Add office photos
Premium Employer

Hexaware Technologies

3.6
based on 5.6k Reviews
Filter interviews by

300+ Yash Impacts Interview Questions and Answers

Updated 17 Jan 2025
Popular Designations
Q1. Intersection of Two Arrays II

You have been given two integer arrays/list(ARR1 and ARR2) of size N and M, respectively. You need to print their intersection; An intersection for this problem can be defined when...read more

View 2 more answers

Q2. Program to find second largest number from set of array

Ans.

Program to find second largest number from set of array

  • Sort the array in descending order

  • Return the second element of the sorted array

View 2 more answers
Q3. Kth largest element in the unsorted array

You are given an array consisting of 'N' distinct positive integers and a number 'K'. Your task is to find the kth largest element in the array.

Example:
Consider the ar...read more
View 2 more answers
Q4. Maximum sum path from the leaf to root

You are given a binary tree of 'N' nodes.

Your task is to find the path from the leaf node to the root node which has the maximum path sum among all the root to leaf paths....read more

View 2 more answers
Discover Yash Impacts interview dos and don'ts from real experiences
Q5. Fishmonger

A fishmonger wants to bring his goods from port to the market. On his route, he has to traverse an area with many states. He has to pay a toll at each border.

He is a good businessman. He wants to cho...read more

View 2 more answers
Q6. Shape and Overriding

Create a Class Shape having a field shapeType and a function printMyType.

Create another class, Square and Rectangle, which inherits the Shape class and has additional fields length and brea...read more

Add your answer
Are these interview questions helpful?
Q7. Add Two Numbers As Linked Lists

You are given two linked lists representing two non-negative numbers. The digits in the linked list are stored in reverse order, i.e. starting from least significant digit (LSD) t...read more

View 3 more answers
Q8. Colour the Graph

You are given a graph with 'N' vertices numbered from '1' to 'N' and 'M' edges. You have to colour this graph in two different colours, say blue and red such that no two vertices connected by an...read more

View 2 more answers
Share interview questions and help millions of jobseekers 🌟
Q9. Ninja Competition

Our hero Ninja is organizing a coding competition where only two teams can participate simultaneously. To make the competition interesting and fair, both the teams should have an equal number o...read more

View 3 more answers
Q10. Rat In a Maze: All Paths

You are given a 'N' * 'N' maze with a rat placed at 'MAZE[0][0]'. Find and print all paths that rat can follow to reach its destination i.e. 'MAZE['N' - 1]['N' - 1]'. Rat can move in any...read more

View 2 more answers

Q11. Write a program to check whether string is palindrome or not?

Ans.

Program to check if a string is a palindrome or not.

  • Create a function to compare the original string with its reverse.

  • Ignore spaces and punctuation when checking for palindrome.

  • Example: 'racecar' is a palindrome, 'hello' is not.

View 1 answer

Q12. Stack implementation, difference between stack and linked list , merge sort algorithm

Ans.

Question on stack implementation, difference between stack and linked list, and merge sort algorithm.

  • Stack is a LIFO data structure while linked list is a linear data structure.

  • Stack is implemented using arrays or linked lists while linked list is implemented using pointers.

  • Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them separately, and then merges them.

  • Merge sort has a time complexity of O(nlogn) and is a stable sorting a...read more

Add your answer
Q13. System Design Question

You have to design a software solution which will automatically inform the truck owners about the servicing date so that they don't miss on it due to their busy life schedule.

Add your answer

Q14. You have knowledge of data structure? Tell me about it

Ans.

Data structures are a way to organize and store data efficiently.

  • Data structures are used to store and manipulate data in a structured manner.

  • They provide different ways to access and perform operations on the data.

  • Examples include arrays, linked lists, stacks, queues, trees, and graphs.

View 2 more answers

Q15. What are OOPS concepts and explain

Ans.

OOPS concepts are the principles of Object-Oriented Programming that help in creating modular and reusable code.

  • OOPS stands for Object-Oriented Programming System

  • It includes concepts like Inheritance, Polymorphism, Encapsulation, and Abstraction

  • Inheritance allows a class to inherit properties and methods from another class

  • Polymorphism allows objects to take on multiple forms or behaviors

  • Encapsulation is the practice of hiding data and methods within a class

  • Abstraction is the ...read more

Add your answer

Q16. Explain Protected, private and public access modifier

Ans.

Protected, private and public are access modifiers in object-oriented programming that control the visibility of class members.

  • Public members are accessible from anywhere in the program.

  • Private members are only accessible within the class they are declared in.

  • Protected members are accessible within the class they are declared in and any subclasses.

  • Access modifiers are used to enforce encapsulation and prevent unauthorized access to class members.

Add your answer
Q17. Managerial Questions

They will just ask few basic questions to see whether you will be able to fit into their culture or not.

Add your answer

Q18. Write a program to reverse a string eg. Hello World to olleh dlrow

Ans.

A program to reverse a string by iterating through the characters and appending them in reverse order.

  • Create a function that takes a string as input

  • Initialize an empty string to store the reversed string

  • Iterate through the characters of the input string in reverse order and append them to the empty string

  • Return the reversed string

Add your answer

Q19. Write a program to find second maximum number in an array.

Ans.

Program to find second maximum number in an array of strings.

  • Convert array elements to integers for comparison.

  • Sort the array in descending order.

  • Return the second element in the sorted array.

Add your answer

Q20. Brief discription of project, regression in machine learning.

Ans.

Regression in machine learning is a technique used to predict continuous numerical values based on input data.

  • Regression models are used to analyze the relationship between variables and predict outcomes.

  • Linear regression is a common type of regression used in machine learning.

  • Examples of regression in machine learning include predicting housing prices based on features like location and square footage, or predicting stock prices based on historical data.

  • Regression can also b...read more

Add your answer
Q21. DBMS Question

What is the difference between MongoDB and MySQL?

Add your answer

Q22. What is Object Oriented Programming?

Ans.

Object Oriented Programming is a programming paradigm based on the concept of objects, which can contain data and code.

  • OOP focuses on creating objects that interact with each other to solve problems

  • Objects have attributes (data) and methods (functions)

  • Encapsulation, inheritance, and polymorphism are key principles of OOP

  • Examples of OOP languages include Java, C++, and Python

Add your answer

Q23. Name 4 pillars of Object Oriented Programming

Ans.

Encapsulation, Inheritance, Polymorphism, Abstraction are the 4 pillars of OOP

  • Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in Java

  • Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Subclass extending a superclass

  • Polymorphism: Ability to present the same interface for different data types. Example: Method overloading in Java

  • Abstraction: Hiding the complex implementation details...read more

View 1 answer
Q24. OS Questions

What is process and explain threading
Explain binary semaphore?
Explain paging
What are overlays.

Add your answer

Q25. what is oop? what is os? joins in sql, insert query

Ans.

OOP is Object-Oriented Programming. OS is Operating System. SQL joins and insert queries are used to manipulate data in databases.

  • OOP is a programming paradigm that focuses on objects and their interactions.

  • OS is a software that manages computer hardware and software resources.

  • SQL joins are used to combine data from two or more tables based on a related column.

  • Insert queries are used to add new data to a table in a database.

Add your answer

Q26. Tell something about the situation . where you are stucked with difficult user and it can be lead on high escalation if issue not get resolved.

Ans.

Dealing with a difficult user and potential high escalation

  • Active listening and empathy to understand the user's concerns

  • Remaining calm and professional to defuse the situation

  • Offering alternative solutions or workarounds

  • Involving a supervisor or manager if necessary

  • Documenting the issue and steps taken for future reference

View 1 answer

Q27. How do you call a variable from one note book to another note book in adb

Ans.

You can call a variable from one notebook to another in adb by using the %run magic command.

  • Use the %run magic command followed by the path to the notebook containing the variable you want to access.

  • Make sure the notebook containing the variable is in the same directory or provide the full path.

  • Once you run the %run command, the variables from the other notebook will be available in the current notebook.

Add your answer

Q28. What is the difference b/w complie time and run time polymorphism?

Ans.

Compile time polymorphism is resolved at compile time, while run time polymorphism is resolved at run time.

  • Compile time polymorphism is achieved through function overloading and operator overloading.

  • Run time polymorphism is achieved through function overriding and virtual functions.

  • Compile time polymorphism is faster as the resolution is done at compile time.

  • Run time polymorphism allows dynamic binding of functions based on the object type at run time.

  • Compile time polymorphis...read more

Add your answer

Q29. What is jagged array?

Ans.

A jagged array is an array of arrays where each element can be of different sizes.

  • Each sub-array can have a different number of elements

  • Useful for representing data structures like matrices or tables

  • Example: [['apple', 'banana'], ['orange', 'grape', 'kiwi']]

View 1 answer

Q30. What is the new operator used for?

Ans.

The new operator is used to create an instance of a class or to allocate memory for an object.

  • The new operator is followed by the name of the class and parentheses.

  • It can also be used to create arrays of objects.

  • Example: MyClass obj = new MyClass();

  • Example: int[] arr = new int[5];

View 1 answer
Q31. Technical Question

Given a file of 1 GB having data in form of digits, sort the file elements with 100 MB RAM available.

Add your answer

Q32. What is the difference between MongoDB and MySQL?

Ans.

MongoDB is a NoSQL database while MySQL is a relational database.

  • MongoDB stores data in JSON-like documents while MySQL stores data in tables with rows and columns.

  • MongoDB is schema-less while MySQL requires a schema to be defined.

  • MongoDB is better suited for handling unstructured data while MySQL is better for structured data.

  • MongoDB has better scalability and performance while MySQL has better ACID compliance.

  • MongoDB supports sharding while MySQL does not.

  • Example: MongoDB i...read more

View 2 more answers

Q33. How you will improve customer experience?

Ans.

To improve customer experience, I will focus on personalization, efficient communication, and continuous improvement.

  • Implement personalized customer interactions based on their preferences and history.

  • Streamline communication channels to ensure prompt and effective responses.

  • Regularly gather customer feedback and use it to identify areas for improvement.

  • Train and empower team members to provide exceptional customer service.

  • Implement self-service options to provide customers w...read more

View 2 more answers

Q34. How to add column in copybook and overall process of this task

Ans.

To add a column in copybook, modify the copybook definition and update all programs that use it.

  • Identify the copybook that needs modification

  • Add the new column to the copybook definition

  • Update all programs that use the modified copybook

  • Test the changes thoroughly before deploying to production

Add your answer

Q35. What is Software Development Lifecycle ?

Ans.

Software Development Lifecycle is a process followed by software development teams to design, develop and maintain software.

  • It includes phases like planning, analysis, design, implementation, testing, deployment, and maintenance.

  • Each phase has its own set of activities and deliverables.

  • It helps in ensuring that the software is developed efficiently and meets the requirements of the stakeholders.

  • Examples of SDLC models are Waterfall, Agile, and DevOps.

Add your answer

Q36. What are constructors?

Ans.

Constructors are special methods in a class that are used to initialize objects.

  • Constructors have the same name as the class they belong to.

  • They are called automatically when an object is created.

  • Constructors can have parameters to initialize object properties.

  • They do not have a return type.

  • Example: public class Car { public Car(String color) { this.color = color; }}

Add your answer

Q37. What rating will you give about your programming knowledge out of 10 ?

Ans.

I would rate my programming knowledge as 7 out of 10.

  • I have a strong understanding of programming concepts and syntax.

  • I have experience with multiple programming languages such as Java, Python, and C++.

  • I am constantly learning and improving my skills through personal projects and online courses.

Add your answer

Q38. What is the standarddoc types both in so and billing

Ans.

Standard document types in SO and billing

  • Sales Order (SO)

  • Invoice

  • Credit Memo

  • Purchase Order

  • Delivery Note

Add your answer

Q39. Get the exact requirements from customer. How many devices, policies,strings, security features, windows updates rings and who are stakeholders these information is is required to work on device migrations.

Ans.

Gather detailed requirements from the customer including number of devices, policies, security features, Windows update rings, and stakeholders.

  • Number of devices: Ensure to get the exact count of devices that need to be migrated.

  • Policies: Understand the specific policies that need to be implemented on the devices.

  • Security features: Identify the required security features for the devices.

  • Windows update rings: Determine the preferred update schedule for Windows updates.

  • Stakehol...read more

Add your answer

Q40. Find the second largest array element in a given lisst of arrays using c programing

Ans.

Find the second largest element in a given list of arrays using C programming.

  • Iterate through the array and compare each element with the current maximum and second maximum

  • If the element is greater than the current maximum, update the second maximum and maximum

  • If the element is greater than the second maximum but less than the maximum, update the second maximum

  • Return the second maximum

Add your answer

Q41. What is inheritance, what is encapsulation, what is data hiding

Ans.

Inheritance is a way to create new classes based on existing classes. Encapsulation is the practice of hiding data and methods within a class. Data hiding is the act of making data private to prevent direct access.

  • Inheritance allows for code reuse and promotes a hierarchical structure of classes.

  • Encapsulation helps to prevent accidental modification of data and promotes modular code.

  • Data hiding is achieved through access modifiers such as private and protected.

  • Example: A Car ...read more

Add your answer

Q42. Write a code to create dataframe in adb using struct type

Ans.

Creating a dataframe in adb using struct type

  • Use the 'CREATE TABLE' statement to define the schema of the dataframe

  • Define the struct type using 'STRUCT' keyword

  • Insert data into the dataframe using 'INSERT INTO' statement

Add your answer

Q43. Write a code to find max salary department wise and second highest salary department wise

Ans.

Code to find max and second highest salary department wise

  • Iterate through the list of employees and store max and second highest salary for each department

  • Use a hashmap to store department wise salaries

  • Sort the salaries in descending order to find max and second highest

Add your answer

Q44. 1) explain the features of Java programming 2) explain the Oops concepts in Java 3) Access Modifiers 4) Check and Unchecked exception in Java 5) explain throw and throws exception handling in Java. 6) What is r...

read more
Ans.

Java programming features, OOPs concepts, access modifiers, exceptions, polymorphism, Java's object-oriented nature, Array vs ArrayList, and a program to find 4th highest salary.

  • Java features include platform independence, object-oriented, robust, secure, and high performance.

  • OOPs concepts in Java include inheritance, encapsulation, polymorphism, and abstraction.

  • Access modifiers in Java are public, private, protected, and default.

  • Checked exceptions are checked at compile time...read more

Add your answer

Q45. Intro What is oops Encapsulation Polymorphism Runtime, compile time Dbms Sql vs no sql

Ans.

Questions related to programming concepts and database management systems.

  • OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects.

  • Encapsulation is the process of hiding the implementation details of an object from the outside world.

  • Polymorphism is the ability of an object to take on many forms.

  • Runtime and compile time are two phases of program execution.

  • DBMS stands for Database Management System which is a software system us...read more

Add your answer

Q46. Difference between mutual fund & hedge funds & its advantages & disadvantages ?

Ans.

Mutual funds are for retail investors while hedge funds are for high net worth individuals. Hedge funds have more flexibility but higher fees.

  • Mutual funds are regulated by the SEC while hedge funds are not.

  • Mutual funds are open to all investors while hedge funds are only open to accredited investors.

  • Mutual funds have lower fees and are more transparent while hedge funds have higher fees and are less transparent.

  • Mutual funds are more diversified while hedge funds can take more...read more

Add your answer

Q47. SQL Query to find such records which never ever contains flag 0 in critical column p1 1-1-21 1 p1 2-3-21 0 p2 3-2-21 0 p3 1-5-21 1 p3 1-5-21 1 p4 14-21 1

Ans.

The SQL query to find records that never contain flag 0 in the critical column.

  • Use the NOT EXISTS operator to check if there are no records with flag 0 for each distinct value in the critical column.

  • Write a subquery to select distinct values from the critical column.

  • Join the main table with the subquery using the critical column.

  • Filter the result by checking if there are no records with flag 0 for each distinct value in the critical column.

Add your answer

Q48. How to link a web page to another in Html

Ans.

Use the anchor tag <a> with the href attribute to link a web page to another in HTML.

  • Use the <a> tag with the href attribute to specify the URL of the page you want to link to.

  • Add the text or image that will serve as the clickable link between the opening and closing <a> tags.

  • You can also use the target attribute to specify where the linked page will open (e.g. in a new tab).

View 1 answer
Q49. C++ Question

What is the new keyword?

Add your answer

Q50. 1.what is output of gtwindowhandals() command? 2.Syntax to opn opra browsr? 3.tak scrnshot command syntax ?

Add your answer
Q51. Assignment

Write an essay on any topic and speak.

Add your answer

Q52. Abstract Class vs Interface. How do you choose b/w this?

Ans.

Abstract classes are used when we want to provide a default implementation, while interfaces are used when we want to enforce a contract.

  • Abstract classes can have constructors, while interfaces cannot

  • A class can implement multiple interfaces, but can only inherit from one abstract class

  • Interfaces are used for loose coupling and flexibility in design

  • Abstract classes are used for code reusability and to provide a common base for related classes

  • Example: An abstract class 'Animal...read more

Add your answer

Q53. What are 1099 forms and types and how much work I have done on them.

Ans.

1099 forms are tax forms used to report income received from sources other than an employer.

  • There are several types of 1099 forms, including 1099-MISC, 1099-INT, and 1099-DIV.

  • 1099-MISC is used to report income earned as an independent contractor or freelancer.

  • 1099-INT is used to report interest income earned from bank accounts or investments.

  • 1099-DIV is used to report dividend income earned from investments.

  • As a tax consultant, I have worked extensively with 1099 forms, ensur...read more

Add your answer

Q54. How can you remove duplicates from a list in python?

Ans.

Remove duplicates from a list in Python.

  • Convert the list to a set to remove duplicates.

  • Convert the set back to a list if needed.

  • Use the built-in function 'set()' to convert the list to a set.

  • Use the built-in function 'list()' to convert the set back to a list.

Add your answer

Q55. Program to arrange no. In ascending order.

Ans.

Program to arrange numbers in ascending order

  • Use a sorting algorithm like bubble sort, selection sort, or insertion sort

  • Iterate through the array and compare adjacent elements, swapping them if necessary

  • Repeat the process until the array is sorted in ascending order

Add your answer

Q56. How tax is calculated and details of gross distribution and cost basis

Ans.

Tax is calculated based on gross distribution and cost basis. Gross distribution is the total amount received and cost basis is the original investment.

  • Tax is calculated based on the difference between gross distribution and cost basis

  • Gross distribution is the total amount received from an investment, including dividends and capital gains

  • Cost basis is the original investment amount, including any fees or commissions

  • Tax is calculated on the net gain, which is the difference be...read more

Add your answer

Q57. what is difference between a static method and a class method in Python?

Ans.

Static methods are bound to a class and not an instance, while class methods are bound to a class and can access class-level variables.

  • Static methods are defined using the @staticmethod decorator and do not take any special parameters.

  • Class methods are defined using the @classmethod decorator and take the class itself as the first parameter.

  • Static methods are often used for utility functions that do not require access to instance or class variables.

  • Class methods are often use...read more

Add your answer
Asked in
SME Interview

Q58. What do mean by Custodian bank? Explain the features of a Custodian bank

Ans.

A custodian bank is a financial institution that holds and safeguards assets on behalf of its clients.

  • Custodian banks provide services such as safekeeping of assets, settlement of trades, and corporate actions processing.

  • They also offer reporting and record-keeping services to clients.

  • Custodian banks may also provide other services such as foreign exchange, cash management, and securities lending.

  • Examples of custodian banks include State Street, BNY Mellon, and J.P. Morgan.

Add your answer

Q59. Difference between WMI filtering &amp; Security filtering, How AD replication works, ports number of AD replication, how to troubleshoot AD replication.

Ans.

WMI filtering is used to apply Group Policy based on system attributes, while Security filtering is used to apply Group Policy based on user or group membership.

  • WMI filtering applies Group Policy based on system attributes like OS version, RAM, etc.

  • Security filtering applies Group Policy based on user or group membership.

  • AD replication works by transferring changes from one domain controller to another.

  • AD replication uses ports 389 (LDAP), 636 (LDAPS), 3268 (Global Catalog), ...read more

Add your answer
Q60. DBMS Qustion

What are ACID properties

Add your answer

Q61. Difference between DELETE and TRUNCATE ?

Ans.

DELETE removes specific rows from a table while TRUNCATE removes all rows and resets the table.

  • DELETE is a DML command while TRUNCATE is a DDL command.

  • DELETE can be rolled back while TRUNCATE cannot be rolled back.

  • DELETE is slower than TRUNCATE as it logs each row deletion while TRUNCATE does not.

  • DELETE can have WHERE clause while TRUNCATE cannot have WHERE clause.

  • DELETE does not reset the identity of the table while TRUNCATE resets the identity of the table.

Add your answer

Q62. What methodology are you aware of? Agile/waterfall? What softwares have you worked on?

Ans.

I am aware of both Agile and Waterfall methodologies. I have worked on various software projects.

  • I have experience working with Agile methodology, including Scrum and Kanban.

  • I am also familiar with Waterfall methodology and have worked on projects following this approach.

  • Some of the software I have worked on includes a CRM system for a healthcare company and a mobile app for a retail company.

  • I have also worked on a web-based project management tool and a financial reporting s...read more

Add your answer

Q63. What is JVM?

Ans.

JVM stands for Java Virtual Machine. It is an abstract machine that provides a runtime environment for Java programs.

  • JVM interprets compiled Java code and executes it

  • It provides platform independence by converting bytecode to machine-specific code

  • JVM manages memory allocation and garbage collection

  • Examples of JVM implementations include Oracle JVM, OpenJDK, and IBM JVM

View 2 more answers

Q64. Have you got any issues in pod, while creating or monitoring pods in the kubernetes cluster?

Ans.

Yes, I have faced issues while creating or monitoring pods in a Kubernetes cluster.

  • One common issue is pods getting stuck in a pending state due to resource constraints or scheduling issues.

  • Another issue is pods crashing frequently due to misconfigured settings or incompatible container images.

  • Monitoring pods can be challenging, especially when dealing with a large number of pods and trying to track their health and performance.

  • Troubleshooting networking issues within the clu...read more

Add your answer

Q65. How to do validation between two integers Source 12345 2122434 54534535 5345353455 target 0000012345 0002122434 0054534535 5345353455

Ans.

To validate between two integers, compare each corresponding digit and check if they are equal.

  • Convert both integers to strings

  • Pad the source integer with leading zeros to match the length of the target integer

  • Compare each digit of the source and target integers

  • If any digit is not equal, the validation fails

Add your answer

Q66. Suppose we have following column what will be output for inner join col1 col2 1 1 1 null null null 1 1 1 blank blank blank

Ans.

The output for inner join will be the rows where both col1 and col2 have non-null values.

  • Inner join returns only the matching rows from both tables.

  • In this case, the output will be the rows with non-null values in both col1 and col2.

  • Rows with null or blank values in either col1 or col2 will be excluded from the output.

Add your answer

Q67. How to create mailbox?, What is the powershell command used to sync the mailbox

Ans.

To create a mailbox in PowerShell, use the New-Mailbox cmdlet. To sync the mailbox, use the Start-ADSyncSyncCycle cmdlet.

  • Use the New-Mailbox cmdlet to create a mailbox in PowerShell

  • Syntax: New-Mailbox -Name -UserPrincipalName -Database

  • Use the Start-ADSyncSyncCycle cmdlet to sync the mailbox

  • Syntax: Start-ADSyncSyncCycle -PolicyType Delta

  • Replace , , and with appropriate values

Add your answer
Q68. System Design Question

Draw E-R Diagram for Uber.

Add your answer

Q69. Explain prime number program

Ans.

A program that identifies prime numbers.

  • A prime number is a number that is only divisible by 1 and itself.

  • The program should take an input number and check if it is prime.

  • One way to check for prime numbers is to divide the number by all numbers less than it.

  • If the number is only divisible by 1 and itself, it is prime.

Add your answer
Q70. Data Structures

I was asked in depth about Stacks and graphs

Add your answer

Q71. what are use of Versioning in S3? Have you got any issues in working using S3?

Ans.

Versioning in S3 allows for preserving, retrieving, and restoring every version of an object stored in a bucket.

  • Enables recovery from unintended user actions or application failures

  • Helps in maintaining different versions of objects for audit or compliance purposes

  • Prevents accidental deletion or overwriting of objects

  • Useful for tracking changes and rolling back to previous versions if needed

Add your answer

Q72. Two major reason to use automation over manual testing

Ans.

Automation saves time and increases accuracy.

  • Automation can run tests faster than humans

  • Automation can perform repetitive tasks without getting tired or making mistakes

  • Automation can simulate large amounts of data to test edge cases

  • Automation can provide consistent results

  • Manual testing is prone to human error and can be time-consuming

  • Automation can free up human testers to focus on more complex testing tasks

Add your answer

Q73. What is change management and in which scenario it is used

Ans.

Change management is the process of managing changes to a system or organization to minimize negative impact and maximize benefits.

  • It involves identifying, analyzing, and implementing changes to a system or organization

  • It is used to ensure that changes are made in a controlled and systematic way

  • It helps to minimize the negative impact of changes on the system or organization

  • It maximizes the benefits of changes by ensuring that they are implemented effectively

  • Examples include ...read more

Add your answer

Q74. What if customer adds more scope in a Fixed Price project

Ans.

In a Fixed Price project, if the customer adds more scope, the project manager needs to assess the impact and negotiate a change order.

  • Assess the impact of the added scope on the project timeline, budget, and resources.

  • Negotiate a change order with the customer to account for the added scope.

  • Ensure that the change order is documented and signed off by both parties before proceeding with the additional work.

  • Communicate the changes to the project team and adjust the project pla...read more

Add your answer

Q75. How will you design and plan device migrations along with strategies?

Ans.

Designing and planning device migrations involves assessing current environment, creating migration plan, testing, and executing migration.

  • Assess current device environment including hardware, software, and configurations

  • Create a detailed migration plan outlining steps, timelines, and resources needed

  • Test migration process in a controlled environment to identify and address any issues

  • Execute migration plan with minimal disruption to end users

  • Monitor and evaluate migration suc...read more

Add your answer

Q76. How do you do incremental load in adf

Ans.

Incremental load in ADF is achieved by using watermark columns to track the last loaded data and only loading new or updated records.

  • Use watermark columns to track the last loaded data

  • Compare the watermark column value with the source data to identify new or updated records

  • Use a filter condition in the source query to only select records with a timestamp greater than the watermark value

  • Update the watermark column value after each successful load

Add your answer

Q77. How do you process multithreads in java ?

Ans.

In Java, multithreading can be processed using the Thread class or implementing the Runnable interface.

  • Create a new thread by extending the Thread class or implementing the Runnable interface.

  • Start the thread using the start() method.

  • Use synchronization mechanisms like synchronized blocks or locks to handle shared resources safely.

  • Join threads to wait for them to finish execution.

  • Use thread pools for managing multiple threads efficiently.

Add your answer

Q78. What is the Progress Report on Daily Basis and Updates.

Ans.

Daily progress reports and updates are essential for effective customer support.

  • Daily progress reports should include a summary of the previous day's activities and any outstanding issues.

  • Updates should be provided regularly to keep customers informed of any changes or developments.

  • Reports and updates should be clear, concise, and easy to understand.

  • Examples of updates include status updates on ongoing issues, new product releases, and changes to policies or procedures.

  • Regula...read more

Add your answer

Q79. What type of Data base avilable

Ans.

There are various types of databases available such as relational, NoSQL, graph, and document-oriented databases.

  • Relational databases use tables to store data and have a predefined schema.

  • NoSQL databases are non-relational and can handle unstructured data.

  • Graph databases are used to store and manage relationships between data.

  • Document-oriented databases store data in documents, usually in JSON format.

  • Examples include MySQL, MongoDB, Neo4j, and Cassandra.

Add your answer

Q80. What type of schemas did you use for your project. (Star schema, Snowflake Schema)

Ans.

I have experience working with both Star and Snowflake schemas in my projects.

  • Star schema is a denormalized schema where one central fact table is connected to multiple dimension tables.

  • Snowflake schema is a normalized schema where dimension tables are further normalized into sub-dimension tables.

  • Used Star schema for simpler, smaller datasets where performance is a priority.

  • Used Snowflake schema for complex, larger datasets where data integrity and scalability are important.

Add your answer

Q81. In team if two groups are created then how to resolve the their issues

Ans.

To resolve issues between two groups in a team, communication, collaboration, and conflict resolution skills are essential.

  • Encourage open communication between the two groups to understand each other's perspectives and concerns.

  • Facilitate a meeting where both groups can discuss their issues and work together to find common ground.

  • Assign a mediator or team leader to help facilitate the discussion and guide the groups towards a resolution.

  • Encourage collaboration and teamwork by...read more

Add your answer

Q82. Types of risks in the project and how it was handled

Ans.

Various risks in the project were identified and mitigated through proactive measures.

  • Identified risks related to budget, timeline, scope, and stakeholder engagement

  • Developed risk management plan to address potential risks

  • Implemented proactive measures such as regular communication with stakeholders, contingency planning, and risk monitoring

  • Example: Identified risk of budget overrun and implemented cost-saving measures such as renegotiating vendor contracts and reducing scope...read more

Add your answer

Q83. What is the difference between set &amp; join?

Ans.

Set and join are operations used in database management systems.

  • Set is used to perform mathematical set operations like union, intersection, and difference on two or more sets.

  • Join is used to combine rows from two or more tables based on a related column between them.

  • Set operations do not require a common column, while join operations do.

  • Set operations return a result set with unique values, while join operations return a result set with combined values.

  • Examples: UNION, INTER...read more

Add your answer
Q84. Java Question

What is JVM?

Add your answer

Q85. Write a program to print how many integer and character from a given string. Input:"nAJh4837sj"

Ans.

A program to count the number of integers and characters in a given string.

  • Iterate through each character in the string and check if it is an integer or a character.

  • Use isdigit() function to check if a character is an integer.

  • Keep separate counters for integers and characters.

  • Return the counts of integers and characters at the end.

Add your answer

Q86. Diff b/w call by value and call by reference?

Ans.

Call by value passes a copy of the value, while call by reference passes the memory address of the value.

  • Call by value creates a new copy of the value being passed.

  • Call by reference passes the memory address of the value being passed.

  • Changes made to the parameter in call by value do not affect the original value.

  • Changes made to the parameter in call by reference affect the original value.

Add your answer

Q87. what is a binary search and how you can do it?

Ans.

Binary search is a search algorithm that finds the position of a target value within a sorted array.

  • Binary search requires a sorted array as input.

  • It compares the target value with the middle element of the array.

  • If the target value is equal to the middle element, the search is successful.

  • If the target value is less than the middle element, the search continues on the left half of the array.

  • If the target value is greater than the middle element, the search continues on the ri...read more

Add your answer

Q88. 1 2 3 . . . 100 we want 100 at first row &amp; rest below it

Ans.

The question is asking to rearrange the numbers so that 100 is at the first row and the rest are below it.

  • Create an array of strings to store the numbers

  • Assign the value '100' to the first element of the array

  • Use a loop to assign the numbers 1 to 99 to the remaining elements of the array

Add your answer

Q89. What is PO and Non PO &amp; what is 2 way and 3 way match

Ans.

PO stands for Purchase Order, Non PO refers to transactions without a Purchase Order. 2 way match involves matching the invoice with the PO, while 3 way match involves matching the invoice, PO, and receiving report.

  • PO (Purchase Order) is a document issued by a buyer to a seller, outlining the products or services to be purchased.

  • Non PO transactions are purchases made without a formal Purchase Order.

  • 2 way match is the process of matching the invoice from the seller with the Pu...read more

Add your answer

Q90. What is investment banking and corporate actions

Ans.

Investment banking involves providing financial services to corporations and governments, while corporate actions refer to events that affect a company's stock price.

  • Investment banking involves underwriting securities, providing financial advice, and facilitating mergers and acquisitions.

  • Corporate actions include stock splits, dividends, and mergers and acquisitions.

  • Investment bankers work with corporations and governments to raise capital through the issuance of stocks and b...read more

Add your answer

Q91. Explain program of Palindrome

Ans.

A program that checks if a given string is the same when read forwards and backwards.

  • A palindrome can be a word, phrase, number, or other sequence of characters.

  • The program should remove any spaces and punctuation before checking for palindrome.

  • Examples of palindromes include 'racecar', 'level', and 'A man, a plan, a canal, Panama!'

Add your answer

Q92. Difference between Union and Union ALL ?

Ans.

Union combines and removes duplicates from two or more tables, while Union ALL combines all rows from two or more tables.

  • Union removes duplicates, Union ALL does not

  • Union requires the same number of columns in each table, Union ALL does not

  • Union is slower than Union ALL

  • Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2

  • Example: SELECT column1 FROM table1 UNION ALL SELECT column1 FROM table2

Add your answer

Q93. What is the difference between star schema and snowflake schema?

Ans.

Star schema has a single fact table connected to multiple dimension tables, while snowflake schema has normalized dimension tables.

  • Star schema denormalizes dimension tables, making it easier to query but potentially less efficient for storage.

  • Snowflake schema normalizes dimension tables, reducing redundancy but potentially making queries more complex.

  • Star schema is commonly used for data warehouses with denormalized data, while snowflake schema is used for normalized OLAP sys...read more

Add your answer

Q94. Explaing bug tracking tool which you used

Ans.

I have experience using JIRA as a bug tracking tool.

  • JIRA is a popular bug tracking tool used in Agile development.

  • It allows for easy tracking and management of bugs and issues.

  • JIRA also integrates well with other Agile tools like Confluence and Bitbucket.

  • I have used JIRA to create and manage user stories, sprints, and backlogs.

  • JIRA also has a robust reporting system that allows for easy tracking of team progress and bug resolution.

Add your answer
Q95. Java Question

What is JRE?

Add your answer

Q96. How would you ensure effective communication during an incident

Ans.

Effective communication during an incident can be ensured by establishing clear communication channels, providing regular updates, and conducting post-incident reviews.

  • Establish clear communication channels for different stakeholders involved in the incident.

  • Provide regular updates on the status of the incident, including any changes or developments.

  • Encourage open and transparent communication among team members to share information and insights.

  • Conduct post-incident reviews ...read more

Add your answer

Q97. What do you know about Hexaware

Ans.

Hexaware is a global IT services company providing automation, cloud, and digital solutions.

  • Hexaware was founded in 1990 and is headquartered in Mumbai, India.

  • They offer services in areas such as application transformation, infrastructure management, and business process services.

  • Hexaware has a strong focus on automation and digital technologies to help clients improve efficiency and innovation.

  • The company has a global presence with offices in multiple countries including the...read more

Add your answer

Q98. Tell me the difference between Drop, Delete and Truncate in DBMS.

Ans.

Drop deletes the table structure and data, Delete removes specific rows, Truncate removes all rows but keeps the table structure.

  • Drop removes the table structure along with all the data in the table.

  • Delete removes specific rows based on a condition using the WHERE clause.

  • Truncate removes all rows from a table but keeps the table structure intact.

  • Example: DROP TABLE table_name; DELETE FROM table_name WHERE condition; TRUNCATE TABLE table_name;

Add your answer

Q99. Share Your experience on Creating AWS resources. GUI or using IAC tool?

Ans.

I primarily use IAC tools like Terraform to create AWS resources for consistency, version control, and automation.

  • I prefer using IAC tools like Terraform for creating AWS resources as it allows for infrastructure as code, version control, and automation.

  • Using IAC tools ensures consistency in resource creation across environments.

  • GUI can be useful for quick prototyping or exploring AWS services, but IAC is more efficient for managing infrastructure at scale.

  • Examples of IAC too...read more

Add your answer

Q100. Brief about arrays and a small program on array.

Ans.

Arrays are a collection of similar data types. They are used to store and access multiple values using a single variable.

  • Arrays can be of different types such as integer, float, character, etc.

  • Arrays are declared with a fixed size and can be accessed using index numbers.

  • Example: int arr[5] = {1, 2, 3, 4, 5};

  • Arrays can also be of strings, which are essentially arrays of characters.

  • Example: char str[10] = 'Hello';

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Yash Impacts

based on 321 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 264 Interview Questions
4.2
 • 237 Interview Questions
4.2
 • 207 Interview Questions
3.5
 • 160 Interview Questions
4.2
 • 157 Interview Questions
3.7
 • 136 Interview Questions
View all
Top Hexaware Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter