashSet, TreeSet
Example: List
Easy and good ,topic are general like arithematic and veral i think it last for 120mins
Time will be around 20-30 mins ,in on campus ,topic will be easy to connect and in group there will minimum of 10-15 peopel.
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Hashmap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.
Hashmap uses a hash function to convert the key into an index in an array.
Collisions can occur when two keys map to the same index, which is resolved using separate chaining or open addressing.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval of values.
Java's Hashmap implementation use...
String is immutable to ensure thread safety and prevent unintended modification.
Immutable objects are safer to use in multi-threaded environments as they cannot be changed by other threads.
String pool is possible because of immutability, which saves memory and improves performance.
StringBuffer and StringBuilder classes are used for mutable string operations.
Example: String s = "hello"; s.concat(" world"); // returns a
I applied via Referral and was interviewed in Aug 2021. There were 5 interview rounds.
JVM stands for Java Virtual Machine. It is an abstract machine that provides a runtime environment for Java programs.
JVM interprets compiled Java code and executes it
It provides platform independence by converting bytecode to machine-specific code
JVM manages memory allocation and garbage collection
Examples of JVM implementations include Oracle JVM, OpenJDK, and IBM JVM
JRE stands for Java Runtime Environment. It is a software package that provides the necessary runtime environment for Java applications.
JRE includes the Java Virtual Machine (JVM), class libraries, and other necessary components to run Java applications.
It is required to run Java applications on a computer.
JRE is available for different operating systems such as Windows, Linux, and macOS.
Examples of Java applications t...
The new operator is used to create an instance of a class or to allocate memory for an object.
The new operator is followed by the name of the class and parentheses.
It can also be used to create arrays of objects.
Example: MyClass obj = new MyClass();
Example: int[] arr = new int[5];
MongoDB is a NoSQL database while MySQL is a relational database.
MongoDB stores data in JSON-like documents while MySQL stores data in tables with rows and columns.
MongoDB is schema-less while MySQL requires a schema to be defined.
MongoDB is better suited for handling unstructured data while MySQL is better for structured data.
MongoDB has better scalability and performance while MySQL has better ACID compliance.
MongoDB...
Hexaware Technologies interview questions for designations
I appeared for an interview in Aug 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on Java, DBMS etc.
JVM stands for Java Virtual Machine, it is an abstract computing machine that enables a computer to run Java programs.
JVM is responsible for converting Java bytecode into machine code that can be executed by the computer's CPU.
It provides a platform-independent execution environment for Java programs.
JVM manages memory, handles garbage collection, and provides security features for Java applications.
Examples of JVM imp...
JRE stands for Java Runtime Environment, which is required to run Java applications on a computer.
JRE includes Java Virtual Machine (JVM), class libraries, and other necessary files to run Java applications.
It is different from JDK (Java Development Kit) which includes tools for developing Java applications.
JRE is needed to run Java applets, Java Web Start applications, and standalone Java applications.
The new keyword in C++ is used to dynamically allocate memory for an object or array.
Used to create objects on the heap: MyClass* obj = new MyClass();
Used to create arrays on the heap: int* arr = new int[10];
MongoDB is a NoSQL database while MySQL is a relational database management system.
MongoDB is schema-less, allowing for flexible data models, while MySQL requires a predefined schema.
MongoDB uses a document-based data model, storing data in JSON-like documents, while MySQL uses tables with rows and columns.
MongoDB is better suited for handling unstructured or semi-structured data, while MySQL is ideal for structured da...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Get interview-ready with Top Hexaware Technologies Interview Questions
What people are saying about Hexaware Technologies
posted on 9 Feb 2015
SQL command for creating a table
Use CREATE TABLE statement
Specify table name and column names with data types
Add any constraints or indexes as needed
SQL commands for inserting, updating, and deleting data from a table.
INSERT INTO table_name (column1, column2, column3) VALUES (value1, value2, value3);
UPDATE table_name SET column1 = new_value1 WHERE condition;
DELETE FROM table_name WHERE condition;
Truncate and drop are SQL commands used to remove data from a table.
Truncate removes all data from a table but keeps the structure intact.
Drop removes the entire table and its structure.
Truncate is faster than drop as it only removes data.
Drop cannot be undone while truncate can be rolled back.
Truncate resets the identity of the table while drop does not.
Examples: TRUNCATE TABLE table_name; DROP TABLE table_name;
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance.
C++ has a standard template library (STL) while C does not.
C++ allows function overloading while C does not.
C++ has exception handling while C does not.
I am a software developer with experience in Java and Python.
I have a Bachelor's degree in Computer Science.
I have worked on various projects involving web development and data analysis.
I am proficient in Java and Python programming languages.
I have experience with frameworks such as Spring and Django.
I am familiar with databases such as MySQL and MongoDB.
I have always been fascinated by technology and its ability to solve complex problems.
I enjoy problem-solving and logical thinking
I have a natural curiosity for how things work
I see the potential for technology to make a positive impact on society
I have experience in programming and find it rewarding
I am excited about the constant innovation and evolution in the IT industry
My strengths include problem-solving, adaptability, and teamwork. My weakness is public speaking.
Strengths: problem-solving, adaptability, teamwork
Examples: I have successfully solved complex coding problems, adapted to new technologies quickly, and collaborated effectively with team members.
Weakness: public speaking
Examples: I get nervous when speaking in front of large groups, but I am working on improving my present
I have the technical skills, experience, and passion to excel in this role.
I have a strong background in software development, with expertise in multiple programming languages and frameworks.
I have experience working on complex projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in the industry.
I am a quick learner and adaptable to new ...
posted on 16 Aug 2015
Network layers are a hierarchical way of organizing communication protocols.
Network layers provide a modular approach to networking.
Each layer has a specific function and communicates with adjacent layers.
The OSI model has 7 layers, while the TCP/IP model has 4 layers.
Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded/multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating s...
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
based on 5 interviews
1 Interview rounds
based on 3 reviews
Rating in categories
Senior Software Engineer
3.8k
salaries
| ₹5.5 L/yr - ₹20 L/yr |
Software Engineer
2.9k
salaries
| ₹2 L/yr - ₹10 L/yr |
System Analyst
2.9k
salaries
| ₹6.8 L/yr - ₹29 L/yr |
Technical Architect
2k
salaries
| ₹10 L/yr - ₹37 L/yr |
Senior Executive
1.9k
salaries
| ₹0.8 L/yr - ₹6.5 L/yr |
Cognizant
TCS
DXC Technology
Mphasis