Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

TetraSoft JCL Interview Questions
Questions Answers Views Company eMail

i have job card like this //job ***** //step1 exec pgm=iebgener //sysut1 dd dsn=main.sss,disp=shr // dd dsn=main1.sss,disp=shr // dd dsn=main2.sss,disp=shr //sysut2 dd dsn=out1.mmm ,disp=(new,catlg,delete) dcb=( ) // sysin dd * like this what i have to do to skip dsn=main1.sss please giveme answer asap

2 6355

mainframe questions like basic&depth

1010

Post New TetraSoft JCL Interview Questions




Un-Answered Questions

How do we convert from Numeric to be Words?

2494


How do I download outlook to my computer?

1


What does it mean by “tattooing” the Registry ?

122


How is collect statement different from append?

582


What is bootstrapping in angular?

474






How to get the length of string?

561


Which components manage deadlocks in db2?

600


What is a premium'? : insurance sales

347


What is the difference between #import and #include?

541


Is double-clicking supported on various components?

1


You are the project manger for Xylophone Phonics. They produce children's software programs that teach basic reading and math skills. You're performing cost estimates for your project and don't have a lot of details yet. You will use which of the following techniques? A. Analogous estimating techniques, because this is a form of expert judgment that uses historical information from similar projects B. Bottom-up estimating techniques because this is a form of expert judgment that uses historical information from similar projects C. Monte Carlo Analysis, because this is a modeling technique that uses simulation to determine estimates D. Parametric modeling, because this is a form of simulation used to determine estimates

820


Explain overloading. Can functions be overloaded?

560


What is web jobs in Azure?

458


how can you identify whether a given operation is transformation or action?

183


Difference interview secure configuration vs unsecure configurations in plugin.

361