Vous êtes sur la page 1sur 27

CICS QUESTION BANK

All the units in CICS are divided into the following topics
Topic 1
Topic 2
Topic 3
Topic 4
Topic 5
Topic 6
Topic 7

Fundamental Program components


Testing CEDF
Testing & Handling exceptions
Maps & Display
Accessing & Displaying map fields
Reading external data
Updating external data
Addressability techniques
Accessing special storage areas
CICS queuing facilities
Additional topics

STRUCTURE OF THE QUESTION PAPER


Guide lines:
Question paper can be divided into 4 sections as given below.
Question paper
Section No.
Section -1
Section -2
Section-3
Section-4

Type of question
Multiple choice
True/False
Fill in the blanks
Short answer questions

No. of
questions
10
10
10
10

Marks
1 each
1 each
1 each
2 each

Questions can be selected from each topic as specified below.

Section
Section-1
Section-2
Section-3
Section-4

topic-1 topic-2 topic-3 topic-4 topic-5 topic-6 topic-7


1
2
2
2
1
1
1
1
1
2
2
2
1
1
1
0
2
2
2
2
1
1
2
2
2
1
1
1

SECTION -1
Mulitiple Choice Questions
1.1 What will be the EIBCALEN in case of I time program run? ( a )
1.2 0
1.3 100
1.4 9999
1.5 None of these
1.2 When a coding terminal control RECEIVE command (not BMS RECEIVE MAP),
which of the following is/are considered normal exceptional condition(s)? ( d)
a) NORMAL
b) EOC
c) LENGERR
d) a) and b)
e) a), b) and c)
1.3 In COBOL, to accept
IF EIBAID = DFHPF6
which of the following statements your program must include? ( c )
a) COPY mapsetname
b) COPY DFHBMSCA
c) COPY DFHAID
d) COPY HANDLE AID
e) None of the above
f)

What action must a programmer take to ensure that CICS copies DFHEIBLK into an application
program? ( d )
g) COPY DFHEIBLK
h) INCLUDE DFHEIBLK
i) COPY DFHCOMMAREA
j) None of the above

1.5 Where can a program find the transaction identification that began a task? (a)
a) In field EIBTRNID.
b) In field EIBTRAN.
c) In the CSA.
d) In the TWA.
e) A program must issue an 'EXEC CICS ASSIGN TRANID(FIELD1) END-EXEC' to
place the transaction ID into FIELD1. FIELD1 must be defined as PIC X(4).
1.6 Which of the following COBOL commands should not be executed within a CICS program?(a)
a)
b)
c)
d)
e)

OPEN INPUT FILE1.


STOP RUN.
COMPUTE FIELD1 ROUNDED = FIELD2 + FIELD3.
MOVE CORRESPONDING TABLE1 TO TABLE2.
None of the above.

1.7 Which of the following COBOL statements should not appear within a CICS program? ( c)
a) FIELD1 PIC X(9) JUSTIFIED RIGHT.
b) FIELD1 OCCURS 1 TO 1000 TIMES DEPENDING ON FIELD2 PIC X.
c) WRITE RECORD1.

d) None of the above.


e) All of the above.
1.8 Which CICS table contains the program name that gets control when a transaction code is
entered and which table has the address where the program is located?
Choose the combination of answers below. (a)
a)
b)
c)
d)

Program To Get Control


PPT
PCT
PPT
PCT

Address Of Program
PCT
PPT
PPT
PCT

e)

Which CICS command is most useful for isolating errors in COBOL statements?(
f) ASKTIME
g) FORMATTIME
h) SEND MAP
i) ENTER TRACENUM
j) All are equally useful
k) All are equally useless

l)

Which of the following will suspend the current HANDLE CONDITION and HANDLE AID
settings ? ( f )
m)
n)
o)
p)
q)
r)
s)

f)

CICS LINK
CICS XCTL
CICS PUSH HANDLE
COBOL static CALL
COBOL dynamic CALL
All of the above
None of the above

2.3. Select the HANDLE ABEND command which will transfer control to a program called
CLEANUP ( d )
a)

EXEC CICS HANDLE ABEND


LABEL (CLEANUP)
END-EXEC
b) EXEC CICS HANDLE ABEND
(CLEANUP)
END-EXEC
c) EXEC CICS HANDLE ABEND
RESET (CLEANUP)
END-EXEC
d) EXEC CICS HANDLE ABEND
PROGRAM (CLEANUP)
END-EXEC
2.4. What is the preferred method of handling exception conditions? ( c )
2.5. HANDLE CONDITION
2.6. Coding NOHANDLE and checking EIBRCODE/EIBRESP
2.7. Coding RESP and checking EIBRESP
2.8. Allow CICS to take default action
2.9. None of the above
2.5. Which of the following commands can be entered from a CICS terminal to check for correct
syntax, but not execute, a SEND command? ( e )

a)

CECI SEND MAP('MAP1') MAPSET('MAPSET1') SYN

b) CECI SEND MAP('MAP1') MAPSET('MAPSET1') SYNTAX


c)

CECI CHECK SEND MAP('MAP1') MAPSET('MAPSET1')

d) ?CECI SEND MAP('MAP1') MAPSET('MAPSET1')


e)

CECS SEND MAP('MAP1') MAPSET('MAPSET1')

2.6. Which of the following statements, when added before or after the highlighted code in the
program below, will pass control to PARA-CLEAR when the clear key is hit on a terminal? ( a )
DATA DIVISION.
WORKING-STORAGE SECTION.
COPY DFHAID.
...
PROCEDURE DIVISION.
...
EXEC CICS RECEIVE MAP('MAP1') MAPSET('MAPSET1') END-EXEC.
...
PARA-CLEAR.
a)

Before the code is executed, issue:


EXEC CICS HANDLE AID CLEAR(PARA-CLEAR) END-EXEC.
b) Before the code is executed, issue:
EXEC CICS HANDLE CLEAR PARA(PARA-CLEAR) END-EXEC.
c) After the code is executed, issue:
IF EIBCLEAR = 'Y'
GO TO PARA-CLEAR.
d) After the code is executed, issue:
IF EIBINPUT = 'CLEAR' GO TO PARA-CLEAR.
e)

Which of the following CICS transaction codes can be used to interactively execute CICS
command language (commands that can be coded in a COBOL program) at a terminal? ( d )
a)

CEMT

b)

CSMT

c)

CECS

d)

CECI

2.8 Which of the following commands are used to invoke EDF (The Execution Diagnostic Facility)?
(b)
2.9 EDF1
2.10 CEDF
2.11 EDF
2.12 EXDF
3.1. It is desired to transmit the information within the symbolic map in a program and the
constant data defined in the physical map. Which of the following code segments
should be substituted for the asterisks (***********) below?
(b )
PROCEDURE DIVISION.
.
EXEC CICS SEND MAP(MAP1) MAPSET(MAPSET1) ************

..
a)
b)
c)
d)
e)

DATAONLY END-EXEC.
END-EXEC.
MERGE END-EXEC.
BOTH END-EXEC.
MAPONLY END-EXEC.

3.2. Which of the following CICS commands can cause a PGMIDERR when executed ( b )
3.3. EXEC CICS RECEIVE MAP(MAP1) MAPSET(MAPSET1) END-EXEC.
3.4. EXEC CICS XCTL PROGRAM(PROGRAM1) END-EXEC.
3.5. EXEC CICS SEND MAP(MAP1) MAPSET(MAPSET1) END-EXEC.
3.6. None of the above.
3.3. If a user keys a valid transaction id (INQY) from a clear screen and presses ENTER, which of the
following SEND MAP commands results in a 3270 data stream that may cause a terminal
error? (e)
3.4. SEND MAP (MAP 1) MAPSET(MAPSET1)
3.5. SEND MAP (MAP 1) MAPSET(MAPSET1) MAPONLY
3.6. SEND MAP (MAP 1) MAPSET(MAPSET1) DATAONLY
3.7. Any of the above
3.8. None of the above
3.4. The constant data defined in a physical map is to be sent to a screen WITHOUT any variable
information from the map copy member defined in the program.
Which of the following is the most efficient way to send the map?(b)
a) EXEC CICS
b) EXEC CICS
END-EXEC.
c) EXEC CICS
EXEC.
d) EXEC CICS
e) EXEC CICS

SEND MAP1('MAP1') MAPSET('MAPSET1') NODATA END-EXEC.


SEND MAP('MAP1') MAPSET('MAPSET1') MAPONLY ERASE
SEND MAP('MAP1') MAPSET('MAPSET1') DATAONLY ERASE ENDSEND MAP('MAP1') MAPSET('MAPSET1') ERASE END-EXEC.
SEND MAP('MAP1') PHYSICAL END-EXEC.

3.5. Which of the following parameters can be substituted for the asterisks (*******) in the map field
defined below?( c)
MAP1S DFHMSD
TYPE=MAP,MODE=INOUT,CTRL=FREEKB,LANG=COBOL,TIOAPFX=YES
MAP1 DFHMDI SIZE=(24,80)
FIELD1 DFHMDF POS=(5,2),ATTRB=UNPROT,LENGTH=9,*******
a)
b)
c)
d)
e)

PIC='S9(7)V99'
PICTURE='9(7)V99'
PICIN='9(7)V99'
PICOUT='$$,999.99'
None of the above parameters are valid within a CICS map definition.

3.6. CICS map MAP1 appears below. Which of the following COBOL statements will place the
cursor at FIELD2 when MAP1 is sent using symbolic cursor positioning?( c)

MAP1S DFHMSD
TYPE=MAP,MODE=INOUT,CTRL=(FREEKB,FRSET),LANG=COBOL, X
TIOAPFX=YES
MAP1 DFHMDI SIZE=(24,80)
FIELD1 DFHMDF POS=(4,2),ATTRB=ASKIP,LENGTH=2
FIELD2 DFHMDF POS=(4,5),ATTRB=UNPROT,LENGTH=2
FIELD3 DFHMDF POS=(4,8),ATTRB=UNPROT,LENGTH=2
DFHMDF POS=(4,11),ATTRB=ASKIP,LENGTH=1
DFHMSD TYPE=FINAL
a)
b)
c)
d)
e)

MOVE -1 TO FIELD1L FIELD2L FIELD3L.


MOVE -1 TO FIELD1L FIELD3L.
MOVE -1 TO FIELD2L.
MOVE -1 TO FIELD1L FIELD2L.
MOVE 'Y' TO FIELD2L.

3.7. Which of the following statements correctly describe options that can be substituted for the
asterisks (*********) below? ( d )
MAP1 DFHMSD TYPE=*******, MODE=INOUT, LANG=COBOL,
CTRL=(FREEKB,FRSET), TIOAPFX=YES
a)
b)
c)
d)
e)

LINK, to create a text deck that can linked into the CICS load library.
LOAD, to create a text deck that can be linked into the CICS load library.
COPY, to create a copy member for use by a program using the map.
DSECT, to create a copy member for use by a program using the map.

Which of the following is not considered an extended attribute when creating BMS maps?
(c )
f) Color
g) Underlining
h) Outlining
i) Transparency
j) All of the above are extended attributes.

3.9. If the operator keys the data into field NAME and presses ENTER key, the information is passed
to your program. If you want to turn off the modified data tag for name, you must move a
one byte constant to which of the following data areas in your program? ( f )
3.10.NAME
3.11.NAMEO
3.12.NAMEL
3.13.NAMEF
3.14.NAMEC
3.15.NAMEA
3.10. A field on a screen was erased by the operator hitting the EOF key. The map definition of the
field is shown below. What are the values of FIELD1F, FIELD1L and FIELD1I when the map
is received? ( e )
FIELD1 DFHMDF POS=(5,8),ATTRB=UNPROT,LENGTH=5
Choose the answer that indicates the correct values of the fields shown.
FIELD1F

FIELD1L

FIELD1I

a)

Hexadecimal '80'

LOW-VALUES

b)

LOW-VALUES

SPACES

c)

LOW-VALUES

SPACES

d)

Hexadecimal '80'

LOW-VALUES

e)

Hexadecimal '80'

SPACES

3.11. Which of the following causes a MAPFAIL exception condition on a RECEIVE MAP?(
3.12.
3.13.
3.14.
3.15.
3.16.

e )

The user entered the data and then erased the data using Erase EOF
The user entered data and then erased the data using the space bar.
The user pressed the CLEAR key.
The user keyed the data and pressed an undefined PF key.
All of the above

4.1. Which of the following statements correctly describe the following code? ( d )
PROCEDURE DIVISION.

EXEC CICS HANDLE CONDITION NOTOPEN(NOTOPEN-PARA )


END-EXEC.
..
NOTOPEN-PARA.
a)

Paragraph NOTOPEN-PARA will get control if a data set does not exist in the
FCT( File Control Table ).
b) The code is used to close the CICS file
c) For each data set referenced in a program, the code must be issued again. If 5 files are
processed, the code must be issued 5 times
d) It is used to pass control to NOTOPEN-PARA when a CICS file control command is
executed upon a data set that is closed.
4.2. Which of the following CICS commands can be added to the following program to browse a
VSAM file backwards (in descending key order)? ( a )
PROCEDURE DIVISION.
EXEC CICS STARTBR DATASET('FILE1') RIDFLD(REC1-KEY)
KEYLENGTH(3) EQUAL END-EXEC.
a)

EXEC CICS READPREV


DATASET('FILE1') RIDFLD(REC1-KEY)
INTO(REC1) LENGTH(REC1-LEN) END-EXEC.

b) EXEC CICS READBACK


DATASET('FILE1') RIDFLD(REC1-KEY)
INTO(REC1) LENGTH(REC1-LEN) END-EXEC.
c)

EXEC CICS READ PRIOR DATASET('FILE1') RIDFLD(REC1-KEY)


INTO(REC1) LENGTH(REC1-LEN) END-EXEC.

d) EXEC CICS READ REVERSE DATASET('FILE1') RIDFLD(REC1-KEY)


INTO(REC1) LENGTH(REC1-LEN) END-EXEC.
e)
f)

A VSAM file may not be browsed backwards under CICS.

Which of the following statements CORRECTLY describe the highlighted code? ( b )

PROCEDURE DIVISION.
EXEC CICS STARTBR DATASET('FILE1') RIDFLD(REC1-KEY)
REQID(REC1-REQID) END-EXEC.
a)

It is required if more than 1 file is browsed within the same CICS program.

b) It is required when multiple browse operations are to be concurrently used upon the same
file.
c)

It contains the password of a VSAM password protected data set.

d) It contains the CICS file security code defined in the FCT and is required for files defined as
'high-security'.
e)

There is no such option. It will cause a CICS command language translator error.

4.4. Which of the following are proper ways to check for an end-of-file condition when the
highlighted code is executed? ( a )
DATA DIVISION.
WORKING-STORAGE SECTION.
01 REC1-LENGTH
PIC S9(4) COMP.
01 REC1-KEY
PIC X(3) VALUE '111'.
01 REC1
PIC X(100).
...
PROCEDURE DIVISION.
EXEC CICS READNEXT
DATASET('FILE1') RIDFLD(REC1-KEY)
INTO(REC1) LENGTH(REC1-LENGTH) END-EXEC.
...
FILE-END.
a)

Issue an 'EXEC CICS HANDLE CONDITION ENDFILE(FILE-END) END-EXEC' before


executing the code.
b) Add an 'AT END GO TO FILE-END' clause before the END-EXEC in the
code.
c) Issue an 'EXEC CICS ENDFILE(FILE-END) END-EXEC' after executing the
code.
d) After executing the READNEXT issue an 'IF EIBENDFL = '10' GO TO FILE-END.'
e) Issue an 'EXEC CICS HANDLE CONDITION ENDFILE(FILE-END) END-EXEC' after
executing the code.
f)

A READ UPDATE command iniitates VSAM exclusive control protection. Which of the
following terminate exclusive control?
( e)
g)
h)
i)
j)
k)
l)

REWRITE command
DELETE command
UNLOCK command
End of task
All of the above
None of the above

4.6. Which of the following are valid for deleting rows of data? (b )
a)
b)
c)
d)

DELETE without an open cursor


DELETE with an open cursor
Both a) & b)
None of the above

4.7. Which of the following statements CORRECTLY describe the highlighted code? ( c)
PROCEDURE DIVISION.
EXEC CICS WRITE FROM(REC1) LENGTH(1000) DATASET('FILE1')
RIDFLD(REC1-KEY) MASSINSERT END-EXEC.
a) The highlighted code must be used when a write is done to a mass storage device.
b) The code must be used when more than 10 records are added to a VSAM file by the same
program.
c) It enables CICS to efficiently add several VSAM records, with ascending keys, into a VSAM
data set.
d) There is no such option as MASSINSERT for a CICS WRITE statement.
4.8. Which of the following statements must be executed before VSAM data set FILE1 is used for
update processing under CICS?(e)
a)

EXEC CICS OPEN DATASET('FILE1') UPDATE END-EXEC.

b) EXEC CICS READY DATASET('FILE1) END-EXEC.


c)

EXEC CICS CONNECT DATASET('FILE1') UPDATE END-EXEC.

d) EXEC CICS STARTBR DATASET('FILE1') UPDATE END-EXEC.


e)

None of the above statements must be executed before using VSAM data set FILE1 for
update processing

4.9. Which of the following statements CORRECTLY describe the highlighted code? ( d )
PROCEDURE DIVISION.
EXEC CICS HANDLE CONDITION DUPREC(DUP-PARA)
END-EXEC.
DUP-PARA.
...
a)

If 2 reads in a row are done with the same key, control will pass to DUP-PARA.

b) DUP-PARA will get control after a record with a duplicate key has successfully been written
to a data set.
c)

The code will cause an error during execution of the command language translator because
there is no such error condition as DUPREC.

d) None of the above

e)

PROGRAMA issues: EXEC CICS LINK PROGRAM(PROGRAMB)


END-EXEC.
PROGRAMB issues: EXEC CICS XCTL PROGRAM(PROGRAMC)
END-EXEC.
PROGRAMC issues: EXEC CICS XCTL PROGRAM(PROGRAMD)
END-EXEC.
What will happen when PROGRAMD issues the following code? (

PROCEDURE DIVISION.

EXEC CICS RETURN END-EXEC.

a) PROGRAMD will return to PROGRAMA.


b) PROGRAMD will return to PROGRAMB.
c) PROGRAMD will return to PROGRAMC.
d) PROGRAMD will not return to any program. It will return to CICS.
e) PROGRAMD will abend because it does not specify the XCTL option in the RETURN
statement.
5.2. Which of the following are required for VS COBOL II programs? (e)
5.3. BLL cells
5.4. SERVICE RELOAD statements
5.5. ADD or COMPUTE verbs when acquired LINKAGE SECTION storage is greater than
4096 bytes.
5.6. All of the above
5.7. None of the above
5.8. In which of the following program-to-program statements do NOT return to the program issuing
the statement?(d
)
a)
b)
c)
d)
e)

CICS LINK
COBOL static CALL
COBOL dynamic CALL
CICS XCTL
None of the above

5.4. Which of the following CICS commands can cause a PGMIDERR when executed? ( e)
a) EXEC CICS LINK PROGRAM('PROGRAM1') END-EXEC.
b) EXEC CICS RECEIVE MAP('MAP1') MAPSET('MAPSET1') END-EXEC.
c) EXEC CICS SEND MAP('MAP1') MAPSET('MAPSET1') DATAONLY ENDEXEC.
d) All of the above
e) None of the above

f)

Which of the following are required for VS COBOL II programs? ( e)


g) BLL cells
h) SERVICE RELOAD statements
i) ADD or COMPUTE verbs when acquired LINKAGE SECTION storage is greater than 4096
bytes.
j) All of the above
k) None of the above

5.6. Assume a message table is required for all users of the transaction. Which of the following is the
best place to store the table address so that all tasks can access it. ( d )
a)
b)
c)
d)
e)

DFHCOMMAREA
TWA
TCTUA
CWA
EIB

6.1. Which of the following support Automatic Task Initiation(ATI)?


6.2. Extrapartition transient data queues
6.3. Intrapartition transient data queues
6.4. Main Temporary storage queues
6.5. Auxiliary Temporary storage queues
6.6. All of the above
6.7. None of the above

(b)

6.2. Which of the following commands can be used to update a record in temporary storage ( a )
a)

EXEC CICS WRITEQ TS QUEUE(QUEUE1)


FROM (REC1)
LENGTH(100)
ITEM(FIELD1)
REWRITE
END-EXEC.

b) EXEC CICS WRITEQ TS QUEUE(QUEUE1)


FROM (REC1)
LENGTH(100)
ITEM(FIELD1)
UPDATE
END-EXEC.
c)

EXEC CICS REWRITEQ TS QUEUE(QUEUE1)


FROM (REC1)
LENGTH(100)
ITEM(FIELD1)
END-EXEC.

d) EXEC CICS UPDATEQ TS QUEUE(QUEUE1)


FROM (REC1)
LENGTH(100)
ITEM(FIELD1)
END-EXEC.
6.3. Where is the definition of the queue specified in the highlighted code? ( e )
DATA DIVISION.

WORKING-STORAGE SECTION.
01 TS-1
PIC X(100).
...
PROCEDURE DIVISION.
EXEC CICS WRITEQ TS QUEUE('TEMP') FROM(TS-1) LENGTH(100)
END-EXEC.
a)

In the DCT (Destination Control Table)

b) In the FCT (File Control Table)


c)

In the TST (Temporary Storage Table)

d) In the FPT (File Processing Table)


e)

It is not defined in any of the above tables.

6.4. What is the purpose of the highlighted code? (

DATA DIVISION.
WORKING-STORAGE SECTION.
01 FIELD1
PIC S9(4) COMP.
...
PROCEDURE DIVISION.
EXEC CICS READQ TS ITEM(FIELD1) ...
a)

It is used to specify the length of the record to be written.

b) It contains the record number when a specific record is to be retrieved from a


temporary storage queue.
c)

It specifies the key field when only the key field is to be retrieved from a temporary
storage record.

d) It contains the length of the key of a temporary storage record.


e)

None of the above statements correctly describe the highlighted code.

7.1. Which of the following CICS transaction code can be used to define the resources into CICS
control tables ( c )
7.2. CEMT
7.3. CECI
7.4. CEDA
7.5. CECS
7.6. Which of the following resources can be accessed using Function Shipping. ( e )
7.7. Application programs
7.8. Mapsets
7.9. VSAM files
7.10.None of the above
7.11.All of the above
7.3. Which of the following facilities are provided by Inter System Communication (ISC) ( a )

7.4. Function shipping


7.5. Data transfer
7.6. Accessing the DB2 database
7.7. All of the above
7.8. None of the above

SECTION - 2
True/False
1.1
1.2
1.3
1.4
1.5

The concept of a COMMAREA is incompatible with conversational programming (t)


In a pseudo-conversational program, the EIB areas are created on each task initiation.(t)
Pseudo-conversational programs are the preferred method of coding CICS applications (t)
CICS requires a LINKAGE SECTION in all COBOL programs running under its control (t)
The following two conditions are equivalent (f)
IF EIBRESP NOT EQUAL DFHRESP(NORMAL) and
IF EIBRESP EQUAL DFHRESP(ERROR)
1.6 Language Environment/370 (LE/370) is supported by CICS/ESA 3.2 or later(t)
1.7 CICS does not provide the facility to pass status information and data from task to task (f)
1.8
1.9
1.10
1.11
1.12
1.13

CECI is used for command syntax checking only(f).


CEBR is used browse the contents of Temporary storage queues (t)
User defined variables are valid only for current CICS task (t)
CEBR can be invoked from the CEDF working storage screen (t)
VS COBOL II places ABEND information in your default TS queue(t)
Exception conditions cannot be handled by making use of HANDLE CONDITION COMMAND
in CICS. (f)
1.14 The ERROR condition option is generic for all non-normal conditions which are not specifically
coded in a HANDLE CONDITION command (t)
1.15
1.16
1.17
1.18
1.19

There can be minimum of 1 space between 2 unprotected fields( t)


There can be 2 spaces between 2 unprotected fields while writing BMS macro(f )
The physical map is a member of copy library(f)
The Symbolic map is the member of copy library(t)
You can receive mapsets into WORKING-STORAGE or the LINKAGE SECTION of your
program.(t)
1.20 The use of extended attributes may require more than one physical location per field on the
terminal screen (f)
1.21 BIF DEEDIT is used to add the edit characters for the data items. (f)
1.22 On a RECEIVE, CICS updates the EIB fields (t)
4.1. A STARTBR command reads the first record specified in the RIDFLD parameter(f)
4.2. An ENDFILE condition should be handled with browsing(t)
4.3. You can use either the CICS READ command or the COBOL READ verb to access VSAM data
in the CICS region.(f)
4.4. For SQL processing you must define a CURSOR if the results table potentially contains more
than one row.(t)
4.5. The concept of browse implies a sequential retrieval of records.(t)
4.6. When you read a record specifying an update, no one else can access the record(t)
4.7. The DUPREC condition should be handled whenever you delete a record(f)
4.8. EXEC CICS SYNCPOINT ROLLBACK END-EXEC. Is a correct statement. (f)
4.9. You must include SYNCPOINT commands in updating protected VSAM files.(f)
4.10. You must have a READ with UPDATE prior to a REWRITE statement. (t)
5.1.

ECI call is a link to a program in CICS region(t)

5.2.
5.3.
5.4.
5.5.
5.6.
5.7.
5.8.
5.9.
5.10.
5.11.
5.12.
5.13.

CICS programs that read a VSAM record using the set option require modification when
migrating from COBOL to VS COBOL II.(t)
LINK is used to pass control to another program in the same logical level (f)
XCTL is used to pass control to another program in the same logical lever (t)
Data can be passed to a called program using the COMMAREA option of the LINK and
XCTL commands in the calling program (t)
The BLL is an addressing convention used to address storage within the working-storage
section of an application program (f)
We need not define BLL cells for addressing the storage in the LINKAGE SECTION in
VS/COBOL - II. (t)
SERVICE RELOAD statement is required for OS/COBOL programs which use BLL cells.(t)
For VS COBOL II and non-VS COBOL II programs you can acquire and address
DFHCOMMAREA during the first task of pseudo-conversation. (f)
CICS ADDRESS command can be used to access information from CICS system areas. (t)
The NETNAME is field which contains VTAM network name(t)
In OS/COBOL, you require one BLL cell for each 4096 bytes (t)
BLL cells are used in VS COBOL II programs for providing addressability (f).

5.14. We cannot process intrapartition transient data queues using batch COBOL programs(t)
5.15. We can read, update and delete individual items in temporary storage queue(f)
5.16. Once you read an intrapartition transient data queue item, you cannot read the item a second
time(t)
5.17. If you browse through temporary storage & transient data queues using CEBR, the queues will
always be in the same condition when you exit CEBR provided that you do not delete any
of the queues.(f)
5.18. You cannot code CICS table entries for non-recoverable temporary storage queues.(t)
5.19. CEDA can be used to define and install the resources in CICS (t)
5.20. MRO(Multi Region Operation )and ISC(Inter System Communication ) are used for
communication between two CICS systems (t)
5.21. VSAM files can be accessed by making use of Function shipping (t)
5.22. All CICS platforms support DPL ( Distributed Program Link ) ( t)
5.23. Remote resources may be accessed only in READ mode in Function shipping (f)
5.24. The START command is used to asynchronously begin a task (t)

SECTION - 3
FILL IN THE BLANKS

1.1. The CICS provided transaction which facilitates debugging of a program containing CICS
Commands is CEDF

1.2. The RECEIVE command is used to receive incoming data from the terminal .
1.3. The control table which is used to register all CICS application programs and BMS Maps is
PPT.
1.4. The control table which is used to register the control information of all CICS transactions is
PCT
1.5. The CICS task control program (KCP) makes use of PCT table for identifying and initializing
the transactions.
1.6. COMMAREA is a CICS-maintained unit of storage for passing and receiving data between
tasks.
1.7. The CICS supplied transaction used to execute commands with defined variables for data area
and data name options is CECI.
1.8. The CICS supplied transaction used to browse the information in TSQs is CEBR.

1.9. The IGNORE CONDITION command causes the CICS to return to the next statement in the
application program if the named condition occurs.
1.10. The ANYKEY option takes care of handling all the PF keys which have not been handled
except the ENTER key .
1.11. To change the attributes of map fields dynamically, we must have the COPY DFHBMSCA
statement in the application program.
1.12. COPY DFHBMSCAdeclares the constants used to alter the field attribute bytes.
1.13. The symbolic map description resides in the COPY library
1.14. The physical map resides in the program load library.
1.15. The symbolic map is placed in the source program by the compiler.
1.16. COPY DFHAID declares the attention identifier constants for determining which key was
pressed by the operator.
1.17. To use symbolic cursor positioning on the map field ERROR, you must code a COBOL
statement: MOVE -1 TO ERRORL.
1.18. The EIB field which identifies the key pressed by the terminal user in the application program is
EIBAID .
1.19. The EIB field used to determine the position of the cursor on the screen is EIBCPOSN.
1.20. BIF DEEDIT command is used to remove the edit characters from the data.
1.21. If you do not code PICIN or PICOUT, the default is always PIC X(length of field)
1.22. The FRSET option is used with SEND MAP command to reset MDT to zero for all unprotected
fields of the screen.
4.1.
4.2.
4.3.
4.4.
4.5.
4.6.
4.7.
4.8.
4.9.
4.10.
4.11.
4.12.
4.13.
4.14.
4.15.
4.16.

The FCT of the CICS control table contains an entry for every File that is to be accessed in
CICS.
The FCP of the CICS supplied program provides the application programs with services to
read,update,add and delete records in a file.
The CICS file control supports the VSAM and BDAM data access methods.
The GENERIC option with READ command is used to read a non specific record from the
file.
The SQLCA is used to communicate the results of execution of SQL statements.
The INVREQ exceptional condition is raised when the key length specified is greater than the
actual key length for a READ command with GENERIC option.
The STARTBR command is used to establish the positioning within the file during the browse
operation.
The INVREQ exceptional condition is raised when the REWRITE command is issued without
a prior READ command with the UPDATE option.
The UNLOCK command is used to release the exclusive control from the record
WRITE command with MASSINSERT option is used to add a group of records whose keys are
in ascending order into a file.
When using a cursor only the current row may be deleted.
The DELETE command is supported for VSAM KSDS and RRDS files.
Only records from VSAM KSDS and RRDS files can be deleted.
KEYLENGTH must be specified for a GENERIC DELETE.
The argument with NUMREC option contains the number of records deleted on a GENERIC
delete
REWRITE is valid only after a READ UPDATE command .

4.17. The LINK command is used to pass control from an application program at one logical level
to another application at the next lower logical level.
4.18. The XCTL command is used to pass control from one application program to another
application program at the same logical level.
4.19. Data can be passed to the called program through the COMMAREA option of LINK or
XCTL commands.
4.20. The PGMIDERR exceptional condition is raised when the program specified with LINK or
XCTL is not found in the PPT.
4.21. The BLL CELLS is an addressing convention used to address storage outside the workingstorage section of application program in OS/COBOL.

4.22. The BLL cells must be defined in LINKAGE section of the application program.
4.23. The SERVICE RELOAD statement is used to ensure addressability to a particular area defined
in the Linkage section of the application program in OS/COBOL, whenever the content
of BLL cell is changed.
4.24. In OS COBOL, the argument provided with the SET option is a BLL cell.
4.25. The SERVICE RELOAD instruction generates code to refresh the machine register with an
address from a BLL cell in OS/COBOL
4.26. In OS/COBOL, we require one BLL cell for each 4096 bytes .
4.27. The CICS command used to load the user table into the program is LOAD.
4.28. The ADDRESS command is used to access information in the CICS system areas.
4.29. The ASSIGN command is used to access the system value outside of the application program.
4.30. The USERID option in ASSIGN command is used to access the user-id.
4.31.
4.32.
4.33.
4.34.
4.35.
4.36.
4.37.
4.38.
4.39.
4.40.
7.1.
7.2.
7.3.
7.4.
7.5.
7.6.
7.7.
7.8.

The Transient Data queue has a destructive read.


The destination Ids and other characteristics of TDQs are defined in the DCT.
The DELETEQ command is applicable only to intrapartition TDQs
The QBUSY exceptional condition is raised when there is an attempt to access a record in
intrapartion TDQ when it is being written to or deleted by another task.
If the TSQ is recoverable then it must be defined in the TST of CICS control tables.
The argument with NUMITEMS option in READQ TS command specifies the number of
items in the queue.
The QZERO condition is raised, if we attempt a READ operation on TDQ when there are no
records.
The NEXT option on READQ TS command is used to retrieve the records sequentially.
The ITEMERR exceptional condition is raised if end of queue is reached for READQ TS
NEXT command.
The ITEMERR exceptional condition is raised if the specified record is not found for READQ
TS ITEM or WRITEQ TS REWRITE.
The CICS supplied transaction used to define the resources online is CEDA.
The Function shipping facility allows a CICS application program in the local CICS system to
access the resources owned by another remote CICS system.
The mirror transactions are the CICS supplied transactions for administrating Function
shipping.
The Asynchronous processing facility allows a CICS application program in the local CICS
system to initiate remote transactions owned by the remote CICS system.
The START command is used to initiate the remote transaction owned by remote CICS system.
The Transaction Routing facility allows a terminal connected to the local CICS system to run
remote transactions which are owned by the remote CICS system.
The relay program is the CICS supplied program for administrating the Transaction Routing.
The Distributed Transaction Processing facility allows a CICS application program on one
CICS system to perform synchronous communication with another program in the other CICS
system.

SECTION - 4
Short answer questions
1.1.
1.2.
1.3.
1.4.
1.5.
1.6.
1.7.

How do you indicate that CICS should branch to your coded routines when exception
condition occurs.
Using HANDLE CONDITION
Which EIB field will give you the last executed CICS command?
EIBFN field in EIB
Name two COBOL commands that cannot be used in CICS.
OPEN,CLOSE,READ,REWRITE,WRITE,DISPLAY,ACCEPT ( any two is sufficient )
Write the CICS command which makes the program pseudo-conversational
EXEC CICS
RETURN TRANID(XXXX) END-EXEC.
What information can be obtained from the EIBRCODE?
Return code of last executed CICS command
What are some of the information available in the Execute Interface Block (EIB) area?
The cursor position in the map, transaction id, terminal id, task number, length of
communication area, current date and time, Attention identifier etc.,
What is
1.8. EIBCALEN
- contains the length of the communication area
1.9. EIBTIME
- contains the time on which the task is initiated
1.10. EIBTRMID
- contains the terminal id on which the task is initiated.
1.11. EIBCPOSN
- contains the current cursor position

1.12. Write syntax for. Returning control to CICS ( without any working storage program is
running in standalone mode ).
EXEC CICS RETURN END-EXEC.
1.13. What happens when a CICS command contains a RESP option?
No action is taken for any exceptional conditions occuring during the execution of the
command. When the abnormal condition occurs, the CICs response code will be stored
in the program work area and can be checked at the next sequential instruction.
1.14. Do you need to do a RECEIVE to look at the EIBAID field or any other field in the EIB?
No, all the fields in the EIB are made available to the user automatically by CICS.
1.15. Which are the options which facilitate exception handling
1.16. RESP, NOHANDLE
1.17. What is the function of the HANDLE CONDITION command?
To specify the program or paragraph label to which the control has to be passed if the
exception condition specified in the HANDLE CONDITION occurs.
1.18. What does HANDLE ABEND command do?
Allows the establishing of an exit, so that cleanup process can be done in the event of
an abnormal task termination.
1.19. What is the difference between the HANDLE CONDITION and IGNORE command
A HANDLE CONDITION command specifies what should be done when the specified
condition occurs. But the IGNORE command gives control back to the next sequential
statement following the command causing the condition.
1.20. What happens when a CICS command contains the RESP option?
No action is taken for any exceptional conditions occurring during the execution of this
command. The abnormal condition that has occurred will be ignored even if a
HANDLE CONDITION command exists. It has then same effect as the IGNORE

command except that it will not cancel the previous HANDLE CONDITION for any
other command.
1.21. What is the function of CEBR command? What does it access by default?
CEBR command is used to browse the contents of TSQs. By default, it will access the
default TSQ.
1.22. If an application uses a HANDLE AID ENTER(main-logic) and the HANDLE CONDITION
ERROR(abort-rtn) commands. If a program issues a RECEIVE MAP and a MAPFAIL
condition occurs, which process will take control: main-logic or abort-rtn? Justify your
answer.

1.23.
1.24.
1.25.

1.26.

Main-logic will receive control because HANDLE AID has priority over HANDLE
CONDITION.
In the application program how can you determine which key was pressed on the key-board
Either by checking the EIBAID value or by making use of HANDLE AID command
Why are RESP codes are more structured than HANDLE CONDITION commands?
A GOTO is generated after each CICS command for each HANDLE CONDITION
routine. RESP codes are tested inline after the CICS command is executed.
How long does the specific condition ( i.e., LENGERR) that is specified in a HANDLE
CONDITION command remain in effect?
A specific condition remains in effect until
The end of a program or a transfer to another program
Another HANDLE CONDITION command is specified overriding the first condition
A HANDLE IGNORE CONDITION command is issued
If you specify a HANDLE CONDITION command in program A and then a LINK or XCTL
to program B. Will the HANDLE CONDITION still be effective?

No, Handle conditions are only effective in the program in which they are defined.
1.27. What could happen to the transaction if an exception condition is not trapped?
The transaction could abend
1.28. What happens when a CICS command contains the NOHANDLE option?
No action is going to be taken for any exceptional condition occurring during the execution
of the statement in which it was specified.
3.1.

3.2.

Write any two differences between physical map and symbolic map.
Physical contains the constant default data, attribute bytes
member of load library
Symbolic map contains field definitions, attribute bytes to be accessed by the
application program
member of copy library.
Given a mapset consisting of 3 maps and total 42 fields ( except stopper byte ), how many of
the following will be needed.
a) DFHMSD ( 1

3.3.

) b) DFHMDI (

) c) DFHMDF ( 42

Write a macro to define a field with the following characteristics in a map


Named Input field to accept a 13 digit VISA number Positioned at 15,15 Cursor
is inserted here, it is bright Field is unprotected, and the keyboard is freed after
Input Initial value is set to 9999999999999

3.4.

Code should contain DFHMDF followed by all the parameters specified above
Assume that you have been working with a mapset named TESTMST containing a map
named TESTMAP. Write a CICS command to send only the symbolic map to the
screen.
EXEC CICS SEND MAP(TESTMAP) MAPSET(TESTMST) DATA ONLY
END-EXEC.

3.5.

Explain briefly use of


a) FSET
Used to set the MDT on
b) IC attributes of BMS Macro
Used to insert the cursor at the field which contains the IC attribute

3.6.

Explain the different methods of positioning the cursor on the map


Static positioning : Code the IC in the DFHMDF BMS macro
Relative positioning : Code the CURSOR option with a value relative to zero
Symbolic positioning : Move HIGH-VALUES or -1 to the field length in the
Symbolic map and code CURSOR on the SEND MAP.

3.7.

Explain the different methods to set the Modified Data Tag ( MDT).
MDT can be set to 1 by
When the user enters data into the field
When the application program moves the DFHBMSFSE to the attribute character
By defining the FSET option while defining the field using BMS Macro

3.8.

What are the BMS assembler macros?


DFHMSD - mapset definition defining each map set.
DFHMDI - defines individual maps within the mapset.
DFHMDF - Defines each field within the individual map.

3.9.

When a BMS map is assembled, How many types of BMS maps are created and what
are they?
Two types of maps are created.
Physical map : member of CICS load library, contains constant default data,
attribute bytes, starting positions,and length of each field.
Symbolic map : Member of CICS copy library, contains field definitions, attribute
bytes etc., to be accessed by the application.

3.10. What does the POS=(x,y) parameter of the DFHMDF macro do?
It gives the row and column position of the attribute character of the field.
3.11. How do you allow data input in a filed
by making the field unprotected.
3.12. When a terminal user modifies data in a field on the screen what enables that data to be
transmitted?
When a terminal operator enters / modifies the any data in a field on the screen
the MDT attribute bit is set for that field.

3.13. If you define a map with CNTRL=FRSET parameter specified ( on the DFHMSD or
DFHMDI macros ) what happens to existing MDT that were previously set on
screen for
a) SEND MAP with DATAONLY
Retains MDT status from prior screen ( except if the attribute byte is
explicitly changed by the application)
b) SEND MAP with MAPONLY
All MDT bits set/reset to off
c) SEND MAP both MAP & DATA ( DEFAULT)
All MDT bits reset to off
3.14. What does ATTRB=FSET on the DFHMDF macro do?
It initializes the MDT bit for that field to ON ( data is transmitted unless turned
OFF by program
3.15. When you receive a map into your application program, how can you determine if
has/has not been entered into a specific field?
If no data has been entered, then the length will be zero and the input field
contains LOW-VALUES.
3.16. If you issue a SEND MAP command, what happens to the output fields that contain
LOW-VALUES?
They do not get transmitted to the screen.
3.17. When you receive a map, how can you tell the cursor position?
The EIB field EIBCPOSN contains the offset position of the cursor on the screen
3.18. What CICS facilities can you use to save data between transactions?
COMMONAREA, TEMPORARY STORAGE and TRANSIENT DATA queues
3.19. What is wrong with the following commands.
3.20. EXEC CICS SEND MAP (XXXX) MAPSET (YYYY)
FROM(SYM-MAP)
MAPONLY
END-EXEC
Where SYM-MAP is symbolic map
MAPONLY cannot be used with SYMBOLIC MAP
3.21. EXEC CICS RECEIVE MAP(XXXX) MAPSET(YYYY)
FROM(SYM-MAP)
END-EXEC.
FROM(SYM-MAP) is invalid with RECEIVE MAP command.

3.22. Assume that you have a VSAM KSDS file containing a 6 character key, the high
order 2 characters beginning with AA, BB, ZZ. Give the command(s) to
retrieve the records whose partial key is RR.
MOVE RR TO KEY-FIELD.
MOVE 2 TO KEY-LEN.
EXEC CICS READ FILE(KSDS1)
RIDFLD(KEY-FIELD)
KEYLENGTH(KEY-LEN)
GENERIC
EQUAL
END-EXEC.
3.23. Write a CICS code to implement browse operation to read from the file EMPFILE according
to the key EMP-NUMBER reading forward putting the data into EMP-RECORD.
The code should consists of STARTBR,READNEXT & ENDBR commands.
3.24. How would you READ a record with only partial key?
By using the GENERIC option along with the READ command.
3.25. What is the major difference between a READ and a STARTBR commands?
READ actually reads a record into the storage buffer. STARTBR sets a pointer to a
starting location but does not actually reads a record.
3.26. How does a STARTBR command know which record to set the pointer to?
The pointer position is identified by the RIDFLD parameter.
3.27. After a STARTBR and a READNEXTwhat does a READPREV do?
It will retrieve the same record as the READ NEXT . The directoin of the browse will
be changed so that any additional READPREV commands will retrieve prior records.
3.28. How would you start a browse operation at the first record?
Move LOW-VALUES to the RIDFLD parameter before issuing the STARTBR
command.
3.29. What will happen if you issue a STARTBR command with an EQUAL parameter and the
record is not there?
A NOTFND condition is raised.
3.30. Can you update a record that you retrieved using STARTBR and READNEXT commands?
No, STARTBR and READ NEXT are used only for browsing.
3.31. What happens when you issue a READNEXT command and there are no records on the file?
An ENDFILE condition is raised
3.32. What happens when you issue a READPREV command and you are beyond the beginning of
the file?
An ENDFILE condition is raised.
3.33. How would you reposition your browse starting position to a new location on the file?
By either of these methods.
RESETBR command to a new location
ENDBR command followed by STARTBR for new location
3.34. If you have a file with a 2 character key AA,BB,..,ZZ and you do a STARTBR on key
GG and then 3 READNEXTs and then 1 READPREV, which record would you have
in your buffer?
You would have II in your buffer.

3.35. How do allocated resources get released when browsing?


By either of these methods
ENDBR command
End task - which releases all resources.
3.36. Specify the two ways of deleting a record ( VSAM/KSDS) Which would you use when?
Issue a READ for UPDATE and then DELETE. This allows you to verify the record
that you want to delete.
Issue a direct DELETE ( without a READ for UPDATE) specifying the RIDFLD.
3.37. If an application has a VSAM/KSDS file READ command with update option and it finds that
the update is no longer required, how does the application release the exclusive control
of the record read?
By using the UNLOCK command with file or dataset option
By using a SYNCPOINT command.
3.38. While doing a mass delete using a generic key, how can you determine the no. of records
deleted? Indicate the usage with the help of an example
By using the NUMREC option with GENERIC key.
3.39. What is the purpose of the UNLOCK command?
Used to release the exclusive control of a resource.
3.40. Why must you be careful when you issue a READ command with UPDATE option?
Because exclusive control is kept over the record for the entire duration of task.
3.41. How would you release control of the record in a READ for UPDATE?
By issuing a REWRITE,DELETE, or UNLOCK command or by ending the task.
3.42. When you issue a WRITE command and a record with the same key already exists, What
happens?
A DUPREC condition is raised.
3.43. Can you WRITE,DELETE and REWRITE without a prior READ for UPDATE command?
You can WRITE and DELETE a record without a prior READ for UPDATE
command, but must issue a READ with UPDATE command before you can REWRITE.
3.44.

If you want to delete all records with a partial key what should you do?
Issue a direct DELETE with GENERIC and KEYLENGTH parameters.

3.45. What is the difference between a WRITE and REWRITE command?


The WRITE command writes a new record that doesnot exists. The REWRITE
command updates a record already existing on the file and READ for UPDATE must be
issued prior to this REWRITE.

3.46. From your program you wish to transfer control to a program named THISPROG at the next
logical level. You wish to pass the field named STUFF to THISPROG. Write a CICS
command to accomplish the above task.
Code should contain LINK command.
3.47. What is the function of the Base Locator for Linkage ( BLL)?
The BLL is used to address the storage outside the working storage section of the
application program. Used in OS/COBOL.
3.48. Why SET option is more efficient than INTO option
SET option returns the address of the TIOA to application program while INTO option
moves the information in the TIOA into the specified area.
3.49. What is the difference between a LINK and XCTL?
LINK passes control to a program at the next lower logical level. The calling program
remains in storage and expects control to be returned to it.
XCTL passes control to a program at the same logical level. The calling program does
not expect the control to be returned to it.
3.50. What does the RETURN statement do?
Returns control to the next higher logical level. If there is no higher logical level
control is passed to CICS.
3.51. If you have a program A that LINKs to Program B, Program B issues a XCTL to program C,
and Program C issues a RETURN, What is the status of programs A,B and C and what
does the RETURN do?
Program A remains in storage expecting a return
Program B does not remain in storage, does not expect a return
Program C remains in storage, returns to A
3.52. Can you issue a CALL statement in CICS? If so, can you pass data to the called program? How
are the caller and the called programs related?
Yes, In CICS, you can issue a CALL to another program and pass data with the USING
option. Both the called program and calling programs will be linked together in the
same load module. In OS/COBOL the called program cannot contain CICS commands.
In VS-COBOL, the called program can contain CICS commands.
3.53. Why is the LOAD command used for and how do you set up addressability to it?
The LOAD command is used to load a separately assembled program or dynamically
into storage. It is referenced thru the linkage section definitions.
3.54. What is the difference between an ASSIGN and ADDRESS command?
ASSIGN command is used to access the system value outside of the application
program
ADDRESS command is used to access the information in the system areas.
3.55. When will you use a SERVICE RELOAD statement in OS/COBOL application program
This statement must be used whenver the content of BLL cell is changed.
3.56. How will you access information in CICS system areas in your application program?
The ADDRESS command is used to access the information in the CICS system areas.

3.57. Write a CICS command to obtain the user log-on id?


EXEC CICS ASSIGN
USERID(user-id)
END-EXEC.
3.58. Which CICS system program is responsible for handling the automatic task initiation
(ATI)?
DCP ( Destination Control Program )
3.59. What will happen if a task issues an EXEC CICS DELETEQ TD against an extrapartition
TDQ?
An INVREQ condition will occur. The default action is to terminate the task.
3.60. What is stored in the temporary storage table (TST)?
The ids of the recoverable TSQs are stored in TST.
3.61. What will happen, If you read a TSQ sequentially and you reach the end of file?
An ITEMERR condition is raised
3.62. What are the different types of READs which can be issued for a TSQ?
Direct Read using READQ with the ITEM parameter; sequential read using READQ
with the NEXT parameter.
3.63. How do you delete a TSQ
By issuing a DELETEQ command
3.64. What CICS facility has a trigger level and what does it do?
TDQs has a trigger level. It will initiate a transaction when the number of records on
the queue reaches the trigger level.
3.65. What are the two types of TDQs and how are they define? What is the difference between the
two?
Intrapartition TDQs - located within the CICS region
Extrapartition TDQs - located outside the CICS region. Both are defined in the DCT.
3.66.

If you have an MVS batch job that creates a sequential file that you need to process via a
CICS transactions, how would you accomplish this?
Define an input Extrapartition TDQ and issue a READQ TD from the CICS transaction

3.67.

If you read an intrapartition TDQ record, can the same record be reread?
No, once a record is read it is unavailable

3.68. What are the two types of TDQs


Intrapartition TDQs
Extrapartition TDQs
3.69. What is the difference between the intrapartition TDQ and extrapartition TDQ?
Intrapartition TDQ is read or wrote by the programs in the same CICS system while
Extrapartition TDQ is used by the applications outside of the CICS system.
3.70. Specify the resources that a CICS region using Function shipping can access
VSAM files, DL/I databases,TDQs and TSQs
3.71. Explain in brief the MRO( Multi Region Operation ) and ISC ( Inter System Communication)
MRO - provides intercommunication between different CICS systems running under
the same processor

ISC - provides intercommunication between different CICS systems running under


different processors.
3.72. Explain Function request shipping
It allows an application program in a local CICS system to access resources owned by a
remote CICS subsystem.
3.73. What is Transaction routing
Allows the terminal connected to a local system to run remote transactions which are
owned by remote CICS system .
3.74. What is a relay program
A relay program is a CICS supplied program for administrating Transaction Routing
and resides in the local system.
3.75. Explain the Distributed transaction routing.
The DTP allows a CICS application program in one CICS system to perform
asynchronous communication with another program in another system

Vous aimerez peut-être aussi