Académique Documents
Professionnel Documents
Culture Documents
All the units in CICS are divided into the following topics
Topic 1
Topic 2
Topic 3
Topic 4
Topic 5
Topic 6
Topic 7
Type of question
Multiple choice
True/False
Fill in the blanks
Short answer questions
No. of
questions
10
10
10
10
Marks
1 each
1 each
1 each
2 each
Section
Section-1
Section-2
Section-3
Section-4
SECTION -1
Mulitiple Choice Questions
1.1 What will be the EIBCALEN in case of I time program run? ( a )
1.2 0
1.3 100
1.4 9999
1.5 None of these
1.2 When a coding terminal control RECEIVE command (not BMS RECEIVE MAP),
which of the following is/are considered normal exceptional condition(s)? ( d)
a) NORMAL
b) EOC
c) LENGERR
d) a) and b)
e) a), b) and c)
1.3 In COBOL, to accept
IF EIBAID = DFHPF6
which of the following statements your program must include? ( c )
a) COPY mapsetname
b) COPY DFHBMSCA
c) COPY DFHAID
d) COPY HANDLE AID
e) None of the above
f)
What action must a programmer take to ensure that CICS copies DFHEIBLK into an application
program? ( d )
g) COPY DFHEIBLK
h) INCLUDE DFHEIBLK
i) COPY DFHCOMMAREA
j) None of the above
1.5 Where can a program find the transaction identification that began a task? (a)
a) In field EIBTRNID.
b) In field EIBTRAN.
c) In the CSA.
d) In the TWA.
e) A program must issue an 'EXEC CICS ASSIGN TRANID(FIELD1) END-EXEC' to
place the transaction ID into FIELD1. FIELD1 must be defined as PIC X(4).
1.6 Which of the following COBOL commands should not be executed within a CICS program?(a)
a)
b)
c)
d)
e)
1.7 Which of the following COBOL statements should not appear within a CICS program? ( c)
a) FIELD1 PIC X(9) JUSTIFIED RIGHT.
b) FIELD1 OCCURS 1 TO 1000 TIMES DEPENDING ON FIELD2 PIC X.
c) WRITE RECORD1.
Address Of Program
PCT
PPT
PPT
PCT
e)
Which CICS command is most useful for isolating errors in COBOL statements?(
f) ASKTIME
g) FORMATTIME
h) SEND MAP
i) ENTER TRACENUM
j) All are equally useful
k) All are equally useless
l)
Which of the following will suspend the current HANDLE CONDITION and HANDLE AID
settings ? ( f )
m)
n)
o)
p)
q)
r)
s)
f)
CICS LINK
CICS XCTL
CICS PUSH HANDLE
COBOL static CALL
COBOL dynamic CALL
All of the above
None of the above
2.3. Select the HANDLE ABEND command which will transfer control to a program called
CLEANUP ( d )
a)
a)
2.6. Which of the following statements, when added before or after the highlighted code in the
program below, will pass control to PARA-CLEAR when the clear key is hit on a terminal? ( a )
DATA DIVISION.
WORKING-STORAGE SECTION.
COPY DFHAID.
...
PROCEDURE DIVISION.
...
EXEC CICS RECEIVE MAP('MAP1') MAPSET('MAPSET1') END-EXEC.
...
PARA-CLEAR.
a)
Which of the following CICS transaction codes can be used to interactively execute CICS
command language (commands that can be coded in a COBOL program) at a terminal? ( d )
a)
CEMT
b)
CSMT
c)
CECS
d)
CECI
2.8 Which of the following commands are used to invoke EDF (The Execution Diagnostic Facility)?
(b)
2.9 EDF1
2.10 CEDF
2.11 EDF
2.12 EXDF
3.1. It is desired to transmit the information within the symbolic map in a program and the
constant data defined in the physical map. Which of the following code segments
should be substituted for the asterisks (***********) below?
(b )
PROCEDURE DIVISION.
.
EXEC CICS SEND MAP(MAP1) MAPSET(MAPSET1) ************
..
a)
b)
c)
d)
e)
DATAONLY END-EXEC.
END-EXEC.
MERGE END-EXEC.
BOTH END-EXEC.
MAPONLY END-EXEC.
3.2. Which of the following CICS commands can cause a PGMIDERR when executed ( b )
3.3. EXEC CICS RECEIVE MAP(MAP1) MAPSET(MAPSET1) END-EXEC.
3.4. EXEC CICS XCTL PROGRAM(PROGRAM1) END-EXEC.
3.5. EXEC CICS SEND MAP(MAP1) MAPSET(MAPSET1) END-EXEC.
3.6. None of the above.
3.3. If a user keys a valid transaction id (INQY) from a clear screen and presses ENTER, which of the
following SEND MAP commands results in a 3270 data stream that may cause a terminal
error? (e)
3.4. SEND MAP (MAP 1) MAPSET(MAPSET1)
3.5. SEND MAP (MAP 1) MAPSET(MAPSET1) MAPONLY
3.6. SEND MAP (MAP 1) MAPSET(MAPSET1) DATAONLY
3.7. Any of the above
3.8. None of the above
3.4. The constant data defined in a physical map is to be sent to a screen WITHOUT any variable
information from the map copy member defined in the program.
Which of the following is the most efficient way to send the map?(b)
a) EXEC CICS
b) EXEC CICS
END-EXEC.
c) EXEC CICS
EXEC.
d) EXEC CICS
e) EXEC CICS
3.5. Which of the following parameters can be substituted for the asterisks (*******) in the map field
defined below?( c)
MAP1S DFHMSD
TYPE=MAP,MODE=INOUT,CTRL=FREEKB,LANG=COBOL,TIOAPFX=YES
MAP1 DFHMDI SIZE=(24,80)
FIELD1 DFHMDF POS=(5,2),ATTRB=UNPROT,LENGTH=9,*******
a)
b)
c)
d)
e)
PIC='S9(7)V99'
PICTURE='9(7)V99'
PICIN='9(7)V99'
PICOUT='$$,999.99'
None of the above parameters are valid within a CICS map definition.
3.6. CICS map MAP1 appears below. Which of the following COBOL statements will place the
cursor at FIELD2 when MAP1 is sent using symbolic cursor positioning?( c)
MAP1S DFHMSD
TYPE=MAP,MODE=INOUT,CTRL=(FREEKB,FRSET),LANG=COBOL, X
TIOAPFX=YES
MAP1 DFHMDI SIZE=(24,80)
FIELD1 DFHMDF POS=(4,2),ATTRB=ASKIP,LENGTH=2
FIELD2 DFHMDF POS=(4,5),ATTRB=UNPROT,LENGTH=2
FIELD3 DFHMDF POS=(4,8),ATTRB=UNPROT,LENGTH=2
DFHMDF POS=(4,11),ATTRB=ASKIP,LENGTH=1
DFHMSD TYPE=FINAL
a)
b)
c)
d)
e)
3.7. Which of the following statements correctly describe options that can be substituted for the
asterisks (*********) below? ( d )
MAP1 DFHMSD TYPE=*******, MODE=INOUT, LANG=COBOL,
CTRL=(FREEKB,FRSET), TIOAPFX=YES
a)
b)
c)
d)
e)
LINK, to create a text deck that can linked into the CICS load library.
LOAD, to create a text deck that can be linked into the CICS load library.
COPY, to create a copy member for use by a program using the map.
DSECT, to create a copy member for use by a program using the map.
Which of the following is not considered an extended attribute when creating BMS maps?
(c )
f) Color
g) Underlining
h) Outlining
i) Transparency
j) All of the above are extended attributes.
3.9. If the operator keys the data into field NAME and presses ENTER key, the information is passed
to your program. If you want to turn off the modified data tag for name, you must move a
one byte constant to which of the following data areas in your program? ( f )
3.10.NAME
3.11.NAMEO
3.12.NAMEL
3.13.NAMEF
3.14.NAMEC
3.15.NAMEA
3.10. A field on a screen was erased by the operator hitting the EOF key. The map definition of the
field is shown below. What are the values of FIELD1F, FIELD1L and FIELD1I when the map
is received? ( e )
FIELD1 DFHMDF POS=(5,8),ATTRB=UNPROT,LENGTH=5
Choose the answer that indicates the correct values of the fields shown.
FIELD1F
FIELD1L
FIELD1I
a)
Hexadecimal '80'
LOW-VALUES
b)
LOW-VALUES
SPACES
c)
LOW-VALUES
SPACES
d)
Hexadecimal '80'
LOW-VALUES
e)
Hexadecimal '80'
SPACES
3.11. Which of the following causes a MAPFAIL exception condition on a RECEIVE MAP?(
3.12.
3.13.
3.14.
3.15.
3.16.
e )
The user entered the data and then erased the data using Erase EOF
The user entered data and then erased the data using the space bar.
The user pressed the CLEAR key.
The user keyed the data and pressed an undefined PF key.
All of the above
4.1. Which of the following statements correctly describe the following code? ( d )
PROCEDURE DIVISION.
Paragraph NOTOPEN-PARA will get control if a data set does not exist in the
FCT( File Control Table ).
b) The code is used to close the CICS file
c) For each data set referenced in a program, the code must be issued again. If 5 files are
processed, the code must be issued 5 times
d) It is used to pass control to NOTOPEN-PARA when a CICS file control command is
executed upon a data set that is closed.
4.2. Which of the following CICS commands can be added to the following program to browse a
VSAM file backwards (in descending key order)? ( a )
PROCEDURE DIVISION.
EXEC CICS STARTBR DATASET('FILE1') RIDFLD(REC1-KEY)
KEYLENGTH(3) EQUAL END-EXEC.
a)
PROCEDURE DIVISION.
EXEC CICS STARTBR DATASET('FILE1') RIDFLD(REC1-KEY)
REQID(REC1-REQID) END-EXEC.
a)
It is required if more than 1 file is browsed within the same CICS program.
b) It is required when multiple browse operations are to be concurrently used upon the same
file.
c)
d) It contains the CICS file security code defined in the FCT and is required for files defined as
'high-security'.
e)
There is no such option. It will cause a CICS command language translator error.
4.4. Which of the following are proper ways to check for an end-of-file condition when the
highlighted code is executed? ( a )
DATA DIVISION.
WORKING-STORAGE SECTION.
01 REC1-LENGTH
PIC S9(4) COMP.
01 REC1-KEY
PIC X(3) VALUE '111'.
01 REC1
PIC X(100).
...
PROCEDURE DIVISION.
EXEC CICS READNEXT
DATASET('FILE1') RIDFLD(REC1-KEY)
INTO(REC1) LENGTH(REC1-LENGTH) END-EXEC.
...
FILE-END.
a)
A READ UPDATE command iniitates VSAM exclusive control protection. Which of the
following terminate exclusive control?
( e)
g)
h)
i)
j)
k)
l)
REWRITE command
DELETE command
UNLOCK command
End of task
All of the above
None of the above
4.6. Which of the following are valid for deleting rows of data? (b )
a)
b)
c)
d)
4.7. Which of the following statements CORRECTLY describe the highlighted code? ( c)
PROCEDURE DIVISION.
EXEC CICS WRITE FROM(REC1) LENGTH(1000) DATASET('FILE1')
RIDFLD(REC1-KEY) MASSINSERT END-EXEC.
a) The highlighted code must be used when a write is done to a mass storage device.
b) The code must be used when more than 10 records are added to a VSAM file by the same
program.
c) It enables CICS to efficiently add several VSAM records, with ascending keys, into a VSAM
data set.
d) There is no such option as MASSINSERT for a CICS WRITE statement.
4.8. Which of the following statements must be executed before VSAM data set FILE1 is used for
update processing under CICS?(e)
a)
None of the above statements must be executed before using VSAM data set FILE1 for
update processing
4.9. Which of the following statements CORRECTLY describe the highlighted code? ( d )
PROCEDURE DIVISION.
EXEC CICS HANDLE CONDITION DUPREC(DUP-PARA)
END-EXEC.
DUP-PARA.
...
a)
If 2 reads in a row are done with the same key, control will pass to DUP-PARA.
b) DUP-PARA will get control after a record with a duplicate key has successfully been written
to a data set.
c)
The code will cause an error during execution of the command language translator because
there is no such error condition as DUPREC.
e)
PROCEDURE DIVISION.
CICS LINK
COBOL static CALL
COBOL dynamic CALL
CICS XCTL
None of the above
5.4. Which of the following CICS commands can cause a PGMIDERR when executed? ( e)
a) EXEC CICS LINK PROGRAM('PROGRAM1') END-EXEC.
b) EXEC CICS RECEIVE MAP('MAP1') MAPSET('MAPSET1') END-EXEC.
c) EXEC CICS SEND MAP('MAP1') MAPSET('MAPSET1') DATAONLY ENDEXEC.
d) All of the above
e) None of the above
f)
5.6. Assume a message table is required for all users of the transaction. Which of the following is the
best place to store the table address so that all tasks can access it. ( d )
a)
b)
c)
d)
e)
DFHCOMMAREA
TWA
TCTUA
CWA
EIB
(b)
6.2. Which of the following commands can be used to update a record in temporary storage ( a )
a)
WORKING-STORAGE SECTION.
01 TS-1
PIC X(100).
...
PROCEDURE DIVISION.
EXEC CICS WRITEQ TS QUEUE('TEMP') FROM(TS-1) LENGTH(100)
END-EXEC.
a)
DATA DIVISION.
WORKING-STORAGE SECTION.
01 FIELD1
PIC S9(4) COMP.
...
PROCEDURE DIVISION.
EXEC CICS READQ TS ITEM(FIELD1) ...
a)
It specifies the key field when only the key field is to be retrieved from a temporary
storage record.
7.1. Which of the following CICS transaction code can be used to define the resources into CICS
control tables ( c )
7.2. CEMT
7.3. CECI
7.4. CEDA
7.5. CECS
7.6. Which of the following resources can be accessed using Function Shipping. ( e )
7.7. Application programs
7.8. Mapsets
7.9. VSAM files
7.10.None of the above
7.11.All of the above
7.3. Which of the following facilities are provided by Inter System Communication (ISC) ( a )
SECTION - 2
True/False
1.1
1.2
1.3
1.4
1.5
5.2.
5.3.
5.4.
5.5.
5.6.
5.7.
5.8.
5.9.
5.10.
5.11.
5.12.
5.13.
CICS programs that read a VSAM record using the set option require modification when
migrating from COBOL to VS COBOL II.(t)
LINK is used to pass control to another program in the same logical level (f)
XCTL is used to pass control to another program in the same logical lever (t)
Data can be passed to a called program using the COMMAREA option of the LINK and
XCTL commands in the calling program (t)
The BLL is an addressing convention used to address storage within the working-storage
section of an application program (f)
We need not define BLL cells for addressing the storage in the LINKAGE SECTION in
VS/COBOL - II. (t)
SERVICE RELOAD statement is required for OS/COBOL programs which use BLL cells.(t)
For VS COBOL II and non-VS COBOL II programs you can acquire and address
DFHCOMMAREA during the first task of pseudo-conversation. (f)
CICS ADDRESS command can be used to access information from CICS system areas. (t)
The NETNAME is field which contains VTAM network name(t)
In OS/COBOL, you require one BLL cell for each 4096 bytes (t)
BLL cells are used in VS COBOL II programs for providing addressability (f).
5.14. We cannot process intrapartition transient data queues using batch COBOL programs(t)
5.15. We can read, update and delete individual items in temporary storage queue(f)
5.16. Once you read an intrapartition transient data queue item, you cannot read the item a second
time(t)
5.17. If you browse through temporary storage & transient data queues using CEBR, the queues will
always be in the same condition when you exit CEBR provided that you do not delete any
of the queues.(f)
5.18. You cannot code CICS table entries for non-recoverable temporary storage queues.(t)
5.19. CEDA can be used to define and install the resources in CICS (t)
5.20. MRO(Multi Region Operation )and ISC(Inter System Communication ) are used for
communication between two CICS systems (t)
5.21. VSAM files can be accessed by making use of Function shipping (t)
5.22. All CICS platforms support DPL ( Distributed Program Link ) ( t)
5.23. Remote resources may be accessed only in READ mode in Function shipping (f)
5.24. The START command is used to asynchronously begin a task (t)
SECTION - 3
FILL IN THE BLANKS
1.1. The CICS provided transaction which facilitates debugging of a program containing CICS
Commands is CEDF
1.2. The RECEIVE command is used to receive incoming data from the terminal .
1.3. The control table which is used to register all CICS application programs and BMS Maps is
PPT.
1.4. The control table which is used to register the control information of all CICS transactions is
PCT
1.5. The CICS task control program (KCP) makes use of PCT table for identifying and initializing
the transactions.
1.6. COMMAREA is a CICS-maintained unit of storage for passing and receiving data between
tasks.
1.7. The CICS supplied transaction used to execute commands with defined variables for data area
and data name options is CECI.
1.8. The CICS supplied transaction used to browse the information in TSQs is CEBR.
1.9. The IGNORE CONDITION command causes the CICS to return to the next statement in the
application program if the named condition occurs.
1.10. The ANYKEY option takes care of handling all the PF keys which have not been handled
except the ENTER key .
1.11. To change the attributes of map fields dynamically, we must have the COPY DFHBMSCA
statement in the application program.
1.12. COPY DFHBMSCAdeclares the constants used to alter the field attribute bytes.
1.13. The symbolic map description resides in the COPY library
1.14. The physical map resides in the program load library.
1.15. The symbolic map is placed in the source program by the compiler.
1.16. COPY DFHAID declares the attention identifier constants for determining which key was
pressed by the operator.
1.17. To use symbolic cursor positioning on the map field ERROR, you must code a COBOL
statement: MOVE -1 TO ERRORL.
1.18. The EIB field which identifies the key pressed by the terminal user in the application program is
EIBAID .
1.19. The EIB field used to determine the position of the cursor on the screen is EIBCPOSN.
1.20. BIF DEEDIT command is used to remove the edit characters from the data.
1.21. If you do not code PICIN or PICOUT, the default is always PIC X(length of field)
1.22. The FRSET option is used with SEND MAP command to reset MDT to zero for all unprotected
fields of the screen.
4.1.
4.2.
4.3.
4.4.
4.5.
4.6.
4.7.
4.8.
4.9.
4.10.
4.11.
4.12.
4.13.
4.14.
4.15.
4.16.
The FCT of the CICS control table contains an entry for every File that is to be accessed in
CICS.
The FCP of the CICS supplied program provides the application programs with services to
read,update,add and delete records in a file.
The CICS file control supports the VSAM and BDAM data access methods.
The GENERIC option with READ command is used to read a non specific record from the
file.
The SQLCA is used to communicate the results of execution of SQL statements.
The INVREQ exceptional condition is raised when the key length specified is greater than the
actual key length for a READ command with GENERIC option.
The STARTBR command is used to establish the positioning within the file during the browse
operation.
The INVREQ exceptional condition is raised when the REWRITE command is issued without
a prior READ command with the UPDATE option.
The UNLOCK command is used to release the exclusive control from the record
WRITE command with MASSINSERT option is used to add a group of records whose keys are
in ascending order into a file.
When using a cursor only the current row may be deleted.
The DELETE command is supported for VSAM KSDS and RRDS files.
Only records from VSAM KSDS and RRDS files can be deleted.
KEYLENGTH must be specified for a GENERIC DELETE.
The argument with NUMREC option contains the number of records deleted on a GENERIC
delete
REWRITE is valid only after a READ UPDATE command .
4.17. The LINK command is used to pass control from an application program at one logical level
to another application at the next lower logical level.
4.18. The XCTL command is used to pass control from one application program to another
application program at the same logical level.
4.19. Data can be passed to the called program through the COMMAREA option of LINK or
XCTL commands.
4.20. The PGMIDERR exceptional condition is raised when the program specified with LINK or
XCTL is not found in the PPT.
4.21. The BLL CELLS is an addressing convention used to address storage outside the workingstorage section of application program in OS/COBOL.
4.22. The BLL cells must be defined in LINKAGE section of the application program.
4.23. The SERVICE RELOAD statement is used to ensure addressability to a particular area defined
in the Linkage section of the application program in OS/COBOL, whenever the content
of BLL cell is changed.
4.24. In OS COBOL, the argument provided with the SET option is a BLL cell.
4.25. The SERVICE RELOAD instruction generates code to refresh the machine register with an
address from a BLL cell in OS/COBOL
4.26. In OS/COBOL, we require one BLL cell for each 4096 bytes .
4.27. The CICS command used to load the user table into the program is LOAD.
4.28. The ADDRESS command is used to access information in the CICS system areas.
4.29. The ASSIGN command is used to access the system value outside of the application program.
4.30. The USERID option in ASSIGN command is used to access the user-id.
4.31.
4.32.
4.33.
4.34.
4.35.
4.36.
4.37.
4.38.
4.39.
4.40.
7.1.
7.2.
7.3.
7.4.
7.5.
7.6.
7.7.
7.8.
SECTION - 4
Short answer questions
1.1.
1.2.
1.3.
1.4.
1.5.
1.6.
1.7.
How do you indicate that CICS should branch to your coded routines when exception
condition occurs.
Using HANDLE CONDITION
Which EIB field will give you the last executed CICS command?
EIBFN field in EIB
Name two COBOL commands that cannot be used in CICS.
OPEN,CLOSE,READ,REWRITE,WRITE,DISPLAY,ACCEPT ( any two is sufficient )
Write the CICS command which makes the program pseudo-conversational
EXEC CICS
RETURN TRANID(XXXX) END-EXEC.
What information can be obtained from the EIBRCODE?
Return code of last executed CICS command
What are some of the information available in the Execute Interface Block (EIB) area?
The cursor position in the map, transaction id, terminal id, task number, length of
communication area, current date and time, Attention identifier etc.,
What is
1.8. EIBCALEN
- contains the length of the communication area
1.9. EIBTIME
- contains the time on which the task is initiated
1.10. EIBTRMID
- contains the terminal id on which the task is initiated.
1.11. EIBCPOSN
- contains the current cursor position
1.12. Write syntax for. Returning control to CICS ( without any working storage program is
running in standalone mode ).
EXEC CICS RETURN END-EXEC.
1.13. What happens when a CICS command contains a RESP option?
No action is taken for any exceptional conditions occuring during the execution of the
command. When the abnormal condition occurs, the CICs response code will be stored
in the program work area and can be checked at the next sequential instruction.
1.14. Do you need to do a RECEIVE to look at the EIBAID field or any other field in the EIB?
No, all the fields in the EIB are made available to the user automatically by CICS.
1.15. Which are the options which facilitate exception handling
1.16. RESP, NOHANDLE
1.17. What is the function of the HANDLE CONDITION command?
To specify the program or paragraph label to which the control has to be passed if the
exception condition specified in the HANDLE CONDITION occurs.
1.18. What does HANDLE ABEND command do?
Allows the establishing of an exit, so that cleanup process can be done in the event of
an abnormal task termination.
1.19. What is the difference between the HANDLE CONDITION and IGNORE command
A HANDLE CONDITION command specifies what should be done when the specified
condition occurs. But the IGNORE command gives control back to the next sequential
statement following the command causing the condition.
1.20. What happens when a CICS command contains the RESP option?
No action is taken for any exceptional conditions occurring during the execution of this
command. The abnormal condition that has occurred will be ignored even if a
HANDLE CONDITION command exists. It has then same effect as the IGNORE
command except that it will not cancel the previous HANDLE CONDITION for any
other command.
1.21. What is the function of CEBR command? What does it access by default?
CEBR command is used to browse the contents of TSQs. By default, it will access the
default TSQ.
1.22. If an application uses a HANDLE AID ENTER(main-logic) and the HANDLE CONDITION
ERROR(abort-rtn) commands. If a program issues a RECEIVE MAP and a MAPFAIL
condition occurs, which process will take control: main-logic or abort-rtn? Justify your
answer.
1.23.
1.24.
1.25.
1.26.
Main-logic will receive control because HANDLE AID has priority over HANDLE
CONDITION.
In the application program how can you determine which key was pressed on the key-board
Either by checking the EIBAID value or by making use of HANDLE AID command
Why are RESP codes are more structured than HANDLE CONDITION commands?
A GOTO is generated after each CICS command for each HANDLE CONDITION
routine. RESP codes are tested inline after the CICS command is executed.
How long does the specific condition ( i.e., LENGERR) that is specified in a HANDLE
CONDITION command remain in effect?
A specific condition remains in effect until
The end of a program or a transfer to another program
Another HANDLE CONDITION command is specified overriding the first condition
A HANDLE IGNORE CONDITION command is issued
If you specify a HANDLE CONDITION command in program A and then a LINK or XCTL
to program B. Will the HANDLE CONDITION still be effective?
No, Handle conditions are only effective in the program in which they are defined.
1.27. What could happen to the transaction if an exception condition is not trapped?
The transaction could abend
1.28. What happens when a CICS command contains the NOHANDLE option?
No action is going to be taken for any exceptional condition occurring during the execution
of the statement in which it was specified.
3.1.
3.2.
Write any two differences between physical map and symbolic map.
Physical contains the constant default data, attribute bytes
member of load library
Symbolic map contains field definitions, attribute bytes to be accessed by the
application program
member of copy library.
Given a mapset consisting of 3 maps and total 42 fields ( except stopper byte ), how many of
the following will be needed.
a) DFHMSD ( 1
3.3.
) b) DFHMDI (
) c) DFHMDF ( 42
3.4.
Code should contain DFHMDF followed by all the parameters specified above
Assume that you have been working with a mapset named TESTMST containing a map
named TESTMAP. Write a CICS command to send only the symbolic map to the
screen.
EXEC CICS SEND MAP(TESTMAP) MAPSET(TESTMST) DATA ONLY
END-EXEC.
3.5.
3.6.
3.7.
Explain the different methods to set the Modified Data Tag ( MDT).
MDT can be set to 1 by
When the user enters data into the field
When the application program moves the DFHBMSFSE to the attribute character
By defining the FSET option while defining the field using BMS Macro
3.8.
3.9.
When a BMS map is assembled, How many types of BMS maps are created and what
are they?
Two types of maps are created.
Physical map : member of CICS load library, contains constant default data,
attribute bytes, starting positions,and length of each field.
Symbolic map : Member of CICS copy library, contains field definitions, attribute
bytes etc., to be accessed by the application.
3.10. What does the POS=(x,y) parameter of the DFHMDF macro do?
It gives the row and column position of the attribute character of the field.
3.11. How do you allow data input in a filed
by making the field unprotected.
3.12. When a terminal user modifies data in a field on the screen what enables that data to be
transmitted?
When a terminal operator enters / modifies the any data in a field on the screen
the MDT attribute bit is set for that field.
3.13. If you define a map with CNTRL=FRSET parameter specified ( on the DFHMSD or
DFHMDI macros ) what happens to existing MDT that were previously set on
screen for
a) SEND MAP with DATAONLY
Retains MDT status from prior screen ( except if the attribute byte is
explicitly changed by the application)
b) SEND MAP with MAPONLY
All MDT bits set/reset to off
c) SEND MAP both MAP & DATA ( DEFAULT)
All MDT bits reset to off
3.14. What does ATTRB=FSET on the DFHMDF macro do?
It initializes the MDT bit for that field to ON ( data is transmitted unless turned
OFF by program
3.15. When you receive a map into your application program, how can you determine if
has/has not been entered into a specific field?
If no data has been entered, then the length will be zero and the input field
contains LOW-VALUES.
3.16. If you issue a SEND MAP command, what happens to the output fields that contain
LOW-VALUES?
They do not get transmitted to the screen.
3.17. When you receive a map, how can you tell the cursor position?
The EIB field EIBCPOSN contains the offset position of the cursor on the screen
3.18. What CICS facilities can you use to save data between transactions?
COMMONAREA, TEMPORARY STORAGE and TRANSIENT DATA queues
3.19. What is wrong with the following commands.
3.20. EXEC CICS SEND MAP (XXXX) MAPSET (YYYY)
FROM(SYM-MAP)
MAPONLY
END-EXEC
Where SYM-MAP is symbolic map
MAPONLY cannot be used with SYMBOLIC MAP
3.21. EXEC CICS RECEIVE MAP(XXXX) MAPSET(YYYY)
FROM(SYM-MAP)
END-EXEC.
FROM(SYM-MAP) is invalid with RECEIVE MAP command.
3.22. Assume that you have a VSAM KSDS file containing a 6 character key, the high
order 2 characters beginning with AA, BB, ZZ. Give the command(s) to
retrieve the records whose partial key is RR.
MOVE RR TO KEY-FIELD.
MOVE 2 TO KEY-LEN.
EXEC CICS READ FILE(KSDS1)
RIDFLD(KEY-FIELD)
KEYLENGTH(KEY-LEN)
GENERIC
EQUAL
END-EXEC.
3.23. Write a CICS code to implement browse operation to read from the file EMPFILE according
to the key EMP-NUMBER reading forward putting the data into EMP-RECORD.
The code should consists of STARTBR,READNEXT & ENDBR commands.
3.24. How would you READ a record with only partial key?
By using the GENERIC option along with the READ command.
3.25. What is the major difference between a READ and a STARTBR commands?
READ actually reads a record into the storage buffer. STARTBR sets a pointer to a
starting location but does not actually reads a record.
3.26. How does a STARTBR command know which record to set the pointer to?
The pointer position is identified by the RIDFLD parameter.
3.27. After a STARTBR and a READNEXTwhat does a READPREV do?
It will retrieve the same record as the READ NEXT . The directoin of the browse will
be changed so that any additional READPREV commands will retrieve prior records.
3.28. How would you start a browse operation at the first record?
Move LOW-VALUES to the RIDFLD parameter before issuing the STARTBR
command.
3.29. What will happen if you issue a STARTBR command with an EQUAL parameter and the
record is not there?
A NOTFND condition is raised.
3.30. Can you update a record that you retrieved using STARTBR and READNEXT commands?
No, STARTBR and READ NEXT are used only for browsing.
3.31. What happens when you issue a READNEXT command and there are no records on the file?
An ENDFILE condition is raised
3.32. What happens when you issue a READPREV command and you are beyond the beginning of
the file?
An ENDFILE condition is raised.
3.33. How would you reposition your browse starting position to a new location on the file?
By either of these methods.
RESETBR command to a new location
ENDBR command followed by STARTBR for new location
3.34. If you have a file with a 2 character key AA,BB,..,ZZ and you do a STARTBR on key
GG and then 3 READNEXTs and then 1 READPREV, which record would you have
in your buffer?
You would have II in your buffer.
If you want to delete all records with a partial key what should you do?
Issue a direct DELETE with GENERIC and KEYLENGTH parameters.
3.46. From your program you wish to transfer control to a program named THISPROG at the next
logical level. You wish to pass the field named STUFF to THISPROG. Write a CICS
command to accomplish the above task.
Code should contain LINK command.
3.47. What is the function of the Base Locator for Linkage ( BLL)?
The BLL is used to address the storage outside the working storage section of the
application program. Used in OS/COBOL.
3.48. Why SET option is more efficient than INTO option
SET option returns the address of the TIOA to application program while INTO option
moves the information in the TIOA into the specified area.
3.49. What is the difference between a LINK and XCTL?
LINK passes control to a program at the next lower logical level. The calling program
remains in storage and expects control to be returned to it.
XCTL passes control to a program at the same logical level. The calling program does
not expect the control to be returned to it.
3.50. What does the RETURN statement do?
Returns control to the next higher logical level. If there is no higher logical level
control is passed to CICS.
3.51. If you have a program A that LINKs to Program B, Program B issues a XCTL to program C,
and Program C issues a RETURN, What is the status of programs A,B and C and what
does the RETURN do?
Program A remains in storage expecting a return
Program B does not remain in storage, does not expect a return
Program C remains in storage, returns to A
3.52. Can you issue a CALL statement in CICS? If so, can you pass data to the called program? How
are the caller and the called programs related?
Yes, In CICS, you can issue a CALL to another program and pass data with the USING
option. Both the called program and calling programs will be linked together in the
same load module. In OS/COBOL the called program cannot contain CICS commands.
In VS-COBOL, the called program can contain CICS commands.
3.53. Why is the LOAD command used for and how do you set up addressability to it?
The LOAD command is used to load a separately assembled program or dynamically
into storage. It is referenced thru the linkage section definitions.
3.54. What is the difference between an ASSIGN and ADDRESS command?
ASSIGN command is used to access the system value outside of the application
program
ADDRESS command is used to access the information in the system areas.
3.55. When will you use a SERVICE RELOAD statement in OS/COBOL application program
This statement must be used whenver the content of BLL cell is changed.
3.56. How will you access information in CICS system areas in your application program?
The ADDRESS command is used to access the information in the CICS system areas.
If you have an MVS batch job that creates a sequential file that you need to process via a
CICS transactions, how would you accomplish this?
Define an input Extrapartition TDQ and issue a READQ TD from the CICS transaction
3.67.
If you read an intrapartition TDQ record, can the same record be reread?
No, once a record is read it is unavailable