
Hexaware Technologies

60+ Hexaware Technologies Interview Questions and Answers for Freshers
Q1. What is the difference b/w complie time and run time polymorphism?
Compile time polymorphism is resolved at compile time, while run time polymorphism is resolved at run time.
Compile time polymorphism is achieved through function overloading and operator overloading.
Run time polymorphism is achieved through function overriding and virtual functions.
Compile time polymorphism is faster as the resolution is done at compile time.
Run time polymorphism allows dynamic binding of functions based on the object type at run time.
Compile time polymorphis...read more
Q2. Intersection of Two Arrays II
Given two integer arrays ARR1
and ARR2
of size N
and M
respectively, find the intersection of these arrays. An intersection refers to elements that appear in both arrays.
Note:
Inp...read more
Find the intersection of two integer arrays in the order they appear in the first array.
Iterate through the first array and store elements in a hashmap with their frequencies.
Iterate through the second array and check if the element exists in the hashmap, decrement frequency if found.
Return the elements that have non-zero frequencies as the intersection.
Q3. What is Software Development Lifecycle ?
Software Development Lifecycle is a process followed by software development teams to design, develop and maintain software.
It includes phases like planning, analysis, design, implementation, testing, deployment, and maintenance.
Each phase has its own set of activities and deliverables.
It helps in ensuring that the software is developed efficiently and meets the requirements of the stakeholders.
Examples of SDLC models are Waterfall, Agile, and DevOps.
Q4. Intro What is oops Encapsulation Polymorphism Runtime, compile time Dbms Sql vs no sql
Questions related to programming concepts and database management systems.
OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects.
Encapsulation is the process of hiding the implementation details of an object from the outside world.
Polymorphism is the ability of an object to take on many forms.
Runtime and compile time are two phases of program execution.
DBMS stands for Database Management System which is a software system us...read more
Q5. You have knowledge of data structure? Tell me about it
Data structures are a way to organize and store data efficiently.
Data structures are used to store and manipulate data in a structured manner.
They provide different ways to access and perform operations on the data.
Examples include arrays, linked lists, stacks, queues, trees, and graphs.
Q6. Difference between DELETE and TRUNCATE ?
DELETE removes specific rows from a table while TRUNCATE removes all rows and resets the table.
DELETE is a DML command while TRUNCATE is a DDL command.
DELETE can be rolled back while TRUNCATE cannot be rolled back.
DELETE is slower than TRUNCATE as it logs each row deletion while TRUNCATE does not.
DELETE can have WHERE clause while TRUNCATE cannot have WHERE clause.
DELETE does not reset the identity of the table while TRUNCATE resets the identity of the table.
Q7. Diff b/w call by value and call by reference?
Call by value passes a copy of the value, while call by reference passes the memory address of the value.
Call by value creates a new copy of the value being passed.
Call by reference passes the memory address of the value being passed.
Changes made to the parameter in call by value do not affect the original value.
Changes made to the parameter in call by reference affect the original value.
Q8. Difference between Union and Union ALL ?
Union combines and removes duplicates from two or more tables, while Union ALL combines all rows from two or more tables.
Union removes duplicates, Union ALL does not
Union requires the same number of columns in each table, Union ALL does not
Union is slower than Union ALL
Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2
Example: SELECT column1 FROM table1 UNION ALL SELECT column1 FROM table2
Q9. Write Bubble sort Program ?
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Compare adjacent elements and swap them if they are in the wrong order
Repeat this process until the list is sorted
Time complexity is O(n^2)
Example: [5, 3, 8, 4, 2] -> [3, 5, 8, 4, 2] -> [3, 5, 4, 8, 2] -> [3, 5, 4, 2, 8] -> [3, 4, 5, 2, 8] -> [3, 4, 2, 5, 8] -> [3, 4, 2, 5, 8] -> [3, 2, 4, 5, 8] -> [2, 3, 4, 5, 8]
Q10. What is inheritance, what is encapsulation, what is data hiding
Inheritance is a way to create new classes based on existing classes. Encapsulation is the practice of hiding data and methods within a class. Data hiding is the act of making data private to prevent direct access.
Inheritance allows for code reuse and promotes a hierarchical structure of classes.
Encapsulation helps to prevent accidental modification of data and promotes modular code.
Data hiding is achieved through access modifiers such as private and protected.
Example: A Car ...read more
Questions related to teamwork, problem-solving, adaptability, and communication skills can help determine if you fit into our company culture.
How do you handle working in a team environment?
Can you provide an example of a time when you had to solve a complex problem?
How do you adapt to changes in a fast-paced work environment?
Describe a situation where effective communication was crucial in a project.
Q12. Graph Coloring Problem
You are given a graph with 'N' vertices numbered from '1' to 'N' and 'M' edges. Your task is to color this graph using two colors, such as blue and red, in a way that no two adjacent vert...read more
Graph coloring problem where vertices need to be colored with two colors such that no adjacent vertices share the same color.
Check if the graph can be colored using two colors without any adjacent vertices sharing the same color.
Use graph coloring algorithms like Greedy Coloring or Backtracking to solve the problem.
If there are odd-length cycles in the graph, it is not possible to color the graph with two colors.
If the graph is bipartite, it is always possible to color it wit...read more
Q13. Ninja Competition Problem Statement
Ninja is organizing a coding competition where two teams compete at a time. To keep it fair and interesting, both teams must have an equal number of members. Ninja’s task is ...read more
Given an integer N, determine if two teams with equal members can be formed based on the divisors of N.
Iterate through all divisors of N and assign members to two teams based on whether the divisor is even or odd.
Keep track of the number of members in each team and check if they are equal at the end.
Return true if the number of members in both teams is equal, false otherwise.
Q14. Rat in a Maze: All Paths Problem
You are provided with an N * N
maze where a rat is positioned at starting cell MAZE[0][0]
. The goal is to determine and print all possible paths that the rat can take to reach i...read more
Find all possible paths for a rat in a maze from start to finish.
Use backtracking to explore all possible paths in the maze.
At each cell, check if it is a valid move and mark it as part of the path.
Explore all four directions (up, down, left, right) recursively.
When reaching the destination cell, add the path to the result.
Return all valid paths found in the maze.
Q15. What type of Data base avilable
There are various types of databases available such as relational, NoSQL, graph, and document-oriented databases.
Relational databases use tables to store data and have a predefined schema.
NoSQL databases are non-relational and can handle unstructured data.
Graph databases are used to store and manage relationships between data.
Document-oriented databases store data in documents, usually in JSON format.
Examples include MySQL, MongoDB, Neo4j, and Cassandra.
Design a software solution to automatically inform truck owners about servicing dates.
Create a database to store truck owner information and servicing dates.
Develop a notification system to send reminders to truck owners before their servicing dates.
Allow truck owners to set preferred communication channels for reminders.
Include a feature for truck owners to reschedule servicing dates if needed.
Q17. Kth Largest Element Problem
Given an array containing N
distinct positive integers and a number K
, determine the Kth largest element in the array.
Example:
Input:
N = 6, K = 3, array = [2, 1, 5, 6, 3, 8]
Output...read more
Find the Kth largest element in an array of distinct positive integers.
Sort the array in non-increasing order and return the Kth element.
Handle multiple test cases efficiently.
Ensure all elements in the array are distinct.
Q18. Maximum Sum Path from Leaf to Root
Given a binary tree with 'N' nodes, identify the path from a leaf node to the root node that has the maximum sum among all root-to-leaf paths.
Example:
All the possible root t...read more
Find the path from a leaf node to the root node with the maximum sum in a binary tree.
Traverse the binary tree from leaf nodes to the root while keeping track of the sum of each path.
Compare the sums of all paths and return the path with the maximum sum.
Use recursion to traverse the tree efficiently.
Consider edge cases such as when the tree is empty or has only one node.
Q19. Fishmonger Toll Optimization Problem
A fishmonger needs to transport goods from a port to a market, crossing multiple states each requiring a toll. The goal is to minimize the toll costs while ensuring the jour...read more
The Fishmonger Toll Optimization Problem involves minimizing toll costs while ensuring timely delivery of goods from a port to a market.
Given 'N' states and a time limit 'M', find the smallest toll amount to reach the market from the port within the given time.
Use dynamic programming to solve the problem efficiently.
Consider the time and toll matrices to calculate the minimum toll cost.
Return -1 if it is not possible to reach the market within the given time limit.
BJTs are three-terminal semiconductor devices used for amplification and switching of electronic signals.
BJTs have three regions - emitter, base, and collector.
They can be NPN or PNP type, depending on the arrangement of semiconductor materials.
BJTs are current-controlled devices, where a small current at the base terminal controls a much larger current between the collector and emitter.
Common BJT examples include 2N2222 (NPN) and BC557 (PNP).
Q21. Add Two Numbers Represented as Linked Lists
Given two linked lists representing two non-negative integers, where the digits are stored in reverse order (i.e., starting from the least significant digit to the mo...read more
Add two numbers represented as linked lists and return the sum as a linked list.
Traverse both linked lists simultaneously while keeping track of carry from previous sum
Create a new linked list to store the sum digits
Handle cases where one list is longer than the other by adding remaining digits with carry
Remember to handle the case where there is a carry after adding all digits
Q22. Shape and Method Overriding Problem Statement
Create a base class called Shape
that contains a field named shapeType
and a method printMyType
.
Implement two derived classes:
- Square: This class inherits from
Sh...read more
Create base class Shape with field shapeType and method printMyType. Implement Square and Rectangle classes with calculateArea method.
Create a base class Shape with shapeType field and printMyType method.
Implement Square and Rectangle classes inheriting from Shape.
Include additional fields like length and breadth in Square and Rectangle classes.
Override printMyType method in Square and Rectangle classes to output the type of object.
Implement calculateArea method in Square and...read more
Stacks are data structures that follow the Last In First Out (LIFO) principle, while Graphs are data structures that consist of nodes and edges to represent relationships.
Stacks are used for implementing functions, backtracking, and expression evaluation.
Graphs are used for representing networks, social connections, and shortest path algorithms.
Stacks can be implemented using arrays or linked lists.
Graphs can be directed or undirected, weighted or unweighted.
Examples of stack...read more
Q24. Joins in Oracle SQL
Joins in Oracle SQL are used to combine rows from two or more tables based on a related column between them.
Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Use ON keyword to specify the join condition.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
Q25. What is topology and its type
Topology is the study of geometric properties and spatial relations unaffected by the continuous change of shape or size.
Topology is concerned with the properties of space that are preserved under continuous transformations, such as stretching or bending.
It is used in mathematics, physics, computer science, and engineering.
Types of topology include point-set topology, algebraic topology, and differential topology.
Examples of topological properties include connectedness, compa...read more
Q26. explain the constructor and its types of it.
A constructor is a special method used to initialize objects in a class. It can have different types based on parameters.
A constructor has the same name as the class it belongs to.
It is automatically called when an object is created.
Constructors can be parameterized or non-parameterized.
Parameterized constructors accept arguments to initialize object properties.
Non-parameterized constructors have no arguments and provide default values.
Constructors can be overloaded, allowing...read more
Q27. 1. Explain Types of network
Types of network include LAN, WAN, MAN, WLAN, PAN, SAN, CAN, and VPN.
LAN (Local Area Network) is a network that covers a small area such as a home, office, or building.
WAN (Wide Area Network) is a network that covers a large geographical area such as a city, country, or even the world.
MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, typically a city or town.
WLAN (Wireless Local Area Network) is a LAN that uses wireless ...read more
Yes, I can write an essay on any topic and present it verbally.
Choose a topic that interests you and research it thoroughly
Create an outline with an introduction, body paragraphs, and a conclusion
Use clear and concise language to convey your ideas
Practice presenting your essay verbally to improve your delivery
Engage your audience by maintaining eye contact and using gestures
Be prepared to answer questions or discuss your essay further
Q29. what is Java language?
Java is a popular object-oriented programming language known for its platform independence and extensive libraries.
Java is designed to be simple, secure, and portable.
It is used for developing a wide range of applications, from desktop to mobile and web.
Java programs are compiled into bytecode, which can run on any Java Virtual Machine (JVM).
It supports multithreading, exception handling, and automatic memory management.
Java has a vast ecosystem of libraries and frameworks, s...read more
ACID properties are a set of properties that guarantee the reliability of transactions in database management systems.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the execution of multiple transactions concurrently does not interfere ...read more
Q31. Difference between overloading and overriding
Overloading is having multiple methods with the same name but different parameters. Overriding is having a method in a subclass with the same name and parameters as a method in the superclass.
Overloading is a compile-time polymorphism while overriding is a runtime polymorphism.
Overloading is used to provide different ways of calling the same method while overriding is used to provide a specific implementation of a method in a subclass.
Overloading is achieved within the same c...read more
Q32. what is topology
Topology is the study of the properties and characteristics of geometric objects that are unchanged by continuous transformations.
Topology studies the properties of objects that remain the same under continuous transformations.
It focuses on the concepts of continuity, connectivity, and proximity.
Examples of topological objects include points, lines, curves, surfaces, and higher-dimensional spaces.
Topology is used in various fields such as mathematics, computer science, physic...read more
An E-R Diagram for Uber would include entities like User, Driver, Ride, Payment, and Location.
Entities: User, Driver, Ride, Payment, Location
Relationships: User requests Ride, Driver provides Ride, Payment for Ride
Attributes: User ID, Driver ID, Ride ID, Payment ID, Location ID
Example: User (1) requests Ride (A) from Location (X) to Location (Y) with Driver (Z) providing the Ride and Payment (123) made for the Ride.
Q34. What are 1099 forms and types and how much work I have done on them.
1099 forms are tax forms used to report income received from sources other than an employer.
There are several types of 1099 forms, including 1099-MISC, 1099-INT, and 1099-DIV.
1099-MISC is used to report income earned as an independent contractor or freelancer.
1099-INT is used to report interest income earned from bank accounts or investments.
1099-DIV is used to report dividend income earned from investments.
As a tax consultant, I have worked extensively with 1099 forms, ensur...read more
Q35. How tax is calculated and details of gross distribution and cost basis
Tax is calculated based on gross distribution and cost basis. Gross distribution is the total amount received and cost basis is the original investment.
Tax is calculated based on the difference between gross distribution and cost basis
Gross distribution is the total amount received from an investment, including dividends and capital gains
Cost basis is the original investment amount, including any fees or commissions
Tax is calculated on the net gain, which is the difference be...read more
Q36. Difference between WMI filtering & Security filtering, How AD replication works, ports number of AD replication, how to troubleshoot AD replication.
WMI filtering is used to apply Group Policy based on system attributes, while Security filtering is used to apply Group Policy based on user or group membership.
WMI filtering applies Group Policy based on system attributes like OS version, RAM, etc.
Security filtering applies Group Policy based on user or group membership.
AD replication works by transferring changes from one domain controller to another.
AD replication uses ports 389 (LDAP), 636 (LDAPS), 3268 (Global Catalog), ...read more
Q37. Tell me the difference between Drop, Delete and Truncate in DBMS.
Drop deletes the table structure and data, Delete removes specific rows, Truncate removes all rows but keeps the table structure.
Drop removes the table structure along with all the data in the table.
Delete removes specific rows based on a condition using the WHERE clause.
Truncate removes all rows from a table but keeps the table structure intact.
Example: DROP TABLE table_name; DELETE FROM table_name WHERE condition; TRUNCATE TABLE table_name;
Q38. WAP for reverse string. array vs arraylist. map and hashmap. what are the explicit wait expected conditions. how to perform mouse over on webelement.
This question covers topics like reversing a string, array vs ArrayList, map and HashMap, explicit wait expected conditions, and performing mouse over on a WebElement.
To reverse a string, you can use the StringBuilder class and its reverse() method.
An array is a fixed-size data structure, while an ArrayList is a dynamic-size data structure.
Map is an interface that represents a mapping between a key and a value, while HashMap is an implementation of the Map interface.
Explicit ...read more
Q39. What do you know about Hexaware
Hexaware is a global IT services company providing automation, cloud, and digital solutions.
Hexaware was founded in 1990 and is headquartered in Mumbai, India.
They offer services in areas such as application transformation, infrastructure management, and business process services.
Hexaware has a strong focus on automation and digital technologies to help clients improve efficiency and innovation.
The company has a global presence with offices in multiple countries including the...read more
Q40. What is SCCM ?
SCCM stands for System Center Configuration Manager. It is a software management tool used for deploying, managing and monitoring software and devices in an enterprise environment.
SCCM is used for automating software deployment and updates across a network
It can manage devices running on different operating systems such as Windows, macOS, and Linux
SCCM provides inventory management, software metering, and reporting capabilities
It can also be used for patch management and secu...read more
Q41. What is investment banking and corporate actions
Investment banking involves providing financial services to corporations and governments, while corporate actions refer to events that affect a company's stock price.
Investment banking involves underwriting securities, providing financial advice, and facilitating mergers and acquisitions.
Corporate actions include stock splits, dividends, and mergers and acquisitions.
Investment bankers work with corporations and governments to raise capital through the issuance of stocks and b...read more
Q42. Difference between Application and package
Application is a software program designed to perform a specific task, while a package is a collection of software components.
An application is a standalone program that can be installed and run on a computer or mobile device.
A package is a collection of software components that are bundled together for easy installation and management.
Applications are designed to perform specific tasks, such as word processing, gaming, or browsing the internet.
Packages can include multiple a...read more
Q43. What is HEAD type of method in REST API Integration
HEAD method in REST API Integration is used to retrieve the headers of a resource without fetching the body.
HEAD requests are similar to GET requests but only return the headers of the resource, not the body.
This can be useful for checking the status of a resource or determining its size without downloading the entire content.
For example, a HEAD request to a website URL will return the headers like content type, content length, etc. without downloading the webpage.
Q44. reverse a string
To reverse a string, iterate through the string from the end and append each character to a new string.
Create an empty string to store the reversed string
Iterate through the original string from the end using a loop
Append each character to the new string
Return the new string as the reversed string
Q45. Why string is immutable Explain Pom Difference between implicit and explicit wait
Strings are immutable in Java because they are stored in the String pool and any modification creates a new string object.
String objects are stored in the String pool to save memory
Any modification to a string creates a new string object
Example: String str = "hello"; str.concat("world"); will create a new string object with "helloworld"
Q46. Speak On a Topic For 2 min
I will speak on the importance of emotional intelligence in leadership.
Emotional intelligence is crucial for effective leadership as it helps in understanding and managing emotions in oneself and others.
Leaders with high emotional intelligence are better at building relationships, resolving conflicts, and inspiring their teams.
Examples of emotional intelligence in leadership include active listening, empathy, and self-awareness.
Emotional intelligence can also lead to better d...read more
Q47. STP loop prevention how its working
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
Q48. Query to fetch 5th highest salary
Use SQL query with ORDER BY and LIMIT to fetch 5th highest salary.
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 1 OFFSET 4 to fetch the 5th highest salary
Q49. What is capital market?
Capital market is a financial market where long-term securities like stocks, bonds, and other financial instruments are traded.
Capital market is a platform for companies to raise long-term funds from investors.
It includes both primary and secondary markets.
Investors can buy and sell securities like stocks, bonds, and debentures in the capital market.
The capital market is regulated by the Securities and Exchange Board of India (SEBI) in India.
Examples of capital markets includ...read more
Q50. Why choose Hexaware
Hexaware offers a collaborative work environment, cutting-edge technologies, and opportunities for growth and learning.
Hexaware provides a collaborative work environment where developers can work together to solve complex problems.
The company uses cutting-edge technologies and tools, allowing developers to stay up-to-date with the latest trends in software development.
Hexaware offers opportunities for growth and learning through training programs, certifications, and mentorsh...read more
Q51. What is money market?
Money market refers to a segment of the financial market where short-term borrowing and lending of funds take place.
Money market deals with short-term debt instruments such as treasury bills, commercial papers, certificates of deposit, etc.
It is used by governments, corporations, and financial institutions to manage their short-term cash needs.
Money market instruments are considered to be low-risk and low-return investments.
The interest rates in the money market are determine...read more
Q52. Common validation in etl testing
Common validation techniques in ETL testing include data completeness, data accuracy, data transformation, and data quality checks.
Data completeness validation ensures that all expected data is loaded into the target system.
Data accuracy validation involves verifying that the data is correctly transformed and loaded without any errors.
Data transformation validation checks if the data is transformed according to the business rules and requirements.
Data quality checks involve v...read more
Q53. Write Java program for Fibonacci series
Java program to generate Fibonacci series
Use a loop to generate Fibonacci numbers
Start with 0 and 1 as the first two numbers
Add the previous two numbers to get the next number
Q54. What is pointers Oops concepts Maltitherding
Pointers are variables that store the memory address of another variable. Oops concepts are programming principles. Maltitherding is not a known term.
Pointers allow for dynamic memory allocation and manipulation.
They are commonly used in C and C++ programming languages.
Example: int *ptr; // declares a pointer to an integer variable
Oops concepts include inheritance, polymorphism, and encapsulation.
They are used in object-oriented programming.
Example: class Animal { virtual voi...read more
Q55. Which food you like
I enjoy a variety of cuisines, but my favorite food is sushi.
I love the freshness and flavors of sushi
I enjoy trying different types of sushi rolls and sashimi
Some of my favorite sushi restaurants include Nobu and Sushi Nakazawa
Q56. Level wise concepts of Java
Java has three levels of concepts: syntax, API, and JVM.
Syntax: basic building blocks of Java programming language
API: pre-built libraries and classes for developers to use
JVM: virtual machine that executes Java code
Example: syntax includes variables, loops, and conditionals
Example: API includes classes like String and ArrayList
Example: JVM is responsible for memory management and garbage collection
Q57. Write a code for bubble sort.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Compare adjacent elements and swap them if they are in the wrong order
Repeat this process until the list is sorted
Time complexity is O(n^2)
Example: [5, 3, 8, 4, 2] -> [3, 5, 8, 4, 2] -> [3, 5, 4, 8, 2] -> [3, 5, 4, 2, 8] -> [3, 4, 5, 2, 8] -> [3, 4, 2, 5, 8] -> [3, 4, 2, 5, 8] -> [3, 2, 4, 5, 8] -> [2, 3, 4, 5, 8]
Q58. JWT TOKEN Explanation on security
JWT token is a secure way to transmit information between parties as a JSON object.
JWT stands for JSON Web Token
It is a compact, URL-safe means of representing claims to be transferred between two parties
It consists of three parts: header, payload, and signature
The header contains the type of token and the signing algorithm used
The payload contains the claims or statements about the user and additional data
The signature is used to verify the integrity of the token
JWT tokens a...read more
Q59. What is SQL joints
SQL joins are used to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query
There are different types of joins such as inner join, left join, right join, and full outer join
Joins are performed based on a related column between the tables
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q60. Recently found vulnerability
A recently found vulnerability in a system
The vulnerability was discovered during a security audit
It allows unauthorized access to sensitive data
The vulnerability can be exploited remotely
A patch or fix should be implemented immediately
Q61. Open to relocate
Yes, I am open to relocate for the right opportunity.
I am willing to relocate for the right job opportunity
I am open to exploring new locations and experiences
I understand that relocation may be necessary for career growth
Q62. Implement Bubble sort
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order.
Compare adjacent elements and swap if necessary
Repeat until no more swaps are needed
Time complexity of O(n^2)
Example: ['banana', 'apple', 'cherry', 'date']
Q63. Brief oops concept
Object-oriented programming (OOP) is a programming paradigm that uses objects to represent and manipulate data.
OOP is based on the concept of classes and objects.
It provides encapsulation, inheritance, and polymorphism as key features.
Encapsulation hides the internal details of an object and provides a public interface.
Inheritance allows classes to inherit properties and methods from other classes.
Polymorphism allows objects of different classes to be treated as objects of a ...read more
Top HR Questions asked in Hexaware Technologies for Freshers
Interview Process at Hexaware Technologies for Freshers

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

