I have 2 dimensional array with having 100 elements. So how to find the 11th item in an array?
6 14398soc-7 is a bad data,invalid data. when ever we are moving the alphabets in the position of numeric then we got this abend. so my question is if o1 ws-data pic 9(1) value passing the alphabet some x. then we got soc-7 or not? i want clarification ?
7 10404Re: 01 NAME1 PIC X(13) VALUE "COBOL PROGRAMMING". 01 NAME2 PIC X(13). now I want to display the value of NAME1 in reverse order i.e value should be displayed as "GNIMMARGORP LOBOC" HOW can I do that ??? please let me know if any one knows it.
2 8503How to read records which is in sequential file in reverse order ? Exp. 1 2 3 4 5 . i want 5 4 3 2 1?please clear my doubt any one
10 23567How to remove the spaces at end of each record in the output file Via COBOL program? note: The file has a VB length
2 15052What is the significance of the PROGRAM-ID paragraph? If this name doesnt match with the name of the COBOL program, does it make a difference? Is the name specified in the PROGRAM-ID paragraph used as a name for the load module or any such thing?
4 14780Post New IBM COBOL Interview Questions
Can you print decimals in type n?
what is sap scriptview ?
Name the data type should you use if you want an 8-bit value thats signed?
Explain “@@rowcount” and “@@error” in sql server?
What is stray light in uv what are units for stray light
How can we change the uppercase to Lowercase in RPG?
What is stl containers in c++?
Name of the relay of low lub oil presuure in DG sets
Explain have you ever been fired or quit a job? : insurance sales
Can we create our own wrapper class in java?
You are a project manager for Dutch Harbor Consulting. Your latest project involved the upgrade of an organization's operating system on 236 servers. You performed this project under contract. You are in the Contract Closeout process and know that you should document: A. Lessons learned B. Performance measurements C. Formal acceptance D. Product verification
1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?
How to root mirror in linux?
What is the maximum clock frequency used by the 8085 microprocessor?
What is Catalyst framework?