What is the difference between a PF key & a PA key ?
Answers were Sorted based on User's Feedback
Answer / guest
pf keys:wakes up the task and send modified data
pa keys:only wakes up the task
| Is This Answer Correct ? | 22 Yes | 2 No |
Answer / guest
pf keys:wakes up the task and send modified data
pa keys:only wakes up the task
| Is This Answer Correct ? | 13 Yes | 7 No |
Answer / kamesh
PF keys: we can reassigned,wakes up the task and send
modified data. Default function key definitions are already
assigned to many of the frequently used system commands.
PA keys: we can't reassigned and just only wakes up the task.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / anil kumawat
PA: The PA keys have special meaning in ISPF. They are not
equated to ISPF commands, and they cannot be reassigned.
PF: PF keys can be reassigned.Default F key definitions are already assigned to many of the frequently used system commands.
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the size of commarea
Kindly specify the pic clause for the hhmmss type of data fields?
Name at least one of the ways by which a transaction can be terminated?
how to make the entire screen protected. i.e., for example when we design a delete screen before deleting the details we need to popup a screen saying do u wish to delete(Y/N). When this screen appears i want to make the previous screen fields as protected.Please help me with the anser. i need the entire screen to be protected. Thanks in advance
What is the option that is used to erase all unprotected fields during a SEND MAP operation?
Generally we check EIBALEN = 0 to decide whether first call or not. If I do not pass any value in the COMMAREA then EIBCALEN will be 0 even on second call. Now how can we say the program is called for the first time or second time?
what is quasi-reentrant program?
How does COBOL II and CICS release 1.7 provide for exceptional conditions and how does that differ from
Explain how and where is the twa size set?
Hai I have a VSAM file and there are two CICS pgms A and B both intends to update the file. How to code the program so that it does not under go a dead lock situation.
If we wish to create bms executable, what are the basic steps that the user has to go through?
Define an aica abend?