Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

How Do You Make Your Bms Maps Case Sensitive?

Answer»

USE ASIS???

Use ASIS???

52.

Do You Receive The Attribute Byte In The Symbolic Map?

Answer»

On EOF YES.

On EOF yes.

53.

What Is The Use Of Dsect Parameter In Bms?

Answer»

Is the PARAMETER to GENERATE a SYMBOLIC MAP.

Is the parameter to generate a symbolic map.

54.

What Is Mdt? What Are Fset, Frset ?

Answer»

Modified Data Tag:Bit in the attribute byte indicating modification of field on screen. Happens on an INPUT OPERATION.
FSET: Sets MDT on to ENSURE field is transmitted. Happens on an output operation.
FRSET: Resets MDT. Until this happens, field CONTINUES to be sent.

Modified Data Tag:Bit in the attribute byte indicating modification of field on screen. Happens on an input operation.
FSET: Sets MDT on to ensure field is transmitted. Happens on an output operation.
FRSET: Resets MDT. Until this happens, field continues to be sent.

55.

What Are The 3 Working Storage Fields Used For Every Field On The Map?

Answer»

LENGTH, ATTRIBUTE and input/output FIELD.

Length, attribute and input/output field.

56.

How Do You Use Extended Attributes ?

Answer»

DEFINE EXTATT=YES and the CORRECT TERMINAL TYPE.

Define EXTATT=YES and the correct terminal type.

57.

What Are The Two Outputs Created As A Result Of Generation Of A Map?

Answer»

The MAP COPYBOOK and the LOAD MODULE.

The map copybook and the load module.

58.

Define The Field With Ic In The Bms Map.

Answer»

USE CURSOR(N m)??

Use CURSOR(n m)??

59.

How Do You Place The Cursor On A Particular Position On The Screen?

Answer»

Move -1 to the LENGTH ATTRIBUTE of the field aand use the CURSOR option.

Move -1 to the length attribute of the field aand use the CURSOR option.

60.

What Is Cics?

Answer»

CICS (Customer Information Control System) is a transaction server that runs primarily on IBM mainframe systems under z/OS and z/VSE.

CICS is a transaction manager designed for RAPID, high-volume online processing. This processing is mostly interactive (screen-oriented), but background TRANSACTIONS are possible.

While CICS has its highest profile among financial INSTITUTIONS such as banks and insurance companies, over 90 percent of Fortune 500 companies are REPORTED to rely on CICS (running on z/OS) for their core business functions, beside many governments. CICS is used in bank-teller applications, ATM systems, industrial production control systems, insurance applications and many other types of interactive application.

Recent CICS Transaction Server enhancements include support for Web services and Enterprise Java Beans (EJBs). IBM began shipping the latest release, CICS Transaction Server - Version 3.2, in June of 2007.

CICS (Customer Information Control System) is a transaction server that runs primarily on IBM mainframe systems under z/OS and z/VSE.

CICS is a transaction manager designed for rapid, high-volume online processing. This processing is mostly interactive (screen-oriented), but background transactions are possible.

While CICS has its highest profile among financial institutions such as banks and insurance companies, over 90 percent of Fortune 500 companies are reported to rely on CICS (running on z/OS) for their core business functions, beside many governments. CICS is used in bank-teller applications, ATM systems, industrial production control systems, insurance applications and many other types of interactive application.

Recent CICS Transaction Server enhancements include support for Web services and Enterprise Java Beans (EJBs). IBM began shipping the latest release, CICS Transaction Server - Version 3.2, in June of 2007.

61.

Kindly Specify The Pic Clause For The Following: Any Bll Cell, Data Type Of Length Option Field, Hhmmss Type Of Data Fields?

Answer»

Any BLL Cell -S9(8) COMP
Data type of length Option FIELD - S9(4) COMP
HHMMSS type of data FIELDS - S9(7) COMP 3

Any BLL Cell -S9(8) COMP
Data type of length Option field - S9(4) COMP
HHMMSS type of data fields - S9(7) COMP 3

62.

List The Sequence Of Steps Used To Achieve Modiication In Skip Sequential Mode?

Answer»

List the sequence of steps USED to achieve "Modiication in SKIP Sequential Mode".

I. READNEXT command
II. Issue the ENDBR command
III. Issue the READ command with UDATE option.
IV. Manipulate the record ( DELETE or REWRITE command)
V. Issue START command
VI. Isusue two READNEXT commands (One for dummy skip)
VII. GO to step two.

List the sequence of steps used to achieve "Modiication in Skip Sequential Mode".

I. READNEXT command
II. Issue the ENDBR command
III. Issue the READ command with UDATE option.
IV. Manipulate the record ( DELETE or REWRITE command)
V. Issue START command
VI. Isusue two READNEXT commands (One for dummy skip)
VII. Go to step two.

63.

What Are The Commands Used To Gain Exclusive Control Over A Resource?

Answer»

What are the commands used to GAIN exclusive CONTROL over a resource
(for Ex a Temporary storage queue.)?

EXEC CICS ENQ EXEC CICS DEQ
RESOURCE(QID) RESOURCE(QID)
END-EXEC END-EXEC

What are the commands used to gain exclusive control over a resource
(for Ex a Temporary storage queue.)?

EXEC CICS ENQ EXEC CICS DEQ
RESOURCE(QID) RESOURCE(QID)
END-EXEC END-EXEC

64.

Mention The 5 Fields Available In The Symbolic Map For Every Named Field In The Dfhmdi Macro? Give A Brief Description Of These Fields (not Exceeding A Line).?

Answer»

FIELD+L - RETURN the length of text entered (or for dymanic cursor positioning)
FIELD+F - Return X(80) if data entered but erased.
FIELD+A - USED for attributes reading and setting
FIELD+I - Used for reading the text entered while RECEIVING the MAP.
FIELD+O - Used for sending information on to the MAP.

FIELD+L - Return the length of text entered (or for dymanic cursor positioning)
FIELD+F - Return X(80) if data entered but erased.
FIELD+A - Used for attributes reading and setting
FIELD+I - Used for reading the text entered while receiving the map.
FIELD+O - Used for sending information on to the MAP.

65.

How Do You Intitiate Another Transaction?

Answer»

The transaction initiated should be in a position to retrieve INFORMATION pertaining to which transaction has initiated it and from which terminal. (CODE the required CICS commands)

EXEC CICS START
INTERVAL(hhmmss)/TIME(hhmmss)
TRANSID('TRAN')
TERMID('TRM1)
FROM(data-area)
LENGTH(data-value)
RTRANSID(EIBTRNID)
RTERMID(EIBTRMID)
END-EXEC

EXEC CICS RETRIEVE
INTO(data-area)
LENGTH(data-value)
RTRANSID(data-name)
RTERMID(data-name)
END-EXEC

The transaction initiated should be in a position to retrieve information pertaining to which transaction has initiated it and from which terminal. (Code the required CICS commands)

EXEC CICS START
INTERVAL(hhmmss)/TIME(hhmmss)
TRANSID('TRAN')
TERMID('TRM1)
FROM(data-area)
LENGTH(data-value)
RTRANSID(EIBTRNID)
RTERMID(EIBTRMID)
END-EXEC

EXEC CICS RETRIEVE
INTO(data-area)
LENGTH(data-value)
RTRANSID(data-name)
RTERMID(data-name)
END-EXEC

66.

What Is The Cics Command Used To Access Current Date And Time?

Answer»

ASKTIME.

ASKTIME.

67.

How Do You Terminate An Already Issued Delay Command?

Answer»

EXEC CICS CANCEL
REQID(ID)
END-EXEC

EXEC CICS CANCEL
REQID(id)
END-EXEC

68.

Which Option Of The Pct Entry Is Used To Specify The Pf Key To Be Pressed For Initiating A Transaction?

Answer»

TASKREQ=PF1

TASKREQ=PF1

69.

Mention The Option Used In The Cics Read Command To Gain Accessibility Directly To The File I/o Area. (assume Cobol-ii).?

Answer»

SET(ADDRESS OF LINKAGE-AREA).

SET(ADDRESS OF LINKAGE-AREA).

70.

How Do You Establish A Starting Position In A Browse Operation?

Answer»

EXEC CICS STARTBR ---- END-EXEC.

EXEC CICS STARTBR ---- END-EXEC.

71.

What Is The Cics Command That Gives The Length Of Twa Area?

Answer»

EXEC CICS ASSIGN
TWALENG(data-value)
END-EXEC.

EXEC CICS ASSIGN
TWALENG(data-value)
END-EXEC.

72.

How Do You Set The Mdt Option To On Status, Even If Data Is Not Entered?

Answer»

Mention FSET OPTION in DFHMDF or SET it DYNAMICALLY in the program using FIELD+A sttribute field.

Mention FSET option in DFHMDF or set it dynamically in the program using FIELD+A sttribute field.

73.

Specify The Cics Command Used To Read A Vsam Record Starting With Prefix F. Code All The Relevant Options?

Answer»

EXEC CICS READ
DATASET('FILENAME')
INTO(data-area)
RIDFLD(data-area)
KEYLENGTH(1)
GENERIC
LENGTH(WK-LEN)
END-EXEC.

EXEC CICS READ
DATASET('FILENAME')
INTO(data-area)
RIDFLD(data-area)
KEYLENGTH(1)
GENERIC
LENGTH(WK-LEN)
END-EXEC.

74.

What Is The Option Specified In The Read Operation To Gain Multiple Concurrent Operations On The Same Dataset?

Answer»

REQID(VALUE)

REQID(value)

75.

Specify Cics Transaction Initiation Process. ( From The Perspective Of Cics Control Programs And Control Tables.)?

Answer»

TCP PLACES data in TIOA and corresponding ENTRY into TCT.
KCP acquires the transaction identifier from TIOA and verifies if it is present in PCT.
SCP acquires Storage in Task Control Area (TCA), in which KCP prepares control data for the task.
KCP then loads the application programs mentioned in PCT by looking for it in PPT.
If resident - real storage MEMORY location is not present in the PPT the control is passed to PCP that loads the application program from the physical storage location address GIVEN in PPT. The control is then passed to the application program (LOAD module).

TCP places data in TIOA and corresponding entry into TCT.
KCP acquires the transaction identifier from TIOA and verifies if it is present in PCT.
SCP acquires Storage in Task Control Area (TCA), in which KCP prepares control data for the task.
KCP then loads the application programs mentioned in PCT by looking for it in PPT.
If resident - real storage memory location is not present in the PPT the control is passed to PCP that loads the application program from the physical storage location address given in PPT. The control is then passed to the application program (LOAD module).

76.

Specify The Requirements For Automatic Task Initiation. (mention The Control Table, It Is Entries And The Corresponding Procedure Division Cics Command).?

Answer»

DFHDCT TYPE = INTRA,
DESTIN = MSGS,
TRANSID = MSW1,
TRIGLEV = 1000

EXEC CICS WRITEQ TD
QUEUE('MSGS'),
FROM(DATA-AREA),
LENGTH(MSG_LEN)
END-EXEC.

DFHDCT TYPE = INTRA,
DESTIN = MSGS,
TRANSID = MSW1,
TRIGLEV = 1000

EXEC CICS WRITEQ TD
QUEUE('MSGS'),
FROM(DATA-AREA),
LENGTH(MSG_LEN)
END-EXEC.

77.

What Is The Eib Parameter And The Cics Command Used To Implement Pseudo-conversational Technique Using Single Pct - Single Ppt Entry?

Answer»

EIBCALEN - To check if COMMAREA has been passed in terurn COMMAND.
EXEC CICS RETURN
TRANSID(data-name)
COMMAREA(data-area)
LENGTH (data-value)
END-EXEC

EIBCALEN - To check if COMMAREA has been passed in terurn command.
EXEC CICS RETURN
TRANSID(data-name)
COMMAREA(data-area)
LENGTH (data-value)
END-EXEC

78.

What Are The Two Ways Of Breaking A Cpu Bound Process To Allow Other Task To Gain Access To Cpu?

Answer»

EXEC CICS DELAY EXEC CICS DELAY
INTERVAL(hhmmss) TIME(hhmmss)
END-EXEC END-EXEC

EXEC CICS DELAY EXEC CICS DELAY
INTERVAL(hhmmss) TIME(hhmmss)
END-EXEC END-EXEC

79.

Mention The Option (along With Argument Type) Used In A Cics Command To Retrieve The Response Code After Execution Of The Command?

Answer»

RESP( S9(8) COM. )

RESP( S9(8) COM. )

80.

Into What Fields Will The Date And Time Values Be Moved After Execution Of The Above Command?

Answer»

EIBDATE and EIBTIME.

EIBDATE and EIBTIME.

81.

What Are The Six Different Type Of Argument Values In Cobol That Can Be Placed In Various Options Of A Cics Command?

Answer»
  1.  Data VALUE - EX (Literal 8 or 77 KEYLEN PIC S9(4) COMP VALUE8.)
  2.  Data Area - EX (01 RECORD-AREA. 05 FIELD PIC X(5).)
  3.  Pointer-REF -EX (05 POINTER-I PIC S9(8( COMP.) . Name -EX (05 FIELD-NAME PIC X(5) VALUE 'FILEA'.).
  4.  Label - COBOL paragraph name
    HHMMSS - EX (77 TIMEVAL PIC S9(7) COMP3. ).

     

 

 

 

82.

What Is The Purpose Of The Program List Table?

Answer»

The Program List Table RECORDS the set of application programs that will be executed AUTOMATICALLY at CICS start-up TIME.

The Program List Table records the set of application programs that will be executed automatically at CICS start-up time.

83.

What Does Pseudo Conversational Mean?

Answer»

The programming technique in which the task will not wait for the end-USER replies on the terminal. Terminating the task every time the APPLICATION needs a response from the user and specifying the next transaction to be STARTED when the end user press any attention key ( (Enter, PF1 trough PF24, PF24, PA1, PA2 and clear) is pseudo-conversational processing.

The programming technique in which the task will not wait for the end-user replies on the terminal. Terminating the task every time the application needs a response from the user and specifying the next transaction to be started when the end user press any attention key ( (Enter, PF1 trough PF24, PF24, PA1, PA2 and clear) is pseudo-conversational processing.

84.

How And Where Is The Twa Size Set?

Answer»

TWASIZE=300 in PCT table.

TWASIZE=300 in PCT table.

85.

What Is The Most Common Way Of Building Queue-id Of A Tsq?

Answer»

(NAME the CONSTITUENTS of the QUEUE ID).
TERMID+TRANSACTION-ID.

(Name the constituents of the Queue ID).
TERMID+TRANSACTION-ID.

86.

What Option Is Specified In The Send Command To Send Only The Unnamed Fields On To The Screen?

Answer»

MAPONLY

MAPONLY

87.

What Is The Commarea (communications Area)?

Answer»

This is the area of MAIN storage designed to let programs or TASK COMMUNICATE with one another. USED in programs VIA RETURN, XCTL and LINK commands.

This is the area of main storage designed to let programs or task communicate with one another. used in programs via RETURN, XCTL and LINK commands.

88.

How Many Conditions Can You Include In A Single Handle Condition Command?

Answer»

No more than 16 in a SINGLE handle CONDITION. If you need more, then you must code another HANDLE CONDITION COMMAND.

No more than 16 in a single handle condition. If you need more, then you must code another HANDLE CONDITION command.

89.

Explain How To Handle Exceptional Conditions In Cics?

Answer»

An abnormal situation during execution of a CICS command is called an exceptional condition:
1. Handle Condition Command: It is used to transfer control to the PROCEDURE label specified if the exceptional condition specified occurs.
2. Ignore Condition Command: It causes no action to be taken if the condition specified occurs in the program. That is control will be returned to the next instruction following the command which ENCOUNTERED the exceptional condition.
3. No Handle Option: This option can be specified in any CICS command and it will cause no action to be taken for any exceptional condition OCCURRING during execution of this command.
4. RESP Option: This option can be specified in any CICS command. If the RESP option is specified in a command, CICS places a response code at a completion of the command. The application program can CHECK this code, then proceed to the next processing.

An abnormal situation during execution of a CICS command is called an exceptional condition:
1. Handle Condition Command: It is used to transfer control to the procedure label specified if the exceptional condition specified occurs.
2. Ignore Condition Command: It causes no action to be taken if the condition specified occurs in the program. That is control will be returned to the next instruction following the command which encountered the exceptional condition.
3. No Handle Option: This option can be specified in any CICS command and it will cause no action to be taken for any exceptional condition occurring during execution of this command.
4. RESP Option: This option can be specified in any CICS command. If the RESP option is specified in a command, CICS places a response code at a completion of the command. The application program can check this code, then proceed to the next processing.

90.

What Is Eib, How Is Can Be Used?

Answer»

CICS AUTOMATICALLY provides some system-related INFORMATION to each task in a form of EXEC interface BLOCK (EIB), which is UNIQUE to the CICS command level. We can USE all the fields of EIB in our application programs right away.

CICS automatically provides some system-related information to each task in a form of EXEC interface BLOCK (EIB), which is unique to the CICS command level. We can use all the fields of EIB in our application programs right away.

91.

What Cics Command Do You Need To Obtain The User Logon-id?

Answer»

You must CODE EXEC CICS ASSIGN with the OPENID option.

You must code EXEC CICS ASSIGN with the OPENID option.

92.

What Are The Differences Between And Exec Cics Xctl And An Exec Cics Link Command?

Answer»

The XCTL COMMAND transfer control to an APPLICATION program at the same logical level ( do not expect to control BACK), while the LINK command passes control to an application program at the next logical level and expects controal back.

The XCTL command transfer control to an application program at the same logical level ( do not expect to control back), while the lINK command passes control to an application program at the next logical level and expects controal back.

93.

What Happens When A Cics Command Contains The Nohandle Option?

Answer»

No action is going to be TAKEN for any exceptional conditional occurring during the execution of this COMMAND. the abnormal condition that occurred will be ignored even if an EXEC CICS HANDLE condition exist. It has the same effect as the EXEC CICS IGNORE condition except that it will not cancel the PREVIOUS HANDLE CONDTION for any other command.

No action is going to be taken for any exceptional conditional occurring during the execution of this command. the abnormal condition that occurred will be ignored even if an EXEC CICS HANDLE condition exist. It has the same effect as the EXEC CICS IGNORE condition except that it will not cancel the previous HANDLE CONDTION for any other command.

94.

What Is The Exec Cics Handle Abend?

Answer»

It ALLOWS the ESTABLISHING of an EXIT so cleanup PROCESSING can be done in the event of abnormal task TERMINATION.

It allows the establishing of an exit so cleanup processing can be done in the event of abnormal task termination.

95.

Explain The Various Ways Data Can Be Passed Between Cics Programs?

Answer»

Data can be passed between CICS programs in three ways- COMMAREA, TRANSIENT DATA QUEUE $ TEMPORARY STORAGE QUEUE.

Data can be passed to a called program using the COMMAREA option of the LINK or XCTL command in a calling program. The called program may alter the data content of COMMAREA and the CHANGES will be available to the calling program after the RETURN command is issued in the called program. This implies that the called program does not have to specify the COMMAREA option in the RETURN command.

If the COMMAREA is used in the calling program, the AREA must be defined in the Working Storage SECTION of the program (calling), whereas, in the called program, the area must be defined as the first area in the Linkage Section . using reserved name DFHCOMMAREA.

Data can be passed between CICS programs in three ways- COMMAREA, TRANSIENT DATA QUEUE $ TEMPORARY STORAGE QUEUE.

Data can be passed to a called program using the COMMAREA option of the LINK or XCTL command in a calling program. The called program may alter the data content of COMMAREA and the changes will be available to the calling program after the RETURN command is issued in the called program. This implies that the called program does not have to specify the COMMAREA option in the RETURN command.

If the COMMAREA is used in the calling program, the area must be defined in the Working Storage Section of the program (calling), whereas, in the called program, the area must be defined as the first area in the Linkage Section . using reserved name DFHCOMMAREA.

96.

What Are The Cics Commands Available For Program Control?

Answer»

The following commands are AVAILABLE for the PROGRAM Control SERVICES:
1. LINK: To pass control to another program at the lower level, expectiong to be returned.
2. XCTL: To pass control to another program at the same level, not expecting to be returned.
3. RETURN: To return to the next higher-level program or CICS.
4. LOAD: to load a program
5. RELEASE: To release a program.

The following commands are available for the Program Control services:
1. LINK: To pass control to another program at the lower level, expectiong to be returned.
2. XCTL: To pass control to another program at the same level, not expecting to be returned.
3. RETURN: To return to the next higher-level program or CICS.
4. LOAD: to load a program
5. RELEASE: To release a program.

97.

When A Task Suspends All The Handle Conditions Via The Push Command, How Does The Task Reactivate All The Handle Conditions?

Answer»

By CODING an EXEC CICS POP HANDLE COMMAND

By coding an EXEC CICS POP HANDLE command

98.

What Is The Difference Between Exec Cics Handle Condtion And An Exec Cics Ignore Command?

Answer»

HANDLE CONDTION COMMAND creates a "go-to" environment. An IGNORE command does not create a go-to environment: instead. it gives CONTROL back to the next sequential instruction following the command CAUSING the condition. They are opposites.

HANDLE CONDTION command creates a "go-to" environment. An IGNORE command does not create a go-to environment: instead. it gives control back to the next sequential instruction following the command causing the condition. They are opposites.

99.

What Is Some Of The Information Available In The Eib Area?

Answer»

I. The cursor position in the MAP
II. TRANSACTION ID
III. Terminal ID
IV. Task Number
V. Length of communication area
VI. Current date and time
VII. Attention IDENTIFIER

I. The cursor position in the map
II. Transaction ID
III. Terminal ID
IV. Task Number
V. Length of communication area
VI. Current date and time
VII. Attention identifier

100.

What Is A Resident Program?

Answer»

A PROGRAM pr map LOADED into the CICS nucleus so that is KEPT PERMANENTLY in main storage and not deleted when CICS goes " Short on Storage."

A program pr map loaded into the CICS nucleus so that is kept permanently in main storage and not deleted when CICS goes " Short on Storage."