When we are working as a HR in a company and applied for some other company. If the company asks for explanation that "why do you want to change from the existing company"? what can be the answer
1 41341. How actually index will work ? 2. Why do people prefer mostly bitmap index and btree index in datawarehouse ? 3. If I use the column in aggrigate functions like max,min,count and avg and if I have a index created on that column, will it increases the performance ?
1 4597Whether Aggrigator transformation ignore the null values or consider the null values ? Advance Thanks, Manojkumar
3 8844How do you avoid duplicate records with out using source qualifier,expression,aggrigator,sorter and lookup transformations ?
4 10971When we enable pushdown optimization technique, two options will be enabled (use view,..). Can anyone tell me how these two options will work ? When do we need to go for pushdown optimization technique ?
3 17392Why do flat file load is faster if you compare that with table load ? Please answer me. Advance Thanks, Manojkumar
11 18688PO made for 100 pcs and GR for 100 Pc but received the invoice for 110 pcs. How you will address this ?
4 17375Post New IBM Interview Questions
What is casting in java programming?
What are value fields?
how to overcome kernel isssues
What is nullable types in c#?
How do I interpret water vapor imagery?
How do I count rows quickly in excel?
Explain what are the attributes of category?
What is database example?
Can we declare array size as a negative number?
Differentiate between magnetic field and magnetic flux?
An interior designer designed a rack with the given dimensions. The dimensions are in feet. This coplanar frame repeats at every 5feet and constitute a space frame. The total length is 120feet. Which steel member will you suggest? A square bar, A square tube or a circular tube. Explain.
What is the usefulness of the distributed by clause in hive?
In what ways do you use math in your daily life?
How many methods can be used to insert rows and columns in a table?
Do hackers use python?