Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Accenture CICS Interview Questions
Questions Answers Views Company eMail

how to make the entire screen protected. i.e., for example when we design a delete screen before deleting the details we need to popup a screen saying do u wish to delete(Y/N). When this screen appears i want to make the previous screen fields as protected.Please help me with the anser. i need the entire screen to be protected. Thanks in advance

3 11144

What is meant by pseudo-conversation?

1 8533

How To Retrive The VSAM Datasets in CICS application programs?

1 2969

Why is GETMAIN command needed?? Will program not work if we do not give GETMAIN?

2 13097

What RCT Entries will you make for a CICS DB2 program??

1 7379

How do we pass parameters into a CICS –DB2 program

3630

How can we code a program such that we will never get a MAPFAIL error?

1 4785

How many ways to share information between different CICS programs?

3 6835

Generally we check EIBALEN = 0 to decide whether first call or not. If I do not pass any value in the COMMAREA then EIBCALEN will be 0 even on second call. Now how can we say the program is called for the first time or second time?

3 10450

What will happen if some program tries to process a queue on which an ENQ command has been issued by some other program?

2047

Post New Accenture CICS Interview Questions


Accenture CICS Interview Questions


Un-Answered Questions

Highlight main points of Union Budget 2017?

631


What is the use of sequences?

1


What is the byte order of byte buffer?

550


How do I extend the life of my ssd?

463


Why we need biasing for transistor, fet and mosfet?

569






What are static assemblies and dynamic assemblies. Differences between them?

615


What is lightinject?

135


How is the resonant peak, resonant frequency, and bandwidth determined from nichols chart?

647


EXPLAIN THE TRANSFORMER MAINTENANCE?

1778


What are the attributes of category?

1


What is the difference between a multiplexer and encoder?

534


What is the need of multiple inheritance?

566


What are the basic controls in asp.net ajax?

500


Who are the partnering organizations with ifbi?

545


You are the project manager for a top-secret software project for an agency of the United States Government. Your mission, should you choose to accept it, is to complete the project using internal resources. The reason is because getting top secret clearances for contractors takes quite a bit of time and waiting for clearances would jeopardize the implementation date. Your programmers are 80 percent of the way through the programming and testing work when your agency appoints a new executive director. Your programmer’s are siphoned off this project to work on the executive director's hot new project. Which of the following addresses the purpose of Scope Verification in this case? A. It determines the correctness and completion of all the work B. It documents the level and degree of completion C. It determines if the project results comply with quality standards D. It documents the correctness of the work according to stakeholders' expectations

650