i
Hexaware Technologies
Filter interviews by
Java8 Stream program to filter even numbers and double them
Use Stream to filter even numbers
Use map to double the filtered numbers
Use collect to collect the results into a list
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
OOPs concept in .NET refers to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementatio...
Some advanced features of .Net Core include cross-platform support, performance improvements, and support for modern development practices.
Cross-platform support allows developers to build and run applications on different operating systems.
Performance improvements such as faster startup times and lower memory usage.
Support for modern development practices like containerization and microservices architecture.
Built-in s...
Interface defines a contract for a class to implement, while abstraction hides the implementation details.
Interface is a blueprint of a class that defines what methods a class must implement.
Abstraction is a concept that hides the implementation details and shows only the functionality.
Interfaces can have multiple inheritance, while abstraction can be achieved using abstract classes.
Example: Interface 'Shape' may have ...
Extension methods are a way to add new methods to existing types without modifying the original type.
Extension methods are defined as static methods in a static class.
They must be in the same namespace as the type being extended.
They are called like instance methods on the extended type.
Example: Adding a method to the String class to reverse a string.
Middle tier is the layer of software that acts as a bridge between the front-end user interface and the back-end database.
Middle tier handles business logic and processing of data
It often includes application servers, web servers, and APIs
Examples include Java EE, .NET Framework, and Node.js
DI stands for Dependency Injection and is a design pattern used to increase flexibility and maintainability of code.
DI is a technique where one object supplies the dependencies of another object instead of the object creating them itself.
It helps in decoupling components, making them easier to test and reuse.
DI containers like Spring Framework in Java are used to manage dependencies and inject them into objects.
Example...
The current project is a web application for managing inventory and sales.
The project follows a MVC (Model-View-Controller) architecture
Uses technologies like React for the front-end and Node.js for the back-end
Database schema includes tables for products, customers, orders, etc.
Implemented features like user authentication, product search, and order processing
SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects o...
Inversion of Control (IoC) is a design principle where the flow of control is inverted compared to traditional programming.
IoC is a design pattern where the control of flow is inverted from the traditional approach.
In IoC, the control is passed to a framework or container that manages the flow of the application.
Dependency Injection is a common implementation of IoC, where dependencies are injected into a class rather
Pipeline functions are a series of functions or tasks that are executed in a specific order to process data or perform actions.
Pipeline functions help streamline complex processes by breaking them down into smaller, manageable tasks
Each function in the pipeline takes input from the previous function and passes output to the next function
Commonly used in data processing, automation, and software development workflows
Session in .NET Core is used to store user-specific information across multiple requests.
Use services.AddSession() in ConfigureServices method of Startup class to enable session
Use app.UseSession() in Configure method of Startup class to add session middleware
Access session data using HttpContext.Session property
Example: HttpContext.Session.SetString("UserName", "JohnDoe") to store a string in session
Example: string us...
ACID properties in DB ensure data integrity and consistency
Atomicity: All operations in a transaction are completed successfully or none at all
Consistency: Data is always in a valid state before and after a transaction
Isolation: Transactions are isolated from each other until they are completed
Durability: Once a transaction is committed, changes are permanent and survive system failures
Isolation levels define the level of visibility a transaction has on other concurrent transactions.
Isolation levels include READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, and SERIALIZABLE.
READ UNCOMMITTED allows dirty reads, READ COMMITTED prevents dirty reads but allows non-repeatable reads, REPEATABLE READ prevents non-repeatable reads but allows phantom reads, and SERIALIZABLE prevents all anomalies.
Isolation le...
Salary expectation is the amount of money a candidate expects to be paid for a specific job role.
Salary expectation is usually discussed during the job interview process.
Candidates may base their salary expectations on factors such as their experience, qualifications, industry standards, and cost of living.
Employers may also consider the candidate's salary expectation when making a job offer.
It is important for candida...
I applied via Recruitment Consulltant and was interviewed before Nov 2022. There were 2 interview rounds.
AD stands for Active Directory, a directory service developed by Microsoft for Windows domain networks.
AD is used to store information about network resources such as computers, users, groups, and printers.
It allows administrators to manage and secure access to resources within a network.
AD uses a hierarchical structure with domains, trees, and forests to organize objects.
Group Policy Objects (GPOs) can be used to appl...
Troubleshooting Oracle involves identifying and resolving issues with database performance, connectivity, and errors.
Check database connectivity by testing connection using SQL*Plus or SQL Developer
Review alert logs and trace files for error messages and performance issues
Monitor database performance using tools like Oracle Enterprise Manager or AWR reports
Check for resource contention issues such as high CPU or memory...
Hexaware Technologies interview questions for designations
I applied via Naukri.com and was interviewed in Sep 2021. There were 2 interview rounds.
Get interview-ready with Top Hexaware Technologies Interview Questions
What people are saying about Hexaware Technologies
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for central...
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster develo...
I applied via Company Website and was interviewed before Sep 2023. There were 3 interview rounds.
Design a user access control system with granular control for pages, controls, data, and response masking.
Implement role-based access control (RBAC) to assign permissions to users based on their roles.
Utilize attribute-based access control (ABAC) for more fine-grained control over access to specific pages, controls, and data.
Implement data masking techniques to ensure sensitive information is not exposed in responses.
U...
Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.
Use a hash map to store only non-null values and their corresponding indices.
Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.
Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usage an
posted on 24 May 2023
I applied via LinkedIn and was interviewed in Nov 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jun 2021. There were 3 interview rounds.
based on 4 interviews
2 Interview rounds
based on 31 reviews
Rating in categories
Senior Software Engineer
3.8k
salaries
| ₹5.5 L/yr - ₹20.1 L/yr |
Software Engineer
2.9k
salaries
| ₹2 L/yr - ₹10 L/yr |
System Analyst
2.9k
salaries
| ₹6.8 L/yr - ₹29 L/yr |
Senior Executive
2.1k
salaries
| ₹0.8 L/yr - ₹6 L/yr |
Technical Architect
2.1k
salaries
| ₹10 L/yr - ₹37 L/yr |
Cognizant
TCS
DXC Technology
Mphasis