given the following: 77 A PIC 9V9 VALUE 9.5 77 B PIC 9 VALUE 9. 77 C PIC V9 VALUE 0.8 77 D PIC 9 77 E PIC 9 77 F PIC 9V999 what are the contenta of D E nad F after the following statements are executed: COMPUTE F ROUNDED=A+C/B MULTIPLY A BY C GIVING E ADD B C A GIVING D ROUNDED a.F=9.589 E=8 D=1 b.F=9.589 E=8 D=9 c.F=9.589 E=7 D=9 d.F=9.589 E=7 D=1
5 14227I have the requirement to compare the two files and pick up the matching records. File 1. file2 23 32 32 13 34 15 35 36 36 35 43 Get the matching records from this 2 files to out file. how you will do this in cobol program?
15 99843While doing system testing your have missed out some issues. The same issue is found by customer and he reverts back to you for an explaination. How do you convince him or how do you justify yourself about your testing?
3 116781 chocolate cost is Rs.1 & if we return 3 wrapers(covers) of chocolate we get 1 more chocolate. If u have Rs.15 how many chocolates do u get...?
54 137593HEDGING is good or bad, because if one get loss, it will make others rich....clarify with practical example?
1 5353Post New Broadridge Interview Questions
From which base class do all Web Forms inherit from?
what are the passive two-wire elements?
what is breathing?
What ethical considerations arise in AI systems that learn from user behavior?
database acl level has manager access.his name is listed in author and Reader fields. but he didn't sea a documents what is the reason?
What is zookeeper in hadoop?
What is an i-server?
How often do you read the paper or watch the news on TV? How important is it for you to keep up with current events?
Explain the use of new keyword?
What are objects in php?
Explain the front controller class of spring mvc.
What is financial modelling in excel?
What is the main role of padding?
What is the use of document object?
How do we use rsa for both authentication and secrecy?