Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Accenture CICS Interview Questions
Questions Answers Views Company eMail

how to make the entire screen protected. i.e., for example when we design a delete screen before deleting the details we need to popup a screen saying do u wish to delete(Y/N). When this screen appears i want to make the previous screen fields as protected.Please help me with the anser. i need the entire screen to be protected. Thanks in advance

3 10429

What is meant by pseudo-conversation?

1 8201

How To Retrive The VSAM Datasets in CICS application programs?

1 2646

Why is GETMAIN command needed?? Will program not work if we do not give GETMAIN?

2 12343

What RCT Entries will you make for a CICS DB2 program??

1 6934

How do we pass parameters into a CICS –DB2 program

3407

How can we code a program such that we will never get a MAPFAIL error?

1 4456

How many ways to share information between different CICS programs?

3 6349

Generally we check EIBALEN = 0 to decide whether first call or not. If I do not pass any value in the COMMAREA then EIBCALEN will be 0 even on second call. Now how can we say the program is called for the first time or second time?

3 9965

What will happen if some program tries to process a queue on which an ENQ command has been issued by some other program?

1834

Post New Accenture CICS Interview Questions


Accenture CICS Interview Questions


Un-Answered Questions

All of the following are tools and techniques of the Schedule Development process except? A. CPM B. RAM C. GERT D. PERT

397


What is data model example?

340


Scenario A year ago we developed a standards compliant website for a client. Their site is very popular resulting in the client wanting to be able to track how it is being used by their users. The first part of this project is to create a Login function so that users can be identified on the website. The data supplied by users would have to be handled securely. You have been allocated this project to work on. You will be responsible for the task from start to finish and will be expected to give feedback to your manager. User expectations  The client wants their users to be able to login using a page that fits in with the website design.  Tom wants to access the website but doesn’t want his login information to be available to anyone else.  Paul doesn’t want to login to the website because he’s not a frequent user. Task Please provide some feedback on how you would do the following:-  Being the only Test Engineer on this task, what would your approach be for this requirement?  Identify the key areas for testing this page.  What tools if any, would you use to perform the testing, bearing in mind that the testing will be done without using an ‘automated test tool’.  Provide a sample test case that could be used for testing this page, for example as a word or Excel document.

1306


What are kiosks? These days' banks have come up with different kiosks. Name them.

531


Can you add up in word?

217






What does file flush mean?

325


Mention what are the types of special stock available?

525


Differentiate between synchronous and asynchronous ajax requests.

369


how to remove all dtddwrappers and labels on zend form elements?

106


What is an artificial (derived) primary key? When should an artificial (or derived) primary key be used?

191


What is a workflow ?

1372


What is a Processing Instruction in XML?

346


What is a local lookup?

477


Where is the tympanum located in the family Tettigoniidae?

1536


Explain about virus dna?

1675