What is difference between CHAR and VARCHAR2?What is the maximum SIZE allowed for each type?
6 33618If i insert record in table A and these record should update in table B by using Trigger.How to achieve this.
4 10516I have a mapping loading 100 records and it failed on 20th record. how to recover it without changing anything.(in prod where we don't have any access).. (the session should should start from 21 record)
1560I have following column in the table. col1 1 a b c 2 3 d and I want to display it as num chars 1 a 2 b 3 c 4 d numbers in one column and letters in another column.
1 2986Can anyone tell me what are the roles and responsibilities of informatica support ( L1, L2, & L3 ) Team?
1 1799How to recover a workflow? What are the different approaches?( In prod i.e no access to modify)
1135Post New Saama Tech Interview Questions
Do you know the capabilities of cursors?
What is Java Annotations?
What does exe mean?
Can the curly brackets { } be used to enclose a single line of code?
What is auto in css?
Why is it desirable to create an additional commit rather than amending an existing commit?
How to remotely administer ms iis?
If hired, what do you believe would be your role and responsibility at Amazon?
Explain streamreader/streamwriter class?
What are sharing rules? Name what are the types of sharing rules?
What is the use of mdt (modified data tag)?
How to reset/destroy a cookie?
Information-gathering techniques used in the Risk Identification process include all of the following except: A. Brainstorming B. Delphi technique C. Interviewing D. Kaizen technique
In General please do read newspapers.And be thorough with 10th history and Geography.Biology also
What is delegation pattern in ios?