Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Cap Gemini Informatica Interview Questions
Questions Answers Views Company eMail

what is the main advantage of unconnected lookup

2 14576

what is junk dimension

4 7412

what is degenerated dimension

6 10027

what is the purpose of surrogate key and diff between primary key&surrogate key

1 6680

i having source, router transformation, two targets in my mapping... i given two conditions in router 1)sal >500 2)sal < 5000 --------------- my source is havig two sal records (1)1000 (2)2000 then which target will load first? will both targets are get load or single target only get load...... why?

9 21696

i having mapping emp---> sq_emp--->target using this mapping i have to load dept table values into target... (condition assume there is no primary and foreign key relation between emp(table x) and dept (table Y))

5 10071

my source is junk data how will u remove that junk data by using unix please any one replay me

3755

how will u get 1 and 3rd and 5th records in table what is the query in oracle please help me

16 25922

How can you change from reusable session into non-reusable session.

5 42833

write a sql query following table? col1 col2 1 2 1 2 1 2 3 4 3 4 5 6 i want the output like unique duplicate col1 col2 col1 col2 1 2 1 2 3 4 1 2 5 6

1 3556

Can any one give me an example for factless fact table ? If your answer is studunt attendence registration,could you plese give me explanation for this ?

3 10747

split two strings into two columns For Eg. Source:-Full Name: Shiva Kumar Target:- First Name:Shiva Last Name:Kumar

1 15800

Enterprise data warehouse your projects phase by phase explain?

1965

If the source has duplicate records as id and name columns, values: 1 a, 1 b, 1 c, 2 a, 2 b, the target should be loaded as 1 a+b+c or 1 a||b||c, what transformations should be used for this?

4 10321

source target --------- -------- name no sal name no sal max_sal r 10 1000 r 10 1000 3000 y 20 3000 y 20 3000 3000

7 12850

Post New Cap Gemini Informatica Interview Questions


Cap Gemini Informatica Interview Questions


Un-Answered Questions

Describe about Fusing spleen cells with myeloma cells using PEG ?

2058


Maintaining sales organization (tvko)?

1148


If specific gravity of cement is less than 3.15 what is the cause?

2363


What is the article title?

947


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2534


Do you think tools are required for managing change. Explain and please list some tools/practices which can help you managing change.

2092


(X^mroot2)/2. Find the value of m?

2677


how to lock screen orientation to landscape mode? : Blackberry tablet os

882


What are the main differences between parsimony,distance and likelihood-based algorithms?

2211


What is the purpose of behaviour driven development (bdd) methodology in the real world?

666


What are the types of authentication?

842


How many variables do you need?

983


why all high frequency semiconductors have comparatively low current rating?

2260


What is reduce side join in mapreduce?

653


Does java have linq?

124