Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


how to make the entire screen protected. i.e., for example
when we design a delete screen before deleting the details
we need to popup a screen saying do u wish to delete(Y/N).
When this screen appears i want to make the previous screen
fields as protected.Please help me with the anser. i need
the entire screen to be protected.

Thanks in advance

Answers were Sorted based on User's Feedback



how to make the entire screen protected. i.e., for example when we design a delete screen before d..

Answer / lenin

I am not sure how to make the entire screen as protected by
a single statement. But we can protect the fields
individully by moving the user defined value to the
attribute field of the fields.

Attribute byte is a 1 byte field, in which the third bit
indicates whether it is protected(1) or unprotected (0) and
for all other fields we can give any of 0 or 1

For Ex: 00100101 ---- if this value is in attribute byte
then the filed is protected we can say, as the third bit is
1.

The decimal value of it(00100101) is 37.

The following program will show you how to move this value
to the attribute byte of the map fields.

01 fiel1 pic s9(4) comp value 37.

01 fiel2 redefines fiel1.
02 a pic x.
02 b pic x.

Move b to nameA. // name field will be protected.

Like this we move b to all the unproteceted fields on the
screen.

Please correct me if i am wrong and provide me the correct
soultion....

Is This Answer Correct ?    5 Yes 1 No

how to make the entire screen protected. i.e., for example when we design a delete screen before d..

Answer / lu

when u compile a cics program with mapset, u have a copy
DFHMSCA (attribut fields)...If u want to protect or
unprotect ..you use this attribut to your fields...
Correct me if i'm wrong

Is This Answer Correct ?    4 Yes 1 No

how to make the entire screen protected. i.e., for example when we design a delete screen before d..

Answer / rajesh

Take a div tag in absolute position n set display property
to none .Now on any click event set width , height n
display="block" .Also set z-index accordingly .Your screen
will be block in specified width n height area .

Is This Answer Correct ?    2 Yes 4 No

Post New Answer

More CICS Interview Questions

I want to know what exactly the STOPPER field does with example. Please help.

1 Answers  


how to code the following map using occours clause? all the three fields have different length. ename eno addr 1) _______ _________ __________ 2) _______ _________ __________ 3) _______ _________ __________ 4) _______ _________ __________ 5) _______ _________ __________ 6) _______ _________ __________

1 Answers   L&T, TCS, Wipro,


What is the function of the EXEC CICS HANDLE CONDITION command?

3 Answers  


Name the two types of transient data queues?

0 Answers  


What is the CICS command that gives the length of TWA area?

3 Answers   IBM, TCS,


<CICSFault xmlns="http://www.ibm.com/software/htp/cics/WSFault">DFHPI10 08 05/13/2009 05:47:14 FSCIBM SOAP message generation failed because of incorrect input (INPUT_STRUCTURE_TOO_SMALL ).</CICSFault> Can anyone suggest how to handle this type of error?

1 Answers  


Thru web page we have triggered the transaction, how can we come to know that whether it has hit the mianframes or not?

2 Answers  


What is EXEC CICS RETRIEVE ?

1 Answers   IBM,


Which is the control table where you specify all the transaction that are to be started by CICS after CICS

4 Answers  


How To Set MDT(Modified Data Tag) Thru Application Program? (Dynamically)?

2 Answers   IBM,


What are attribute bytes and how and why are they modified?

1 Answers  


What is the significance of RDO?

1 Answers   IBM,


Categories