i having source, router transformation, two targets in my mapping... i given two conditions in router 1)sal >500 2)sal < 5000 --------------- my source is havig two sal records (1)1000 (2)2000 then which target will load first? will both targets are get load or single target only get load...... why?
9 21696i having mapping emp---> sq_emp--->target using this mapping i have to load dept table values into target... (condition assume there is no primary and foreign key relation between emp(table x) and dept (table Y))
5 10071how will u get 1 and 3rd and 5th records in table what is the query in oracle please help me
16 25922write a sql query following table? col1 col2 1 2 1 2 1 2 3 4 3 4 5 6 i want the output like unique duplicate col1 col2 col1 col2 1 2 1 2 3 4 1 2 5 6
1 3556Can any one give me an example for factless fact table ? If your answer is studunt attendence registration,could you plese give me explanation for this ?
3 10747split two strings into two columns For Eg. Source:-Full Name: Shiva Kumar Target:- First Name:Shiva Last Name:Kumar
1 15800If the source has duplicate records as id and name columns, values: 1 a, 1 b, 1 c, 2 a, 2 b, the target should be loaded as 1 a+b+c or 1 a||b||c, what transformations should be used for this?
4 10321source target --------- -------- name no sal name no sal max_sal r 10 1000 r 10 1000 3000 y 20 3000 y 20 3000 3000
7 12850Post New Cap Gemini Informatica Interview Questions
Describe about Fusing spleen cells with myeloma cells using PEG ?
Maintaining sales organization (tvko)?
If specific gravity of cement is less than 3.15 what is the cause?
What is the article title?
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
Do you think tools are required for managing change. Explain and please list some tools/practices which can help you managing change.
(X^mroot2)/2. Find the value of m?
how to lock screen orientation to landscape mode? : Blackberry tablet os
What are the main differences between parsimony,distance and likelihood-based algorithms?
What is the purpose of behaviour driven development (bdd) methodology in the real world?
What are the types of authentication?
How many variables do you need?
why all high frequency semiconductors have comparatively low current rating?
What is reduce side join in mapreduce?
Does java have linq?