given the following: 77 A PIC 9V9 VALUE 9.5 77 B PIC 9 VALUE 9. 77 C PIC V9 VALUE 0.8 77 D PIC 9 77 E PIC 9 77 F PIC 9V999 what are the contenta of D E nad F after the following statements are executed: COMPUTE F ROUNDED=A+C/B MULTIPLY A BY C GIVING E ADD B C A GIVING D ROUNDED a.F=9.589 E=8 D=1 b.F=9.589 E=8 D=9 c.F=9.589 E=7 D=9 d.F=9.589 E=7 D=1
5 14248I have the requirement to compare the two files and pick up the matching records. File 1. file2 23 32 32 13 34 15 35 36 36 35 43 Get the matching records from this 2 files to out file. how you will do this in cobol program?
15 99898While doing system testing your have missed out some issues. The same issue is found by customer and he reverts back to you for an explaination. How do you convince him or how do you justify yourself about your testing?
3 116981 chocolate cost is Rs.1 & if we return 3 wrapers(covers) of chocolate we get 1 more chocolate. If u have Rs.15 how many chocolates do u get...?
54 137778HEDGING is good or bad, because if one get loss, it will make others rich....clarify with practical example?
1 5369Post New Broadridge Interview Questions
What are the types of feature modules?
What do you mean by sql server agent?
how much area can be platered by a mason for exterior
How to open and read data files with Perl
Tell me how include and require are different from each other?
How much bandwidth does the cloud connector consume?
what we do when calibration of any instrument is fail ?
Are you open to work in night shifts?
I want my class to be developed in such a way that no other class (even derived class) can create its objects. How can I do so?
What is the use of writing sharing rules? Can you use sharing rules to restrict data access?
what is the role of dip user in our database?
Can you evaluate payroll results using the sap query and the ad-hoc query?
Who are naive users?
What strategies can simplify LLM development and deployment?
What is ad hoc analysis?