In one of intervie, my interviwer asked, I have a file which contains 4 records I would like to split the 4 different outputs for each record how to do?
14 33715I want to increse the size of one existing dataset, can anyone tell me the TSO command throgh that I can edit it.
4 11035Attended Xansa Interview , Asked Questions : 1) Diff between Renames and Redefines 2) Comp and Comp -3 3) What will happen if DISP = ( NEW, DELETE, KEEP) 4) Gave one scenario like , if PIC clause X(50) has to be increased to X(70) how u will proceed with this change. 5) Diff between Section and Paragraph
4 8438As you are working with cmmi level 5 company ,can you tell me what processes you r following as QA engineer?
2481Role of Finance Manager in matters of dividend policy? Alternatives and factors that you may consider before finalizing dividend policy?
4 13522What will happen if a variable is declared as below.. Explain with an example? Working storage section:- 01 WS-VARX PIC X(10) VALUE 'ABCDEFGHIJ'. 01 WS-VARN REDEFINES WS-VARX PIC 9(5) VALUE '12345'. What will happen I want Display WS-VARX and WS-VARN?
3 6793What will happen if a variable is declared as below.. Explain with an example? Working storage section:- 01 WS-VARX PIC X(10) VALUE 'ABCDEFGHIJ'. 01 WS-VARN REDEFINES WS-VARX PIC 9(5) VALUE '12345'. What will happen I am going to Display the WS-VARX and WS- VARN?
6 10665Post New Xansa Interview Questions
How can I automate database maintenance routines?
Explain about Viewcontroller lifecycle.
What are the variables in tensorflow?
Hi Masters, in Oracle Applications 11i, we hace 2 functions using the same form, i need to create 1 personalization, but that code must afect only one function.... how can i do that?
What is self closing tag?
Is sql a oracle?
What do you mean by loam soil?
Differentiate between dataset and datareader?
which are the five general EMI(electromagnetic interference) testings conducted on any system?
What is postgres default password?
Differences between amazon s3 and ec2?
Where is spring framework used?
Which cryptologic mechanisms can be used to protect integrity?
Explain split function in perl?
The component used for sorting data is called as?