How to make protected field in BMS invisible through
application program?
Answer Posted / adarsh
using "DFHPROTN"
Is This Answer Correct ? | 9 Yes | 4 No |
Post New Answer View All Answers
What does the 'ceci:cics' transactions do?
define the field with ic in the bms map.
what are transient data sets defined to cics?
Name the two types of transient data queues?
How to handle exceptional conditions in cics?
Can you explain exec cics handle condition command?
Explain how do you control cursor positioning?
Explain the primary significance of intra-partition and extra-partition tdqs ?
Define the term transaction routing?
If we wish to create bms executable, what are the basic steps that the user has to go through?
what are the reserved words for cics?
What are some of the cics commands associated with interval control?
What is fset?
explain the means of supporting pseudo conversation programming. (Eg. Storing and restoring of states, control flow, error handling)?
What is the main function of the sign-on table?