Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

TCS Informatica Interview Questions
Questions Answers Views Company eMail

Can we change Dynamic to Static or Persistent cache? If so what happens?

2261

What is Java Transformation? what are the uses of it?

3066

Create a mapping which contains 2 target tables. When the session runs for the first time it shud load Target table 1 and when it runs for second time it shud load Target table 2.

7 15272

Can we update a target table (without primarykey) by using update strategy transformation?

4 23851

What is the main purpose of Unconnected lookup other than updating slowly changing dimensions? or In which case u use Unconnected lookup?

2 7597

Aggregator transformation is having fields say a,b,c,d,e group by is enabled on a,b,c with sorted input,How the aggregator transformation process the i/p data?or in which way i/p comes to agg transformation

1 5062

Which one is better performance wise connected/un-connected lkp?why?

2 14170

One of the optimizing technique to improve the session performance is push down optimization,by using push down optimization we push as much as transformation logic to source/target database,but this degrades the d/b performance,how to overcome this?

2313

why we are using level option in normalizer transformation

1 7026

following source name gender ramya female ram male deesha female david male kumar male i want the target male female ram ramya david deesha kumar any body give solution above question?

4 8516

difference between informatica 8.1.1 and 8.6? And different betweeninformatica 7x and 8x?

1 8713

how the informatica server sorts the strings values in rank transformations?

3 16897

can you use flat file for repository?why?

2 7384

source table A having 100000 records. and target B table having 100000 records. now iam updating B records using update query. i don't know which record is update in target. write a sql query get all updated records from target table B.

4 9764

When will u go for Dynamic Cache and Persistent Cache? Pls explain with an example?

2 9515

Post New TCS Informatica Interview Questions


TCS Informatica Interview Questions


Un-Answered Questions

What is microsoft word and what is it used for?

652


what is difference between delete and truncate commands? : Sql dba

1175


Which authorization object is used during the authorization check on hr infotype 0001?

1082


what do you mean by a vsam split?

1153


Are you familiar with lean manufacturing principles and Six Sigma methodologies? How have you applied these concepts to enhance production efficiency?

1


What are the best linux system programming interview questions you've ever asked or been asked?

840


How do I see threads in linux?

980


Which ROI setting can we able to modify?

64


Is node js a web server?

566


What are the protocols and forms in ajax?

1028


Expand-------ANTS

2079


What is recursive function in r?

94


Describe the image white list feature in lotus notes.

3


1. is it possible to use the cursor atttibutes (%found ,% rowcount , %isopen , %notfound ) to our user defined cursor names ....... cursor cursor_name is select * from scott.emp if you use... cursor_name%found , %rowcount ,%isopen,%notfound...will it work... -------------------------- 2.what is the difference between the varray and index by table .. -------- 3. type type_name is table of number(8,3) index by binary_integer; identifier_name type_name; first , last , prior , next ,trim are the methods we can use it for the above type...simillary is there any way to apply for cursors... with thanks and regards..sarao...

2499


How can you take an AD backup in Windows 2003 server?

441