Hexaware Technologies
300+ Yash Impacts Interview Questions and Answers
You have been given two integer arrays/list(ARR1 and ARR2) of size N and M, respectively. You need to print their intersection; An intersection for this problem can be defined when...read more
Q2. Program to find second largest number from set of array
Program to find second largest number from set of array
Sort the array in descending order
Return the second element of the sorted array
You are given an array consisting of 'N' distinct positive integers and a number 'K'. Your task is to find the kth largest element in the array.
Example:
Consider the ar...read more
You are given a binary tree of 'N' nodes.
Your task is to find the path from the leaf node to the root node which has the maximum path sum among all the root to leaf paths....read more
A fishmonger wants to bring his goods from port to the market. On his route, he has to traverse an area with many states. He has to pay a toll at each border.
He is a good businessman. He wants to cho...read more
Create a Class Shape having a field shapeType and a function printMyType.
Create another class, Square and Rectangle, which inherits the Shape class and has additional fields length and brea...read more
You are given two linked lists representing two non-negative numbers. The digits in the linked list are stored in reverse order, i.e. starting from least significant digit (LSD) t...read more
You are given a graph with 'N' vertices numbered from '1' to 'N' and 'M' edges. You have to colour this graph in two different colours, say blue and red such that no two vertices connected by an...read more
Our hero Ninja is organizing a coding competition where only two teams can participate simultaneously. To make the competition interesting and fair, both the teams should have an equal number o...read more
You are given a 'N' * 'N' maze with a rat placed at 'MAZE[0][0]'. Find and print all paths that rat can follow to reach its destination i.e. 'MAZE['N' - 1]['N' - 1]'. Rat can move in any...read more
Q11. Write a program to check whether string is palindrome or not?
Program to check if a string is a palindrome or not.
Create a function to compare the original string with its reverse.
Ignore spaces and punctuation when checking for palindrome.
Example: 'racecar' is a palindrome, 'hello' is not.
Q12. Stack implementation, difference between stack and linked list , merge sort algorithm
Question on stack implementation, difference between stack and linked list, and merge sort algorithm.
Stack is a LIFO data structure while linked list is a linear data structure.
Stack is implemented using arrays or linked lists while linked list is implemented using pointers.
Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them separately, and then merges them.
Merge sort has a time complexity of O(nlogn) and is a stable sorting a...read more
You have to design a software solution which will automatically inform the truck owners about the servicing date so that they don't miss on it due to their busy life schedule.
Q14. You have knowledge of data structure? Tell me about it
Data structures are a way to organize and store data efficiently.
Data structures are used to store and manipulate data in a structured manner.
They provide different ways to access and perform operations on the data.
Examples include arrays, linked lists, stacks, queues, trees, and graphs.
Q15. What are OOPS concepts and explain
OOPS concepts are the principles of Object-Oriented Programming that help in creating modular and reusable code.
OOPS stands for Object-Oriented Programming System
It includes concepts like Inheritance, Polymorphism, Encapsulation, and Abstraction
Inheritance allows a class to inherit properties and methods from another class
Polymorphism allows objects to take on multiple forms or behaviors
Encapsulation is the practice of hiding data and methods within a class
Abstraction is the ...read more
Q16. Explain Protected, private and public access modifier
Protected, private and public are access modifiers in object-oriented programming that control the visibility of class members.
Public members are accessible from anywhere in the program.
Private members are only accessible within the class they are declared in.
Protected members are accessible within the class they are declared in and any subclasses.
Access modifiers are used to enforce encapsulation and prevent unauthorized access to class members.
They will just ask few basic questions to see whether you will be able to fit into their culture or not.
Q18. Write a program to reverse a string eg. Hello World to olleh dlrow
A program to reverse a string by iterating through the characters and appending them in reverse order.
Create a function that takes a string as input
Initialize an empty string to store the reversed string
Iterate through the characters of the input string in reverse order and append them to the empty string
Return the reversed string
Q19. Write a program to find second maximum number in an array.
Program to find second maximum number in an array of strings.
Convert array elements to integers for comparison.
Sort the array in descending order.
Return the second element in the sorted array.
Q20. Brief discription of project, regression in machine learning.
Regression in machine learning is a technique used to predict continuous numerical values based on input data.
Regression models are used to analyze the relationship between variables and predict outcomes.
Linear regression is a common type of regression used in machine learning.
Examples of regression in machine learning include predicting housing prices based on features like location and square footage, or predicting stock prices based on historical data.
Regression can also b...read more
What is the difference between MongoDB and MySQL?
Q22. What is Object Oriented Programming?
Object Oriented Programming is a programming paradigm based on the concept of objects, which can contain data and code.
OOP focuses on creating objects that interact with each other to solve problems
Objects have attributes (data) and methods (functions)
Encapsulation, inheritance, and polymorphism are key principles of OOP
Examples of OOP languages include Java, C++, and Python
Q23. Name 4 pillars of Object Oriented Programming
Encapsulation, Inheritance, Polymorphism, Abstraction are the 4 pillars of OOP
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in Java
Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Subclass extending a superclass
Polymorphism: Ability to present the same interface for different data types. Example: Method overloading in Java
Abstraction: Hiding the complex implementation details...read more
What is process and explain threading
Explain binary semaphore?
Explain paging
What are overlays.
Q25. what is oop? what is os? joins in sql, insert query
OOP is Object-Oriented Programming. OS is Operating System. SQL joins and insert queries are used to manipulate data in databases.
OOP is a programming paradigm that focuses on objects and their interactions.
OS is a software that manages computer hardware and software resources.
SQL joins are used to combine data from two or more tables based on a related column.
Insert queries are used to add new data to a table in a database.
Q26. Tell something about the situation . where you are stucked with difficult user and it can be lead on high escalation if issue not get resolved.
Dealing with a difficult user and potential high escalation
Active listening and empathy to understand the user's concerns
Remaining calm and professional to defuse the situation
Offering alternative solutions or workarounds
Involving a supervisor or manager if necessary
Documenting the issue and steps taken for future reference
Q27. How do you call a variable from one note book to another note book in adb
You can call a variable from one notebook to another in adb by using the %run magic command.
Use the %run magic command followed by the path to the notebook containing the variable you want to access.
Make sure the notebook containing the variable is in the same directory or provide the full path.
Once you run the %run command, the variables from the other notebook will be available in the current notebook.
Q28. What is the difference b/w complie time and run time polymorphism?
Compile time polymorphism is resolved at compile time, while run time polymorphism is resolved at run time.
Compile time polymorphism is achieved through function overloading and operator overloading.
Run time polymorphism is achieved through function overriding and virtual functions.
Compile time polymorphism is faster as the resolution is done at compile time.
Run time polymorphism allows dynamic binding of functions based on the object type at run time.
Compile time polymorphis...read more
Q29. What is jagged array?
A jagged array is an array of arrays where each element can be of different sizes.
Each sub-array can have a different number of elements
Useful for representing data structures like matrices or tables
Example: [['apple', 'banana'], ['orange', 'grape', 'kiwi']]
Q30. What is the new operator used for?
The new operator is used to create an instance of a class or to allocate memory for an object.
The new operator is followed by the name of the class and parentheses.
It can also be used to create arrays of objects.
Example: MyClass obj = new MyClass();
Example: int[] arr = new int[5];
Given a file of 1 GB having data in form of digits, sort the file elements with 100 MB RAM available.
Q32. What is the difference between MongoDB and MySQL?
MongoDB is a NoSQL database while MySQL is a relational database.
MongoDB stores data in JSON-like documents while MySQL stores data in tables with rows and columns.
MongoDB is schema-less while MySQL requires a schema to be defined.
MongoDB is better suited for handling unstructured data while MySQL is better for structured data.
MongoDB has better scalability and performance while MySQL has better ACID compliance.
MongoDB supports sharding while MySQL does not.
Example: MongoDB i...read more
Q33. How you will improve customer experience?
To improve customer experience, I will focus on personalization, efficient communication, and continuous improvement.
Implement personalized customer interactions based on their preferences and history.
Streamline communication channels to ensure prompt and effective responses.
Regularly gather customer feedback and use it to identify areas for improvement.
Train and empower team members to provide exceptional customer service.
Implement self-service options to provide customers w...read more
Q34. How to add column in copybook and overall process of this task
To add a column in copybook, modify the copybook definition and update all programs that use it.
Identify the copybook that needs modification
Add the new column to the copybook definition
Update all programs that use the modified copybook
Test the changes thoroughly before deploying to production
Q35. What is Software Development Lifecycle ?
Software Development Lifecycle is a process followed by software development teams to design, develop and maintain software.
It includes phases like planning, analysis, design, implementation, testing, deployment, and maintenance.
Each phase has its own set of activities and deliverables.
It helps in ensuring that the software is developed efficiently and meets the requirements of the stakeholders.
Examples of SDLC models are Waterfall, Agile, and DevOps.
Q36. What are constructors?
Constructors are special methods in a class that are used to initialize objects.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
Constructors can have parameters to initialize object properties.
They do not have a return type.
Example: public class Car { public Car(String color) { this.color = color; }}
Q37. What rating will you give about your programming knowledge out of 10 ?
I would rate my programming knowledge as 7 out of 10.
I have a strong understanding of programming concepts and syntax.
I have experience with multiple programming languages such as Java, Python, and C++.
I am constantly learning and improving my skills through personal projects and online courses.
Q38. What is the standarddoc types both in so and billing
Standard document types in SO and billing
Sales Order (SO)
Invoice
Credit Memo
Purchase Order
Delivery Note
Q39. Get the exact requirements from customer. How many devices, policies,strings, security features, windows updates rings and who are stakeholders these information is is required to work on device migrations.
Gather detailed requirements from the customer including number of devices, policies, security features, Windows update rings, and stakeholders.
Number of devices: Ensure to get the exact count of devices that need to be migrated.
Policies: Understand the specific policies that need to be implemented on the devices.
Security features: Identify the required security features for the devices.
Windows update rings: Determine the preferred update schedule for Windows updates.
Stakehol...read more
Q40. Find the second largest array element in a given lisst of arrays using c programing
Find the second largest element in a given list of arrays using C programming.
Iterate through the array and compare each element with the current maximum and second maximum
If the element is greater than the current maximum, update the second maximum and maximum
If the element is greater than the second maximum but less than the maximum, update the second maximum
Return the second maximum
Q41. What is inheritance, what is encapsulation, what is data hiding
Inheritance is a way to create new classes based on existing classes. Encapsulation is the practice of hiding data and methods within a class. Data hiding is the act of making data private to prevent direct access.
Inheritance allows for code reuse and promotes a hierarchical structure of classes.
Encapsulation helps to prevent accidental modification of data and promotes modular code.
Data hiding is achieved through access modifiers such as private and protected.
Example: A Car ...read more
Q42. Write a code to create dataframe in adb using struct type
Creating a dataframe in adb using struct type
Use the 'CREATE TABLE' statement to define the schema of the dataframe
Define the struct type using 'STRUCT' keyword
Insert data into the dataframe using 'INSERT INTO' statement
Q43. Write a code to find max salary department wise and second highest salary department wise
Code to find max and second highest salary department wise
Iterate through the list of employees and store max and second highest salary for each department
Use a hashmap to store department wise salaries
Sort the salaries in descending order to find max and second highest
Q44. 1) explain the features of Java programming 2) explain the Oops concepts in Java 3) Access Modifiers 4) Check and Unchecked exception in Java 5) explain throw and throws exception handling in Java. 6) What is r...
read moreJava programming features, OOPs concepts, access modifiers, exceptions, polymorphism, Java's object-oriented nature, Array vs ArrayList, and a program to find 4th highest salary.
Java features include platform independence, object-oriented, robust, secure, and high performance.
OOPs concepts in Java include inheritance, encapsulation, polymorphism, and abstraction.
Access modifiers in Java are public, private, protected, and default.
Checked exceptions are checked at compile time...read more
Q45. Intro What is oops Encapsulation Polymorphism Runtime, compile time Dbms Sql vs no sql
Questions related to programming concepts and database management systems.
OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects.
Encapsulation is the process of hiding the implementation details of an object from the outside world.
Polymorphism is the ability of an object to take on many forms.
Runtime and compile time are two phases of program execution.
DBMS stands for Database Management System which is a software system us...read more
Q46. Difference between mutual fund & hedge funds & its advantages & disadvantages ?
Mutual funds are for retail investors while hedge funds are for high net worth individuals. Hedge funds have more flexibility but higher fees.
Mutual funds are regulated by the SEC while hedge funds are not.
Mutual funds are open to all investors while hedge funds are only open to accredited investors.
Mutual funds have lower fees and are more transparent while hedge funds have higher fees and are less transparent.
Mutual funds are more diversified while hedge funds can take more...read more
Q47. SQL Query to find such records which never ever contains flag 0 in critical column p1 1-1-21 1 p1 2-3-21 0 p2 3-2-21 0 p3 1-5-21 1 p3 1-5-21 1 p4 14-21 1
The SQL query to find records that never contain flag 0 in the critical column.
Use the NOT EXISTS operator to check if there are no records with flag 0 for each distinct value in the critical column.
Write a subquery to select distinct values from the critical column.
Join the main table with the subquery using the critical column.
Filter the result by checking if there are no records with flag 0 for each distinct value in the critical column.
Q48. How to link a web page to another in Html
Use the anchor tag <a> with the href attribute to link a web page to another in HTML.
Use the <a> tag with the href attribute to specify the URL of the page you want to link to.
Add the text or image that will serve as the clickable link between the opening and closing <a> tags.
You can also use the target attribute to specify where the linked page will open (e.g. in a new tab).
Q50. 1.what is output of gtwindowhandals() command? 2.Syntax to opn opra browsr? 3.tak scrnshot command syntax ?
Write an essay on any topic and speak.
Q52. Abstract Class vs Interface. How do you choose b/w this?
Abstract classes are used when we want to provide a default implementation, while interfaces are used when we want to enforce a contract.
Abstract classes can have constructors, while interfaces cannot
A class can implement multiple interfaces, but can only inherit from one abstract class
Interfaces are used for loose coupling and flexibility in design
Abstract classes are used for code reusability and to provide a common base for related classes
Example: An abstract class 'Animal...read more
Q53. What are 1099 forms and types and how much work I have done on them.
1099 forms are tax forms used to report income received from sources other than an employer.
There are several types of 1099 forms, including 1099-MISC, 1099-INT, and 1099-DIV.
1099-MISC is used to report income earned as an independent contractor or freelancer.
1099-INT is used to report interest income earned from bank accounts or investments.
1099-DIV is used to report dividend income earned from investments.
As a tax consultant, I have worked extensively with 1099 forms, ensur...read more
Q54. How can you remove duplicates from a list in python?
Remove duplicates from a list in Python.
Convert the list to a set to remove duplicates.
Convert the set back to a list if needed.
Use the built-in function 'set()' to convert the list to a set.
Use the built-in function 'list()' to convert the set back to a list.
Q55. Program to arrange no. In ascending order.
Program to arrange numbers in ascending order
Use a sorting algorithm like bubble sort, selection sort, or insertion sort
Iterate through the array and compare adjacent elements, swapping them if necessary
Repeat the process until the array is sorted in ascending order
Q56. How tax is calculated and details of gross distribution and cost basis
Tax is calculated based on gross distribution and cost basis. Gross distribution is the total amount received and cost basis is the original investment.
Tax is calculated based on the difference between gross distribution and cost basis
Gross distribution is the total amount received from an investment, including dividends and capital gains
Cost basis is the original investment amount, including any fees or commissions
Tax is calculated on the net gain, which is the difference be...read more
Q57. what is difference between a static method and a class method in Python?
Static methods are bound to a class and not an instance, while class methods are bound to a class and can access class-level variables.
Static methods are defined using the @staticmethod decorator and do not take any special parameters.
Class methods are defined using the @classmethod decorator and take the class itself as the first parameter.
Static methods are often used for utility functions that do not require access to instance or class variables.
Class methods are often use...read more
Q58. What do mean by Custodian bank? Explain the features of a Custodian bank
A custodian bank is a financial institution that holds and safeguards assets on behalf of its clients.
Custodian banks provide services such as safekeeping of assets, settlement of trades, and corporate actions processing.
They also offer reporting and record-keeping services to clients.
Custodian banks may also provide other services such as foreign exchange, cash management, and securities lending.
Examples of custodian banks include State Street, BNY Mellon, and J.P. Morgan.
Q59. Difference between WMI filtering & Security filtering, How AD replication works, ports number of AD replication, how to troubleshoot AD replication.
WMI filtering is used to apply Group Policy based on system attributes, while Security filtering is used to apply Group Policy based on user or group membership.
WMI filtering applies Group Policy based on system attributes like OS version, RAM, etc.
Security filtering applies Group Policy based on user or group membership.
AD replication works by transferring changes from one domain controller to another.
AD replication uses ports 389 (LDAP), 636 (LDAPS), 3268 (Global Catalog), ...read more
What are ACID properties
Q61. Difference between DELETE and TRUNCATE ?
DELETE removes specific rows from a table while TRUNCATE removes all rows and resets the table.
DELETE is a DML command while TRUNCATE is a DDL command.
DELETE can be rolled back while TRUNCATE cannot be rolled back.
DELETE is slower than TRUNCATE as it logs each row deletion while TRUNCATE does not.
DELETE can have WHERE clause while TRUNCATE cannot have WHERE clause.
DELETE does not reset the identity of the table while TRUNCATE resets the identity of the table.
Q62. What methodology are you aware of? Agile/waterfall? What softwares have you worked on?
I am aware of both Agile and Waterfall methodologies. I have worked on various software projects.
I have experience working with Agile methodology, including Scrum and Kanban.
I am also familiar with Waterfall methodology and have worked on projects following this approach.
Some of the software I have worked on includes a CRM system for a healthcare company and a mobile app for a retail company.
I have also worked on a web-based project management tool and a financial reporting s...read more
Q63. What is JVM?
JVM stands for Java Virtual Machine. It is an abstract machine that provides a runtime environment for Java programs.
JVM interprets compiled Java code and executes it
It provides platform independence by converting bytecode to machine-specific code
JVM manages memory allocation and garbage collection
Examples of JVM implementations include Oracle JVM, OpenJDK, and IBM JVM
Q64. Have you got any issues in pod, while creating or monitoring pods in the kubernetes cluster?
Yes, I have faced issues while creating or monitoring pods in a Kubernetes cluster.
One common issue is pods getting stuck in a pending state due to resource constraints or scheduling issues.
Another issue is pods crashing frequently due to misconfigured settings or incompatible container images.
Monitoring pods can be challenging, especially when dealing with a large number of pods and trying to track their health and performance.
Troubleshooting networking issues within the clu...read more
Q65. How to do validation between two integers Source 12345 2122434 54534535 5345353455 target 0000012345 0002122434 0054534535 5345353455
To validate between two integers, compare each corresponding digit and check if they are equal.
Convert both integers to strings
Pad the source integer with leading zeros to match the length of the target integer
Compare each digit of the source and target integers
If any digit is not equal, the validation fails
Q66. Suppose we have following column what will be output for inner join col1 col2 1 1 1 null null null 1 1 1 blank blank blank
The output for inner join will be the rows where both col1 and col2 have non-null values.
Inner join returns only the matching rows from both tables.
In this case, the output will be the rows with non-null values in both col1 and col2.
Rows with null or blank values in either col1 or col2 will be excluded from the output.
Q67. How to create mailbox?, What is the powershell command used to sync the mailbox
To create a mailbox in PowerShell, use the New-Mailbox cmdlet. To sync the mailbox, use the Start-ADSyncSyncCycle cmdlet.
Use the New-Mailbox cmdlet to create a mailbox in PowerShell
Syntax: New-Mailbox -Name
-UserPrincipalName -Database Use the Start-ADSyncSyncCycle cmdlet to sync the mailbox
Syntax: Start-ADSyncSyncCycle -PolicyType Delta
Replace
, , and with appropriate values
Draw E-R Diagram for Uber.
Q69. Explain prime number program
A program that identifies prime numbers.
A prime number is a number that is only divisible by 1 and itself.
The program should take an input number and check if it is prime.
One way to check for prime numbers is to divide the number by all numbers less than it.
If the number is only divisible by 1 and itself, it is prime.
I was asked in depth about Stacks and graphs
Q71. what are use of Versioning in S3? Have you got any issues in working using S3?
Versioning in S3 allows for preserving, retrieving, and restoring every version of an object stored in a bucket.
Enables recovery from unintended user actions or application failures
Helps in maintaining different versions of objects for audit or compliance purposes
Prevents accidental deletion or overwriting of objects
Useful for tracking changes and rolling back to previous versions if needed
Q72. Two major reason to use automation over manual testing
Automation saves time and increases accuracy.
Automation can run tests faster than humans
Automation can perform repetitive tasks without getting tired or making mistakes
Automation can simulate large amounts of data to test edge cases
Automation can provide consistent results
Manual testing is prone to human error and can be time-consuming
Automation can free up human testers to focus on more complex testing tasks
Q73. What is change management and in which scenario it is used
Change management is the process of managing changes to a system or organization to minimize negative impact and maximize benefits.
It involves identifying, analyzing, and implementing changes to a system or organization
It is used to ensure that changes are made in a controlled and systematic way
It helps to minimize the negative impact of changes on the system or organization
It maximizes the benefits of changes by ensuring that they are implemented effectively
Examples include ...read more
Q74. What if customer adds more scope in a Fixed Price project
In a Fixed Price project, if the customer adds more scope, the project manager needs to assess the impact and negotiate a change order.
Assess the impact of the added scope on the project timeline, budget, and resources.
Negotiate a change order with the customer to account for the added scope.
Ensure that the change order is documented and signed off by both parties before proceeding with the additional work.
Communicate the changes to the project team and adjust the project pla...read more
Q75. How will you design and plan device migrations along with strategies?
Designing and planning device migrations involves assessing current environment, creating migration plan, testing, and executing migration.
Assess current device environment including hardware, software, and configurations
Create a detailed migration plan outlining steps, timelines, and resources needed
Test migration process in a controlled environment to identify and address any issues
Execute migration plan with minimal disruption to end users
Monitor and evaluate migration suc...read more
Q76. How do you do incremental load in adf
Incremental load in ADF is achieved by using watermark columns to track the last loaded data and only loading new or updated records.
Use watermark columns to track the last loaded data
Compare the watermark column value with the source data to identify new or updated records
Use a filter condition in the source query to only select records with a timestamp greater than the watermark value
Update the watermark column value after each successful load
Q77. How do you process multithreads in java ?
In Java, multithreading can be processed using the Thread class or implementing the Runnable interface.
Create a new thread by extending the Thread class or implementing the Runnable interface.
Start the thread using the start() method.
Use synchronization mechanisms like synchronized blocks or locks to handle shared resources safely.
Join threads to wait for them to finish execution.
Use thread pools for managing multiple threads efficiently.
Q78. What is the Progress Report on Daily Basis and Updates.
Daily progress reports and updates are essential for effective customer support.
Daily progress reports should include a summary of the previous day's activities and any outstanding issues.
Updates should be provided regularly to keep customers informed of any changes or developments.
Reports and updates should be clear, concise, and easy to understand.
Examples of updates include status updates on ongoing issues, new product releases, and changes to policies or procedures.
Regula...read more
Q79. What type of Data base avilable
There are various types of databases available such as relational, NoSQL, graph, and document-oriented databases.
Relational databases use tables to store data and have a predefined schema.
NoSQL databases are non-relational and can handle unstructured data.
Graph databases are used to store and manage relationships between data.
Document-oriented databases store data in documents, usually in JSON format.
Examples include MySQL, MongoDB, Neo4j, and Cassandra.
Q80. What type of schemas did you use for your project. (Star schema, Snowflake Schema)
I have experience working with both Star and Snowflake schemas in my projects.
Star schema is a denormalized schema where one central fact table is connected to multiple dimension tables.
Snowflake schema is a normalized schema where dimension tables are further normalized into sub-dimension tables.
Used Star schema for simpler, smaller datasets where performance is a priority.
Used Snowflake schema for complex, larger datasets where data integrity and scalability are important.
Q81. In team if two groups are created then how to resolve the their issues
To resolve issues between two groups in a team, communication, collaboration, and conflict resolution skills are essential.
Encourage open communication between the two groups to understand each other's perspectives and concerns.
Facilitate a meeting where both groups can discuss their issues and work together to find common ground.
Assign a mediator or team leader to help facilitate the discussion and guide the groups towards a resolution.
Encourage collaboration and teamwork by...read more
Q82. Types of risks in the project and how it was handled
Various risks in the project were identified and mitigated through proactive measures.
Identified risks related to budget, timeline, scope, and stakeholder engagement
Developed risk management plan to address potential risks
Implemented proactive measures such as regular communication with stakeholders, contingency planning, and risk monitoring
Example: Identified risk of budget overrun and implemented cost-saving measures such as renegotiating vendor contracts and reducing scope...read more
Q83. What is the difference between set & join?
Set and join are operations used in database management systems.
Set is used to perform mathematical set operations like union, intersection, and difference on two or more sets.
Join is used to combine rows from two or more tables based on a related column between them.
Set operations do not require a common column, while join operations do.
Set operations return a result set with unique values, while join operations return a result set with combined values.
Examples: UNION, INTER...read more
Q85. Write a program to print how many integer and character from a given string. Input:"nAJh4837sj"
A program to count the number of integers and characters in a given string.
Iterate through each character in the string and check if it is an integer or a character.
Use isdigit() function to check if a character is an integer.
Keep separate counters for integers and characters.
Return the counts of integers and characters at the end.
Q86. Diff b/w call by value and call by reference?
Call by value passes a copy of the value, while call by reference passes the memory address of the value.
Call by value creates a new copy of the value being passed.
Call by reference passes the memory address of the value being passed.
Changes made to the parameter in call by value do not affect the original value.
Changes made to the parameter in call by reference affect the original value.
Q87. what is a binary search and how you can do it?
Binary search is a search algorithm that finds the position of a target value within a sorted array.
Binary search requires a sorted array as input.
It compares the target value with the middle element of the array.
If the target value is equal to the middle element, the search is successful.
If the target value is less than the middle element, the search continues on the left half of the array.
If the target value is greater than the middle element, the search continues on the ri...read more
Q88. 1 2 3 . . . 100 we want 100 at first row & rest below it
The question is asking to rearrange the numbers so that 100 is at the first row and the rest are below it.
Create an array of strings to store the numbers
Assign the value '100' to the first element of the array
Use a loop to assign the numbers 1 to 99 to the remaining elements of the array
Q89. What is PO and Non PO & what is 2 way and 3 way match
PO stands for Purchase Order, Non PO refers to transactions without a Purchase Order. 2 way match involves matching the invoice with the PO, while 3 way match involves matching the invoice, PO, and receiving report.
PO (Purchase Order) is a document issued by a buyer to a seller, outlining the products or services to be purchased.
Non PO transactions are purchases made without a formal Purchase Order.
2 way match is the process of matching the invoice from the seller with the Pu...read more
Q90. What is investment banking and corporate actions
Investment banking involves providing financial services to corporations and governments, while corporate actions refer to events that affect a company's stock price.
Investment banking involves underwriting securities, providing financial advice, and facilitating mergers and acquisitions.
Corporate actions include stock splits, dividends, and mergers and acquisitions.
Investment bankers work with corporations and governments to raise capital through the issuance of stocks and b...read more
Q91. Explain program of Palindrome
A program that checks if a given string is the same when read forwards and backwards.
A palindrome can be a word, phrase, number, or other sequence of characters.
The program should remove any spaces and punctuation before checking for palindrome.
Examples of palindromes include 'racecar', 'level', and 'A man, a plan, a canal, Panama!'
Q92. Difference between Union and Union ALL ?
Union combines and removes duplicates from two or more tables, while Union ALL combines all rows from two or more tables.
Union removes duplicates, Union ALL does not
Union requires the same number of columns in each table, Union ALL does not
Union is slower than Union ALL
Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2
Example: SELECT column1 FROM table1 UNION ALL SELECT column1 FROM table2
Q93. What is the difference between star schema and snowflake schema?
Star schema has a single fact table connected to multiple dimension tables, while snowflake schema has normalized dimension tables.
Star schema denormalizes dimension tables, making it easier to query but potentially less efficient for storage.
Snowflake schema normalizes dimension tables, reducing redundancy but potentially making queries more complex.
Star schema is commonly used for data warehouses with denormalized data, while snowflake schema is used for normalized OLAP sys...read more
Q94. Explaing bug tracking tool which you used
I have experience using JIRA as a bug tracking tool.
JIRA is a popular bug tracking tool used in Agile development.
It allows for easy tracking and management of bugs and issues.
JIRA also integrates well with other Agile tools like Confluence and Bitbucket.
I have used JIRA to create and manage user stories, sprints, and backlogs.
JIRA also has a robust reporting system that allows for easy tracking of team progress and bug resolution.
Q96. How would you ensure effective communication during an incident
Effective communication during an incident can be ensured by establishing clear communication channels, providing regular updates, and conducting post-incident reviews.
Establish clear communication channels for different stakeholders involved in the incident.
Provide regular updates on the status of the incident, including any changes or developments.
Encourage open and transparent communication among team members to share information and insights.
Conduct post-incident reviews ...read more
Q97. What do you know about Hexaware
Hexaware is a global IT services company providing automation, cloud, and digital solutions.
Hexaware was founded in 1990 and is headquartered in Mumbai, India.
They offer services in areas such as application transformation, infrastructure management, and business process services.
Hexaware has a strong focus on automation and digital technologies to help clients improve efficiency and innovation.
The company has a global presence with offices in multiple countries including the...read more
Q98. Tell me the difference between Drop, Delete and Truncate in DBMS.
Drop deletes the table structure and data, Delete removes specific rows, Truncate removes all rows but keeps the table structure.
Drop removes the table structure along with all the data in the table.
Delete removes specific rows based on a condition using the WHERE clause.
Truncate removes all rows from a table but keeps the table structure intact.
Example: DROP TABLE table_name; DELETE FROM table_name WHERE condition; TRUNCATE TABLE table_name;
Q99. Share Your experience on Creating AWS resources. GUI or using IAC tool?
I primarily use IAC tools like Terraform to create AWS resources for consistency, version control, and automation.
I prefer using IAC tools like Terraform for creating AWS resources as it allows for infrastructure as code, version control, and automation.
Using IAC tools ensures consistency in resource creation across environments.
GUI can be useful for quick prototyping or exploring AWS services, but IAC is more efficient for managing infrastructure at scale.
Examples of IAC too...read more
Q100. Brief about arrays and a small program on array.
Arrays are a collection of similar data types. They are used to store and access multiple values using a single variable.
Arrays can be of different types such as integer, float, character, etc.
Arrays are declared with a fixed size and can be accessed using index numbers.
Example: int arr[5] = {1, 2, 3, 4, 5};
Arrays can also be of strings, which are essentially arrays of characters.
Example: char str[10] = 'Hello';
Top HR Questions asked in Yash Impacts
Interview Process at Yash Impacts
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month