What is the different ways to initiate a task?2 7826
Can you access ESDS files from CICS ?2 8672
What is the function of the Terminal Control table?4 5757
How do you access storage outside your CICS program?2 4905
What is the primary objective of CICS ?1 4345
What do the keywords MAPONLY and DATAONLY mean?2 5244
What is ENQ, DEQ ?1 9206
What is the name of the facility provided by CICS to free the application program form the problems caused1 2926
What is the function of the CICS translator?1 10748
Which is the macro used for making an entry in the PPT1 4048
What is the difference between a PF key & a PA key ?4 14481
What are the two outputs created as a result of generation of a map?2 3362
What is a Logical Unit of Work (LUW)?1 11662
if i am having a cics,vsam and db2 programs with each functions and i want that each function on screen?
How is Telon(CA-Telon) used to build map?
Add a field to screen when what's the flow of impact?
hi,what is the module? how many modules in mainframe based banking projects
Name some translator and compile options and explain their meaning?
Particular area has been affected in cics screen, what is the process to find?
We can allocate memory dynamically by using GET MAIN command my question is at what scenario we can't release this memory and reuse this same memory??
How do we pass parameters into a CICS –DB2 program
What will happen if some program tries to process a queue on which an ENQ command has been issued by some other program?
how a data in physical and symbolic map gets treated? Since the physical map is much concerned about the screen alignment and the field positions, how the values entered in the field which has PICIN or PICOUT clause in Physical map gets treated? Does that mean datas recieved or sent to the physical map should be constant? How does the data in Symbolic map gets converted with 5suffix namely F,L,A,I and O. For example EMPNO is treated as EMPNOI, EMPNOO, EMPNOA, EMPNOL and EMPNOF. how does this happen in symbolic map. Please provide your inputs on the above and kindly correct me if I am wrong.
For protecting a transaction using the transaction security function, the two things that must be done are?
How To Compile The COBOL-BD2-CI CS Programs In Real TIme? Please Give Me the Detailed Description?