By which CICS defined field can you determine the position
of the cursor on the map ?
For protecting a transaction using the transaction security function, the two things that must be done are?
what are the two ways of breaking a cpu bound process to allow other task to gain access to cpu?
What is the abend command?
how to make the entire screen protected. i.e., for example when we design a delete screen before deleting the details we need to popup a screen saying do u wish to delete(Y/N). When this screen appears i want to make the previous screen fields as protected.Please help me with the anser. i need the entire screen to be protected. Thanks in advance
Explain the mdt in cics?
<CICSFault xmlns="http://www.ibm.com/software/htp/cics/WSFault">DFHPI10 08 05/13/2009 05:47:14 FSCIBM SOAP message generation failed because of incorrect input (INPUT_STRUCTURE_TOO_SMALL ).</CICSFault> Can anyone suggest how to handle this type of error?
At which situation we need to use the push and pop conditions...pls tell me with exampls.
What is meant by an attribute byte?
What are the steps you go through to a create a BMS executable?
Define task work area?
when will be use the tdq and tsq??
What is a transid?