CoverPhoto
Hexaware Technologies logo
Premium Employer

Hexaware Technologies

Verified
3.5
based on 6k Reviews
Filter interviews by
Designation
Fresher
Experienced
Skills
Clear (1)

60+ Hexaware Technologies Interview Questions and Answers for Freshers

Updated 14 Oct 2024
Popular Designations

Q1. What is the difference b/w complie time and run time polymorphism?

Ans.

Compile time polymorphism is resolved at compile time, while run time polymorphism is resolved at run time.

  • Compile time polymorphism is achieved through function overloading and operator overloading.

  • Run time polymorphism is achieved through function overriding and virtual functions.

  • Compile time polymorphism is faster as the resolution is done at compile time.

  • Run time polymorphism allows dynamic binding of functions based on the object type at run time.

  • Compile time polymorphis...read more

Add your answer
right arrow

Q2. Intersection of Two Arrays II

Given two integer arrays ARR1 and ARR2 of size N and M respectively, find the intersection of these arrays. An intersection refers to elements that appear in both arrays.

Note:
Inp...read more
Ans.

Find the intersection of two integer arrays in the order they appear in the first array.

  • Iterate through the first array and store elements in a hashmap with their frequencies.

  • Iterate through the second array and check if the element exists in the hashmap, decrement frequency if found.

  • Return the elements that have non-zero frequencies as the intersection.

Add your answer
right arrow

Q3. What is Software Development Lifecycle ?

Ans.

Software Development Lifecycle is a process followed by software development teams to design, develop and maintain software.

  • It includes phases like planning, analysis, design, implementation, testing, deployment, and maintenance.

  • Each phase has its own set of activities and deliverables.

  • It helps in ensuring that the software is developed efficiently and meets the requirements of the stakeholders.

  • Examples of SDLC models are Waterfall, Agile, and DevOps.

Add your answer
right arrow

Q4. Intro What is oops Encapsulation Polymorphism Runtime, compile time Dbms Sql vs no sql

Ans.

Questions related to programming concepts and database management systems.

  • OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects.

  • Encapsulation is the process of hiding the implementation details of an object from the outside world.

  • Polymorphism is the ability of an object to take on many forms.

  • Runtime and compile time are two phases of program execution.

  • DBMS stands for Database Management System which is a software system us...read more

Add your answer
right arrow
Discover Hexaware Technologies interview dos and don'ts from real experiences

Q5. You have knowledge of data structure? Tell me about it

Ans.

Data structures are a way to organize and store data efficiently.

  • Data structures are used to store and manipulate data in a structured manner.

  • They provide different ways to access and perform operations on the data.

  • Examples include arrays, linked lists, stacks, queues, trees, and graphs.

View 2 more answers
right arrow

Q6. Difference between DELETE and TRUNCATE ?

Ans.

DELETE removes specific rows from a table while TRUNCATE removes all rows and resets the table.

  • DELETE is a DML command while TRUNCATE is a DDL command.

  • DELETE can be rolled back while TRUNCATE cannot be rolled back.

  • DELETE is slower than TRUNCATE as it logs each row deletion while TRUNCATE does not.

  • DELETE can have WHERE clause while TRUNCATE cannot have WHERE clause.

  • DELETE does not reset the identity of the table while TRUNCATE resets the identity of the table.

Add your answer
right arrow
Are these interview questions helpful?

Q7. Diff b/w call by value and call by reference?

Ans.

Call by value passes a copy of the value, while call by reference passes the memory address of the value.

  • Call by value creates a new copy of the value being passed.

  • Call by reference passes the memory address of the value being passed.

  • Changes made to the parameter in call by value do not affect the original value.

  • Changes made to the parameter in call by reference affect the original value.

Add your answer
right arrow

Q8. Difference between Union and Union ALL ?

Ans.

Union combines and removes duplicates from two or more tables, while Union ALL combines all rows from two or more tables.

  • Union removes duplicates, Union ALL does not

  • Union requires the same number of columns in each table, Union ALL does not

  • Union is slower than Union ALL

  • Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2

  • Example: SELECT column1 FROM table1 UNION ALL SELECT column1 FROM table2

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. Write Bubble sort Program ?

Ans.

Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.

  • Compare adjacent elements and swap them if they are in the wrong order

  • Repeat this process until the list is sorted

  • Time complexity is O(n^2)

  • Example: [5, 3, 8, 4, 2] -> [3, 5, 8, 4, 2] -> [3, 5, 4, 8, 2] -> [3, 5, 4, 2, 8] -> [3, 4, 5, 2, 8] -> [3, 4, 2, 5, 8] -> [3, 4, 2, 5, 8] -> [3, 2, 4, 5, 8] -> [2, 3, 4, 5, 8]

Add your answer
right arrow

Q10. What is inheritance, what is encapsulation, what is data hiding

Ans.

Inheritance is a way to create new classes based on existing classes. Encapsulation is the practice of hiding data and methods within a class. Data hiding is the act of making data private to prevent direct access.

  • Inheritance allows for code reuse and promotes a hierarchical structure of classes.

  • Encapsulation helps to prevent accidental modification of data and promotes modular code.

  • Data hiding is achieved through access modifiers such as private and protected.

  • Example: A Car ...read more

Add your answer
right arrow
Q11. What basic questions do you think will help determine if I fit into your company culture?
Ans.

Questions related to teamwork, problem-solving, adaptability, and communication skills can help determine if you fit into our company culture.

  • How do you handle working in a team environment?

  • Can you provide an example of a time when you had to solve a complex problem?

  • How do you adapt to changes in a fast-paced work environment?

  • Describe a situation where effective communication was crucial in a project.

Add your answer
right arrow

Q12. Graph Coloring Problem

You are given a graph with 'N' vertices numbered from '1' to 'N' and 'M' edges. Your task is to color this graph using two colors, such as blue and red, in a way that no two adjacent vert...read more

Ans.

Graph coloring problem where vertices need to be colored with two colors such that no adjacent vertices share the same color.

  • Check if the graph can be colored using two colors without any adjacent vertices sharing the same color.

  • Use graph coloring algorithms like Greedy Coloring or Backtracking to solve the problem.

  • If there are odd-length cycles in the graph, it is not possible to color the graph with two colors.

  • If the graph is bipartite, it is always possible to color it wit...read more

Add your answer
right arrow

Q13. Ninja Competition Problem Statement

Ninja is organizing a coding competition where two teams compete at a time. To keep it fair and interesting, both teams must have an equal number of members. Ninja’s task is ...read more

Ans.

Given an integer N, determine if two teams with equal members can be formed based on the divisors of N.

  • Iterate through all divisors of N and assign members to two teams based on whether the divisor is even or odd.

  • Keep track of the number of members in each team and check if they are equal at the end.

  • Return true if the number of members in both teams is equal, false otherwise.

Add your answer
right arrow

Q14. Rat in a Maze: All Paths Problem

You are provided with an N * N maze where a rat is positioned at starting cell MAZE[0][0]. The goal is to determine and print all possible paths that the rat can take to reach i...read more

Ans.

Find all possible paths for a rat in a maze from start to finish.

  • Use backtracking to explore all possible paths in the maze.

  • At each cell, check if it is a valid move and mark it as part of the path.

  • Explore all four directions (up, down, left, right) recursively.

  • When reaching the destination cell, add the path to the result.

  • Return all valid paths found in the maze.

Add your answer
right arrow

Q15. What type of Data base avilable

Ans.

There are various types of databases available such as relational, NoSQL, graph, and document-oriented databases.

  • Relational databases use tables to store data and have a predefined schema.

  • NoSQL databases are non-relational and can handle unstructured data.

  • Graph databases are used to store and manage relationships between data.

  • Document-oriented databases store data in documents, usually in JSON format.

  • Examples include MySQL, MongoDB, Neo4j, and Cassandra.

Add your answer
right arrow
Q16. You have to design a software solution that automatically informs truck owners about their servicing dates to ensure they don't miss it due to their busy schedules.
Ans.

Design a software solution to automatically inform truck owners about servicing dates.

  • Create a database to store truck owner information and servicing dates.

  • Develop a notification system to send reminders to truck owners before their servicing dates.

  • Allow truck owners to set preferred communication channels for reminders.

  • Include a feature for truck owners to reschedule servicing dates if needed.

Add your answer
right arrow

Q17. Kth Largest Element Problem

Given an array containing N distinct positive integers and a number K, determine the Kth largest element in the array.

Example:

Input:
N = 6, K = 3, array = [2, 1, 5, 6, 3, 8]
Output...read more
Ans.

Find the Kth largest element in an array of distinct positive integers.

  • Sort the array in non-increasing order and return the Kth element.

  • Handle multiple test cases efficiently.

  • Ensure all elements in the array are distinct.

Add your answer
right arrow

Q18. Maximum Sum Path from Leaf to Root

Given a binary tree with 'N' nodes, identify the path from a leaf node to the root node that has the maximum sum among all root-to-leaf paths.

Example:

All the possible root t...read more

Ans.

Find the path from a leaf node to the root node with the maximum sum in a binary tree.

  • Traverse the binary tree from leaf nodes to the root while keeping track of the sum of each path.

  • Compare the sums of all paths and return the path with the maximum sum.

  • Use recursion to traverse the tree efficiently.

  • Consider edge cases such as when the tree is empty or has only one node.

Add your answer
right arrow

Q19. Fishmonger Toll Optimization Problem

A fishmonger needs to transport goods from a port to a market, crossing multiple states each requiring a toll. The goal is to minimize the toll costs while ensuring the jour...read more

Ans.

The Fishmonger Toll Optimization Problem involves minimizing toll costs while ensuring timely delivery of goods from a port to a market.

  • Given 'N' states and a time limit 'M', find the smallest toll amount to reach the market from the port within the given time.

  • Use dynamic programming to solve the problem efficiently.

  • Consider the time and toll matrices to calculate the minimum toll cost.

  • Return -1 if it is not possible to reach the market within the given time limit.

Add your answer
right arrow
Q20. Can you explain Bipolar Junction Transistors (BJTs)?
Ans.

BJTs are three-terminal semiconductor devices used for amplification and switching of electronic signals.

  • BJTs have three regions - emitter, base, and collector.

  • They can be NPN or PNP type, depending on the arrangement of semiconductor materials.

  • BJTs are current-controlled devices, where a small current at the base terminal controls a much larger current between the collector and emitter.

  • Common BJT examples include 2N2222 (NPN) and BC557 (PNP).

Add your answer
right arrow

Q21. Add Two Numbers Represented as Linked Lists

Given two linked lists representing two non-negative integers, where the digits are stored in reverse order (i.e., starting from the least significant digit to the mo...read more

Ans.

Add two numbers represented as linked lists and return the sum as a linked list.

  • Traverse both linked lists simultaneously while keeping track of carry from previous sum

  • Create a new linked list to store the sum digits

  • Handle cases where one list is longer than the other by adding remaining digits with carry

  • Remember to handle the case where there is a carry after adding all digits

Add your answer
right arrow

Q22. Shape and Method Overriding Problem Statement

Create a base class called Shape that contains a field named shapeType and a method printMyType.

Implement two derived classes:

  • Square: This class inherits from Sh...read more
Ans.

Create base class Shape with field shapeType and method printMyType. Implement Square and Rectangle classes with calculateArea method.

  • Create a base class Shape with shapeType field and printMyType method.

  • Implement Square and Rectangle classes inheriting from Shape.

  • Include additional fields like length and breadth in Square and Rectangle classes.

  • Override printMyType method in Square and Rectangle classes to output the type of object.

  • Implement calculateArea method in Square and...read more

Add your answer
right arrow
Q23. Can you explain in detail about Stacks and Graphs?
Ans.

Stacks are data structures that follow the Last In First Out (LIFO) principle, while Graphs are data structures that consist of nodes and edges to represent relationships.

  • Stacks are used for implementing functions, backtracking, and expression evaluation.

  • Graphs are used for representing networks, social connections, and shortest path algorithms.

  • Stacks can be implemented using arrays or linked lists.

  • Graphs can be directed or undirected, weighted or unweighted.

  • Examples of stack...read more

Add your answer
right arrow

Q24. Joins in Oracle SQL

Ans.

Joins in Oracle SQL are used to combine rows from two or more tables based on a related column between them.

  • Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • Use ON keyword to specify the join condition.

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;

Add your answer
right arrow

Q25. What is topology and its type

Ans.

Topology is the study of geometric properties and spatial relations unaffected by the continuous change of shape or size.

  • Topology is concerned with the properties of space that are preserved under continuous transformations, such as stretching or bending.

  • It is used in mathematics, physics, computer science, and engineering.

  • Types of topology include point-set topology, algebraic topology, and differential topology.

  • Examples of topological properties include connectedness, compa...read more

Add your answer
right arrow

Q26. explain the constructor and its types of it.

Ans.

A constructor is a special method used to initialize objects in a class. It can have different types based on parameters.

  • A constructor has the same name as the class it belongs to.

  • It is automatically called when an object is created.

  • Constructors can be parameterized or non-parameterized.

  • Parameterized constructors accept arguments to initialize object properties.

  • Non-parameterized constructors have no arguments and provide default values.

  • Constructors can be overloaded, allowing...read more

Add your answer
right arrow

Q27. 1. Explain Types of network

Ans.

Types of network include LAN, WAN, MAN, WLAN, PAN, SAN, CAN, and VPN.

  • LAN (Local Area Network) is a network that covers a small area such as a home, office, or building.

  • WAN (Wide Area Network) is a network that covers a large geographical area such as a city, country, or even the world.

  • MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, typically a city or town.

  • WLAN (Wireless Local Area Network) is a LAN that uses wireless ...read more

Add your answer
right arrow
Q28. Can you write an essay on any topic and present it verbally?
Ans.

Yes, I can write an essay on any topic and present it verbally.

  • Choose a topic that interests you and research it thoroughly

  • Create an outline with an introduction, body paragraphs, and a conclusion

  • Use clear and concise language to convey your ideas

  • Practice presenting your essay verbally to improve your delivery

  • Engage your audience by maintaining eye contact and using gestures

  • Be prepared to answer questions or discuss your essay further

Add your answer
right arrow

Q29. what is Java language?

Ans.

Java is a popular object-oriented programming language known for its platform independence and extensive libraries.

  • Java is designed to be simple, secure, and portable.

  • It is used for developing a wide range of applications, from desktop to mobile and web.

  • Java programs are compiled into bytecode, which can run on any Java Virtual Machine (JVM).

  • It supports multithreading, exception handling, and automatic memory management.

  • Java has a vast ecosystem of libraries and frameworks, s...read more

Add your answer
right arrow
Q30. What are the ACID properties in database management systems?
Ans.

ACID properties are a set of properties that guarantee the reliability of transactions in database management systems.

  • ACID stands for Atomicity, Consistency, Isolation, and Durability.

  • Atomicity ensures that either all operations in a transaction are completed successfully or none are.

  • Consistency ensures that the database remains in a consistent state before and after the transaction.

  • Isolation ensures that the execution of multiple transactions concurrently does not interfere ...read more

View 1 answer
right arrow

Q31. Difference between overloading and overriding

Ans.

Overloading is having multiple methods with the same name but different parameters. Overriding is having a method in a subclass with the same name and parameters as a method in the superclass.

  • Overloading is a compile-time polymorphism while overriding is a runtime polymorphism.

  • Overloading is used to provide different ways of calling the same method while overriding is used to provide a specific implementation of a method in a subclass.

  • Overloading is achieved within the same c...read more

Add your answer
right arrow

Q32. what is topology

Ans.

Topology is the study of the properties and characteristics of geometric objects that are unchanged by continuous transformations.

  • Topology studies the properties of objects that remain the same under continuous transformations.

  • It focuses on the concepts of continuity, connectivity, and proximity.

  • Examples of topological objects include points, lines, curves, surfaces, and higher-dimensional spaces.

  • Topology is used in various fields such as mathematics, computer science, physic...read more

Add your answer
right arrow
Q33. Can you draw an E-R Diagram for Uber?
Ans.

An E-R Diagram for Uber would include entities like User, Driver, Ride, Payment, and Location.

  • Entities: User, Driver, Ride, Payment, Location

  • Relationships: User requests Ride, Driver provides Ride, Payment for Ride

  • Attributes: User ID, Driver ID, Ride ID, Payment ID, Location ID

  • Example: User (1) requests Ride (A) from Location (X) to Location (Y) with Driver (Z) providing the Ride and Payment (123) made for the Ride.

Add your answer
right arrow

Q34. What are 1099 forms and types and how much work I have done on them.

Ans.

1099 forms are tax forms used to report income received from sources other than an employer.

  • There are several types of 1099 forms, including 1099-MISC, 1099-INT, and 1099-DIV.

  • 1099-MISC is used to report income earned as an independent contractor or freelancer.

  • 1099-INT is used to report interest income earned from bank accounts or investments.

  • 1099-DIV is used to report dividend income earned from investments.

  • As a tax consultant, I have worked extensively with 1099 forms, ensur...read more

Add your answer
right arrow

Q35. How tax is calculated and details of gross distribution and cost basis

Ans.

Tax is calculated based on gross distribution and cost basis. Gross distribution is the total amount received and cost basis is the original investment.

  • Tax is calculated based on the difference between gross distribution and cost basis

  • Gross distribution is the total amount received from an investment, including dividends and capital gains

  • Cost basis is the original investment amount, including any fees or commissions

  • Tax is calculated on the net gain, which is the difference be...read more

Add your answer
right arrow

Q36. Difference between WMI filtering & Security filtering, How AD replication works, ports number of AD replication, how to troubleshoot AD replication.

Ans.

WMI filtering is used to apply Group Policy based on system attributes, while Security filtering is used to apply Group Policy based on user or group membership.

  • WMI filtering applies Group Policy based on system attributes like OS version, RAM, etc.

  • Security filtering applies Group Policy based on user or group membership.

  • AD replication works by transferring changes from one domain controller to another.

  • AD replication uses ports 389 (LDAP), 636 (LDAPS), 3268 (Global Catalog), ...read more

Add your answer
right arrow

Q37. Tell me the difference between Drop, Delete and Truncate in DBMS.

Ans.

Drop deletes the table structure and data, Delete removes specific rows, Truncate removes all rows but keeps the table structure.

  • Drop removes the table structure along with all the data in the table.

  • Delete removes specific rows based on a condition using the WHERE clause.

  • Truncate removes all rows from a table but keeps the table structure intact.

  • Example: DROP TABLE table_name; DELETE FROM table_name WHERE condition; TRUNCATE TABLE table_name;

Add your answer
right arrow

Q38. WAP for reverse string. array vs arraylist. map and hashmap. what are the explicit wait expected conditions. how to perform mouse over on webelement.

Ans.

This question covers topics like reversing a string, array vs ArrayList, map and HashMap, explicit wait expected conditions, and performing mouse over on a WebElement.

  • To reverse a string, you can use the StringBuilder class and its reverse() method.

  • An array is a fixed-size data structure, while an ArrayList is a dynamic-size data structure.

  • Map is an interface that represents a mapping between a key and a value, while HashMap is an implementation of the Map interface.

  • Explicit ...read more

Add your answer
right arrow

Q39. What do you know about Hexaware

Ans.

Hexaware is a global IT services company providing automation, cloud, and digital solutions.

  • Hexaware was founded in 1990 and is headquartered in Mumbai, India.

  • They offer services in areas such as application transformation, infrastructure management, and business process services.

  • Hexaware has a strong focus on automation and digital technologies to help clients improve efficiency and innovation.

  • The company has a global presence with offices in multiple countries including the...read more

Add your answer
right arrow

Q40. What is SCCM ?

Ans.

SCCM stands for System Center Configuration Manager. It is a software management tool used for deploying, managing and monitoring software and devices in an enterprise environment.

  • SCCM is used for automating software deployment and updates across a network

  • It can manage devices running on different operating systems such as Windows, macOS, and Linux

  • SCCM provides inventory management, software metering, and reporting capabilities

  • It can also be used for patch management and secu...read more

View 2 more answers
right arrow

Q41. What is investment banking and corporate actions

Ans.

Investment banking involves providing financial services to corporations and governments, while corporate actions refer to events that affect a company's stock price.

  • Investment banking involves underwriting securities, providing financial advice, and facilitating mergers and acquisitions.

  • Corporate actions include stock splits, dividends, and mergers and acquisitions.

  • Investment bankers work with corporations and governments to raise capital through the issuance of stocks and b...read more

Add your answer
right arrow

Q42. Difference between Application and package

Ans.

Application is a software program designed to perform a specific task, while a package is a collection of software components.

  • An application is a standalone program that can be installed and run on a computer or mobile device.

  • A package is a collection of software components that are bundled together for easy installation and management.

  • Applications are designed to perform specific tasks, such as word processing, gaming, or browsing the internet.

  • Packages can include multiple a...read more

View 1 answer
right arrow

Q43. What is HEAD type of method in REST API Integration

Ans.

HEAD method in REST API Integration is used to retrieve the headers of a resource without fetching the body.

  • HEAD requests are similar to GET requests but only return the headers of the resource, not the body.

  • This can be useful for checking the status of a resource or determining its size without downloading the entire content.

  • For example, a HEAD request to a website URL will return the headers like content type, content length, etc. without downloading the webpage.

Add your answer
right arrow

Q44. reverse a string

Ans.

To reverse a string, iterate through the string from the end and append each character to a new string.

  • Create an empty string to store the reversed string

  • Iterate through the original string from the end using a loop

  • Append each character to the new string

  • Return the new string as the reversed string

View 1 answer
right arrow

Q45. Why string is immutable Explain Pom Difference between implicit and explicit wait

Ans.

Strings are immutable in Java because they are stored in the String pool and any modification creates a new string object.

  • String objects are stored in the String pool to save memory

  • Any modification to a string creates a new string object

  • Example: String str = "hello"; str.concat("world"); will create a new string object with "helloworld"

Add your answer
right arrow

Q46. Speak On a Topic For 2 min

Ans.

I will speak on the importance of emotional intelligence in leadership.

  • Emotional intelligence is crucial for effective leadership as it helps in understanding and managing emotions in oneself and others.

  • Leaders with high emotional intelligence are better at building relationships, resolving conflicts, and inspiring their teams.

  • Examples of emotional intelligence in leadership include active listening, empathy, and self-awareness.

  • Emotional intelligence can also lead to better d...read more

Add your answer
right arrow

Q47. STP loop prevention how its working

Ans.

STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.

  • STP (Spanning Tree Protocol) identifies redundant paths in a network

  • STP selects a root bridge to be the central point of the network

  • STP blocks certain ports to prevent loops while still allowing for redundancy

  • If a link fails, STP will unblock a previously blocked port to maintain connectivity

Add your answer
right arrow

Q48. Query to fetch 5th highest salary

Ans.

Use SQL query with ORDER BY and LIMIT to fetch 5th highest salary.

  • Use ORDER BY clause to sort salaries in descending order

  • Use LIMIT 1 OFFSET 4 to fetch the 5th highest salary

Add your answer
right arrow

Q49. What is capital market?

Ans.

Capital market is a financial market where long-term securities like stocks, bonds, and other financial instruments are traded.

  • Capital market is a platform for companies to raise long-term funds from investors.

  • It includes both primary and secondary markets.

  • Investors can buy and sell securities like stocks, bonds, and debentures in the capital market.

  • The capital market is regulated by the Securities and Exchange Board of India (SEBI) in India.

  • Examples of capital markets includ...read more

Add your answer
right arrow

Q50. Why choose Hexaware

Ans.

Hexaware offers a collaborative work environment, cutting-edge technologies, and opportunities for growth and learning.

  • Hexaware provides a collaborative work environment where developers can work together to solve complex problems.

  • The company uses cutting-edge technologies and tools, allowing developers to stay up-to-date with the latest trends in software development.

  • Hexaware offers opportunities for growth and learning through training programs, certifications, and mentorsh...read more

Add your answer
right arrow

Q51. What is money market?

Ans.

Money market refers to a segment of the financial market where short-term borrowing and lending of funds take place.

  • Money market deals with short-term debt instruments such as treasury bills, commercial papers, certificates of deposit, etc.

  • It is used by governments, corporations, and financial institutions to manage their short-term cash needs.

  • Money market instruments are considered to be low-risk and low-return investments.

  • The interest rates in the money market are determine...read more

Add your answer
right arrow

Q52. Common validation in etl testing

Ans.

Common validation techniques in ETL testing include data completeness, data accuracy, data transformation, and data quality checks.

  • Data completeness validation ensures that all expected data is loaded into the target system.

  • Data accuracy validation involves verifying that the data is correctly transformed and loaded without any errors.

  • Data transformation validation checks if the data is transformed according to the business rules and requirements.

  • Data quality checks involve v...read more

Add your answer
right arrow

Q53. Write Java program for Fibonacci series

Ans.

Java program to generate Fibonacci series

  • Use a loop to generate Fibonacci numbers

  • Start with 0 and 1 as the first two numbers

  • Add the previous two numbers to get the next number

Add your answer
right arrow

Q54. What is pointers Oops concepts Maltitherding

Ans.

Pointers are variables that store the memory address of another variable. Oops concepts are programming principles. Maltitherding is not a known term.

  • Pointers allow for dynamic memory allocation and manipulation.

  • They are commonly used in C and C++ programming languages.

  • Example: int *ptr; // declares a pointer to an integer variable

  • Oops concepts include inheritance, polymorphism, and encapsulation.

  • They are used in object-oriented programming.

  • Example: class Animal { virtual voi...read more

Add your answer
right arrow

Q55. Which food you like

Ans.

I enjoy a variety of cuisines, but my favorite food is sushi.

  • I love the freshness and flavors of sushi

  • I enjoy trying different types of sushi rolls and sashimi

  • Some of my favorite sushi restaurants include Nobu and Sushi Nakazawa

Add your answer
right arrow

Q56. Level wise concepts of Java

Ans.

Java has three levels of concepts: syntax, API, and JVM.

  • Syntax: basic building blocks of Java programming language

  • API: pre-built libraries and classes for developers to use

  • JVM: virtual machine that executes Java code

  • Example: syntax includes variables, loops, and conditionals

  • Example: API includes classes like String and ArrayList

  • Example: JVM is responsible for memory management and garbage collection

Add your answer
right arrow

Q57. Write a code for bubble sort.

Ans.

Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.

  • Compare adjacent elements and swap them if they are in the wrong order

  • Repeat this process until the list is sorted

  • Time complexity is O(n^2)

  • Example: [5, 3, 8, 4, 2] -> [3, 5, 8, 4, 2] -> [3, 5, 4, 8, 2] -> [3, 5, 4, 2, 8] -> [3, 4, 5, 2, 8] -> [3, 4, 2, 5, 8] -> [3, 4, 2, 5, 8] -> [3, 2, 4, 5, 8] -> [2, 3, 4, 5, 8]

Add your answer
right arrow

Q58. JWT TOKEN Explanation on security

Ans.

JWT token is a secure way to transmit information between parties as a JSON object.

  • JWT stands for JSON Web Token

  • It is a compact, URL-safe means of representing claims to be transferred between two parties

  • It consists of three parts: header, payload, and signature

  • The header contains the type of token and the signing algorithm used

  • The payload contains the claims or statements about the user and additional data

  • The signature is used to verify the integrity of the token

  • JWT tokens a...read more

Add your answer
right arrow

Q59. What is SQL joints

Ans.

SQL joins are used to combine data from two or more tables based on a related column.

  • Joins are used to retrieve data from multiple tables in a single query

  • There are different types of joins such as inner join, left join, right join, and full outer join

  • Joins are performed based on a related column between the tables

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column

Add your answer
right arrow

Q60. Recently found vulnerability

Ans.

A recently found vulnerability in a system

  • The vulnerability was discovered during a security audit

  • It allows unauthorized access to sensitive data

  • The vulnerability can be exploited remotely

  • A patch or fix should be implemented immediately

Add your answer
right arrow

Q61. Open to relocate

Ans.

Yes, I am open to relocate for the right opportunity.

  • I am willing to relocate for the right job opportunity

  • I am open to exploring new locations and experiences

  • I understand that relocation may be necessary for career growth

Add your answer
right arrow

Q62. Implement Bubble sort

Ans.

Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order.

  • Compare adjacent elements and swap if necessary

  • Repeat until no more swaps are needed

  • Time complexity of O(n^2)

  • Example: ['banana', 'apple', 'cherry', 'date']

Add your answer
right arrow

Q63. Brief oops concept

Ans.

Object-oriented programming (OOP) is a programming paradigm that uses objects to represent and manipulate data.

  • OOP is based on the concept of classes and objects.

  • It provides encapsulation, inheritance, and polymorphism as key features.

  • Encapsulation hides the internal details of an object and provides a public interface.

  • Inheritance allows classes to inherit properties and methods from other classes.

  • Polymorphism allows objects of different classes to be treated as objects of a ...read more

Add your answer
right arrow
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Hexaware Technologies for Freshers

based on 64 interviews
Interview experience
4.1
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Cisco Logo
4.1
 • 299 Interview Questions
Morgan Stanley Logo
3.7
 • 262 Interview Questions
PayPal Logo
3.9
 • 177 Interview Questions
Tata Elxsi Logo
3.8
 • 157 Interview Questions
HARMAN Logo
3.7
 • 134 Interview Questions
View all
Recently Viewed
INTERVIEWS
Zydus Lifesciences
Fresher
40 top interview questions
SALARIES
Zydus Lifesciences
SALARIES
Zydus Lifesciences
INTERVIEWS
Optum Global Solutions
200 top interview questions
INTERVIEWS
Zydus Lifesciences
No Interviews
INTERVIEWS
Hexaware Technologies
300 top interview questions
INTERVIEWS
Eicher Motors
No Interviews
REVIEWS
Optum Global Solutions
No Reviews
INTERVIEWS
Tata Motors
No Interviews
INTERVIEWS
Zydus Lifesciences
200 top interview questions
Top Hexaware Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter