Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

What Is Eib? How It Can Be Used?

Answer»

CICS automatically PROVIDES some system-related information to each task in a form of EXEC INTERFACE Block (EIB), which is unique to the CICS command level. We can USE all the fields of EIB in our application programs RIGHT AWAY.

CICS automatically provides some system-related information to each task in a form of EXEC Interface Block (EIB), which is unique to the CICS command level. We can use all the fields of EIB in our application programs right away.

52.

What Are The Differences Between An Exec Cics Xctl And An Exec Cics Link Command?

Answer»

The XCTL COMMAND transfers the control to an application PROGRAM at the same logical level and it does not expect the control back, while the LINK command passes the control to an application program at the next logical level and EXPECTS the control back.

The XCTL command transfers the control to an application program at the same logical level and it does not expect the control back, while the LINK command passes the control to an application program at the next logical level and expects the control back.

53.

What Is The Function Of The Cics Translator?

Answer»

The CICS translator CONVERTS the EXEC CICS commands into call STATEMENTS for a SPECIFIC programming language.

The CICS translator converts the EXEC CICS commands into call statements for a specific programming language.

54.

What Is A Mapset?

Answer»

Mapset is a collection of MAPS which are linked EDITED TOGETHER to form a LOAD module. It should have a PPT ENTRY. It can have names from 1 to 7 chars.

Mapset is a collection of maps which are linked edited together to form a load module. It should have a PPT entry. It can have names from 1 to 7 chars.

55.

Into Which Table Is The Terminal Id Registered?

Answer»

TERMINAL CONTROL Table.

Terminal Control Table.

56.

Which Cics Service Transaction Is Used To Gain Accessibility To Cics Control Tables?

Answer»

CEDA TRANSACTION is used to GAIN accessibility to control TABLES.

CEDA transaction is used to gain accessibility to control tables.

57.

How Do You Set The Mdt Option To ‘on’ Status, Even If Data Is Not Entered?

Answer»

MENTION FSET option in DFHMDF or set it DYNAMICALLY in the PROGRAM using FIELD+A attribute field.

Mention FSET option in DFHMDF or set it dynamically in the program using FIELD+A attribute field.

58.

What Are The Attribute Values Of Skipper And Stopper Fields?

Answer»

For SKIPPER FIELD, USE ASKIP and for STOPPER field use PROT.

For Skipper field, use ASKIP and for stopper field use PROT.

59.

Which Command Is Used To Release A Record On Which Exclusive Control Is Gained?

Answer»

EXEC CICS UNLOCK END-EXEC.

EXEC CICS UNLOCK END-EXEC.

60.

How Do You Dynamically Set The Cursor Position To A Specific Field?

Answer»

MOVE -1 to FIELD + L field. Mention CURSOR OPTION in the SEND command.

MOVE -1 to FIELD + L field. Mention CURSOR option in the SEND command.

61.

What’s The Cics Command Used To Access The Current Date And Time?

Answer»

ASKTIME command is USED to access CURRENT DATE and time.

ASKTIME command is used to access current date and time.

62.

Mention What Is The Difference Between Specifying Disp=old And Disp=shr For A Dataset?

Answer»

The DIFFERENCE between SPECIFYING DISP=OLD and DISP=SHR for a DATASET is that,
DISP=OLD: It reads data from beginning of dataset. But incase if you TRY to modify or write, then it will overwrite on existing data. i.e old data is lost
DISP=SHR: Its read-only file. In this, multiple USER can share the data

The difference between specifying DISP=OLD and DISP=SHR for a dataset is that,
DISP=OLD: It reads data from beginning of dataset. But incase if you try to modify or write, then it will overwrite on existing data. i.e old data is lost
DISP=SHR: Its read-only file. In this, multiple user can share the data

63.

Explain What Is The Difference Between Jes3 And Jes2?

Answer»

The difference between JES3 and JES2 is that,
JES3 ASSIGNS datasets for all the STEPS before the job is scheduled.
JES2 assigns datasets REQUIRED by a STEP just before the step EXECUTES.

The difference between JES3 and JES2 is that,
JES3 assigns datasets for all the steps before the job is scheduled.
JES2 assigns datasets required by a step just before the step executes.

64.

Explain How Can You Direct The Data To Spool Using Sysout Option?

Answer»

You can DIRECT the DATA to SPOOL USING SYSOUT OPTION “SYSOUT=*”

You can direct the data to spool using SYSOUT option “SYSOUT=*”

65.

Explain In Dd Statement What Is The Use Of Dcb Parameter?

Answer»

In DD STATEMENT the USE of DCB parameter is to GIVE the detail information of the physical CHARACTERISTICS of a dataset.

In DD statement the use of DCB parameter is to give the detail information of the physical characteristics of a dataset.

66.

Is It Possible To Code Instream Data In A Proc?

Answer»

No, it is not POSSIBLE to CODE INSTREAM DATA in a PROC.

No, it is not possible to code instream data in a PROC.

67.

Explain What Is The Use Of Iebgener Utility?

Answer»

The use of IEBGENER utility is used for COPYING the DATA from

  • ONE PS to another PS
  • OR MEMBER of a PDS to another PS
  • OR PS to member of PDS.

The use of IEBGENER utility is used for copying the data from

68.

Explain What Is “cond= Even” And “cond=only”?

Answer»

Cond=EVEN indicates to EXECUTE this STEP EVEN if any PREVIOUS step is terminated ABNORMALLY.
Cond=only indicates to execute this ONLY if any previous step is terminated abnormally

Cond=even indicates to execute this step EVEN if any previous step is terminated abnormally.
Cond=only indicates to execute this ONLY if any previous step is terminated abnormally

69.

Explain How Can You Access An Uncataloged Dataset In A Jcl?

Answer»

You can ACCESS an uncataloged DATASET in a JCL by USING the VOL and UNIT serial PARAMETERS in the dataset DD statement.

You can access an uncataloged dataset in a JCL by using the VOL and UNIT serial parameters in the dataset DD statement.

70.

Explain In Ways Data Can Be Passed To A Cobol Program From Jcl?

Answer»

A DATA can be passed to a COBOL program from JCL through

A data can be passed to a COBOL program from JCL through

71.

Explain What Is Soc4 Error?

Answer»

SOC4 error is for STORAGE violation error and can be due to many reasons. For example, invalid address due to SCRIPT error.

SOC4 error is for storage violation error and can be due to many reasons. For example, invalid address due to script error.

72.

Explain How Would You Create A Temporary Dataset? And Where Will You Use Them?

Answer»

TEMPORARY dataset can by CREATED either by specifying the temporary file INDICATOR as in SDN=&&TEMP or by not specifying any DSName.

Temporary dataset can by created either by specifying the temporary file indicator as in SDN=&&Temp or by not specifying any DSName.

73.

Mention What Is Dsn In Jcl And What Are The Parameters To Declare The Dsn?

Answer»

In JCL, a dataset NAME determines the name of a file and it is referred by “DSN”.
The DSN VALUE can comprise of sub-names each of 1 to 8 characters LENGTH, separated by periods and of total length of 44 characters (ALPHANUMERIC).

In JCL, a dataset name determines the name of a file and it is referred by “DSN”.
The DSN value can comprise of sub-names each of 1 to 8 characters length, separated by periods and of total length of 44 characters (alphanumeric).

74.

Mention What Happens When Cond Is Coded In Job Statement And When Cond Is Coded Inside Exec Statement?

Answer»

When COND is CODED in JOB STATEMENT, the CONDITION is tested for every job step. When the condition is true for any PARTICULAR job step, it is byepassed along with the job steps.
When COND is coded inside EXEC statement of a job step, and the condition is true, then only that particular job step is bypassed, and execution will be carried out from the NEXT job step

When COND is coded in JOB statement, the condition is tested for every job step. When the condition is true for any particular job step, it is byepassed along with the job steps.
When COND is coded inside EXEC statement of a job step, and the condition is true, then only that particular job step is bypassed, and execution will be carried out from the next job step

75.

What Is Cataloged Procedures?

Answer»

From the JCL, when the PROCEDURE is separated out and coded in a different DATA store, then it is REFERRED as a Cataloged Procedure.

From the JCL, when the procedure is separated out and coded in a different data store, then it is referred as a Cataloged Procedure.

76.

Explain What Jcl Procedures?

Answer»

The JCL Procedures are NOTHING but a set of statements INSIDE a JCL, grouped together to perform a particular function. Procedure can be used to achieve PARALLEL execution of a PROGRAM using multiple input FILES.

The JCL Procedures are nothing but a set of statements inside a JCL, grouped together to perform a particular function. Procedure can be used to achieve parallel execution of a program using multiple input files.

77.

Explain What Is Dsn Parameter And Disp Parameter Is Used For?

Answer»

DISP PARAMETER: It is used to specify the DISPOSITION of dataset which is CODED on DSN parameter
DSN parameter: It is used to specify the data SET NAME

DISP parameter: It is used to specify the disposition of dataset which is coded on DSN parameter
DSN parameter: It is used to specify the data set name

78.

Explain What Are Jcllib And Steplib In Jcl?

Answer»

Both libraries SPECIFIES the private libraries that should be searched before the DEFAULT system libraries does in order to locate a program to be executed.
JCLLIB IDENTIFIES the libraries that the system will search for include groups or procedures named in EXEC statements
JOBLIB applies to all steps in the job while STEPLIB applies only to the PARTICULAR step.

Both libraries specifies the private libraries that should be searched before the default system libraries does in order to locate a program to be executed.
JCLLIB identifies the libraries that the system will search for include groups or procedures named in EXEC statements
JOBLIB applies to all steps in the job while STEPLIB applies only to the particular step.

79.

Explain What Exec Statement Is And What Is The Syntax Of Exec Statement Used In Jcl?

Answer»

EXEC statement holds the JOB step program or procedure information. The syntax of EXEC statement USED in JCL is
//Step-name EXEC Positional-param, Keyword-param

EXEC statement holds the job step program or procedure information. The syntax of EXEC statement used in JCL is
//Step-name EXEC Positional-param, Keyword-param

80.

Explain What Is Dd Statement Is Used In Jcl?

Answer»

DD statement is used in JCL is used to identify the source of INPUT and the PLACEMENT of OUTPUT INFORMATION.

DD statement is used in JCL is used to identify the source of input and the placement of output information.

81.

What Is The Syntax Of Jcl Statement?

Answer»

The SYNTAX of JCL STATEMENT is,
//JOB-name JOB Positional-param, Keyword-param

The syntax of JCL statement is,
//Job-name JOB Positional-param, Keyword-param

82.

Mention What Is The Jcl Statement Consists Of?

Answer»

JCL statement CONSISTS of

JCL statement consists of

83.

Explain How Jcl Works?

Answer»

JCL RECOGNIZES the program to be executed, the INPUTS that are required and location of the input/output and informs the OPERATING System through Job CONTROL Statements.

JCL recognizes the program to be executed, the inputs that are required and location of the input/output and informs the Operating System through Job control Statements.

84.

Mention The Types Of Job Control Statements?

Answer»

The TYPES of JOB control STATEMENTS are

  • JOB – to identify the Job
  • DD – to supply the I/O files needed for the EXECUTION of the PROGRAM
  • EXEC – to identify which program has to be executed

The types of job control statements are

85.

Explain What Is The Use Of Jcl?

Answer»
  • It is used for the deleting CREATING, the Data Sets, GDG’S and VSAM CLUSTERS.
  • It is used for comparing the files and PDS members
  • It is used for compiling and executing the programs which INCLUDES BATCH programs as well
  • It is used for merging and sorting on file data

86.

Explain What Is Jcl?

Answer»

JCL stands for Job Control Language. It is the command language of Multiple Virtual STORAGE (MVS). It is the normally used in OPERATING System in the IBM MAINFRAME computers.

JCL stands for Job Control Language. It is the command language of Multiple Virtual Storage (MVS). It is the normally used in Operating System in the IBM Mainframe computers.

87.

What Is Shareopts?

Answer»

SHAREOPTS is a parameter in the DEFINE and SPECIFIES how an object can be shared among users. It is coded as SHAREOPTS(a B), where a is the cross region share OPTION ie how TWO or more jobs on a single system can share the file, while b is the cross system share option ie how two or more jobs on different MVSes can share the file. Usual value is (2 3).

SHAREOPTS is a parameter in the DEFINE and specifies how an object can be shared among users. It is coded as SHAREOPTS(a b), where a is the cross region share option ie how two or more jobs on a single system can share the file, while b is the cross system share option ie how two or more jobs on different MVSes can share the file. Usual value is (2 3).

88.

Would You Specify Freespace For An Esds?

Answer»

No. Because you cannot insert records in an ESDS, also when you rewrite a record, it MUST be of the same LENGTH. Thus PUTTING any value for freespace does not make any sense.

No. Because you cannot insert records in an ESDS, also when you rewrite a record, it must be of the same length. Thus putting any value for freespace does not make any sense.

89.

How Do You Decide On Optimum Values For Ci, Freespace Etc?

Answer»

CI size should be BASED on record length, type of processing. Usually CI is 4K.If record length is larger(>1K), CHOSE 6K or 8K. FREESPACE should be large if more number of INSERTIONS are envisaged. Usual values are (20 20) when heavy updates are expected. CI size can be calculated.

CI size should be based on record length, type of processing. Usually CI is 4K.If record length is larger(>1K), chose 6K or 8K. FREESPACE should be large if more number of insertions are envisaged. Usual values are (20 20) when heavy updates are expected. CI size can be calculated.

90.

What Is Freespace?

Answer»

Coded in the DEFINE as FREESPACE(CI ca) where ci is the PERCENTAGE of each control interval to be LEFT free for insertions, ca is the percentage of control intervals in each control area to be left empty.

Coded in the DEFINE as FREESPACE(ci ca) where ci is the percentage of each control interval to be left free for insertions, ca is the percentage of control intervals in each control area to be left empty.

91.

What Is Control Interval, Control Area?

Answer»

Control Interval is analogous to a physical BLOCK for QSAM files. It is the unit of i/o. Must be between 512 bytes to 32 k. Usually either 2K or 4K. A larger control interval INCREASES performance for sequential processing while the reverse is true for random access. Under CICS when a record is locked, the entire CI gets locked.
Control area is a group of control intervals. CA is used during allocation. CA size is calculated based on the allocation type (cyl, tracks or records) and can be max of 1 CYLINDER

Control Interval is analogous to a physical block for QSAM files. It is the unit of i/o. Must be between 512 bytes to 32 k. Usually either 2K or 4K. A larger control interval increases performance for sequential processing while the reverse is true for random access. Under CICS when a record is locked, the entire CI gets locked.
Control area is a group of control intervals. CA is used during allocation. CA size is calculated based on the allocation type (cyl, tracks or records) and can be max of 1 cylinder

92.

What Is Idcams?

Answer»

IDCAMS is the ACCESS Method Services PROGRAM. You run the IDCAMS program and SUPPLY AMS commands thru SYSIN. (examples of AMS commands are DELETE, DEFINE, REPRO ETC..).

IDCAMS is the Access Method Services program. You run the IDCAMS program and supply AMS commands thru SYSIN. (examples of AMS commands are DELETE, DEFINE, REPRO etc..).

93.

What Are The Different Types Of Vsam Files Available?

Answer»

ESDS: ENTRY SEQUENCE Data SET
KSDS: KEY Sequence Data Set
RRDS: Relative Data Set

ESDS: Entry Sequence Data Set
KSDS: Key Sequence Data Set
RRDS: Relative Data Set

94.

What Is Vsam?

Answer»

VSAM = Virtual Storage Access Method
Virtual storage access method (VSAM) an IBM disk FILE storage access method,first used in the OS/VS1, OS/VS2 Release 1 (SVS) and Release 2 (MVS)operating systems, later used throughout the Multiple Virtual Storage (MVS) architecture and now in z/OS. ORIGINALLY a RECORD­oriented filesystem.[NB 2], VSAM comprises four[NB 2] data SET organizations: Key Sequenced Data Set (KSDS), Relative Record Data Set (RRDS), Entry Sequenced Data Set (ESDS) and Linear Data Set (LDS).

VSAM = Virtual Storage Access Method
Virtual storage access method (VSAM) an IBM disk file storage access method,first used in the OS/VS1, OS/VS2 Release 1 (SVS) and Release 2 (MVS)operating systems, later used throughout the Multiple Virtual Storage (MVS) architecture and now in z/OS. Originally a record­oriented filesystem.[NB 2], VSAM comprises four[NB 2] data set organizations: Key Sequenced Data Set (KSDS), Relative Record Data Set (RRDS), Entry Sequenced Data Set (ESDS) and Linear Data Set (LDS).

95.

What Is The Use Of Alter Command In Vsam?

Answer»

ALTER COMMAND is USED to change most of the VSAM dataset attributes that were specified while DEFINING VSAM cluster.

ALTER command is used to change most of the VSAM dataset attributes that were specified while defining VSAM cluster.

96.

Explain Different Steps To Create Alternate Index?

Answer»

First step is Define Alternate Index. Second is Define PATH and THIRD step is Building Index.

First step is Define Alternate Index. Second is Define Path and third step is Building Index.

97.

What Is Upgrade And Noupgrade Option In Alternate Index?

Answer»

UPGRADE SPECIFIES that the alternate index should be MODIFIED if the base cluster is modified and NOUPGRADE specifies that the alternate INDEXES should be left ALONE if the base cluster is modified.

UPGRADE specifies that the alternate index should be modified if the base cluster is modified and NOUPGRADE specifies that the alternate indexes should be left alone if the base cluster is modified.

98.

What Are Sub-allocated Clusters?

Answer»

A sub-allocated VSAM file shares the VSAM SPACE with other sub-allocated files. It specifies that file should be sub-allocated WITHIN EXISTING VSAM space. Sub-allocation is USED for easier management and control of VSAM spaces.

A sub-allocated VSAM file shares the VSAM space with other sub-allocated files. It specifies that file should be sub-allocated within existing VSAM space. Sub-allocation is used for easier management and control of VSAM spaces.

99.

What Are Unique Cluster?

Answer»

UNIQUE Clusters consists of a SEPARATE data SPACE which is UTILIZED completely by the cluster created within it. Unique clusters are created out of unallocated space on DIRECT access storage.

Unique Clusters consists of a separate data space which is utilized completely by the cluster created within it. Unique clusters are created out of unallocated space on direct access storage.

100.

What Does '02' File Status Code Indicate?

Answer»

'02' indicates Non-Unique ALTERNATE Index duplicate KEY found.

'02' indicates Non-Unique Alternate Index duplicate key found.