CoverPhoto
Hexaware Technologies logo
Premium Employer

Hexaware Technologies

Verified
3.5
based on 6k Reviews
Filter interviews by

300+ Hexaware Technologies Interview Questions and Answers

Updated 5 Mar 2025
Popular Designations

Q101. Sort the array without using predefined functions etc

Ans.

Sorting an array without using predefined functions

  • Implement a sorting algorithm like bubble sort, insertion sort, or selection sort

  • Loop through the array and compare adjacent elements to swap them if necessary

  • Repeat the loop until the array is sorted in ascending or descending order

Add your answer
right arrow

Q102. Reverse the string without using predefined functions

Ans.

Reverse a string without using predefined functions.

  • Iterate through the string from the end and append each character to a new string.

  • Use a loop to swap the first and last characters, then move towards the middle.

  • Convert the string to a list, reverse the list, then join the list back into a string.

Add your answer
right arrow
Hexaware Technologies Interview Questions and Answers for Freshers
illustration image

Q103. Solve using Little's Law and calculate Pacing for 200 users doing 20,000 TPH

Ans.

Little's Law can be used to calculate the pacing for a given number of users and transactions per hour.

  • Little's Law states that the average number of users in a system (L) is equal to the average arrival rate (λ) multiplied by the average time a user spends in the system (W). Mathematically, L = λW.

  • To calculate pacing, we need to rearrange the formula to solve for W: W = L / λ.

  • In this case, we have 200 users and 20,000 transactions per hour, so the arrival rate (λ) is 20,000 ...read more

Add your answer
right arrow

Q104. What is difference between spring MVC and spring Boot

Ans.

Spring MVC is a web framework while Spring Boot is an opinionated configuration of Spring.

  • Spring MVC requires manual configuration while Spring Boot provides auto-configuration.

  • Spring Boot includes an embedded server while Spring MVC requires a separate server.

  • Spring Boot simplifies dependency management while Spring MVC requires manual dependency management.

  • Spring Boot is ideal for microservices while Spring MVC is better suited for larger applications.

Add your answer
right arrow
Discover Hexaware Technologies interview dos and don'ts from real experiences

Q105. How do you get the sum of consecutive numbers in a table

Ans.

To get the sum of consecutive numbers in a table, you can use SQL queries with aggregate functions like SUM() and window functions like ROWS BETWEEN.

  • Use the SUM() function to calculate the sum of consecutive numbers in a column.

  • Use window functions like ROWS BETWEEN to define the range of consecutive numbers.

  • Combine the SUM() function with window functions to get the desired result.

  • Here's an example query: SELECT SUM(column_name) OVER (ORDER BY column_name ROWS BETWEEN 1 PREC...read more

Add your answer
right arrow

Q106. What does a scenario-based email assignment entail?

Ans.

A scenario-based email assignment tests a candidate's ability to craft effective communication for specific situations.

  • Identify the target audience: Understand who the email is intended for, e.g., customers, team members, or stakeholders.

  • Define the scenario: Clearly outline the context, such as a product launch, crisis management, or customer feedback.

  • Craft a clear subject line: Ensure it reflects the email's purpose, e.g., 'Exciting New Product Launch - Join Us!'

  • Use appropri...read more

Add your answer
right arrow
Are these interview questions helpful?

Q107. What are the Devops tools, you have experience on?

Ans.

I have experience with various DevOps tools including Jenkins, Docker, Ansible, and Terraform.

  • Jenkins

  • Docker

  • Ansible

  • Terraform

Add your answer
right arrow

Q108. How to manage the third party software patches using intune

Ans.

Manage third party software patches using Intune

  • Create a software update policy in Intune

  • Select 'Third Party Updates' as the update source

  • Choose the third party software you want to patch

  • Set the schedule for patch deployment

  • Monitor patch deployment status and compliance

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q109. What is JRE?

Ans.

JRE stands for Java Runtime Environment. It is a software package that provides the necessary runtime environment for Java applications.

  • JRE includes the Java Virtual Machine (JVM), class libraries, and other necessary components to run Java applications.

  • It is required to run Java applications on a computer.

  • JRE is available for different operating systems such as Windows, Linux, and macOS.

  • Examples of Java applications that require JRE include Eclipse, NetBeans, and Apache Tomc...read more

View 1 answer
right arrow

Q110. How can tables be imported and joined in Business Objects

Ans.

Tables can be imported and joined in Business Objects using the Universe Design Tool.

  • Create a universe in the Universe Design Tool

  • Import tables from different data sources

  • Define joins between the tables based on common fields

  • Use aliases to link tables with different names but similar data

  • Test the joins to ensure data integrity

Add your answer
right arrow

Q111. Write a program to find no of repeated characters in a string

Ans.

Program to find number of repeated characters in a string

  • Iterate through each character in the string

  • Use a hashmap to store the count of each character

  • Increment the count if character is already present in the hashmap

  • Return the count of characters with count greater than 1

Add your answer
right arrow

Q112. What does service configure does in .net core

Ans.

Service configure method in .NET Core is used to configure services for dependency injection.

  • Service configure method is used in the ConfigureServices method of the Startup class to register services with the dependency injection container.

  • It allows you to add services to the service collection using the IServiceCollection interface.

  • You can also configure services with specific options using extension methods like AddDbContext, AddMvc, AddControllersWithViews, etc.

Add your answer
right arrow

Q113. What is custom authorization in .net core

Ans.

Custom authorization in .NET Core allows developers to define their own logic for determining access to resources.

  • Custom authorization involves creating custom authorization policies in .NET Core.

  • Developers can define their own requirements and handlers for authorization.

  • Examples include checking user roles, permissions, or any other custom logic before granting access.

Add your answer
right arrow

Q114. Write a java program for add this number 6134 and total will be 14

Ans.

Java program to add numbers 6134 to get total 14.

  • Create an array of integers with the numbers to be added

  • Iterate through the array and add the numbers

  • Check if the total equals 14

Add your answer
right arrow

Q115. What is your comfortable programming language

Ans.

My comfortable programming language is Java.

  • Strong object-oriented programming skills

  • Experience with Java frameworks like Spring

  • Proficient in writing clean and efficient code

Add your answer
right arrow

Q116. What is derived tables in business objects

Ans.

Derived tables in Business Objects are tables created from the result of a query.

  • Derived tables are temporary tables created from the result of a query.

  • They can be used to simplify complex queries or to improve performance.

  • They are created on the fly and are not stored in the database.

  • They can be used in subsequent queries or reports.

  • Example: A derived table can be created to calculate the total sales for each region from a sales table.

Add your answer
right arrow

Q117. Can you explain about EMR andEC2 instance?

Ans.

EMR is a managed Hadoop framework for processing large amounts of data, while EC2 is a scalable virtual server in AWS.

  • EMR stands for Elastic MapReduce and is a managed Hadoop framework for processing large amounts of data.

  • EC2 stands for Elastic Compute Cloud and is a scalable virtual server in Amazon Web Services (AWS).

  • EMR allows for easy provisioning and scaling of Hadoop clusters, while EC2 provides resizable compute capacity in the cloud.

  • EMR is commonly used for big data p...read more

Add your answer
right arrow

Q118. Have you used python, pyspark in your projects?

Ans.

Yes, I have used Python and PySpark in my projects for data engineering tasks.

  • I have used Python for data manipulation, analysis, and visualization.

  • I have used PySpark for big data processing and distributed computing.

  • I have experience in writing PySpark jobs to process large datasets efficiently.

Add your answer
right arrow

Q119. Do you have any experience with serverless schema?

Ans.

Yes, I have experience with serverless schema.

  • I have worked with AWS Lambda to build serverless applications.

  • I have experience using serverless frameworks like Serverless Framework or AWS SAM.

  • I have designed and implemented serverless architectures using services like AWS API Gateway and AWS DynamoDB.

Add your answer
right arrow

Q120. What is the main advantage of delta lake?

Ans.

Delta Lake provides ACID transactions, schema enforcement, and time travel capabilities for data lakes.

  • ACID transactions ensure data consistency and reliability.

  • Schema enforcement helps maintain data quality and prevent data corruption.

  • Time travel allows users to access and revert to previous versions of data for auditing or analysis purposes.

Add your answer
right arrow

Q121. What is difference between delete and truncate query

Ans.

Delete removes rows one by one, while truncate removes all rows at once.

  • Delete is a DML command, while truncate is a DDL command

  • Delete can be rolled back, while truncate cannot be rolled back

  • Delete fires triggers, while truncate does not fire triggers

Add your answer
right arrow

Q122. what is the difference between comparable and comparator

Ans.

Comparable is an interface used for comparing objects, while Comparator is a separate class used for custom sorting.

  • Comparable is implemented by the class whose objects need to be compared, while Comparator is a separate class used for custom sorting.

  • Comparable has a single method, compareTo(), which is used to compare objects, while Comparator has a method, compare(), for custom sorting logic.

  • Comparable is used for natural ordering of objects, while Comparator allows for cus...read more

Add your answer
right arrow

Q123. 1) code to reverse words in string and first letter capital 2) diamond pattern program 3) program on drop-down

Ans.

Reverse words in a string with first letter capitalized, create a diamond pattern, and program on drop-down.

  • To reverse words in a string with first letter capitalized, split the string into words, reverse each word, capitalize the first letter, and join them back together.

  • For creating a diamond pattern program, use nested loops to print spaces and stars in a specific pattern.

  • For a program on drop-down, you can create a simple HTML form with a drop-down menu and use JavaScript...read more

Add your answer
right arrow

Q124. WAP for reverse string. array vs arraylist. map and hashmap. what are the explicit wait expected conditions. how to perform mouse over on webelement.

Ans.

This question covers topics like reversing a string, array vs ArrayList, map and HashMap, explicit wait expected conditions, and performing mouse over on a WebElement.

  • To reverse a string, you can use the StringBuilder class and its reverse() method.

  • An array is a fixed-size data structure, while an ArrayList is a dynamic-size data structure.

  • Map is an interface that represents a mapping between a key and a value, while HashMap is an implementation of the Map interface.

  • Explicit ...read more

Add your answer
right arrow

Q125. Explain the benefits of the educational institutions

Ans.

Educational institutions provide numerous benefits to individuals and society as a whole.

  • Educational institutions equip individuals with knowledge and skills necessary for personal and professional growth.

  • They provide opportunities for socialization and networking.

  • Educational institutions contribute to the development of a skilled workforce, which in turn boosts the economy.

  • They promote research and innovation, leading to advancements in various fields.

  • Educational institution...read more

Add your answer
right arrow

Q126. Write me the code to call the properties of a page in the model class

Ans.

To call properties of a page in the model class, use the Page API in AEM

  • Use the Page API to get the current page object in the model class

  • Access the properties of the page using the getProperty method on the page object

  • Ensure to handle null values or default values for properties that may not exist

Add your answer
right arrow

Q127. Challenges faced and how it was mitigated

Ans.

Challenges faced and mitigated in Change Management

  • Resistance to change from employees

  • Lack of communication and transparency

  • Lack of leadership support

  • Mitigated by involving employees in the change process

  • Regular communication and feedback sessions

  • Providing training and support to employees

  • Engaging leadership and creating a change management plan

Add your answer
right arrow

Q128. Re compile the Stored procedure and update the statistics

Ans.

Recompiling stored procedures and updating statistics improves query performance.

  • Recompiling stored procedures can help optimize execution plans.

  • Updating statistics ensures the query optimizer has accurate information about the data.

  • Both actions can improve query performance.

  • Example: EXEC sp_recompile 'myStoredProc'; UPDATE STATISTICS myTable;

Add your answer
right arrow

Q129. what are the components of HTTP request?

Ans.

HTTP request components include method, URL, headers, and body.

  • Method: GET, POST, PUT, DELETE, etc.

  • URL: Uniform Resource Locator

  • Headers: contain additional information about the request

  • Body: optional data sent with the request

  • Example: GET http://example.com HTTP/1.1

  • Example header: Accept-Language: en-US

  • Example body: {"name": "John", "age": 30}

Add your answer
right arrow

Q130. Where you used OOPS concept in your framework

Ans.

I used OOPS concepts in my framework for creating reusable components and maintaining code modularity.

  • Used inheritance to create a base class with common functionalities shared by multiple classes

  • Implemented polymorphism to allow different classes to implement the same method in their own way

  • Encapsulated data and behavior within classes using access modifiers like private and public

  • Utilized abstraction to hide the implementation details of certain classes from other parts of ...read more

Add your answer
right arrow

Q131. How would you handel a high-severity incidents

Ans.

I would follow established incident management procedures to quickly assess, prioritize, and resolve the incident.

  • Quickly assess the severity and impact of the incident

  • Prioritize the incident based on impact to the business

  • Engage necessary stakeholders and resources to resolve the incident

  • Communicate effectively with all parties involved

  • Document the incident and post-incident review for process improvement

Add your answer
right arrow

Q132. How would you cocument and report incident

Ans.

Incidents should be documented and reported in a structured manner to ensure proper resolution and prevention of future occurrences.

  • Create a standardized incident report template to capture all relevant details such as date, time, location, individuals involved, description of incident, impact, and actions taken.

  • Document all incidents promptly and accurately to ensure no details are missed or forgotten.

  • Include any supporting evidence or documentation related to the incident, ...read more

Add your answer
right arrow

Q133. How to reset Multi-Factor Authentication?

Ans.

To reset Multi-Factor Authentication, follow these steps:

  • Log in to the account

  • Go to the security settings

  • Select Multi-Factor Authentication

  • Disable the current MFA method

  • Enable a new MFA method

Add your answer
right arrow

Q134. What are 2 advantages and disadvantages of ecommerce

Add your answer
right arrow

Q135. What is loss ratio and what is the formula

Ans.

Loss ratio is a key performance indicator used in insurance to measure the profitability of underwriting. The formula is (Incurred Losses + Loss Adjustment Expenses) / Earned Premiums.

  • Loss ratio is a ratio used in insurance to assess the profitability of underwriting.

  • The formula for loss ratio is (Incurred Losses + Loss Adjustment Expenses) / Earned Premiums.

  • A lower loss ratio indicates better underwriting performance, while a higher ratio may suggest potential issues with cl...read more

Add your answer
right arrow

Q136. What is the difference between qs and surplus

Ans.

QS is the quantity supplied in the market while surplus is the excess of quantity supplied over quantity demanded.

  • QS refers to the amount of a good or service that producers are willing to sell at a given price

  • Surplus occurs when the quantity supplied exceeds the quantity demanded at a given price

  • Surplus can lead to lower prices as producers try to sell off excess inventory

  • QS is a key factor in determining market equilibrium

Add your answer
right arrow

Q137. What is .Net core advance features

Ans.

Some advanced features of .Net Core include cross-platform support, performance improvements, and support for modern development practices.

  • Cross-platform support allows developers to build and run applications on different operating systems.

  • Performance improvements such as faster startup times and lower memory usage.

  • Support for modern development practices like containerization and microservices architecture.

  • Built-in support for dependency injection and logging.

  • Enhanced secur...read more

Add your answer
right arrow

Q138. How to use session in .net core

Ans.

Session in .NET Core is used to store user-specific information across multiple requests.

  • Use services.AddSession() in ConfigureServices method of Startup class to enable session

  • Use app.UseSession() in Configure method of Startup class to add session middleware

  • Access session data using HttpContext.Session property

  • Example: HttpContext.Session.SetString("UserName", "JohnDoe") to store a string in session

  • Example: string userName = HttpContext.Session.GetString("UserName") to retr...read more

Add your answer
right arrow

Q139. What are arrays and Stacks

Ans.

Arrays are a collection of elements of the same data type, while stacks are a type of data structure that follows the Last-In-First-Out (LIFO) principle.

  • Arrays store multiple values in a single variable, accessed using an index.

  • Stacks are a linear data structure with two main operations: push (add an element to the top) and pop (remove the top element).

  • Arrays can be used to implement stacks by restricting the operations to only the end of the array.

  • Example: Array - int[] numb...read more

Add your answer
right arrow

Q140. Pro's and con's of online Shopping

Ans.

Online shopping offers convenience and variety, but can also lead to fraud and lack of personal touch.

  • Pro: Convenience of shopping from home

  • Pro: Wide variety of products available

  • Pro: Easy price comparison

  • Con: Risk of fraud and scams

  • Con: Lack of personal touch and interaction

  • Con: Delay in receiving products

View 1 answer
right arrow

Q141. How can rows and columns be added in SharePoint?

Ans.

Rows and columns can be added in SharePoint by editing the list settings and using the Quick Edit feature.

  • Navigate to the list where you want to add rows and columns

  • Click on the 'List' tab and then select 'List Settings'

  • Under the 'Columns' section, click on 'Add a column' to add a new column

  • To add rows, you can use the Quick Edit feature to directly input data into the list

Add your answer
right arrow

Q142. What's is hoisting? What is prototypal inheritance

Ans.

Hoisting is a JavaScript behavior where variable and function declarations are moved to the top of their scope.

  • Hoisting applies to both variable and function declarations.

  • Variable declarations are hoisted but not their initializations.

  • Function declarations are fully hoisted, including their definitions.

  • Hoisting can lead to unexpected behavior if not understood properly.

Add your answer
right arrow

Q143. Find the SQL query to find duplicate in table

Ans.

Use a SQL query with GROUP BY and HAVING clause to find duplicates in a table.

  • Use GROUP BY to group rows with the same values together

  • Use HAVING COUNT(*) > 1 to filter out non-duplicate rows

  • Select the columns you want to check for duplicates in the SELECT statement

Add your answer
right arrow

Q144. Difference b/w white and block box testing?

Ans.

White box testing is testing the internal structure of the system while black box testing is testing the functionality of the system.

  • White box testing is also known as clear box testing or structural testing

  • It involves testing the internal workings of the system, such as code and algorithms

  • Black box testing is also known as functional testing

  • It involves testing the external functionality of the system, without knowledge of its internal workings

  • Both types of testing are import...read more

Add your answer
right arrow

Q145. How to tune the stored Procedure

Ans.

Tuning stored procedures involves optimizing query performance by analyzing execution plans and indexing.

  • Analyze execution plans to identify bottlenecks

  • Use appropriate indexing to improve query performance

  • Avoid using cursors and temporary tables

  • Minimize network traffic by reducing data transfer

  • Use parameterized queries to avoid SQL injection attacks

Add your answer
right arrow

Q146. What is topology and its type

Ans.

Topology is the study of geometric properties and spatial relations unaffected by the continuous change of shape or size.

  • Topology is concerned with the properties of space that are preserved under continuous transformations, such as stretching or bending.

  • It is used in mathematics, physics, computer science, and engineering.

  • Types of topology include point-set topology, algebraic topology, and differential topology.

  • Examples of topological properties include connectedness, compa...read more

Add your answer
right arrow

Q147. Why hexaware ,are you ready to reallocate

Ans.

I am interested in the opportunities and growth potential at Hexaware and am open to relocating for the right opportunity.

  • Interested in the growth potential at Hexaware

  • Open to relocating for the right opportunity

  • Excited about the opportunities at Hexaware

Add your answer
right arrow

Q148. Explain the OOP Concepts? Use of OOP?

Ans.

OOP stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOP focuses on creating objects that contain both data and methods to manipulate that data.

  • Encapsulation: Objects hide their internal state and require interaction through defined interfaces.

  • Inheritance: Objects can inherit attributes and methods from parent classes.

  • Polymorphism: Objects can take on multiple forms and behave differently based on their data type.

  • Example: In...read more

Add your answer
right arrow

Q149. Find the student with marks greater than 80 in all subjects

Ans.

Filter students with marks greater than 80 in all subjects

  • Iterate through each student's marks in all subjects

  • Check if all marks are greater than 80 for a student

  • Return the student if all marks are greater than 80

Add your answer
right arrow

Q150. Write the syntax to define the schema of a file for loading.

Ans.

Syntax to define schema of a file for loading

  • Use CREATE EXTERNAL TABLE statement in SQL

  • Specify column names and data types in the schema definition

  • Example: CREATE EXTERNAL TABLE MyTable (col1 INT, col2 STRING) USING CSV

Add your answer
right arrow

Q151. build.prform(); is corrct syntax for ky board action?

Add your answer
right arrow

Q152. Write Bubble sort Program ?

Ans.

Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.

  • Compare adjacent elements and swap them if they are in the wrong order

  • Repeat this process until the list is sorted

  • Time complexity is O(n^2)

  • Example: [5, 3, 8, 4, 2] -> [3, 5, 8, 4, 2] -> [3, 5, 4, 8, 2] -> [3, 5, 4, 2, 8] -> [3, 4, 5, 2, 8] -> [3, 4, 2, 5, 8] -> [3, 4, 2, 5, 8] -> [3, 2, 4, 5, 8] -> [2, 3, 4, 5, 8]

Add your answer
right arrow

Q153. Query to fetch only numbers from alphanumeric data from a table.

Ans.

Use regular expressions to extract numbers from alphanumeric data in a table.

  • Use the REGEXP_REPLACE function in SQL to replace all non-numeric characters with an empty string.

  • For example, SELECT REGEXP_REPLACE(column_name, '[^0-9]', '') FROM table_name;

  • This will return only the numbers from the alphanumeric data in the specified column.

Add your answer
right arrow

Q154. Query to fetch data greater than average, min and max salary.

Ans.

Query to fetch data greater than average, min and max salary.

  • Calculate average, min, and max salary first

  • Use a SELECT statement with WHERE clause to filter data greater than average, min, and max salary

Add your answer
right arrow

Q155. what is polymorphism, what is fibbanocci series

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon. Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Polymorphism allows different objects to be treated as instances of a single class, enabling flexibility and reusability in code.

  • Fibonacci series starts with 0 and 1, with each subsequent number being the sum of the two preceding numbers (0, 1, 1, 2, 3, 5, 8, ...)

  • Polymo...read more

Add your answer
right arrow

Q156. How outbound BPO industry work?

Ans.

Outbound BPO industry involves making calls to potential customers to sell products or services.

  • Outbound BPO agents make calls to potential customers to sell products or services

  • They follow a script and try to convince the customer to make a purchase

  • They may also conduct surveys or collect information from customers

  • Outbound BPO industry requires good communication and persuasion skills

  • Examples of outbound BPO services include telemarketing, lead generation, and appointment se...read more

Add your answer
right arrow

Q157. What would you do in case of a Ransomware attack?

Ans.

Isolate infected systems, disconnect from network, report incident to management, restore from backups.

  • Isolate infected systems to prevent further spread of ransomware

  • Disconnect infected systems from the network to prevent communication with the attacker

  • Report the incident to management and IT security team for further investigation

  • Restore affected systems from backups to recover data without paying ransom

Add your answer
right arrow
Q158. What is the JVM?
Ans.

JVM stands for Java Virtual Machine, it is an abstract computing machine that enables a computer to run Java programs.

  • JVM is responsible for converting Java bytecode into machine code that can be executed by the computer's CPU.

  • It provides a platform-independent execution environment for Java programs.

  • JVM manages memory, handles garbage collection, and provides security features for Java applications.

  • Examples of JVM implementations include Oracle HotSpot, OpenJ9, and GraalVM.

Add your answer
right arrow

Q159. Explain structure and later of current project

Ans.

The current project is a web application for managing inventory and sales.

  • The project follows a MVC (Model-View-Controller) architecture

  • Uses technologies like React for the front-end and Node.js for the back-end

  • Database schema includes tables for products, customers, orders, etc.

  • Implemented features like user authentication, product search, and order processing

Add your answer
right arrow
Asked in
SME Interview

Q160. What are Buy ins ? It's characteristics

Ans.

Buy ins refer to the process of gaining acceptance or agreement from others to support a particular idea or initiative.

  • Buy ins involve convincing others to support a particular idea or initiative

  • They are characterized by the need for persuasion and negotiation

  • Buy ins can be achieved through effective communication, building relationships, and addressing concerns

  • Examples of buy ins include gaining support for a new project, convincing stakeholders to invest in a business, or g...read more

Add your answer
right arrow

Q161. explain the constructor and its types of it.

Ans.

A constructor is a special method used to initialize objects in a class. It can have different types based on parameters.

  • A constructor has the same name as the class it belongs to.

  • It is automatically called when an object is created.

  • Constructors can be parameterized or non-parameterized.

  • Parameterized constructors accept arguments to initialize object properties.

  • Non-parameterized constructors have no arguments and provide default values.

  • Constructors can be overloaded, allowing...read more

Add your answer
right arrow

Q162. Why string is immutable Explain Pom Difference between implicit and explicit wait

Ans.

Strings are immutable in Java because they are stored in the String pool and any modification creates a new string object.

  • String objects are stored in the String pool to save memory

  • Any modification to a string creates a new string object

  • Example: String str = "hello"; str.concat("world"); will create a new string object with "helloworld"

Add your answer
right arrow

Q163. Explain your framework What is grid what is webtable what are selenium waits

Ans.

Framework is a set of guidelines, tools, and best practices for automation testing. Grid is a tool for parallel testing. Webtable is an HTML table. Selenium waits are used to wait for certain conditions before proceeding.

  • Framework is a structured approach to automate testing processes

  • Grid is used for parallel testing, allowing multiple tests to run simultaneously on different machines

  • Webtable is an HTML table used to display data on a web page

  • Selenium waits are used to pause ...read more

Add your answer
right arrow

Q164. What are the types of Load Tests

Ans.

Types of Load Tests include Stress Testing, Spike Testing, Endurance Testing, and Volume Testing.

  • Stress Testing: Evaluates system behavior under extreme conditions to determine breaking points.

  • Spike Testing: Tests system response to sudden spikes in load to ensure stability.

  • Endurance Testing: Checks system performance over an extended period to identify any issues related to prolonged use.

  • Volume Testing: Assesses system performance with a large amount of data to ensure scalab...read more

Add your answer
right arrow

Q165. What is operator overriding & overloading in java

Ans.

Operator overriding is redefining an operator in a subclass while overloading is defining multiple methods with the same name but different parameters.

  • Operator overriding is used to change the behavior of an operator in a subclass.

  • Overloading is used to define multiple methods with the same name but different parameters.

  • Overloading can be done with both unary and binary operators.

  • Example of operator overriding: '+' operator in String class.

  • Example of operator overloading: '+'...read more

Add your answer
right arrow

Q166. What is difference in delete and truncate

Ans.

Delete removes rows one by one, while truncate removes all rows at once.

  • Delete is a DML command, while truncate is a DDL command

  • Delete can be rolled back, while truncate cannot be rolled back

  • Delete fires triggers, while truncate does not fire triggers

Add your answer
right arrow

Q167. Explain about Function and non-functional testing

Ans.

Function testing checks if the software meets the functional requirements while non-functional testing checks the non-functional aspects.

  • Function testing ensures that the software meets the functional requirements specified in the requirements document.

  • Non-functional testing checks the non-functional aspects of the software such as performance, usability, security, etc.

  • Function testing is usually done using black-box testing techniques while non-functional testing is done usi...read more

Add your answer
right arrow

Q168. Who will do white box testing?

Ans.

White box testing is usually done by developers or automation testers.

  • Developers or automation testers usually perform white box testing.

  • White box testing involves testing the internal structure of the application.

  • It requires knowledge of the code and the system architecture.

  • White box testing is used to test individual functions or modules.

  • Examples of white box testing tools include JUnit and Selenium.

Add your answer
right arrow

Q169. How to interchange values of 2 variables

Ans.

To interchange values of 2 variables, use a temporary variable to store one value before swapping them.

  • Declare a temporary variable to store the value of one variable

  • Assign the value of the first variable to the temporary variable

  • Assign the value of the second variable to the first variable

  • Assign the value of the temporary variable to the second variable

Add your answer
right arrow

Q170. How do you increase array size?

Ans.

To increase array size, you can create a new array with a larger size and copy the elements from the original array to the new array.

  • Create a new array with a larger size

  • Copy elements from the original array to the new array

  • Update the reference to the new array

Add your answer
right arrow

Q171. What is difference between c and c++ What is encapsulation.

Ans.

C is a procedural programming language while C++ is an extension of C with added features like object-oriented programming.

  • C is a procedural language while C++ supports both procedural and object-oriented programming.

  • C++ has additional features like classes, objects, inheritance, and polymorphism.

  • C++ supports function overloading and namespaces, which are not present in C.

  • C++ has a standard template library (STL) that provides useful data structures and algorithms.

  • C++ allows ...read more

Add your answer
right arrow

Q172. Explain some annotations that are used in Sling Model

Ans.

Annotations used in Sling Model for AEM development

  • The @Model annotation is used to define a Sling Model class

  • The @Inject annotation is used to inject OSGi services or request attributes

  • The @Self annotation is used to inject the current resource

  • The @Via annotation is used to specify the resource type to adapt from

  • The @Named annotation is used to specify the name of the injected property

Add your answer
right arrow

Q173. Code for Fibonacci sequence

Ans.

The Fibonacci sequence is a series of numbers in which each number is the sum of the two preceding ones.

  • Start with two variables, a and b, initialized to 0 and 1 respectively.

  • Loop through the desired number of Fibonacci numbers.

  • In each iteration, calculate the next Fibonacci number by adding a and b.

  • Update the values of a and b to the next two numbers in the sequence.

  • Store each Fibonacci number in an array.

  • Return the array of Fibonacci numbers.

Add your answer
right arrow

Q174. Technical question: Explain LODs

Ans.

LODs stands for Level of Detail. It is a technique used in computer graphics to optimize the rendering of complex scenes.

  • LODs are used to reduce the amount of detail in a scene based on the distance from the viewer.

  • This technique is commonly used in video games to improve performance.

  • For example, a tree in a game may have multiple LODs with different levels of detail depending on how far away the player is from it.

  • LODs can also be used in architectural visualization to optimi...read more

Add your answer
right arrow

Q175. What is the use of GROUP BY clause?

Ans.

The GROUP BY clause is used in SQL to group rows that have the same values into summary rows.

  • It is used with aggregate functions like COUNT, SUM, AVG, etc.

  • It helps in summarizing data and generating reports.

  • It is often used in conjunction with the HAVING clause to filter grouped data.

  • Example: SELECT department, COUNT(employee_id) FROM employees GROUP BY department;

Add your answer
right arrow

Q176. what will you get from the company's traffic

Ans.

I will contribute to the company's traffic management by ensuring compliance with safety regulations and implementing effective emergency response plans.

  • Ensuring compliance with traffic safety regulations

  • Implementing effective emergency response plans

  • Conducting regular safety inspections and audits

  • Training staff on traffic safety procedures

  • Collaborating with local authorities for traffic management

Add your answer
right arrow

Q177. Explain about react core concepts and flux architecture

Ans.

React core concepts include components, state, and props. Flux architecture is a pattern for managing data flow in React applications.

  • React components are reusable UI elements that can be composed to build complex interfaces

  • State is data that can change within a component and can trigger a re-render

  • Props are read-only data passed down from a parent component to a child component

  • Flux architecture uses a unidirectional data flow to manage state and update the UI

  • Flux includes ac...read more

Add your answer
right arrow

Q178. What is Interface vs Abstraction

Ans.

Interface defines a contract for a class to implement, while abstraction hides the implementation details.

  • Interface is a blueprint of a class that defines what methods a class must implement.

  • Abstraction is a concept that hides the implementation details and shows only the functionality.

  • Interfaces can have multiple inheritance, while abstraction can be achieved using abstract classes.

  • Example: Interface 'Shape' may have methods like 'calculateArea()' and 'calculatePerimeter()',...read more

Add your answer
right arrow

Q179. What isn fund accounting

Ans.

Fund accounting is a specialized form of accounting used by investment companies to track and report on the financial activities of investment funds.

  • Fund accounting is used by investment companies to manage the financial activities of investment funds.

  • It involves tracking and reporting on the income, expenses, and investments of the fund.

  • Fund accountants ensure compliance with regulatory requirements and provide accurate financial statements to investors.

  • They calculate the ne...read more

View 1 answer
right arrow

Q180. What is the difference between map and flat map

Ans.

Map transforms each element of a collection, while flatMap transforms each element into a new collection and flattens the result.

  • Map applies a function to each element of a collection and returns a new collection with the results

  • FlatMap applies a function that returns a collection to each element of a collection, then flattens the result into a single collection

  • Example: map([1, 2, 3], x => [x, x+1]) returns [[1, 2], [2, 3], [3, 4]], flatMap([1, 2, 3], x => [x, x+1]) returns [...read more

Add your answer
right arrow

Q181. What is windows powershell?

Ans.

Windows PowerShell is a command-line shell and scripting language designed for system administration tasks.

  • It is built on the .NET Framework

  • It allows users to automate tasks using scripts

  • It supports remote management of Windows machines

  • It has a rich set of commands and utilities

  • Example: Get-Process command retrieves information about running processes

  • Example: Set-ExecutionPolicy command changes the PowerShell execution policy

View 1 answer
right arrow

Q182. What is a semaphore ?

Ans.

A semaphore is a synchronization construct used to control access to a shared resource by multiple processes or threads.

  • Semaphores can have an integer value representing the number of available resources.

  • They can be used to prevent race conditions and ensure mutual exclusion.

  • Operations on semaphores include wait (P) and signal (V).

Add your answer
right arrow

Q183. 1. Explain Types of network

Ans.

Types of network include LAN, WAN, MAN, WLAN, PAN, SAN, CAN, and VPN.

  • LAN (Local Area Network) is a network that covers a small area such as a home, office, or building.

  • WAN (Wide Area Network) is a network that covers a large geographical area such as a city, country, or even the world.

  • MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, typically a city or town.

  • WLAN (Wireless Local Area Network) is a LAN that uses wireless ...read more

Add your answer
right arrow

Q184. How hashmap works internally?

Ans.

Hashmap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.

  • Hashmap uses a hash function to convert the key into an index in an array.

  • Collisions can occur when two keys map to the same index, which is resolved using separate chaining or open addressing.

  • Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval of values.

  • Java's Hashmap implementation uses an array of linked lists to handle collisions.

  • The load f...read more

Add your answer
right arrow

Q185. What is DI and it's use

Ans.

DI stands for Dependency Injection and is a design pattern used to increase flexibility and maintainability of code.

  • DI is a technique where one object supplies the dependencies of another object instead of the object creating them itself.

  • It helps in decoupling components, making them easier to test and reuse.

  • DI containers like Spring Framework in Java are used to manage dependencies and inject them into objects.

  • Example: Instead of hardcoding a database connection in a class, ...read more

Add your answer
right arrow

Q186. How to write Immutable class in java

Ans.

Immutable class in Java

  • Make the class final

  • Make all fields private and final

  • Do not provide any setter methods

  • If mutable objects are used, return a copy instead of the original object

Add your answer
right arrow

Q187. What are concepts of oops

Ans.

OOPs concepts are the principles of Object-Oriented Programming that help in designing and implementing software.

  • Abstraction

  • Encapsulation

  • Inheritance

  • Polymorphism

  • Class

  • Object

  • Method

  • Message Passing

Add your answer
right arrow

Q188. Which Inheritance does not support java?

Ans.

Java does not support multiple inheritance.

  • Java supports only single inheritance through classes.

  • However, it supports multiple inheritance through interfaces.

  • Diamond problem can occur in multiple inheritance.

Add your answer
right arrow

Q189. What is SCCM ?

Ans.

SCCM stands for System Center Configuration Manager. It is a software management tool used for deploying, managing and monitoring software and devices in an enterprise environment.

  • SCCM is used for automating software deployment and updates across a network

  • It can manage devices running on different operating systems such as Windows, macOS, and Linux

  • SCCM provides inventory management, software metering, and reporting capabilities

  • It can also be used for patch management and secu...read more

View 2 more answers
right arrow

Q190. Difference between Waterfall and Agile methodology

Ans.

Waterfall is a linear approach to project management while Agile is iterative and flexible.

  • Waterfall follows a sequential process while Agile is iterative.

  • Waterfall requires detailed planning upfront while Agile allows for changes throughout the project.

  • Waterfall is best suited for projects with well-defined requirements while Agile is better for projects with evolving requirements.

  • Waterfall is more rigid while Agile is more flexible and adaptable.

  • Examples of Waterfall includ...read more

View 1 answer
right arrow

Q191. Extracting data out of delimited strings

Ans.

Explaining how to extract data from delimited strings.

  • Use the split() method to split the string into an array based on the delimiter.

  • Access the desired data by indexing the array.

  • Use regular expressions to handle more complex delimiters.

  • Consider using a library like csv-parser for CSV files.

  • Handle edge cases like empty strings or missing delimiters.

Add your answer
right arrow

Q192. What are the pillers of oops concept

Ans.

The pillars of OOPs concept are Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer
right arrow

Q193. diff btw assertion vs validation/verification

Ans.

Assertion is a statement that checks if a condition is true, while validation/verification is the process of confirming that a product meets specified requirements.

  • Assertion is used to validate the expected outcome of a test case.

  • Validation/verification is the process of checking if the product meets the specified requirements.

  • Assertions are typically used within test scripts to verify the expected behavior of the system.

  • Validation/verification involves comparing the actual r...read more

Add your answer
right arrow

Q194. STP loop prevention how its working

Ans.

STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.

  • STP (Spanning Tree Protocol) identifies redundant paths in a network

  • STP selects a root bridge to be the central point of the network

  • STP blocks certain ports to prevent loops while still allowing for redundancy

  • If a link fails, STP will unblock a previously blocked port to maintain connectivity

Add your answer
right arrow

Q195. Whats the bpo meaning of your

Ans.

BPO stands for Business Process Outsourcing.

  • BPO refers to the practice of contracting specific business processes to a third-party service provider.

  • It involves outsourcing non-core functions such as customer service, technical support, data entry, and more.

  • BPO companies help organizations streamline operations, reduce costs, and improve efficiency.

  • For example, a company may outsource its customer service department to a BPO firm located in a different country.

  • BPO has become a...read more

View 1 answer
right arrow

Q196. How to sync primary and standby?

Ans.

Primary and standby databases can be synced using Data Guard in Oracle.

  • Configure Data Guard on primary and standby databases

  • Enable redo transport services

  • Monitor and resolve any synchronization issues

  • Perform switchover or failover when necessary

Add your answer
right arrow

Q197. What is Password Hash Synchronization?

Ans.

Password Hash Synchronization is a feature in Azure AD that syncs on-premises password hashes to the cloud.

  • Allows users to use the same password on-premises and in the cloud

  • Improves security by not storing actual passwords in the cloud

  • Requires Azure AD Connect to be installed and configured

  • Can be used in conjunction with Pass-Through Authentication

  • Helps to simplify the user sign-in experience

Add your answer
right arrow

Q198. Why string is immutable?

Ans.

String is immutable to ensure thread safety and prevent unintended modification.

  • Immutable objects are safer to use in multi-threaded environments as they cannot be changed by other threads.

  • String pool is possible because of immutability, which saves memory and improves performance.

  • StringBuffer and StringBuilder classes are used for mutable string operations.

  • Example: String s = "hello"; s.concat(" world"); // returns a new string, s remains unchanged.

Add your answer
right arrow

Q199. What will do in Real application cluater

Ans.

Real Application Cluster (RAC) is a cluster database with shared disk architecture.

  • RAC allows multiple instances to access a single database simultaneously.

  • It provides high availability and scalability.

  • RAC uses Oracle Clusterware to manage the cluster.

  • Load balancing and failover are automatic in RAC.

  • RAC requires additional hardware and software licenses.

Add your answer
right arrow

Q200. How to Calculate NAV ?

Ans.

NAV is calculated by subtracting liabilities from assets and dividing by total outstanding shares.

  • Calculate the total value of assets held by the fund

  • Subtract the total value of liabilities from the total value of assets

  • Divide the result by the total number of outstanding shares

  • NAV = (Total Assets - Total Liabilities) / Total Outstanding Shares

  • Example: If a fund has $10 million in assets, $2 million in liabilities, and 1 million outstanding shares, the NAV would be $8 per sha...read more

Add your answer
right arrow
Previous
1
2
3
4
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Hexaware Technologies

based on 649 interviews
Interview experience
3.9
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Cisco Logo
4.1
 â€¢ 299 Interview Questions
Morgan Stanley Logo
3.7
 â€¢ 262 Interview Questions
PayPal Logo
3.9
 â€¢ 177 Interview Questions
Tata Elxsi Logo
3.8
 â€¢ 157 Interview Questions
HARMAN Logo
3.7
 â€¢ 134 Interview Questions
View all
Top Hexaware Technologies Interview Questions And Answers
Share an Interview