Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is version control in informatica ?

Advance thanks

Answer Posted / moorthy g

Check_Out and Check_in
----------------------
While starting u have to give CHECK_OUT then made some
changes in the mapping then u have to give CHECK_IN.
------
Note: Before check_in to check the mapping twice atleast.

Correct me If I'm wrong.
Best Regards,
Moorthy. G

Is This Answer Correct ?    2 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the sql query overwrite in source qualifier in informatica

1134


Why is sorter an active transformation?

1191


What is rank transform?

1054


Explain in detail about scd type 1 through mapping.

1619


How is Source Side push down optimization different to just providing a SQL override in Source qualifier transformation.

1837


Explain load alternative records / rows into multiple targets - informatica

1200


-Which expression we can not use in Maplets?, -Can we join(relate) two dimensions in a schema? -Why and where we use 'sorted input' option?

5868


What is the use of transformation?

1049


Describe an informatica powercenter?

1188


What are the reusable transformations?

1211


How many transformations can be used in mapplets.

1976


Different sorts of metadata that stores in the storage facility?

1069


What is blocking transformation?

1183


Explain incremental aggregation in informatica

1178


Please let me know how to make encryption and decryption with example?

1940