Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


For protecting a transaction using the transaction security
function, the two things that must be done are?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CICS Interview Questions

How do you handle errors in CICS pgms ?

1 Answers   IBM,


What is BMS?

13 Answers  


What is an MDT (Modified Data Tag) - it's meaning and use?

2 Answers   Polaris,


What is temporary storage?

1 Answers   IBM,


What are the databases that CICS can access?

1 Answers  


Explain the difference between exec cics handle condtion and an exec cics ignore command?

0 Answers  


What does ?Pseudo Conversational? mean?

3 Answers   IBM,


interview type questions like basics&deep

0 Answers   TetraSoft,


name the command that is used to dump the main storage areas related to a task?

0 Answers  


What is the primary function of the Processing Program Table (PPT)?

5 Answers   IBM,


when you compile a cics program, the (pre) compiler puts an extra chunk of code. Where does it get included and that is it called? What is its length?

0 Answers   IBM,


What are different ways of initiating transaction in CICS ?

3 Answers   Cap Gemini, IBM,


Categories