Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Patni Interview Questions
Questions Answers Views Company eMail

following table source target name gender name target a1 male a1 female a2 female a2 male i want a1 female update to target how will do?

2 5243

What is degenerated dimention table?

7 8821

Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection

7 7332

What is junk dimention?

3 6959

I have scenario, i have 10 worklflows and i want run the 1st workflow first and immediately i want to run 10th workflow has to run and am not bothering of 2 to 9 workflows? can any one help me how to do this? Thanks in advance.....

4 8107

When validity of role is over its profile get deleted from master record but corresponding role remains as it is, Why ? Can we delete it automatically ?

2 7363

What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?

3 10814

What is Use Of SM35P and SM35 , Is there any difference between these two ?

1 16958

What is use Of SHDB (Transaction Recorder) ?

2 11394

How can we Lock transaction ? What happens exactly ?

4 11062

How many Single roles can be added in one Composite role ?

3 24250

What is use of System Task Tab on menubar in PFCG ?

2 9387

What is mean By Start Profile, Default Profile, Instance Profile ? What is difference between these ?

4 20664

How many Sub Reports added in One MainReport?

4 16407

In JCl which of this activities get executed if act002 abnormally terminates //job001 job ......... //act001 exec pgm=cobo01 //act002 exec pgm=cob02, cond=(01,le) //actoo3 exec pgm=cob03, cond=only //actoo4 exec pgm=con04

3 6639

Post New Patni Interview Questions


Patni Interview Questions


Un-Answered Questions

What is the aws key management service?

93


The stress concentration is caused due to ?

809


Why pointers are used?

730


How do I turn off auto sync on android?

592


In block work seawalls what is the purpose of slip joints?

862






In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2065


What the core interfaces are of hibernate framework?

194


What are different types of Compilers and also define how to convert NFA to DFA?

58


From the following identify the non schema object: packages, triggers, public synonyms, tables and indexes.

701


Define byte?

739


Give me a example that differentiate Test case Procedure,Test case Scenario,Test case Discription & test steps.

2313


In EDO ACBs what is a purpose of closing coil and motor, what is the operation of these devices are they inetconnected. means if we give supply to motor and by BCS we charge Closing coil,what exact is operation is and how it charge a spring of ACB. Sir if anybody has an wiring diagram please send me the link to operate and EDO breaker.

1753


How do we determine if we should manage search engine marketing activities in-house or outsource to an sem vendor?

512


Why did my jdbc code throw a rollback sqlexception? : BEA Weblogic

602


Does c++ support multilevel and multiple inheritances?

633