IBM-CICS Interview Questions & Answers

  1. Question 1. What Is The Difference Between Start And Xctl?

    Answer :

    START is used to start a new task. It is a interval control command. XCTL is used to pass control to a program within the same task. It is a program control command.

  2. Question 2. What Are The Thress Bms Options?

    Answer :

    Minimum, Standard, FULL

  3. VSAM Interview Questions

  4. Question 3. What Is The Primary Objective Of Cics?

    Answer :

    To provide the control and services of the DB/DC system.

  5. Question 4. Can You Access Esds Files From Cics?

    Answer :

    Yes

  6. VSAM Tutorial

  7. Question 5. Can You Access Qsam (seq) Files From Cics?

    Answer :

    No

  8. IBM – VSAM Interview Questions

  9. Question 6. How Would You Resolve An Asra Abend?

    Answer :

    In COBOL II start with CEBR, and get the offset/instruction.

  10. Question 7. What Is An Aica Abend?

    Answer :

    Runaway Task.

  11. IBM-REXX Tutorial
    IBM-REXX Interview Questions

  12. Question 8. What Is The Usage Of Language In The Ppt Entry?

    Answer :

    Language interface and call parameters

  13. Question 9. How Do You Handle Errors In Cics Programs?

    Answer :

    Check EIBRESP after the call or use the HANDLE condition.

  14. JCL Interview Questions

  15. Question 10. Can You Use Dynamic Calls In Cics?

    Answer :

    Yes, the called routine must be defined in PPT and the calling program must use CALL identifier…

  16. IBM DB2 Tutorial

  17. Question 11. Name Some Important Fields In The Eib Block?

    Answer :

    EIBRESP, EIBCALEN, EIBRRCDE, EIBTASK, EIBDATE, EIBTIME

  18. IBM DB2 Interview Questions

  19. Question 12. What Is Exec Cics Retrieve?

    Answer :

    Used by STARTed tasks to get the parameters passed to them.

  20. VSAM Interview Questions

  21. Question 13. What Is An Aey9 Abend?

    Answer :

    DB2/IDMS not up.

  22. COBOL Tutorial

  23. Question 14. What Is An Asra Abend?

    Answer :

    Any data exception problem SOC7, SOC4 etc.

  24. Question 15. What Is Enq, Deq?

    Answer :

    Task control commands to make resources serially reusable.

  25. COBOL Interview Questions

  26. Question 16. What Is The Use Of Dct?

    Answer :

    Destination Control Table used define TDQs

  27. IBM-JCL Tutorial

  28. Question 17. When You Compile A Cics Program, The (pre) Compiler Puts An Extra Chunk Of Code. Where Does It Get Included And That Is It Called? What Is Its Length?

    Answer :

    DFHEIBLK, DFHCOMMAREA.

  29. IBM-JCL Interview Questions

  30. Question 18. What Is Mdt? What Are Fset, Frset?

    Answer :

    MDT: Bit in the attribute byte indicating modification of field on screen. Happens on an input operation.
    FSET: Sets MDT on to ensure field is transmitted. Happens on an output operation
    FRSET: Reset MDT. Until this happens, field continues to be sent.

  31. IBM – VSAM Interview Questions

  32. Question 19. What Is The Attribute Byte?

    Answer :

    Defines the display/transmission of field. Most cases is an output field from the program.

  33. DB2 Using SQL Tutorial

  34. Question 20. What Is The Difference Between Physical Map And Symbolic Map?

    Answer :

    The physical map is the load module and the symbolic map is the data structure.

  35. DB2 Using SQL Interview Questions

  36. Question 21. Can A Program Change Protected Field?

    Answer :

    NO

  37. Question 22. What Is The Difference Between A Symbolic Map And Physical Map?

    Answer :

    SYMBOLIC MAP IS USED BY USER AND PHYSICAL MAP IS USED BY SYSTEM

  38. IBM Mainframe Tutorial

  39. Question 23. Why Is It Important Not To Execute A Stop Run In Cics?

    Answer :

    Stop run will come out from the CICS region.

  40. IBM-JCL&VSAM Interview Questions

  41. Question 24. How To Build Up Lu 6.2 Communication?

    Answer :

    Pseudo-conversational transactions are almost always the preferred method. In these mode CICS releases resources between responses to user input, i.e. the task is ended awaiting the user response.

  42. IBM-REXX Interview Questions

  43. Question 25. Db2 What Is The Difference Between A Package And A Plan. How Does One Bind 2 Versions Of A Cics Transaction With The Same Module Name In Two Different Cics Regions That Share The Same Db2 Subsystem?

    Answer :

    Package and plan are usually used synonymously, as in this site. Both contain optimized code for SQL statements – a package for a single program, module or subroutine contained in the database request module (DBRM) library. A plan may contain multiple packages and pointers to package that could be referenced in two different plans.

  44. Question 26. What Is The Abend Command And When Would You Use It?

    Answer :

    The ABEND command forces a task to end abnormally. It creates a transaction dump and invokes the dynamic transaction backout.

  45. IBM Mainframe Interview Questions

  46. Question 27. What Is The Cics Load Command?

    Answer :

    The LOAD command retrieves an object program from disk and loads it into main storage – it’s primarily used for a constant table that will be available system-wide.

  47. JCL Interview Questions

  48. Question 28. What Is Task Control And What Are The Cics Commands Associated With It?

    Answer :

    Task control refers to the CICS functions that manage the execution of tasks. Task control commands are SUSPEND, ENQ, and DEQ.

  49. Question 29. What Is Interval Control And What Are Some Of The Cics Commands Associated With It?

    Answer :

    CICS interval control provides a variety of time-related features – common commands are ASKTIME, PORMATTIME, START, RETRIEVE, and CANCEL.

  50. Mainframe DB2 Interview Questions

  51. Question 30. How Do You Delete Item 3 In A Five-item Tsq?

    Answer :

    You can’t at least not directly. Options, none of them good, inlude:
    I. adding a logical-delete flag to the contents of each item;
    II. moving item 4 to 3 and 5 to 4 and initializing item 5, all thru rewrites; this is a variant on 1;
    III. Creating a new ‘copy’ TSQ that excludes the unwanted item, killing the old TSQ (deleteq ts). writing the new TSQ with the original name from the new TSQ, and then deleting the ‘copy’ TSQ. This way, you will get an accurate report from NUMITEMS.

  52. Question 31. What Is The Meaning Of The Enq And Deq Commands?

    Answer :

    Neither command is exclusively a transient data command. The ENQ command reserves any user defined resource for the specific task. For enqueued transient data no other task will be able to write records to it for as long as it is enqueued. DEQ removes the lock.

  53. Question 32. What Is A Logical Message In Cics?

    Answer :

    A logical message is a single unit of output created by SEND TEXT or SEND MAP commands
    BMS collects the separate output from each command and treats them as one entity.
    This technique may be used to build CICS reports.

  54. Question 33. What Is Cebr?

    Answer :

    CEBR lets you browse the contents of a specific temporary storage queue.

  55. IBM DB2 Interview Questions

  56. Question 34. What Is Cedf?

    Answer :

    CEDF is the execute diagnostic facility that can be used for debugging CICS programs.

  57. Question 35. What Is Ceci?

    Answer :

    CECI is the command level interpreter transid that interactively executes CICS commands. It is a rudimentary CICS command debugger which does not require coding an entire program.

  58. Question 36. What Is The Significance Of Rdo?

    Answer :

    RDO is Resource Definition Online. Since release 1.6 RDO allows resources (terminals, programs, transactions and files) to be defined interactively while CICS is running.

  59. COBOL Interview Questions

  60. Question 37. What Is A Cursor In Cics Sql Processing?

    Answer :

    A cursor is a pointer that identifies one row in a SQL results table as the current row.

  61. Question 38. What Is The Massinsert Option?

    Answer :

    MASSINSERT is a WRITE option that modifies normal VSAM split processing, leaving free space after the inserted record, so subsequent records can be inserted without splits. it is ended by an UNLOCK command.

  62. Question 39. What Is The Meaning Of The Syncpoint Command?

    Answer :

    SYNCPOINT without the ROLLBACK option makes all updates to protected resources permanent, with the ROLLBACK option it reverses all updates.

  63. Question 40. What Is Journal Recovery And Dynamic Transaction Backout?

    Answer :

    Journal Recovery is recovery of changes made to a file during online processing. If a file has I/O problems it is restored from a backup taken before online processing began and the journalled changes are applied. Dynamic transaction backout is the removal of partial changes made by a failed transaction.

  64. IBM-JCL Interview Questions

  65. Question 41. What Are Transient Data Sets Defined To Cics?

    Answer :

    They are defined in the destination control table (DCT).

  66. Question 42. What Are The Two Types Of Transient Data Queues?

    Answer :

    They are intrapartition, which can only be accessed from with CICS and extrapartition, which are typically used to collect data online, but process it in a batch environment.

  67. DB2 Using SQL Interview Questions

  68. Question 43. What Is Transient Data?

    Answer :

    Transient data provides CICS program with a simple method for sequential processing, often used to produce output for 3270 printers.

  69. Question 44. What Is Temporary Storage?

    Answer :

    Temporary storage is either main or auiliary storage that allows the program to save data between task invocations.

  70. Question 45. What Is An Asra?

    Answer :

    An ASRA is the CICS interrupt code, the equivalent of an MVS abend code.

  71. Question 46. How Do You Control Cursor Positioning?

    Answer :

    It’s controlled by the cursor option of the SEND MAP command using a direct (0 through 1919) or symbolic value.

  72. Question 47. What Is The Meaning And Use Of The Eibaid Field?

    Answer :

    EIBAID is a key field in the execute interface block; it indicates which attention key the user presse to initiate the task.

  73. Question 48. How Do You Access Storage Outside Your Cics Program?

    Answer :

    In COBOL storage was accessed via BLL cell using the SET option of ADDRESS commands. In COBOL II the special register. ADDRESS OF lets you reference the address of any Linkage Section field.

  74. Question 49. What Is The Function Of The Load Command?

    Answer :

    To fetch a program, table or map to the main storage.

  75. Question 50. What Is The Cics Command That Is Used For Reading A Record From The Tdq?

    Answer :

    READQ

  76. Question 51. Which Of The Following Are Recoverable Cics Resources?

    Answer :

    Data files and data bases, Intrapartition TDQs, Auxiliary TSQs.

  77. Question 52. Which Is The Command Used For Terminating A Browse Operation?

    Answer :

    ENDBR

  78. Question 53. What Is The Primary Function Of The Processing Program Table (ppt)?

    Answer :

    To register all programs and maps

  79. Question 54. Sync Points Cannot Be Requested By The Application Programs (true Or False)?

    Answer :

    False

  80. Question 55. Which Is The Command That Is Used To Dump The Main Storage Areas Related To A Task?

    Answer :

    DUMP

  81. Question 56. What Is The Cics Command That Is Used To Copy A Screen Image Of A Terminal Into Another Terminal?

    Answer :

    ISSUE COPY

  82. Question 57. The Eib Field Which Gives The Last Cics Command Executed Is?

    Answer :

    EIBRCODE

  83. Question 58. Which Is The Cics Control Program That Provides Communication Services Between User Written Application Programs And Terminals?

    Answer :

    Terminal Control Program

  84. Question 59. Cics Command Level Is?

    Answer :

    Low level version of CICS macro level

  85. Question 60. Tsqs Can Be Written In The Main Storage Or Auxiliary Storage ( True Or False)?

    Answer :

    True

  86. Question 61. What Is Difference Between Call And Link?

    Answer :

    In case of call, whenever you do changes to the called program you need to compile the calling program also. In case of link, it is not needed.

  87. Question 62. What Are The Differences Between Dfhcommarea And Tsq?

    Answer :

    Both are used to save data among tasks. but
    1. COMMAREA is private to that transaction only like every transaction has its own COMMAREA created by CICS as soon as the transaction is initiated. however TSQ, if queue id is known can be accessed by other transactions also
    2. COMMAREA length is s9(4) comp i.e. 65k. but TSQ can have any length
    3. COMMAREA is available only during the transaction is running. TSQ if created with auxiliary option resides in aux memory and available even if main memory crashes
    4. normally COMMAREA is used to transfer data from one task to another while TSQ is used widely within the task as a scratch pad.

  88. Question 63. What Is Communication Area?

    Answer :

    Communication Area is used to pass data between the program or between the task.

  89. Question 64. A Cics Program Abends With An Asra Abend Code, What Is Its Meaning?

    Answer :

    1. Alink was issued to a program whose name does not exist in the PPT (Program Processing Table).
    2. A program attempted to use a map that is not defined in the PCT ( Program Control Table).
    3. A security violation has occurred. The operator is not defined with the proper authority in the SNT ( Sign on Table ) to use a particular file.
    4.  A program interrupt (0C0 or 0C2 ot …) has occurred in a CICS program.
    5. An I/O error has occurred when attempting to use a VSAM file from a CICS program.

       

  90. Question 65. How Can You Accomplish Breakpoint In Intertest?

    Answer :

    U-for unconditional breakpoint, C-for conditional breakpoint, and A-for automatic breakpoint

  91. Question 66. How Many Ways Are There For Initiating A Transaction ? What Are They?

    Answer :

    There are six ways in initiating a transaction they are as follows.
    1. embedding four character transid on the top left most corner of the screen.
    2. making use of EXEC CICS START TRANSID()
    3. making use of EXEC CICS RETURN TRANSID()
    4. By defining the transid in DCT ( destination control table ) to enable ATI ( AUTOMATIC TASK INITIATION)
    5. Making use of PLT ( program list table )
    6. By associating four character transid in PCT ( program control table )

  92. Question 67. Which Type Of Tdq Is Read Destructive?

    Answer :

    Intrapartition TDQ is read destructive. extra partition TDQ is not read destructive.

  93. Question 68. The Error Code Aeiv?

    Answer :

    This is the error code for length, if length of the source data is more than the receiving field, This error will occur.

  94. Question 69. What Is The Size Of Commarea?

    Answer :

    The default commarea size is 65k.

  95. Question 70. What Is Asraabend In Cics?

    Answer :

    It occurs when program interruption takes place. e.g. when alphanumeric string moved to numeric data item OR when arithmetic calculations performed on nunnumeric data item OR when an attempt made to read an occurrence of a table beyond the defined occurrences.

  96. Question 71. What Is A Two Phase Commit In Cics?

    Answer :

    This occurs when a programmer Issues a EXEC CICS Syncpoint command. this is called two phase because CICS will first commit changes to the resources under its control like VSAM files, and the DB2 changes are committed. Usually CICS signal DB2 to complete the next phase and release all the locks.

  97. Question 72. Difference Between Tsq And Tdq?

    Answer :

    TDQ is read destructive, TSQ is not, TSQ can be created dynamically, TDQ cannot be created dynamically. TSQ is temporary in nature (i.e. it will be deleted when the program finishes execution, unless it is made permanent by making a entry in the Temporary Storage Table), TDQ is not.

  98. Question 73. In Symbolic Cursor Positioning After Moving – 1 To The Length Field Also The Cursor Is Not Positioned In That Particular Field. Give Reasons?

    Answer :

    You have to explicitly specify the word CURSOR between your EXEC CICS and END-EXEC in the program.

  99. Question 74. What Does Eib Mean?

    Answer :

    The EIB is the EXECUTIVE INTERFACE BLOCK. It is not the EXECUTE INTERFACE BLOCK. All TP monitors or transaction processor are know as EXECUTIVEs as they carry out process on behalf of a program module. CICS and DB2 are executives.

  100. Question 75. How Many Exceptional Condition Can Be Given In A Handle Condition?

    Answer :

    Max. of 12 exceptional conditions can be given in a HANDLE CONDITION.

  101. Question 76. How Do You Access The Records Randomly In Tsq?

    Answer :

    By specifying the ITEM option

  102. Question 77. What Command Do You Issue To Delete A Record In A Transient Data Queue?

    Answer :

    READQ TD, the read is destructive.

  103. Question 78. What Are Different Ways Of Initiating Transaction In Cics?

    Answer :

    We can initiate CICS transaction
    a) by giving transaction id
    b) by giving CICS start command
    c) automatic task initiation.

  104. Question 79. What Is The Difference Between Link And Xctl?

    Answer :

    The XCTL command passes control to another program, but the resources requested by the first program may still be allocated. A task does not end until a RETURN statement is executed. While in LINK command, program control resumes its instruction following the LINK parameter. The disadvantage of LINK is that it requires that both the calling program and the called program remain in main memory even though both are no longer needed.

  105. Question 80. What Is The Difference Between Cics Program Control Table (pct) And Cics Processing Program Table (ppt)?

    Answer :

    PCT contains a list of valid transaction ID. Each transaction ID is paired with the name of the program, CICS will load and execute when the transaction is invoked. On the other hand, PPT indicates each program’s location which pertains to a storage address if the program has already been loaded or a disk location if the program hasn’t been loaded. PPT will also be used to detemine whether it will load a new copy of the program when the transaction is invoked.

  106. Question 81. What Are The 3 Common Ways To Create Maps?

    Answer :

    The first way is to code a physical map and then code a matching symbolic map in your COBOL program. The second way to create a physical map along with a matching symbolic map is to code only the physical map using the and SYSPARM option, CICS will automatically create a member in a COPY library. And the third way is to use a map generator such as SDF ( Screen Definition Facility ).

  107. Question 82. What Is Quasi-reentrancy?

    Answer :

    There are times when many users are concurrently using the same program, this is what we call MultiThreading, For example, 50 users are using program A, CICS will provide 50 Working storage for that program but one Procedure Division. And this technique is known as quasi-reentrancy.

  108. Question 83. What Is The Difference Between A Physical Bms Mapset And A Logical Bms Mapset?

    Answer :

    The physical mapset is a load module used to map the data to the screen at execution time. The symbolic map is the actual copybook member used in the program to reference the input and output fields on the screen.

  109. Question 84. What Cics Facilities Can You Use To Save Data Between The Transactions?

    Answer :

    COMMONAREA, TSQ and TDQ.

  110. Question 85. How Would You Release Control Of The Record In A Read For Update?

    Answer :

    By issuing a REWRITE, DELETE, or UNLOCK command or by ending the task.

  111. Question 86. What Is The Difference Between A Return With Transid And Xctl? For Example Program. A Is Issuing Return With Transid To Program B. Program A. Is Isssuing Xctl To Program B?

    Answer :

    In RETURN with TRANSID the control goes to the CICS region and the user have to transfer the control to program B by pressing any of the AID KEYS. In XCTL the control is directly transfer to program B.

  112. Question 87. What Will Be The Length Of The Eibcalen, If The Transaction Is Used To Cics First Time?

    Answer :

    The length will be 0 (zero).

  113. Question 88. What Is Dfheiblk?

    Answer :

    DFHEIBLK is Execute Interface Block. It is placed in the linkage section automatically by CICS translator program.
    It must be the first entry in linkage section. CICS places values prior to giving control to the program and we can find almost any information about our transaction.

  114. Question 89. What Is The Difference Between The Xctl And Link Commands?

    Answer :

    The LINK command anticipates return of control to the calling program, the XCTL command does not. RETURN to the calling program will be the result of the CICS RETURN command, specifying TRANSID (name of the calling program)

  115. Question 90. What Cics Command Would You Use To Read A Vsam Ksds Sequentially In Ascending Order?

    Answer :

    First issue a STARTBR (start browse), which will position the browse at the desired record. Retrieve records by using subsequent READNEXT commands. Indicate the end of sequential processing with the ENDBR command. If the generic key is specified in the STARTBR command position in the file will be before the first record satisfying the generic key. For reading in descending order use the READPREV instead of READNEXT.

  116. Question 91. What Is The Difference Between Pseudo-conversational And Conversational?

    Answer :

    pseudo-conversational will start a new task for each input. By coding a CICS RETURN command specifying TRANSID9ITSELF). Conversational will have an active task during the duration of the data entry.

  117. Question 92. What Is The Comaera (communication Area)?

    Answer :

    An area used to transfer data between different programs or between subsequent executions of the same program. Needs to be defined in the LINKAGE Section.

  118. Question 93. What Is The Common Work Area (cwa)?

    Answer :

    The common work area is a storage area that can be accessed by any task in a CICS system.

  119. Question 94. What Is A Transid And Explain The System Transid Cemt?

    Answer :

    Transid is a transaction identifier, a four character code used to invoke a CICS task. CEMT is the master terminal transaction that lets you display and change the status of resources – it is the primary CICS service transaction.

  120. Question 95. What Is An Mdt (modified Data Tag)? Its Menaing And Use?

    Answer :

    The modified data tag is the last bit in the attribute byte for each screen field. It indicates whether the corresponding field has been changed.

  121. Question 96. What Is The Eib (execute Interface Block)?

    Answer :

    The execute interface block lets the program communicate with the execute interface program, which processes CICS commands. It contains terminal id, time of day and response codes.

  122. Question 97. What Is The Common Systems Area (csa)?

    Answer :

    The common systems area is the major CICS control block that contains system information, including pointers to most other CICS control blocks. The CSA points to all members of STATIC storage.

  123. Question 98. What Is Meant By Program Reentrance?

    Answer :

    A program is considered reentrant if more than one task can execute the code without interfering with the other tasks’ execution.

  124. Question 99. What Is Meant By A Cics Task?

    Answer :

    A CICS task exist from the time the operator presses the enter key until the application program returns control to CICS.

  125. Question 100. Name Some Common Cics Service Programs And Explain Their Usage?

    Answer :

    Terminal Control, File Control, Task Control, Storage Control, etc, Each CICS service program controls the usage and status for its resource (file, terminal, etc) within the CICS region.

  126. Question 101. Name Some Of The Common Tables In Cics And Their Usage?

    Answer :

    PCT Program Control Table – defines each transaction containing a list of valid transaction identifiers (transid) where each transaction is paired with its matching program;

    PPT Program Processing Table – contains a list of valid program names and maps and whether a current version is in the CICS region or needs to be brought in as a new copy;

    FCT File Control Table – contains a list of files known to CICS, the dataset name and status (closed/open, enable/disabled;)

    TCT Terminal Control Table – a list of the terminals known to CICS.

  127. Question 102. What Is The Difference Between Link Xctl?

    Answer :

    Link is temporary transfer of control. Xctl is permanent transfer of control.

  128. Question 103. What Is Multitasking And Multithreading?

    Answer :

    multitasking is the feature supported by the operating system to execute more than one task simultaneously. Multithreading is the system environment where the tasks are sharing the same programs load module under the multitasking environment. It is a subset of multitasking since it concerns task which use the same program.

  129. Question 104. What Are Different System Tables Used In Cics?

    Answer :

    PCT, FCT, TCT, DCT, PPT

  130. Question 105. Explain The Term Mro (multi Region Operation)?

    Answer :

    MRO is the mechanism by which different CICS address spaces with in the same CPU can comunication and share resources.

  131. Question 106. Explain The Term Function Request Shipping?

    Answer :

    Function request shipping is one of the CICS modes of intercommunication which allows an application program in a local CICS to access resources owned by a remote CICS.

  132. Question 107. In An On-line Environment, How Can You Prevent More Than One User From Accessing The Same Transient Data Queue At The Same Time?

    Answer :

    By issuing an EXEC CICS ENQ against the resource. When processing is completed, a DEQ should be executed.

  133. Question 108. When An Apllication Is Invoked Via The Exec Cics Start Command With The From Option, How Does The Application Gain Access To The Common Area?

    Answer :

    An EXEC CICS RETRIEVE command will access the common area.

  134. Question 109. The Dfhcommara Is Used To Pass Information From One Application To Another. What Are Some Other Ways That This Function Can Be Accomplished?

    Answer :

    You can also pass information in the following ways.
    -By using a temporary storage queue.
    -By using an intrapartion TDQ
    -By using the Task Work Area
    -By using TCTUA
    -Through a file.

  135. Question 110. How Do You Define Task Work Area?

    Answer :

    By defining it on the PCT ( the Program Control Table)

  136. Question 111. What Information Do You Get When An Exec Cics Startcode Is Issued?

    Answer :

    You will be able to determine if the application was started by
    (1) a transient data trigger level (QD),
    (2) a START command (S,SD),
    (3) user (U) or terminal input (TD), or
    (4) Distributed Program Link (D, DS).

  137. Question 112. Which Cics Command Must Be Issued By The Application Program In Order To Gain Access To The Common Work Area (cwa)?

    Answer :

    EXEC CICS ADDRESS with CWA option.

  138. Question 113. In Which Cics Table Would You Specify The Length Of The Task Work Area (twa)?

    Answer :

    In the Program Control Table (PCT).

  139. Question 114. What Is A Deadlock?

    Answer :

    Deadlock (also known as a “deadly embrace”) occurs when a task is waiting for a resource held by another task which, in turn, is waiting for a resources held by the first task.

  140. Question 115. What Is Enq In Cics?

    Answer :

    If any one want to restrict Trans-ID to single user, enter trans-id with ENQ. It won’t allow any one else to use the same trans-id.

  141. Question 116. Explain The Term Transaction Routing?

    Answer :

    Transaction routing is a CICS mode of intercommunication which allows a terminal connected to local CICS to execute another transaction owned by a remote CICS.

  142. Question 117. How Can You Prevent More Than One User From Accessing The Same Transient Data Queue?

    Answer :

    By issuing an EXEC CICS ENQ against the resource. When processing is completed, a DEQ should be executed.

  143. Question 118. How Can The Fact That Eibcalen Is Equal To Zeros Be Of Use To An Application Programmer?

    Answer :

    When working in a pseudo-conversational mode, EIBCALEN can be checked if it is equal to zero. A programmer can use this condition as a way of determining first time usage (of the program).

  144. Question 119. Which Cics System Program Is Responsible For Handling Automatic Task Initialization?

    Answer :

    The Transient Data Program (TDP).

  145. Question 120. What Is The Function Of Dfhmdf Bms Macro?

    Answer :

    The DFHMDF macro defines fields, literal, and characteristics of a field.

  146. Question 121. Explain The Basic Difference Between Intra Partition Tdq And Extra Partition Tdq?

    Answer :

    INTRA PARTITION TD QUEUEs. It is a goup of sequential records which are produced by the same and / or different transaction within a CICS region. These Qs are stored in only one physical file (VSAM) in a CICS region, which is prepared by the system programmer. Once a record is read from a queuue, the record will be logically removed from the queue; that is the record cannot be read again EXTRA PARTITION TD QUEUEs It is a group of sequential record which interface between the transaction s of the CICS region and the systems outside of CICS region. Each of there TDQs is a separate physical file, and it may be on the disk, tap, printer or plotter.

  147. Question 122. What Is The Differences Between Getting The System Time With Eibtime And Asktime Command?

    Answer :

    The ASKTIME command is used to request the current date and time. Whereas, the EIBTIME field have the value at the task initiation time.

  148. Question 123. Explain Floating Maps With Illustration?

    Answer :

    Maps which can positioon themselves relative to the previous maps on the screen or page are known as the floating maps. For this you have to use special positional operands to LINE and COLUMN parameters of the BMS macro definition. They are SAME, NEXT. Actually this floating map concept is there only in Full BMS where as it is not available in Min. or Standard BMS macros. RECEIVE MAP is not recommended in the case of floating maps. Hence these maps are normally used to send information such as selected records from a database to screen but not for data entry. A mapset can contain more than one map in it, you may use all these maps to build a screen. In that case there are two ways to send these maps on to the screen.

    i) Use separate SEND MAP commands one for each map involved. or
    ii) Use ACCUM operand along with SEND MAP command and while sending really on to the screen use SEND PAGE to display them at one shot. The second one is called cumulative mapping scheme where you also can use foating maps.

    Let’s take a situation where you have to build a screen like this

    HEADER MAP (no. of A gr. employs)
    DETAIL MAP ( employee list)
    TRAILER MAP

  149. Question 124. What Does It Mean When Eibcalen Is Equal To Zeros?

    Answer :

    When the length of the communication area (EIBCALEN) is equal to zeros, it means that no data was passed to the application.

  150. Question 125. What Is The Difference Between The Into And The Set Option In The Exec Cics Receive Map Command?

    Answer :

    The INTO option moves the information in the TIOA into the reserved specified area, while the SET option simple returns the address of the TIOA to the specified BLL cell or “address-of” a linkage-section.

  151. Question 126. What Is The Difference Between Using The Read Command With Into Option And Set Option?

    Answer :

    When we use INTO option with the READ command the data content of the record will be moved into the specified field defined in the Working Storage Section of the program. When we use SET option with the READ command, CICS sets the address pointer to the address of the record in the file input / output area within CICS,so that the application program can directly refer to the record without moving the record content into the Working Storage area defined in the program. Therefore, the SET option provides a better performance than the INTO option.

  152. Question 127. What Is Mdt?

    Answer :

    MDT ( Modified Data Tag ) is one bit of the attribute character, If it is off (0), it indicates that this field has not been modified by the terminal operator. If it is on (1), It indicates that field has been modified by the operator. Only when MDT is on, will the data of the field be sent by the terminal hardware to the host computer (i.e. to the applcation progam in end). An effective use of MDT drastically reduces the amount of data traffic in the communication line, thereby improving performance significantly. Therefore, BMS maps and CICS application program should be devloped based on careful considerations for MDT.

  153. Question 128. Name Three Ways The Modified Data Tag Can Be Set On?

    Answer :

    The Modified Data Tag can be set on:
    1. When the user enters data into the field.
    2. When the application program moves DFHBMFSE to the attribute character.
    3. By defining it in the BMS macro definition.

  154. Question 129. Can We Define An Alternate Index On Vsam/rrds?

    Answer :

    No

  155. Question 130. How To Establish Dynamic Cursor Position On A Map? How To Get The Cursor Position When We Receive A Map?

    Answer :

    We dynamically position a cursor through an application program using a symbolic name of the symbolic map by placing -1 into the field length (i.e., fieldname + L) of the field where you wish to place the cursor. The SEND MAP command to be issued must have the CURSOR option (without value). Also, the mapset must be coded with MODE = INOUT in the DFHMSD macro. We get the cursor position when we receive a map by checking EIBCPOSN, which is a halfword ( S9(4) COMP) binary field in EIB, and contains offset position (relatively to zero) of the cursor on the screen.

  156. Question 131. What Are The Three Ways Available For A Program To Position The Cursor On The Screen?

    Answer :

    1.  Static positioning. Code the insert cursor (IC) in the DFHMDF BMS macro.
    2. . Relative positioning. Code the CURSOR option with a value relative to zero (position 1.1 is zero).
    3.  Symbolic positioning. Move high values or -1 the field length in the symbolic map (and code CURSOR on SEND command ).

       

  157. Question 132. What Is A Mapset?

    Answer :

    A mapset is a collection of BMS maps link-edited together.

  158. Question 133. Why Is A Term Id Recommended In Naming A Tsq?

    Answer :

    In order to avoid confusion and to maintain data security, a strict naming convention for QID will be required in the installation. Moreover, for a terminal-dependent task (e.g. pseudo-conversation task), the terminal id should be included in QID in order to ensure the uniqueness of TSQ to the task.

  159. Question 134. What Are The Differences Between Temporary Storage Queue (tsq) And Transient Data Quene (tdq)?

    Answer :

    Temporary Storage Queue names are dynamically defined in the application program, while TDQs must first be defined in the DCT (Destination Control Table). When a TDQ contains certain amount of records (Trigger level), A CICS transaction can be started automatically. This does not happen when using a TSQ. TDQ (extra partition) may be used by batch application; TSQ cannot be accessed in batch. The Transient Data Queue is actually a QSAM file. You may update an existing item in a TSQ. A record in a TDQ cannot be updated. Records in TSQ can be read randomly. The TDQ can be read only sequentially. Records inTemporary Storage can be read more than once, while recordes stored in Temporary Data Queues cannot. With TDQs it is “one read” only.

  160. Question 135. What Does The Following Transactions Do?

    Answer :

    CEDF:CICS-supplied Execution Diagnostic Facility transaction. It provides interactive program execution and debugging functions of a CICS programs.

    CEMT: CICS-supplied Extended Master Terminal transaction. It displays or manipulates CICS control environment interactively.

    CEBR: CICS-supplied Temporary Storage Browse transaction. It displays the content of Temporary Storage Queue (TSQ).

    CECI: CICS-supplied Command Interpreter transaction. It verifies the syntax of a CICS command and executes the command.

  161. Question 136. What Is The Function Of The Terminal Control Table?

    Answer :

    To register all CICS terminals

  162. Question 137. Which Cics Service Transaction Is Used To Gain Accessibility To Cics Control Tables? Mention The One That Has The Highest Priority.?

    Answer :

    CEDA

  163. Question 138. Into Which Table Is The Terminal Id Registered?

    Answer :

    TCT.

  164. Question 139. Which Transient Data Queue Support Ati?

    Answer :

    INTRA-PARTITION Data queue.

  165. Question 140. Explain The Means Of Supporting Pseudo Conversation Programming. (eg. Storing And Restoring Of States, Control Flow, Error Handling)?

    Answer :

    When we send a map using SEND MAP command, Immediately we release the program by using EXEC CICS RETURN command. In this command we mention the TRANSACTION ID which is to be executed after receiving the map. In this command we also specify the data that should be stored in COMMUNICATION AREA for later use. When this command is executed the corresponding program is released from the memory. After receiving the response from the terminal the program is again loaded and this time the data which we stored in communication area will be copied into the working storage section. And the map will be received with RECEIVE MAP command. The variable EIBCALEN in EIB holds the length of communication area. In procedure division we checks the value of EIBCALEN if it is zero, we first send the map followed by RETURN command. Otherwise, that is if EIBCALEN is not zero, we know that this transaction is not running first time and we receive the map by using RECEIVE MAP command.

  166. Question 141. How Can You Start A Cics Transaction Other Than By Keying The Transaction Id At The Terminal?

    Answer :

    By coding an EXEC CICS START in the application program
    1. By coding the trans id and a trigger level on the DCT table
    2. By coding the trans id in the EXEC CICS RETURN command
    3. By associating an attention key with the Program Control Table
    4. By embedding the TRANSID in the first four positions of a screen to the terminal.
    5. By using the Program List Table.

  167. Question 142. What Are The Differences Between And Exec Cics Xctl And Exec Cics Start Command?

    Answer :

    The XCTL command transfer control to another application (having the same Transaction ID), while the START command initiates a new transaction ID (therefore a new task number). The XCTL continues task on the same terminal. START can initiate a task on another terminal.

  168. Question 143. What Happens To Resources Supplied To A Transaction When An Xctl Command Is Executed?

    Answer :

    With an XCTL, the working storage and the procedure division of the program issuing the XCTL are released. The I/O areas, the GETMAIN areas, and the chained Linkage Section areas (Commarea from a higher level) remain. All existing locks and queues also remain in effect. With a LINK, however, program storage is also saved, since the transaction expects to return and use it again.

  169. Question 144. What Is A Resident Program?

    Answer :

    A program pr map loaded into the CICS nucleus so that is kept permanently in main storage and not deleted when CICS goes ” Short on Storage.”

  170. Question 145. What Is Some Of The Information Available In The Eib Area?

    Answer :

    I. The cursor position in the map
    II. Transaction ID
    III. Terminal ID
    IV. Task Number
    V. Length of communication area
    VI. Current date and time
    VII. Attention identifier

  171. Question 146. What Is The Effect Of Including The Transid In The Exec Cics Return Command?

    Answer :

    The next time the end user presses an attention key, CICS will start the transaction specified in the TRANSID option.

  172. Question 147. What Is The Function Of The Exec Cics Handle Condition Command?

    Answer :

    To specify the paragrph or program label to which control is to be passed if the “handle conditin” occurs.

  173. Question 148. What Is The Difference Between Exec Cics Handle Condtion And An Exec Cics Ignore Command?

    Answer :

    HANDLE CONDTION command creates a “go-to” environment. An IGNORE command does not create a go-to environment: instead. it gives control back to the next sequential instruction following the command causing the condition. They are opposites.

  174. Question 149. When A Task Suspends All The Handle Conditions Via The Push Command, How Does The Task Reactivate All The Handle Conditions?

    Answer :

    By coding an EXEC CICS POP HANDLE command

  175. Question 150. What Are The Cics Commands Available For Program Control?

    Answer :

    The following commands are available for the Program Control services:
    1. LINK: To pass control to another program at the lower level, expectiong to be returned.
    2. XCTL: To pass control to another program at the same level, not expecting to be returned.
    3. RETURN: To return to the next higher-level program or CICS.
    4. LOAD: to load a program
    5. RELEASE: To release a program.

  176. Question 151. Explain The Various Ways Data Can Be Passed Between Cics Programs?

    Answer :

    Data can be passed between CICS programs in three ways- COMMAREA, TRANSIENT DATA QUEUE $ TEMPORARY STORAGE QUEUE.

    Data can be passed to a called program using the COMMAREA option of the LINK or XCTL command in a calling program. The called program may alter the data content of COMMAREA and the changes will be available to the calling program after the RETURN command is issued in the called program. This implies that the called program does not have to specify the COMMAREA option in the RETURN command.

    If the COMMAREA is used in the calling program, the area must be defined in the Working Storage Section of the program (calling), whereas, in the called program, the area must be defined as the first area in the Linkage Section . using reserved name DFHCOMMAREA.

  177. Question 152. What Is The Exec Cics Handle Abend?

    Answer :

    It allows the establishing of an exit so cleanup processing can be done in the event of abnormal task termination.

  178. Question 153. What Happens When A Cics Command Contains The Nohandle Option?

    Answer :

    No action is going to be taken for any exceptional conditional occurring during the execution of this command. the abnormal condition that occurred will be ignored even if an EXEC CICS HANDLE condition exist. It has the same effect as the EXEC CICS IGNORE condition except that it will not cancel the previous HANDLE CONDTION for any other command.

  179. Question 154. What Are The Differences Between And Exec Cics Xctl And An Exec Cics Link Command?

    Answer :

    The XCTL command transfer control to an application program at the same logical level ( do not expect to control back), while the lINK command passes control to an application program at the next logical level and expects controal back.

  180. Question 155. What Cics Command Do You Need To Obtain The User Logon-id?

    Answer :

    You must code EXEC CICS ASSIGN with the OPENID option.

  181. Question 156. What Is Eib, How Is Can Be Used?

    Answer :

    CICS automatically provides some system-related information to each task in a form of EXEC interface BLOCK (EIB), which is unique to the CICS command level. We can use all the fields of EIB in our application programs right away.

  182. Question 157. What Information Can Be Obtained From The Eibrcode?

    Answer :

    The EIBRCODE tells the application program if the last CICS command was executed successfully and, if not, why not.

  183. Question 158. Explain How To Handle Exceptional Conditions In Cics?

    Answer :

    An abnormal situation during execution of a CICS command is called an exceptional condition:
    1. Handle Condition Command: It is used to transfer control to the procedure label specified if the exceptional condition specified occurs.
    2. Ignore Condition Command: It causes no action to be taken if the condition specified occurs in the program. That is control will be returned to the next instruction following the command which encountered the exceptional condition.
    3. No Handle Option: This option can be specified in any CICS command and it will cause no action to be taken for any exceptional condition occurring during execution of this command.
    4. RESP Option: This option can be specified in any CICS command. If the RESP option is specified in a command, CICS places a response code at a completion of the command. The application program can check this code, then proceed to the next processing.

  184. Question 159. How Many Conditions Can You Include In A Single Handle Condition Command?

    Answer :

    No more than 16 in a single handle condition. If you need more, then you must code another HANDLE CONDITION command.

  185. Question 160. What Is The Commarea (communications Area)?

    Answer :

    This is the area of main storage designed to let programs or task communicate with one another. used in programs via RETURN, XCTL and LINK commands.

  186. Question 161. What Option Is Specified In The Send Command To Send Only The Unnamed Fields On To The Screen?

    Answer :

    MAPONLY

  187. Question 162. What Is The Most Common Way Of Building Queue-id Of A Tsq?

    Answer :

    (Name the constituents of the Queue ID).
    TERMID+TRANSACTION-ID.

  188. Question 163. How And Where Is The Twa Size Set?

    Answer :

    TWASIZE=300 in PCT table.

  189. Question 164. What Does Pseudo Conversational Mean?

    Answer :

    The programming technique in which the task will not wait for the end-user replies on the terminal. Terminating the task every time the application needs a response from the user and specifying the next transaction to be started when the end user press any attention key ( (Enter, PF1 trough PF24, PF24, PA1, PA2 and clear) is pseudo-conversational processing.

  190. Question 165. What Is The Function Of The Cics Translator?

    Answer :

    The CICS translator convert the EXEC CICS commands into call statements for a specific programming language. There are CICS translator for Assembler, COBOL, and PL/1.

  191. Question 166. What Is The Purpose Of The Program List Table?

    Answer :

    The Program List Table records the set of application programs that will be executed automatically at CICS start-up time.

  192. Question 167. What Are The Six Different Type Of Argument Values In Cobol That Can Be Placed In Various Options Of A Cics Command?

    Answer :

    1.  Data Value – EX (Literal 8 or 77 KEYLEN PIC S9(4) COMP VALUE8.)
    2.  Data Area – EX (01 RECORD-AREA. 05 FIELD PIC X(5).)
    3.  Pointer-REF -EX (05 POINTER-I PIC S9(8( COMP.) . Name -EX (05 FIELD-NAME PIC X(5) VALUE ‘FILEA’.).
    4.  Label – Cobol paragraph name
       HHMMSS – EX (77 TIMEVAL PIC S9(7) COMP3. ).

       

     

  193. Question 168. Into What Fields Will The Date And Time Values Be Moved After Execution Of The Above Command?

    Answer :

    EIBDATE and EIBTIME.

  194. Question 169. Mention The Option (along With Argument Type) Used In A Cics Command To Retrieve The Response Code After Execution Of The Command?

    Answer :

    RESP( S9(8) COM. )

  195. Question 170. What Are The Two Ways Of Breaking A Cpu Bound Process To Allow Other Task To Gain Access To Cpu?

    Answer :

    EXEC CICS DELAY EXEC CICS DELAY
    INTERVAL(hhmmss) TIME(hhmmss)
    END-EXEC END-EXEC

  196. Question 171. What Is The Eib Parameter And The Cics Command Used To Implement Pseudo-conversational Technique Using Single Pct – Single Ppt Entry?

    Answer :

    EIBCALEN – To check if COMMAREA has been passed in terurn command.
    EXEC CICS RETURN
    TRANSID(data-name)
    COMMAREA(data-area)
    LENGTH (data-value)
    END-EXEC

  197. Question 172. Specify The Requirements For Automatic Task Initiation. (mention The Control Table, It Is Entries And The Corresponding Procedure Division Cics Command).?

    Answer :

    DFHDCT TYPE = INTRA,
    DESTIN = MSGS,
    TRANSID = MSW1,
    TRIGLEV = 1000

    EXEC CICS WRITEQ TD
    QUEUE(‘MSGS’),
    FROM(DATA-AREA),
    LENGTH(MSG_LEN)
    END-EXEC.

  198. Question 173. Specify Cics Transaction Initiation Process. ( From The Perspective Of Cics Control Programs And Control Tables.)?

    Answer :

    TCP places data in TIOA and corresponding entry into TCT.
    KCP acquires the transaction identifier from TIOA and verifies if it is present in PCT.
    SCP acquires Storage in Task Control Area (TCA), in which KCP prepares control data for the task.
    KCP then loads the application programs mentioned in PCT by looking for it in PPT.
    If resident – real storage memory location is not present in the PPT the control is passed to PCP that loads the application program from the physical storage location address given in PPT. The control is then passed to the application program (LOAD module).

  199. Question 174. What Are The Attribute Values Of Skipper And Stopper Fields?

    Answer :

    ASKIP. PROT.

  200. Question 175. What Is The Option Specified In The Read Operation To Gain Multiple Concurrent Operations On The Same Dataset?

    Answer :

    REQID(value)

  201. Question 176. Which Command Is Used To Release A Record On Which Exclusive Control Is Gained?

    Answer :

    EXEC CICS UNLOCK END-EXEC.

  202. Question 177. Specify The Cics Command Used To Read A Vsam Record Starting With Prefix F. Code All The Relevant Options?

    Answer :

    EXEC CICS READ
    DATASET(‘FILENAME’)
    INTO(data-area)
    RIDFLD(data-area)
    KEYLENGTH(1)
    GENERIC
    LENGTH(WK-LEN)
    END-EXEC.

  203. Question 178. How Do You Dynamically Set The Cursor Position To A Specific Field?

    Answer :

    MOVE-1 to FIELD + L field. Mention CURSOR option in the SEND command.

  204. Question 179. How Do You Set The Mdt Option To On Status, Even If Data Is Not Entered?

    Answer :

    Mention FSET option in DFHMDF or set it dynamically in the program using FIELD+A sttribute field.

  205. Question 180. What Is The Cics Command That Gives The Length Of Twa Area?

    Answer :

    EXEC CICS ASSIGN
    TWALENG(data-value)
    END-EXEC.

  206. Question 181. How Do You Establish A Starting Position In A Browse Operation?

    Answer :

    EXEC CICS STARTBR —- END-EXEC.

  207. Question 182. Mention The Option Used In The Cics Read Command To Gain Accessibility Directly To The File I/o Area. (assume Cobol-ii).?

    Answer :

    SET(ADDRESS OF LINKAGE-AREA).

  208. Question 183. Which Option Of The Pct Entry Is Used To Specify The Pf Key To Be Pressed For Initiating A Transaction?

    Answer :

    TASKREQ=PF1

  209. Question 184. How Do You Terminate An Already Issued Delay Command?

    Answer :

    EXEC CICS CANCEL
    REQID(id)
    END-EXEC

  210. Question 185. What Is The Cics Command Used To Access Current Date And Time?

    Answer :

    ASKTIME.

  211. Question 186. How Do You Intitiate Another Transaction?

    Answer :

    The transaction initiated should be in a position to retrieve information pertaining to which transaction has initiated it and from which terminal. (Code the required CICS commands)

    EXEC CICS START
    INTERVAL(hhmmss)/TIME(hhmmss)
    TRANSID(‘TRAN’)
    TERMID(‘TRM1)
    FROM(data-area)
    LENGTH(data-value)
    RTRANSID(EIBTRNID)
    RTERMID(EIBTRMID)
    END-EXEC

    EXEC CICS RETRIEVE
    INTO(data-area)
    LENGTH(data-value)
    RTRANSID(data-name)
    RTERMID(data-name)
    END-EXEC

  212. Question 187. Mention The 5 Fields Available In The Symbolic Map For Every Named Field In The Dfhmdi Macro? Give A Brief Description Of These Fields (not Exceeding A Line).?

    Answer :

    FIELD+L – Return the length of text entered (or for dymanic cursor positioning)
    FIELD+F – Return X(80) if data entered but erased.
    FIELD+A – Used for attributes reading and setting
    FIELD+I – Used for reading the text entered while receiving the map.
    FIELD+O – Used for sending information on to the MAP.

  213. Question 188. What Are The Commands Used To Gain Exclusive Control Over A Resource?

    Answer :

    What are the commands used to gain exclusive control over a resource
    (for Ex a Temporary storage queue.)?

    EXEC CICS ENQ EXEC CICS DEQ
    RESOURCE(QID) RESOURCE(QID)
    END-EXEC END-EXEC

  214. Question 189. List The Sequence Of Steps Used To Achieve Modiication In Skip Sequential Mode?

    Answer :

    List the sequence of steps used to achieve “Modiication in Skip Sequential Mode”.

    I. READNEXT command
    II. Issue the ENDBR command
    III. Issue the READ command with UDATE option.
    IV. Manipulate the record ( DELETE or REWRITE command)
    V. Issue START command
    VI. Isusue two READNEXT commands (One for dummy skip)
    VII. Go to step two.

  215. Question 190. Kindly Specify The Pic Clause For The Following:
    Any Bll Cell, Data Type Of Length Option Field, Hhmmss Type Of Data Fields?

    Answer :

    Any BLL Cell -S9(8) COMP
    Data type of length Option field – S9(4) COMP
    HHMMSS type of data fields – S9(7) COMP 3

  216. Question 191. What Is Cics?

    Answer :

    CICS (Customer Information Control System) is a transaction server that runs primarily on IBM mainframe systems under z/OS and z/VSE.

    CICS is a transaction manager designed for rapid, high-volume online processing. This processing is mostly interactive (screen-oriented), but background transactions are possible.

    While CICS has its highest profile among financial institutions such as banks and insurance companies, over 90 percent of Fortune 500 companies are reported to rely on CICS (running on z/OS) for their core business functions, beside many governments. CICS is used in bank-teller applications, ATM systems, industrial production control systems, insurance applications and many other types of interactive application.

    Recent CICS Transaction Server enhancements include support for Web services and Enterprise Java Beans (EJBs). IBM began shipping the latest release, CICS Transaction Server – Version 3.2, in June of 2007.

  217. Question 192. How Do You Place The Cursor On A Particular Position On The Screen?

    Answer :

    Move -1 to the length attribute of the field aand use the CURSOR option.

  218. Question 193. Define The Field With Ic In The Bms Map.

    Answer :

    Use CURSOR(n m)??

  219. Question 194. What Are The Two Outputs Created As A Result Of Generation Of A Map?

    Answer :

    The map copybook and the load module.

  220. Question 195. How Do You Use Extended Attributes ?

    Answer :

    Define EXTATT=YES and the correct terminal type.

  221. Question 196. What Are The 3 Working Storage Fields Used For Every Field On The Map?

    Answer :

    Length, attribute and input/output field.

  222. Question 197. What Is Mdt? What Are Fset, Frset ?

    Answer :

    Modified Data Tag:Bit in the attribute byte indicating modification of field on screen. Happens on an input operation.
    FSET: Sets MDT on to ensure field is transmitted. Happens on an output operation.
    FRSET: Resets MDT. Until this happens, field continues to be sent.

  223. Question 198. What Is The Use Of Dsect Parameter In Bms?

    Answer :

    Is the parameter to generate a symbolic map.

  224. Question 199. Do You Receive The Attribute Byte In The Symbolic Map?

    Answer :

    On EOF yes.

  225. Question 200. How Do You Make Your Bms Maps Case Sensitive?

    Answer :

    Use ASIS???

  226. Question 201. What Is Effect On Receive Map When

    Answer :

    PF key is pressed? Data transmission may happen,
    PA key is pressed? Data transmission will not happen.

  227. Question 202. What Are Send Map Maponly & Send Map Dataonly ?

    Answer :

    MAPONLY – to send the map alone, without any data. Eg: used for sending Menu screens.
    DATAONLY – to send data alone, without sending the screen layout again. Eg: used for refreshing the screen data.

  228. Question 203. What Is The Difference Between A Pf Key & A Pa Key ?

    Answer :

    PF keys wake up the task and transmit modified data, PA keys only wake up the task.

  229. Question 204. Name The Macros Used To Define The Following:

    Answer :

    MAP MAPSET FIELD
    DFHMSD DFHMDI DFHMDF

  230. Question 205. Can You Use Occurs In A Bms Map? If You Do, What Are The Issues Related With Its Use?

    Answer :

    Yes. cannot use group by clause???

  231. Question 206. Can You Define Multiple Maps In A Bms Mapset?

    Answer :

    Yes.

  232. Question 207. How Is The Storage Determined In The Symbolic Map, If You Have Multiple Maps?

    Answer :

    Storage for maps redefine the first. This means largest map has to be the first.

  233. Question 208. What Is The Meaning Of Bms Length Of Field = 0?

    Answer :

    Data was not entered in the field

  234. Question 209. Can You Simply Check If Length = 0 For Checking If A Field Was Modified?

    Answer :

    No, not if ERASE EOF was used.

  235. Question 210. What Do You Do If You Do Not Want Characters Entered By The User To Be Folded To Uppercase ?

    Answer :

    Use ASIS option on RECEIVE.

  236. Question 211. What Does The Buffer Option In Receive Mean ?

    Answer :

    Brings the entire datastream from the terminal buffer.

  237. Question 212. What Are The Steps You Go Through To A Create A Bms Executable?

    Answer :

    Assemble to create CSECT and Link

  238. Question 213. When You Compile A Cics Program, The (pre)compiler Puts An Extra Chunk Of Code. Where Does It Get Included And That Is It Called? What Is Its Length?

    Answer :

    DFHEIBLK, DFHCOMMAREA.

  239. Question 214. 25. List All The Cics Tables And Explain Their Contents.

    Answer :

    PPT SIT
    PCT JCT
    FCT SNT
    DCT SRT
    RCT TCT

  240. Question 215. I Have Written A Cics Program. What Tables Should I Setup To Run This Program?

    Answer :

    PPT, PCT, (FCT, DCT, RCT (if needed)).

  241. Question 216. In Which Table Would You Make An Entry For A Bms Map?

    Answer :

    PPT

  242. Question 217. What Is The Content Of The Ppt Entry?

    Answer :

    Length, Source, Use count, Lang, Res count DFHRPL number

  243. Question 218. For A Cics-db2 Program, How Is The Plan Referenced?

    Answer :

    Uses a RCT table.

  244. Question 219. How Is Dynamic Memory Allocated Within A Cics Application Program?

    Answer :

    Use a GETMAIN

  245. Question 220. What Is The Use Of A Tdq, Tsq?

    Answer :

    Temporary data stores.

  246. Question 221. How Do You Read From A Tsq?

    Answer :

    Temp storage read command

  247. Question 222. If I Create A Tsq From One Transaction, Can I Read It From Another Transaction?

    Answer :

    Yes. As long as they run in the same region.

  248. Question 223. What Are Extra Partition & Intra Partition Tdqs?

    Answer :

    Extra partition TDQs are datasets used for communication between CICS and other CICS/Batch regions. Intrapartition TDQs are queues for communication within region.

  249. Question 224. What Is Trigger Level In The Context Of Tdqs?

    Answer :

    For intrapartition TDQs specify the # records at which ATI happens. not applicable for extra partition TDQs.

  250. Question 225. How Do You Fire A Batch Job From A Cics Txn ?

    Answer :

    Define an extrapartition TDQ as an internal reader and write the JCL to it. Terminate the JCL with /*EOF.

  251. Question 226. What Is Ati? What Kind Of Tdq Can Be Used?

    Answer :

    Automatic Task Initiation. Intra partition TDQ.

  252. Question 227. Do You Require A Table Entry For A Tsq?

    Answer :

    If recovery is needed.

  253. Question 228. Is There Any Entry For Tsqs In Cics Tables?

    Answer :

    Yes in the DFHTST.

  254. Question 229. What Is The Use Of Dct?

    Answer :

    Destination Control Table used to define TDQs

  255. Question 230. What Is Enq, Deq ?

    Answer :

    Task control commands to make resources serially reusable.

  256. Question 231. Can You Issue Sql Commit From A Cics Program?

    Answer :

    Yes.

  257. Question 232. What Is The Other Way Of Terminating A Transaction?

    Answer :

    EXEC CICS SYNCPOINT. Assuming it is a LUW. This will not end the Xn.

  258. Question 233. What Is An Asra Abend ?

    Answer :

    Any data exception problem SOC7, SOC4 etc.

  259. Question 234. What Is An Aey9 Abend ?

    Answer :

    DB2/IDMS not up.

  260. Question 235. What Are The Situations Under Which Newcopy Is Required ?

    Answer :

    When a program has been used in CICS atleast once and then changed and recompiled.

  261. Question 236. Name Some Important Fields In The Eib Block ?

    Answer :

    EIBRESP, EIBCALEN, EIBRRCDE, EIBTASK, EIBDATE, EIBTIME

  262. Question 237. Can You Use Dynamic Calls In Cics ?

    Answer :

    Yes, the called routine must be defined in PPT and the calling program must use CALL identifier..

  263. Question 238. How Do You Handle Errors In Cics Pgms ?

    Answer :

    Check EIBRESP after the call or use the HANDLE condition.

  264. Question 239. Suppose Pgm A Passes 30 Bytes To Pgm B Thru Commarea And Pgm B Has Defined Its Dfhcommarea To Be 50 Bytes . Is There A Problem ?

    Answer :

    Yes, if B tries to access bytes 31-50.

  265. Question 240. When An Xctl Is Done, Does The Tranid Change ? Is A New Task Created ? Does It Cause An Implicit Syncpoint To Be Issued ?

    Answer :

    No, No, Yes.

  266. Question 241. How Do You Execute A Background Cics Txn ?

    Answer :

    With a START or ATI.

  267. Question 242. What Is The Difference Between Start And Xctl ?

    Answer :

    START is used to start a new task. It is a interval control command. XCTL is used to pass control to a program within the same task. It is a program control command.

  268. Question 243. Can You Have Cics Code In A Copybook? If Yes, What Happens During Compilation?

    Answer :

    Yes. Needs to be preprocessed.

  269. Question 244. When You Do A Start, What Will The Value Of Eibcalen?

    Answer :

    Zero.

  270. Question 245. How Are Vsam Files Read In Cics Pgms?

    Answer :

    File Control Commands. Random, Sequential, forward and backward.

  271. Question 246. How Will You Access A Vsam File Using An Alternate Index?

    Answer :

    Thru the path. Define path as an FCT and use normal File control commands.

  272. Question 247. How Do You Rollback Data Written To An Esds File?

    Answer :

    Define the file as recoverable. in cases where records have been inserted into the file, you may need to run a batch program to logically delete the inserted records.

  273. Question 248. I Have Done A Start Browse On A Vsam Dataset. Can I Do Another Start Browse Without Doing An End Browse?

    Answer :

    No.

  274. Question 249. Can You Access Qsam (seq ) Files From Cics ?

    Answer :

    No.

  275. Question 250. Can You Access Esds Files From Cics ?

    Answer :

    Yes.