How to import multiple xl files which are saved in a folder into SAS and extract two different types of values from a given variable at a time? Any help would be appreciated. Thanks Rasi
1280hi this is neraj, iam mca fresher i want to join sap course ,is it right or rong if it is right which module will taken among all modules in sap ,based on my mca fresher/
2492When conducting a business process reengineering study, what should you look for when trying to identify business processes to change? Why?
3651Hi Friends... I faced an question in Tcs.But i unable to answer. find the question below.. A root filesytem"c0t0d0s0" caries 100 gb data. in this filesystem. i am having 3 files named a,b,c it caries 20 gb data each. I need to take backup only 3 files a,b,c. How i can take. Note you need to take only 3 files to an single tape having capacity 80 gb. Whats the commad used?
TCS,
1936Can u explain me banking domain projects? And in banking domain projects how many dimension tables and how many fact tables and how to load source and targets in mapping level Please explain give me one example
4676
Hi Friends I am learning QTP and in preliminary stage, able to write statements with no addl constraints however i am not able to get a solution if there are two options to be selected from the weblist and also when there are options with radio buttons need your help Thanks
what is the difference between software product and software version ?
you have given estimation to your customer for 15 days and later it requires more days then how will u handle this situations...
What are the main objectives of configuration management and version control?
How do you relate JAVA and DOTNET with Application Support,Infrastructure Support Development in a Project Management Perspective
How to get the MVFs in workflow
what are the attrifacs followed in risk analysis
What are the main risk factors which may be encountered in the development of software?
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
What kind of Reporting you do?
explain the methodologies / ways to create the test cases for QA
what are the thing/problems that occurs during the developing the software..
what are the major items in Integration check list
If there are 11 versions of a mapping and if you want to keep the latest version and delete the remaining versions .. how do you do it?
Host and Agent are the component associated with which tool?