DWQA User ProfilesureshQuestions(16815)Answers(17160)Posts(0)CommentsWhat are the different types of transformation functions available in Informatica PowerCenter and how would you use them in a data transformation pipeline?suresh answered 3 months ago • Informatica47 views1 answers0 votesWhat is your experience with conducting vulnerability assessments and penetration testing?suresh answered 3 months ago • Cybersecurity32 views1 answers0 votesWhat are the key components of Informatica PowerCenter and how do they work together in a data integration workflow?suresh answered 3 months ago • Informatica66 views1 answers0 votesWhat is the difference between a Router and a Filter transformation in Informatica and when would you use each one?suresh answered 3 months ago • Informatica60 views1 answers0 votesDescribe the difference between model space and paper space in AutoCAD.suresh answered 3 months ago • Auto CAD38 views1 answers0 votesWhat are some common techniques for creating 3D models in AutoCAD?suresh answered 3 months ago • Auto CAD50 views1 answers0 votesDescribe the difference between a polyline and a line in AutoCAD.suresh answered 3 months ago • Auto CAD41 views1 answers0 votesWhat are the different types of coordinate systems used in AutoCAD?suresh answered 3 months ago • Auto CAD44 views1 answers0 votesDescribe a situation where you had to troubleshoot and resolve a complex issue while working on a project in AutoCAD. What steps did you take to identify the problem and how did you ultimately solve it?suresh answered 3 months ago • Auto CAD75 views1 answers0 votesCan you explain the difference between model space and paper space in AutoCAD and how they are used in the design process?suresh answered 3 months ago • Auto CAD87 views2 answers0 votesWhat are the different types of objects in AutoCAD?suresh answered 3 months ago • Auto CAD44 views1 answers0 votesWhat are the different ways to create a block in AutoCAD?suresh answered 3 months ago • Auto CAD94 views1 answers0 votesWhat are the different types of constraints available in AutoCAD?suresh answered 3 months ago • Auto CAD59 views1 answers0 votesWhat are the common methods used by attackers to gain unauthorized access to a network or system?suresh answered 3 months ago • Cybersecurity104 views1 answers0 votesCan you provide an example of a successful account management strategy you implemented that resulted in significant revenue growth or client satisfaction?suresh answered 3 months ago • Accounts273 views1 answers0 votesCrop