
Hexaware Technologies

300+ Hexaware Technologies Interview Questions and Answers
Q101. Sort the array without using predefined functions etc
Sorting an array without using predefined functions
Implement a sorting algorithm like bubble sort, insertion sort, or selection sort
Loop through the array and compare adjacent elements to swap them if necessary
Repeat the loop until the array is sorted in ascending or descending order
Q102. Reverse the string without using predefined functions
Reverse a string without using predefined functions.
Iterate through the string from the end and append each character to a new string.
Use a loop to swap the first and last characters, then move towards the middle.
Convert the string to a list, reverse the list, then join the list back into a string.
Q103. Solve using Little's Law and calculate Pacing for 200 users doing 20,000 TPH
Little's Law can be used to calculate the pacing for a given number of users and transactions per hour.
Little's Law states that the average number of users in a system (L) is equal to the average arrival rate (λ) multiplied by the average time a user spends in the system (W). Mathematically, L = λW.
To calculate pacing, we need to rearrange the formula to solve for W: W = L / λ.
In this case, we have 200 users and 20,000 transactions per hour, so the arrival rate (λ) is 20,000 ...read more
Q104. What is difference between spring MVC and spring Boot
Spring MVC is a web framework while Spring Boot is an opinionated configuration of Spring.
Spring MVC requires manual configuration while Spring Boot provides auto-configuration.
Spring Boot includes an embedded server while Spring MVC requires a separate server.
Spring Boot simplifies dependency management while Spring MVC requires manual dependency management.
Spring Boot is ideal for microservices while Spring MVC is better suited for larger applications.
Q105. How do you get the sum of consecutive numbers in a table
To get the sum of consecutive numbers in a table, you can use SQL queries with aggregate functions like SUM() and window functions like ROWS BETWEEN.
Use the SUM() function to calculate the sum of consecutive numbers in a column.
Use window functions like ROWS BETWEEN to define the range of consecutive numbers.
Combine the SUM() function with window functions to get the desired result.
Here's an example query: SELECT SUM(column_name) OVER (ORDER BY column_name ROWS BETWEEN 1 PREC...read more
Q106. What does a scenario-based email assignment entail?
A scenario-based email assignment tests a candidate's ability to craft effective communication for specific situations.
Identify the target audience: Understand who the email is intended for, e.g., customers, team members, or stakeholders.
Define the scenario: Clearly outline the context, such as a product launch, crisis management, or customer feedback.
Craft a clear subject line: Ensure it reflects the email's purpose, e.g., 'Exciting New Product Launch - Join Us!'
Use appropri...read more
Q107. What are the Devops tools, you have experience on?
I have experience with various DevOps tools including Jenkins, Docker, Ansible, and Terraform.
Jenkins
Docker
Ansible
Terraform
Q108. How to manage the third party software patches using intune
Manage third party software patches using Intune
Create a software update policy in Intune
Select 'Third Party Updates' as the update source
Choose the third party software you want to patch
Set the schedule for patch deployment
Monitor patch deployment status and compliance
Q109. What is JRE?
JRE stands for Java Runtime Environment. It is a software package that provides the necessary runtime environment for Java applications.
JRE includes the Java Virtual Machine (JVM), class libraries, and other necessary components to run Java applications.
It is required to run Java applications on a computer.
JRE is available for different operating systems such as Windows, Linux, and macOS.
Examples of Java applications that require JRE include Eclipse, NetBeans, and Apache Tomc...read more
Q110. How can tables be imported and joined in Business Objects
Tables can be imported and joined in Business Objects using the Universe Design Tool.
Create a universe in the Universe Design Tool
Import tables from different data sources
Define joins between the tables based on common fields
Use aliases to link tables with different names but similar data
Test the joins to ensure data integrity
Q111. Write a program to find no of repeated characters in a string
Program to find number of repeated characters in a string
Iterate through each character in the string
Use a hashmap to store the count of each character
Increment the count if character is already present in the hashmap
Return the count of characters with count greater than 1
Q112. What does service configure does in .net core
Service configure method in .NET Core is used to configure services for dependency injection.
Service configure method is used in the ConfigureServices method of the Startup class to register services with the dependency injection container.
It allows you to add services to the service collection using the IServiceCollection interface.
You can also configure services with specific options using extension methods like AddDbContext, AddMvc, AddControllersWithViews, etc.
Q113. What is custom authorization in .net core
Custom authorization in .NET Core allows developers to define their own logic for determining access to resources.
Custom authorization involves creating custom authorization policies in .NET Core.
Developers can define their own requirements and handlers for authorization.
Examples include checking user roles, permissions, or any other custom logic before granting access.
Q114. Write a java program for add this number 6134 and total will be 14
Java program to add numbers 6134 to get total 14.
Create an array of integers with the numbers to be added
Iterate through the array and add the numbers
Check if the total equals 14
Q115. What is your comfortable programming language
My comfortable programming language is Java.
Strong object-oriented programming skills
Experience with Java frameworks like Spring
Proficient in writing clean and efficient code
Q116. What is derived tables in business objects
Derived tables in Business Objects are tables created from the result of a query.
Derived tables are temporary tables created from the result of a query.
They can be used to simplify complex queries or to improve performance.
They are created on the fly and are not stored in the database.
They can be used in subsequent queries or reports.
Example: A derived table can be created to calculate the total sales for each region from a sales table.
Q117. Can you explain about EMR andEC2 instance?
EMR is a managed Hadoop framework for processing large amounts of data, while EC2 is a scalable virtual server in AWS.
EMR stands for Elastic MapReduce and is a managed Hadoop framework for processing large amounts of data.
EC2 stands for Elastic Compute Cloud and is a scalable virtual server in Amazon Web Services (AWS).
EMR allows for easy provisioning and scaling of Hadoop clusters, while EC2 provides resizable compute capacity in the cloud.
EMR is commonly used for big data p...read more
Q118. Have you used python, pyspark in your projects?
Yes, I have used Python and PySpark in my projects for data engineering tasks.
I have used Python for data manipulation, analysis, and visualization.
I have used PySpark for big data processing and distributed computing.
I have experience in writing PySpark jobs to process large datasets efficiently.
Q119. Do you have any experience with serverless schema?
Yes, I have experience with serverless schema.
I have worked with AWS Lambda to build serverless applications.
I have experience using serverless frameworks like Serverless Framework or AWS SAM.
I have designed and implemented serverless architectures using services like AWS API Gateway and AWS DynamoDB.
Q120. What is the main advantage of delta lake?
Delta Lake provides ACID transactions, schema enforcement, and time travel capabilities for data lakes.
ACID transactions ensure data consistency and reliability.
Schema enforcement helps maintain data quality and prevent data corruption.
Time travel allows users to access and revert to previous versions of data for auditing or analysis purposes.
Q121. What is difference between delete and truncate query
Delete removes rows one by one, while truncate removes all rows at once.
Delete is a DML command, while truncate is a DDL command
Delete can be rolled back, while truncate cannot be rolled back
Delete fires triggers, while truncate does not fire triggers
Q122. what is the difference between comparable and comparator
Comparable is an interface used for comparing objects, while Comparator is a separate class used for custom sorting.
Comparable is implemented by the class whose objects need to be compared, while Comparator is a separate class used for custom sorting.
Comparable has a single method, compareTo(), which is used to compare objects, while Comparator has a method, compare(), for custom sorting logic.
Comparable is used for natural ordering of objects, while Comparator allows for cus...read more
Q123. 1) code to reverse words in string and first letter capital 2) diamond pattern program 3) program on drop-down
Reverse words in a string with first letter capitalized, create a diamond pattern, and program on drop-down.
To reverse words in a string with first letter capitalized, split the string into words, reverse each word, capitalize the first letter, and join them back together.
For creating a diamond pattern program, use nested loops to print spaces and stars in a specific pattern.
For a program on drop-down, you can create a simple HTML form with a drop-down menu and use JavaScript...read more
Q124. WAP for reverse string. array vs arraylist. map and hashmap. what are the explicit wait expected conditions. how to perform mouse over on webelement.
This question covers topics like reversing a string, array vs ArrayList, map and HashMap, explicit wait expected conditions, and performing mouse over on a WebElement.
To reverse a string, you can use the StringBuilder class and its reverse() method.
An array is a fixed-size data structure, while an ArrayList is a dynamic-size data structure.
Map is an interface that represents a mapping between a key and a value, while HashMap is an implementation of the Map interface.
Explicit ...read more
Q125. Explain the benefits of the educational institutions
Educational institutions provide numerous benefits to individuals and society as a whole.
Educational institutions equip individuals with knowledge and skills necessary for personal and professional growth.
They provide opportunities for socialization and networking.
Educational institutions contribute to the development of a skilled workforce, which in turn boosts the economy.
They promote research and innovation, leading to advancements in various fields.
Educational institution...read more
Q126. Write me the code to call the properties of a page in the model class
To call properties of a page in the model class, use the Page API in AEM
Use the Page API to get the current page object in the model class
Access the properties of the page using the getProperty method on the page object
Ensure to handle null values or default values for properties that may not exist
Q127. Challenges faced and how it was mitigated
Challenges faced and mitigated in Change Management
Resistance to change from employees
Lack of communication and transparency
Lack of leadership support
Mitigated by involving employees in the change process
Regular communication and feedback sessions
Providing training and support to employees
Engaging leadership and creating a change management plan
Q128. Re compile the Stored procedure and update the statistics
Recompiling stored procedures and updating statistics improves query performance.
Recompiling stored procedures can help optimize execution plans.
Updating statistics ensures the query optimizer has accurate information about the data.
Both actions can improve query performance.
Example: EXEC sp_recompile 'myStoredProc'; UPDATE STATISTICS myTable;
Q129. what are the components of HTTP request?
HTTP request components include method, URL, headers, and body.
Method: GET, POST, PUT, DELETE, etc.
URL: Uniform Resource Locator
Headers: contain additional information about the request
Body: optional data sent with the request
Example: GET http://example.com HTTP/1.1
Example header: Accept-Language: en-US
Example body: {"name": "John", "age": 30}
Q130. Where you used OOPS concept in your framework
I used OOPS concepts in my framework for creating reusable components and maintaining code modularity.
Used inheritance to create a base class with common functionalities shared by multiple classes
Implemented polymorphism to allow different classes to implement the same method in their own way
Encapsulated data and behavior within classes using access modifiers like private and public
Utilized abstraction to hide the implementation details of certain classes from other parts of ...read more
Q131. How would you handel a high-severity incidents
I would follow established incident management procedures to quickly assess, prioritize, and resolve the incident.
Quickly assess the severity and impact of the incident
Prioritize the incident based on impact to the business
Engage necessary stakeholders and resources to resolve the incident
Communicate effectively with all parties involved
Document the incident and post-incident review for process improvement
Q132. How would you cocument and report incident
Incidents should be documented and reported in a structured manner to ensure proper resolution and prevention of future occurrences.
Create a standardized incident report template to capture all relevant details such as date, time, location, individuals involved, description of incident, impact, and actions taken.
Document all incidents promptly and accurately to ensure no details are missed or forgotten.
Include any supporting evidence or documentation related to the incident, ...read more
Q133. How to reset Multi-Factor Authentication?
To reset Multi-Factor Authentication, follow these steps:
Log in to the account
Go to the security settings
Select Multi-Factor Authentication
Disable the current MFA method
Enable a new MFA method
Q134. What are 2 advantages and disadvantages of ecommerce
Q135. What is loss ratio and what is the formula
Loss ratio is a key performance indicator used in insurance to measure the profitability of underwriting. The formula is (Incurred Losses + Loss Adjustment Expenses) / Earned Premiums.
Loss ratio is a ratio used in insurance to assess the profitability of underwriting.
The formula for loss ratio is (Incurred Losses + Loss Adjustment Expenses) / Earned Premiums.
A lower loss ratio indicates better underwriting performance, while a higher ratio may suggest potential issues with cl...read more
Q136. What is the difference between qs and surplus
QS is the quantity supplied in the market while surplus is the excess of quantity supplied over quantity demanded.
QS refers to the amount of a good or service that producers are willing to sell at a given price
Surplus occurs when the quantity supplied exceeds the quantity demanded at a given price
Surplus can lead to lower prices as producers try to sell off excess inventory
QS is a key factor in determining market equilibrium
Q137. What is .Net core advance features
Some advanced features of .Net Core include cross-platform support, performance improvements, and support for modern development practices.
Cross-platform support allows developers to build and run applications on different operating systems.
Performance improvements such as faster startup times and lower memory usage.
Support for modern development practices like containerization and microservices architecture.
Built-in support for dependency injection and logging.
Enhanced secur...read more
Q138. How to use session in .net core
Session in .NET Core is used to store user-specific information across multiple requests.
Use services.AddSession() in ConfigureServices method of Startup class to enable session
Use app.UseSession() in Configure method of Startup class to add session middleware
Access session data using HttpContext.Session property
Example: HttpContext.Session.SetString("UserName", "JohnDoe") to store a string in session
Example: string userName = HttpContext.Session.GetString("UserName") to retr...read more
Q139. What are arrays and Stacks
Arrays are a collection of elements of the same data type, while stacks are a type of data structure that follows the Last-In-First-Out (LIFO) principle.
Arrays store multiple values in a single variable, accessed using an index.
Stacks are a linear data structure with two main operations: push (add an element to the top) and pop (remove the top element).
Arrays can be used to implement stacks by restricting the operations to only the end of the array.
Example: Array - int[] numb...read more
Q140. Pro's and con's of online Shopping
Online shopping offers convenience and variety, but can also lead to fraud and lack of personal touch.
Pro: Convenience of shopping from home
Pro: Wide variety of products available
Pro: Easy price comparison
Con: Risk of fraud and scams
Con: Lack of personal touch and interaction
Con: Delay in receiving products
Q141. How can rows and columns be added in SharePoint?
Rows and columns can be added in SharePoint by editing the list settings and using the Quick Edit feature.
Navigate to the list where you want to add rows and columns
Click on the 'List' tab and then select 'List Settings'
Under the 'Columns' section, click on 'Add a column' to add a new column
To add rows, you can use the Quick Edit feature to directly input data into the list
Q142. What's is hoisting? What is prototypal inheritance
Hoisting is a JavaScript behavior where variable and function declarations are moved to the top of their scope.
Hoisting applies to both variable and function declarations.
Variable declarations are hoisted but not their initializations.
Function declarations are fully hoisted, including their definitions.
Hoisting can lead to unexpected behavior if not understood properly.
Q143. Find the SQL query to find duplicate in table
Use a SQL query with GROUP BY and HAVING clause to find duplicates in a table.
Use GROUP BY to group rows with the same values together
Use HAVING COUNT(*) > 1 to filter out non-duplicate rows
Select the columns you want to check for duplicates in the SELECT statement
Q144. Difference b/w white and block box testing?
White box testing is testing the internal structure of the system while black box testing is testing the functionality of the system.
White box testing is also known as clear box testing or structural testing
It involves testing the internal workings of the system, such as code and algorithms
Black box testing is also known as functional testing
It involves testing the external functionality of the system, without knowledge of its internal workings
Both types of testing are import...read more
Q145. How to tune the stored Procedure
Tuning stored procedures involves optimizing query performance by analyzing execution plans and indexing.
Analyze execution plans to identify bottlenecks
Use appropriate indexing to improve query performance
Avoid using cursors and temporary tables
Minimize network traffic by reducing data transfer
Use parameterized queries to avoid SQL injection attacks
Q146. What is topology and its type
Topology is the study of geometric properties and spatial relations unaffected by the continuous change of shape or size.
Topology is concerned with the properties of space that are preserved under continuous transformations, such as stretching or bending.
It is used in mathematics, physics, computer science, and engineering.
Types of topology include point-set topology, algebraic topology, and differential topology.
Examples of topological properties include connectedness, compa...read more
Q147. Why hexaware ,are you ready to reallocate
I am interested in the opportunities and growth potential at Hexaware and am open to relocating for the right opportunity.
Interested in the growth potential at Hexaware
Open to relocating for the right opportunity
Excited about the opportunities at Hexaware
Q148. Explain the OOP Concepts? Use of OOP?
OOP stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOP focuses on creating objects that contain both data and methods to manipulate that data.
Encapsulation: Objects hide their internal state and require interaction through defined interfaces.
Inheritance: Objects can inherit attributes and methods from parent classes.
Polymorphism: Objects can take on multiple forms and behave differently based on their data type.
Example: In...read more
Q149. Find the student with marks greater than 80 in all subjects
Filter students with marks greater than 80 in all subjects
Iterate through each student's marks in all subjects
Check if all marks are greater than 80 for a student
Return the student if all marks are greater than 80
Q150. Write the syntax to define the schema of a file for loading.
Syntax to define schema of a file for loading
Use CREATE EXTERNAL TABLE statement in SQL
Specify column names and data types in the schema definition
Example: CREATE EXTERNAL TABLE MyTable (col1 INT, col2 STRING) USING CSV
Q151. build.prform(); is corrct syntax for ky board action?
Q152. Write Bubble sort Program ?
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Compare adjacent elements and swap them if they are in the wrong order
Repeat this process until the list is sorted
Time complexity is O(n^2)
Example: [5, 3, 8, 4, 2] -> [3, 5, 8, 4, 2] -> [3, 5, 4, 8, 2] -> [3, 5, 4, 2, 8] -> [3, 4, 5, 2, 8] -> [3, 4, 2, 5, 8] -> [3, 4, 2, 5, 8] -> [3, 2, 4, 5, 8] -> [2, 3, 4, 5, 8]
Q153. Query to fetch only numbers from alphanumeric data from a table.
Use regular expressions to extract numbers from alphanumeric data in a table.
Use the REGEXP_REPLACE function in SQL to replace all non-numeric characters with an empty string.
For example, SELECT REGEXP_REPLACE(column_name, '[^0-9]', '') FROM table_name;
This will return only the numbers from the alphanumeric data in the specified column.
Q154. Query to fetch data greater than average, min and max salary.
Query to fetch data greater than average, min and max salary.
Calculate average, min, and max salary first
Use a SELECT statement with WHERE clause to filter data greater than average, min, and max salary
Q155. what is polymorphism, what is fibbanocci series
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon. Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Polymorphism allows different objects to be treated as instances of a single class, enabling flexibility and reusability in code.
Fibonacci series starts with 0 and 1, with each subsequent number being the sum of the two preceding numbers (0, 1, 1, 2, 3, 5, 8, ...)
Polymo...read more
Q156. How outbound BPO industry work?
Outbound BPO industry involves making calls to potential customers to sell products or services.
Outbound BPO agents make calls to potential customers to sell products or services
They follow a script and try to convince the customer to make a purchase
They may also conduct surveys or collect information from customers
Outbound BPO industry requires good communication and persuasion skills
Examples of outbound BPO services include telemarketing, lead generation, and appointment se...read more
Q157. What would you do in case of a Ransomware attack?
Isolate infected systems, disconnect from network, report incident to management, restore from backups.
Isolate infected systems to prevent further spread of ransomware
Disconnect infected systems from the network to prevent communication with the attacker
Report the incident to management and IT security team for further investigation
Restore affected systems from backups to recover data without paying ransom
JVM stands for Java Virtual Machine, it is an abstract computing machine that enables a computer to run Java programs.
JVM is responsible for converting Java bytecode into machine code that can be executed by the computer's CPU.
It provides a platform-independent execution environment for Java programs.
JVM manages memory, handles garbage collection, and provides security features for Java applications.
Examples of JVM implementations include Oracle HotSpot, OpenJ9, and GraalVM.
Q159. Explain structure and later of current project
The current project is a web application for managing inventory and sales.
The project follows a MVC (Model-View-Controller) architecture
Uses technologies like React for the front-end and Node.js for the back-end
Database schema includes tables for products, customers, orders, etc.
Implemented features like user authentication, product search, and order processing
Q160. What are Buy ins ? It's characteristics
Buy ins refer to the process of gaining acceptance or agreement from others to support a particular idea or initiative.
Buy ins involve convincing others to support a particular idea or initiative
They are characterized by the need for persuasion and negotiation
Buy ins can be achieved through effective communication, building relationships, and addressing concerns
Examples of buy ins include gaining support for a new project, convincing stakeholders to invest in a business, or g...read more
Q161. explain the constructor and its types of it.
A constructor is a special method used to initialize objects in a class. It can have different types based on parameters.
A constructor has the same name as the class it belongs to.
It is automatically called when an object is created.
Constructors can be parameterized or non-parameterized.
Parameterized constructors accept arguments to initialize object properties.
Non-parameterized constructors have no arguments and provide default values.
Constructors can be overloaded, allowing...read more
Q162. Why string is immutable Explain Pom Difference between implicit and explicit wait
Strings are immutable in Java because they are stored in the String pool and any modification creates a new string object.
String objects are stored in the String pool to save memory
Any modification to a string creates a new string object
Example: String str = "hello"; str.concat("world"); will create a new string object with "helloworld"
Q163. Explain your framework What is grid what is webtable what are selenium waits
Framework is a set of guidelines, tools, and best practices for automation testing. Grid is a tool for parallel testing. Webtable is an HTML table. Selenium waits are used to wait for certain conditions before proceeding.
Framework is a structured approach to automate testing processes
Grid is used for parallel testing, allowing multiple tests to run simultaneously on different machines
Webtable is an HTML table used to display data on a web page
Selenium waits are used to pause ...read more
Q164. What are the types of Load Tests
Types of Load Tests include Stress Testing, Spike Testing, Endurance Testing, and Volume Testing.
Stress Testing: Evaluates system behavior under extreme conditions to determine breaking points.
Spike Testing: Tests system response to sudden spikes in load to ensure stability.
Endurance Testing: Checks system performance over an extended period to identify any issues related to prolonged use.
Volume Testing: Assesses system performance with a large amount of data to ensure scalab...read more
Q165. What is operator overriding & overloading in java
Operator overriding is redefining an operator in a subclass while overloading is defining multiple methods with the same name but different parameters.
Operator overriding is used to change the behavior of an operator in a subclass.
Overloading is used to define multiple methods with the same name but different parameters.
Overloading can be done with both unary and binary operators.
Example of operator overriding: '+' operator in String class.
Example of operator overloading: '+'...read more
Q166. What is difference in delete and truncate
Delete removes rows one by one, while truncate removes all rows at once.
Delete is a DML command, while truncate is a DDL command
Delete can be rolled back, while truncate cannot be rolled back
Delete fires triggers, while truncate does not fire triggers
Q167. Explain about Function and non-functional testing
Function testing checks if the software meets the functional requirements while non-functional testing checks the non-functional aspects.
Function testing ensures that the software meets the functional requirements specified in the requirements document.
Non-functional testing checks the non-functional aspects of the software such as performance, usability, security, etc.
Function testing is usually done using black-box testing techniques while non-functional testing is done usi...read more
Q168. Who will do white box testing?
White box testing is usually done by developers or automation testers.
Developers or automation testers usually perform white box testing.
White box testing involves testing the internal structure of the application.
It requires knowledge of the code and the system architecture.
White box testing is used to test individual functions or modules.
Examples of white box testing tools include JUnit and Selenium.
Q169. How to interchange values of 2 variables
To interchange values of 2 variables, use a temporary variable to store one value before swapping them.
Declare a temporary variable to store the value of one variable
Assign the value of the first variable to the temporary variable
Assign the value of the second variable to the first variable
Assign the value of the temporary variable to the second variable
Q170. How do you increase array size?
To increase array size, you can create a new array with a larger size and copy the elements from the original array to the new array.
Create a new array with a larger size
Copy elements from the original array to the new array
Update the reference to the new array
Q171. What is difference between c and c++ What is encapsulation.
C is a procedural programming language while C++ is an extension of C with added features like object-oriented programming.
C is a procedural language while C++ supports both procedural and object-oriented programming.
C++ has additional features like classes, objects, inheritance, and polymorphism.
C++ supports function overloading and namespaces, which are not present in C.
C++ has a standard template library (STL) that provides useful data structures and algorithms.
C++ allows ...read more
Q172. Explain some annotations that are used in Sling Model
Annotations used in Sling Model for AEM development
The @Model annotation is used to define a Sling Model class
The @Inject annotation is used to inject OSGi services or request attributes
The @Self annotation is used to inject the current resource
The @Via annotation is used to specify the resource type to adapt from
The @Named annotation is used to specify the name of the injected property
Q173. Code for Fibonacci sequence
The Fibonacci sequence is a series of numbers in which each number is the sum of the two preceding ones.
Start with two variables, a and b, initialized to 0 and 1 respectively.
Loop through the desired number of Fibonacci numbers.
In each iteration, calculate the next Fibonacci number by adding a and b.
Update the values of a and b to the next two numbers in the sequence.
Store each Fibonacci number in an array.
Return the array of Fibonacci numbers.
Q174. Technical question: Explain LODs
LODs stands for Level of Detail. It is a technique used in computer graphics to optimize the rendering of complex scenes.
LODs are used to reduce the amount of detail in a scene based on the distance from the viewer.
This technique is commonly used in video games to improve performance.
For example, a tree in a game may have multiple LODs with different levels of detail depending on how far away the player is from it.
LODs can also be used in architectural visualization to optimi...read more
Q175. What is the use of GROUP BY clause?
The GROUP BY clause is used in SQL to group rows that have the same values into summary rows.
It is used with aggregate functions like COUNT, SUM, AVG, etc.
It helps in summarizing data and generating reports.
It is often used in conjunction with the HAVING clause to filter grouped data.
Example: SELECT department, COUNT(employee_id) FROM employees GROUP BY department;
Q176. what will you get from the company's traffic
I will contribute to the company's traffic management by ensuring compliance with safety regulations and implementing effective emergency response plans.
Ensuring compliance with traffic safety regulations
Implementing effective emergency response plans
Conducting regular safety inspections and audits
Training staff on traffic safety procedures
Collaborating with local authorities for traffic management
Q177. Explain about react core concepts and flux architecture
React core concepts include components, state, and props. Flux architecture is a pattern for managing data flow in React applications.
React components are reusable UI elements that can be composed to build complex interfaces
State is data that can change within a component and can trigger a re-render
Props are read-only data passed down from a parent component to a child component
Flux architecture uses a unidirectional data flow to manage state and update the UI
Flux includes ac...read more
Q178. What is Interface vs Abstraction
Interface defines a contract for a class to implement, while abstraction hides the implementation details.
Interface is a blueprint of a class that defines what methods a class must implement.
Abstraction is a concept that hides the implementation details and shows only the functionality.
Interfaces can have multiple inheritance, while abstraction can be achieved using abstract classes.
Example: Interface 'Shape' may have methods like 'calculateArea()' and 'calculatePerimeter()',...read more
Q179. What isn fund accounting
Fund accounting is a specialized form of accounting used by investment companies to track and report on the financial activities of investment funds.
Fund accounting is used by investment companies to manage the financial activities of investment funds.
It involves tracking and reporting on the income, expenses, and investments of the fund.
Fund accountants ensure compliance with regulatory requirements and provide accurate financial statements to investors.
They calculate the ne...read more
Q180. What is the difference between map and flat map
Map transforms each element of a collection, while flatMap transforms each element into a new collection and flattens the result.
Map applies a function to each element of a collection and returns a new collection with the results
FlatMap applies a function that returns a collection to each element of a collection, then flattens the result into a single collection
Example: map([1, 2, 3], x => [x, x+1]) returns [[1, 2], [2, 3], [3, 4]], flatMap([1, 2, 3], x => [x, x+1]) returns [...read more
Q181. What is windows powershell?
Windows PowerShell is a command-line shell and scripting language designed for system administration tasks.
It is built on the .NET Framework
It allows users to automate tasks using scripts
It supports remote management of Windows machines
It has a rich set of commands and utilities
Example: Get-Process command retrieves information about running processes
Example: Set-ExecutionPolicy command changes the PowerShell execution policy
Q182. What is a semaphore ?
A semaphore is a synchronization construct used to control access to a shared resource by multiple processes or threads.
Semaphores can have an integer value representing the number of available resources.
They can be used to prevent race conditions and ensure mutual exclusion.
Operations on semaphores include wait (P) and signal (V).
Q183. 1. Explain Types of network
Types of network include LAN, WAN, MAN, WLAN, PAN, SAN, CAN, and VPN.
LAN (Local Area Network) is a network that covers a small area such as a home, office, or building.
WAN (Wide Area Network) is a network that covers a large geographical area such as a city, country, or even the world.
MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, typically a city or town.
WLAN (Wireless Local Area Network) is a LAN that uses wireless ...read more
Q184. How hashmap works internally?
Hashmap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.
Hashmap uses a hash function to convert the key into an index in an array.
Collisions can occur when two keys map to the same index, which is resolved using separate chaining or open addressing.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval of values.
Java's Hashmap implementation uses an array of linked lists to handle collisions.
The load f...read more
Q185. What is DI and it's use
DI stands for Dependency Injection and is a design pattern used to increase flexibility and maintainability of code.
DI is a technique where one object supplies the dependencies of another object instead of the object creating them itself.
It helps in decoupling components, making them easier to test and reuse.
DI containers like Spring Framework in Java are used to manage dependencies and inject them into objects.
Example: Instead of hardcoding a database connection in a class, ...read more
Q186. How to write Immutable class in java
Immutable class in Java
Make the class final
Make all fields private and final
Do not provide any setter methods
If mutable objects are used, return a copy instead of the original object
Q187. What are concepts of oops
OOPs concepts are the principles of Object-Oriented Programming that help in designing and implementing software.
Abstraction
Encapsulation
Inheritance
Polymorphism
Class
Object
Method
Message Passing
Q188. Which Inheritance does not support java?
Java does not support multiple inheritance.
Java supports only single inheritance through classes.
However, it supports multiple inheritance through interfaces.
Diamond problem can occur in multiple inheritance.
Q189. What is SCCM ?
SCCM stands for System Center Configuration Manager. It is a software management tool used for deploying, managing and monitoring software and devices in an enterprise environment.
SCCM is used for automating software deployment and updates across a network
It can manage devices running on different operating systems such as Windows, macOS, and Linux
SCCM provides inventory management, software metering, and reporting capabilities
It can also be used for patch management and secu...read more
Q190. Difference between Waterfall and Agile methodology
Waterfall is a linear approach to project management while Agile is iterative and flexible.
Waterfall follows a sequential process while Agile is iterative.
Waterfall requires detailed planning upfront while Agile allows for changes throughout the project.
Waterfall is best suited for projects with well-defined requirements while Agile is better for projects with evolving requirements.
Waterfall is more rigid while Agile is more flexible and adaptable.
Examples of Waterfall includ...read more
Q191. Extracting data out of delimited strings
Explaining how to extract data from delimited strings.
Use the split() method to split the string into an array based on the delimiter.
Access the desired data by indexing the array.
Use regular expressions to handle more complex delimiters.
Consider using a library like csv-parser for CSV files.
Handle edge cases like empty strings or missing delimiters.
Q192. What are the pillers of oops concept
The pillars of OOPs concept are Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q193. diff btw assertion vs validation/verification
Assertion is a statement that checks if a condition is true, while validation/verification is the process of confirming that a product meets specified requirements.
Assertion is used to validate the expected outcome of a test case.
Validation/verification is the process of checking if the product meets the specified requirements.
Assertions are typically used within test scripts to verify the expected behavior of the system.
Validation/verification involves comparing the actual r...read more
Q194. STP loop prevention how its working
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
Q195. Whats the bpo meaning of your
BPO stands for Business Process Outsourcing.
BPO refers to the practice of contracting specific business processes to a third-party service provider.
It involves outsourcing non-core functions such as customer service, technical support, data entry, and more.
BPO companies help organizations streamline operations, reduce costs, and improve efficiency.
For example, a company may outsource its customer service department to a BPO firm located in a different country.
BPO has become a...read more
Q196. How to sync primary and standby?
Primary and standby databases can be synced using Data Guard in Oracle.
Configure Data Guard on primary and standby databases
Enable redo transport services
Monitor and resolve any synchronization issues
Perform switchover or failover when necessary
Q197. What is Password Hash Synchronization?
Password Hash Synchronization is a feature in Azure AD that syncs on-premises password hashes to the cloud.
Allows users to use the same password on-premises and in the cloud
Improves security by not storing actual passwords in the cloud
Requires Azure AD Connect to be installed and configured
Can be used in conjunction with Pass-Through Authentication
Helps to simplify the user sign-in experience
Q198. Why string is immutable?
String is immutable to ensure thread safety and prevent unintended modification.
Immutable objects are safer to use in multi-threaded environments as they cannot be changed by other threads.
String pool is possible because of immutability, which saves memory and improves performance.
StringBuffer and StringBuilder classes are used for mutable string operations.
Example: String s = "hello"; s.concat(" world"); // returns a new string, s remains unchanged.
Q199. What will do in Real application cluater
Real Application Cluster (RAC) is a cluster database with shared disk architecture.
RAC allows multiple instances to access a single database simultaneously.
It provides high availability and scalability.
RAC uses Oracle Clusterware to manage the cluster.
Load balancing and failover are automatic in RAC.
RAC requires additional hardware and software licenses.
Q200. How to Calculate NAV ?
NAV is calculated by subtracting liabilities from assets and dividing by total outstanding shares.
Calculate the total value of assets held by the fund
Subtract the total value of liabilities from the total value of assets
Divide the result by the total number of outstanding shares
NAV = (Total Assets - Total Liabilities) / Total Outstanding Shares
Example: If a fund has $10 million in assets, $2 million in liabilities, and 1 million outstanding shares, the NAV would be $8 per sha...read more
Top HR Questions asked in Hexaware Technologies
Interview Process at Hexaware Technologies

Top Interview Questions from Similar Companies





