What is the different ways to initiate a task?2 7413
Can you access ESDS files from CICS ?2 8347
What is the function of the Terminal Control table?4 5490
How do you access storage outside your CICS program?2 4707
What is the primary objective of CICS ?1 4171
What do the keywords MAPONLY and DATAONLY mean?2 5066
What is ENQ, DEQ ?1 8860
What is the name of the facility provided by CICS to free the application program form the problems caused1 2747
What is the function of the CICS translator?1 10501
Which is the macro used for making an entry in the PPT1 3900
What is the difference between a PF key & a PA key ?4 14026
What are the two outputs created as a result of generation of a map?2 3158
What is a Logical Unit of Work (LUW)?1 11369
Particular area has been affected in cics screen, what is the process to find?
How To Compile The COBOL-BD2-CI CS Programs In Real TIme? Please Give Me the Detailed Description?
Add a field to screen when what's the flow of impact?
if i am having a cics,vsam and db2 programs with each functions and i want that each function on screen?
hi,what is the module? how many modules in mainframe based banking projects
Name some translator and compile options and explain their meaning?
What will happen if some program tries to process a queue on which an ENQ command has been issued by some other program?
how a data in physical and symbolic map gets treated? Since the physical map is much concerned about the screen alignment and the field positions, how the values entered in the field which has PICIN or PICOUT clause in Physical map gets treated? Does that mean datas recieved or sent to the physical map should be constant? How does the data in Symbolic map gets converted with 5suffix namely F,L,A,I and O. For example EMPNO is treated as EMPNOI, EMPNOO, EMPNOA, EMPNOL and EMPNOF. how does this happen in symbolic map. Please provide your inputs on the above and kindly correct me if I am wrong.
How is Telon(CA-Telon) used to build map?
We can allocate memory dynamically by using GET MAIN command my question is at what scenario we can't release this memory and reuse this same memory??
How do we pass parameters into a CICS –DB2 program
For protecting a transaction using the transaction security function, the two things that must be done are?