following table source target name gender name target a1 male a1 female a2 female a2 male i want a1 female update to target how will do?
2 5243Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection
7 7332I have scenario, i have 10 worklflows and i want run the 1st workflow first and immediately i want to run 10th workflow has to run and am not bothering of 2 to 9 workflows? can any one help me how to do this? Thanks in advance.....
4 8107When validity of role is over its profile get deleted from master record but corresponding role remains as it is, Why ? Can we delete it automatically ?
2 7363What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?
3 10814What is mean By Start Profile, Default Profile, Instance Profile ? What is difference between these ?
4 20664In JCl which of this activities get executed if act002 abnormally terminates //job001 job ......... //act001 exec pgm=cobo01 //act002 exec pgm=cob02, cond=(01,le) //actoo3 exec pgm=cob03, cond=only //actoo4 exec pgm=con04
3 6639Post New Patni Interview Questions
What is the aws key management service?
The stress concentration is caused due to ?
Why pointers are used?
How do I turn off auto sync on android?
In block work seawalls what is the purpose of slip joints?
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
What the core interfaces are of hibernate framework?
What are different types of Compilers and also define how to convert NFA to DFA?
From the following identify the non schema object: packages, triggers, public synonyms, tables and indexes.
Define byte?
Give me a example that differentiate Test case Procedure,Test case Scenario,Test case Discription & test steps.
In EDO ACBs what is a purpose of closing coil and motor, what is the operation of these devices are they inetconnected. means if we give supply to motor and by BCS we charge Closing coil,what exact is operation is and how it charge a spring of ACB. Sir if anybody has an wiring diagram please send me the link to operate and EDO breaker.
How do we determine if we should manage search engine marketing activities in-house or outsource to an sem vendor?
Why did my jdbc code throw a rollback sqlexception? : BEA Weblogic
Does c++ support multilevel and multiple inheritances?