Answer Posted / vijay
To register the security info of all CICS users. There are
two sign on tranasactions available CESN and CSSN
CESN - Sign on transaction with the external security
manager.
CSSN - Sign on transaction without the external security
manager
Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
Can you define aica abend?
mention the option used in the cics read command to gain accessibility directly to the file i/o area. (Assume cobol-ii).?
What are the cics tables?
Define primary objective of cics?
when an xctl is done, does the tranid change ? Is a new task created ? Does it cause an implicit syncpoint to be issued ?
Explain how do you access the records randomly in tsq?
Is length = 0 sufficient to ascertain that the field has been modified?
how a data in physical and symbolic map gets treated? Since the physical map is much concerned about the screen alignment and the field positions, how the values entered in the field which has PICIN or PICOUT clause in Physical map gets treated? Does that mean datas recieved or sent to the physical map should be constant? How does the data in Symbolic map gets converted with 5suffix namely F,L,A,I and O. For example EMPNO is treated as EMPNOI, EMPNOO, EMPNOA, EMPNOL and EMPNOF. how does this happen in symbolic map. Please provide your inputs on the above and kindly correct me if I am wrong.
what is an mdt (modified data tag)? Its menaing and use?
What is the eib parameter?
What is the procedure to read a statement from tsq?
Give certain situations where NEWCOPY is obligatory?
Define RCT.
Explain how can you accomplish breakpoint in intertest?
Highlight the difference between a symbolic map and physical map?