Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Accenture CICS Interview Questions
Questions Answers Views Company eMail

how to make the entire screen protected. i.e., for example when we design a delete screen before deleting the details we need to popup a screen saying do u wish to delete(Y/N). When this screen appears i want to make the previous screen fields as protected.Please help me with the anser. i need the entire screen to be protected. Thanks in advance

3 11346

What is meant by pseudo-conversation?

1 8618

How To Retrive The VSAM Datasets in CICS application programs?

1 3046

Why is GETMAIN command needed?? Will program not work if we do not give GETMAIN?

2 13233

What RCT Entries will you make for a CICS DB2 program??

1 7482

How do we pass parameters into a CICS –DB2 program

3677

How can we code a program such that we will never get a MAPFAIL error?

1 4880

How many ways to share information between different CICS programs?

3 6975

Generally we check EIBALEN = 0 to decide whether first call or not. If I do not pass any value in the COMMAREA then EIBCALEN will be 0 even on second call. Now how can we say the program is called for the first time or second time?

3 10592

What will happen if some program tries to process a queue on which an ENQ command has been issued by some other program?

2109

Post New Accenture CICS Interview Questions


Accenture CICS Interview Questions


Un-Answered Questions

What is inbound proxy and out bound proxy?

584


Differentiate between a constructor and a method? Can we mark constructors final?

712


Which config file has all the supported channels/protocol?

585


What are the permission sets in salesforce?

225


Is Banking Ombudsman Scheme applied on commercial banks?

747






What is java server faces (jsf)?

67


What is template angular 2?

462


I have windows rt. Can I get windows 8.1?

512


What is the significance of proxy user?

639


What is the difference between consigner and consignee?

649


What is formatting in html?

500


If I have more than one version of one assemblies, then how will I use old version (how/where to specify version number?) In my application?

553


What is yield c#?

516


Explain ng-include directive.

469


The server is already having the list of IP addresses of all its authorized clients & if any client is requesting the server to do a task, it is sending its IP address(encapsulated in the packet) to the server.The server can easily match that IP address with that on its list and check if it's authorized client or not, then why we need inverse domain...........

1403