CICS provides an interface through which the all the DL/I services can be used under CICS(True or False).
1 4159For protecting a transaction using the transaction security function, the two things that must be done are?
2340Specify the requirements for Automatic Task Initiation. (Mention the control table, it?s entries and the corresponding Procedure division CICS command).
1 5799Before issuing an ASKTIME command what will be the values in the EIBDATE and EIBTIME fields ?
1 7624
Explain how do you control cursor positioning?
When would you use abend command?
What is the pic clause for the any bll cell type of data fields?
Name the 3 common ways to create maps?
Explain the difference between link xctl?
list the sequence of steps used to achieve modiication in skip sequential mode?
What is bms map?
what is the difference between a package and a plan. How does one bind 2 versions of a cics transaction with the same module name in two different cics regions that share the same db2 subsystem?
Kindly specify the pic clause for the any bll cell type of data fields?
What is the meaning of the enq command?
the dfhcommara is used to pass information from one application to another. What are some other ways that this function can be accomplished?
What do you mean by CEMT?
Explain the difference between cics program control table (pct) and cics processing program table (ppt)?
Name the three ways available for a program to position the cursor on the screen?
Explain how many exceptional condition can be given in a handle condition?