How do you take care of security using a repository manager
Answer Posted / rekha
REPOSITORY PRIVILAGES
FOLDER PERMISSION (OWNERS,GROUPS,USERS)
LOCKS (READ,WRITE,EXECUTE.FETCH ,SAVE)
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What are mapplets? How is it different from a Reusable Transformation?
Explain the informatica workflow?
Explain how to import oracle sequence into informatica?
What is the different lookup cache(s)?
what is granularity,what type of granularity we will take in fact tables either lowlevel or highlevel,if two tables having same granularity that is posiable or not
Suppose on 1st Nov 2010 you had created a mapping which includes huge aggregator calculations and it is under process for next two days. You will notice that even on 3rd day also its still calculating. So without changing a logic or changing a mapping How will you troubleshot or to run that mapping? Explain the steps
explain any diffcult scenario that u have faced in your experience... or explain any complex maping u have developed?
What is a rank transform?
what is INFORMATICA TESTING process
Why do we need informatica?
Different qualification between a related rotate toward the sky and isolates look upward?
Suppose we have a source qualifier transformation that populates two target tables. How do you ensure tgt2 is loaded after tgt1?
My source is delimited flat file Flat file data is H|Date D1|ravi|bangalore D2|raju|pune T|4 The data will be send to target if the fallowing two conditions satisfied 1.The first row Date column is equal to SYSDATE 2.Last record second port equal to number of records. How to achieve?
Give one example for each of conditional aggregation, non-aggregate expression, and nested aggregation?
Explain the tuning lookup transformation - informatica