Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Wipro RPG400 Interview Questions
Questions Answers Views Company eMail

How can i keyed a flat file in RPGLE

5 23407

how to retrieve particular field records from a physical file,say i have a physical file called 'employee' in it i have to retrieve the records of a field 'admin' present in pf 'employee' using rpg,but i should not use logical file or openquery file.

3 8263

how can we find setll setgt chain read reade readp operations are successfull or not,give example.explain in detail.

4 13266

What is the diff bw PF/LF Name and their Record format name? what is restriction in record format then file name?

2490

What is the difference between ITER and DO ? I know both are used to execute set of statements repeatedly, but what is the main difference?

2 16350

how to run only 10 modules of existing N modules in service program in RPGILE ?

3 7198

What is a record lock error?

1239

Post New Wipro RPG400 Interview Questions


Wipro RPG400 Interview Questions


Un-Answered Questions

How to add an rss feed in magento?

3


What is the use of setFetchSize() and setMaxRows() methods in Statement?

504


What is the difference between work item and notification e-mail?

409


Describe a time when you've has to make a decision that was likely to be unpopular with your team

655


What are the android development tools?

497






what is the code provision for acceptance of fineness modulus range for fine aggregates in design mix

4478


What did you do to prepare yourself for this interview?

1374


How do I quit sql?

467


What is the difference between ArrayList and Vector? which one is better in Java

580


What is the arden syntax?

1


Genarally what we have to tell. If anybody asks in the interview. what are challenges u faced in the Project and what are the Risks u faced in the Project, Anybody can suggest it ......Thanks in Advance....

1687


How do I get rid of margins in pdf?

139


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

492


How can a database be repaired?

545


What is the need of multiple inheritance?

559