Hi All can any one give the answers for these Q's? 1.what are the contents of Personnel files? 2.what all are the statuatory deductions from salary?
2 6095Post New Siemens Human Resources Interview Questions
What does dollar sign ($) me in jquery?
what r the diffence between QTP 8.2 & QTP9.0?
What is strict mode in js?
How does mongodb provide consistency?
WHAT IS THE DEFINATION OF IN TECHNOLOGY AND OFF TECHNOLOGY ?
Write one line of code to get a list of names that start with character ājā?
What is s3? What is it used for? How can an encoding be used?
How do you detect memory leaks?
How we make bend & diffuser from any pipe (it's equation)& how we mark in pipe....
1. Tell me about your self? 2. Latest Project Introduction? 3. Difference between server jobs and parallel jobs? 4. Seq-Seq Explain its behavior and execution mode and which parallelism technique is used? 5. What is padding characters? 6. Seq-Seq, Seq-Copy-Seq which one is the best and efficient? 7. How many reject links do we have to a transformer? 8. How many reject links to join stage? 9. Difference between join and lookup? 10. How to design PX routine? 11. How can we call job in another job? 12. Difference between batch and sequencer? 13. Which Database is used? 14. What is change capture? Give briefing of that? 15. What is change Code? Explain? 16. How you call UNIX in Ds? 17. How do you call JCL in UNIX? 18. How do you pass the job status of one job to another job? Have designed any job sequencer? 19. How do you find a file in existed directory? 20. How can you call parallel jobs in transformer? 21. Execution of jobs in command line? 22. Tuning of sql queries? 23. What is orchestrating metadata? 24. What are junk dimension? 25. What are the third party tools you are used? 26. What are the system variables you have used?
How do you open an asp file?
I'm an MBA student. I need guidance to prepare for AMAZON COMPANY. can u pls post papers to ammuprathyu@ymail.com
Do I need wordpress hosting?
What is rank transformation?
Explain the concept of adversarial attacks and how to protect AI models from them.