cics question bank

39
CICS QUESTION BANK All the units in CICS are divided into the following topics Topic 1 Fundamental Program components Topic 2 Testing CEDF Testing & Handling exceptions Topic 3 Maps & Display Accessing & Displaying map fields Topic 4 Reading external data Updating external data Topic 5 Addressability techniques Accessing special storage areas Topic 6 CICS queuing facilities Topic 7 Additional topics

Upload: rameshdwara

Post on 02-Dec-2015

259 views

Category:

Documents


0 download

DESCRIPTION

CICS question Bank

TRANSCRIPT

Page 1: CICS question Bank

CICS QUESTION BANK

All the units in CICS are divided into the following topics

Topic 1 Fundamental Program componentsTopic 2 Testing CEDF

Testing & Handling exceptionsTopic 3 Maps & Display

Accessing & Displaying map fieldsTopic 4 Reading external data

Updating external dataTopic 5 Addressability techniques

Accessing special storage areasTopic 6 CICS queuing facilitiesTopic 7 Additional topics

Page 2: CICS question Bank

STRUCTURE OF THE QUESTION PAPER

Guide lines:· Question paper can be divided into 4 sections as given below.

Question paper Section No.

Type of question No. of questions

Marks

Section -1 Multiple choice 10 1 eachSection -2 True/False 10 1 eachSection-3 Fill in the blanks 10 1 eachSection-4 Short answer questions 10 2 each

· Questions can be selected from each topic as specified below.

Section topic-1 topic-2 topic-3 topic-4 topic-5 topic-6 topic-7Section-1 1 2 2 2 1 1 1Section-2 1 1 2 2 2 1 1Section-3 1 0 2 2 2 2 1Section-4 1 2 2 2 1 1 1

Page 3: CICS question Bank

SECTION -1Mulitiple Choice Questions

1.1 What will be the EIBCALEN in case of I time program run? ( a ) 1.2 0 1.3 100 1.4 9999 1.5 None of these

1.2 When a coding terminal control RECEIVE command (not BMS RECEIVE MAP), which of the following is/are considered normal exceptional condition(s)? ( d)

a) NORMALb) EOCc) LENGERRd) a) and b)e) a), b) and c)

1.3 In COBOL, to accept IF EIBAID = DFHPF6…… which of the following statements your program must include? ( c )

a) COPY mapsetnameb) COPY DFHBMSCAc) COPY DFHAIDd) COPY HANDLE AIDe) None of the above

f) What action must a programmer take to ensure that CICS copies DFHEIBLK into an application program? ( d )

g) COPY DFHEIBLKh) INCLUDE DFHEIBLKi) COPY DFHCOMMAREAj) None of the above

1.5 Where can a program find the transaction identification that began a task? (a)a) In field EIBTRNID.b) In field EIBTRAN. c) In the CSA. d) In the TWA. e) A program must issue an 'EXEC CICS ASSIGN TRANID(FIELD1) END-EXEC' to

place the transaction ID into FIELD1. FIELD1 must be defined as PIC X(4).

1.6 Which of the following COBOL commands should not be executed within a CICS program?(a)

a) OPEN INPUT FILE1. b) STOP RUN. c) COMPUTE FIELD1 ROUNDED = FIELD2 + FIELD3.d) MOVE CORRESPONDING TABLE1 TO TABLE2.e) None of the above.

1.7 Which of the following COBOL statements should not appear within a CICS program? ( c)

Page 4: CICS question Bank

a) FIELD1 PIC X(9) JUSTIFIED RIGHT.b) FIELD1 OCCURS 1 TO 1000 TIMES DEPENDING ON FIELD2 PIC X. c) WRITE RECORD1. d) None of the above. e) All of the above.

1.8 Which CICS table contains the program name that gets control when a transaction code is entered and which table has the address where the program is located?

Choose the combination of answers below. (a)

Program To Get Control Address Of Programa) PPT PCTb) PCT PPT c) PPT PPT d) PCT PCT

e) Which CICS command is most useful for isolating errors in COBOL statements?( f )f) ASKTIMEg) FORMATTIMEh) SEND MAPi) ENTER TRACENUMj) All are equally usefulk) All are equally useless

l) Which of the following will suspend the current HANDLE CONDITION and HANDLE AID settings ? ( f )

m) CICS LINKn) CICS XCTLo) CICS PUSH HANDLEp) COBOL static CALLq) COBOL dynamic CALLr) All of the aboves) None of the above

2.3. Select the HANDLE ABEND command which will transfer control to a program called CLEANUP ( d )

a) EXEC CICS HANDLE ABENDLABEL (‘CLEANUP’)

END-EXECb) EXEC CICS HANDLE ABEND

(‘CLEANUP’)END-EXEC

c) EXEC CICS HANDLE ABEND RESET (‘CLEANUP’)

END-EXECd) EXEC CICS HANDLE ABEND

PROGRAM (‘CLEANUP’) END-EXEC

2.4. What is the preferred method of handling exception conditions? ( c ) 2.5. HANDLE CONDITION2.6. Coding NOHANDLE and checking EIBRCODE/EIBRESP2.7. Coding RESP and checking EIBRESP2.8. Allow CICS to take default action

Page 5: CICS question Bank

2.9. None of the above

2.5. Which of the following commands can be entered from a CICS terminal to check for correct syntax, but not execute, a SEND command? ( e )

a) CECI SEND MAP('MAP1') MAPSET('MAPSET1') SYN

b) CECI SEND MAP('MAP1') MAPSET('MAPSET1') SYNTAX

c) CECI CHECK SEND MAP('MAP1') MAPSET('MAPSET1')

d) ?CECI SEND MAP('MAP1') MAPSET('MAPSET1')

e) CECS SEND MAP('MAP1') MAPSET('MAPSET1')

2.6. Which of the following statements, when added before or after the highlighted code in the program below, will pass control to PARA-CLEAR when the clear key is hit on a terminal? ( a )

DATA DIVISION. WORKING-STORAGE SECTION. COPY DFHAID. ... PROCEDURE DIVISION. ... EXEC CICS RECEIVE MAP('MAP1') MAPSET('MAPSET1') END-EXEC. ... PARA-CLEAR.

a) Before the code is executed, issue:EXEC CICS HANDLE AID CLEAR(PARA-CLEAR) END-EXEC.

b) Before the code is executed, issue:EXEC CICS HANDLE CLEAR PARA(PARA-CLEAR) END-EXEC.

c) After the code is executed, issue:IF EIBCLEAR = 'Y' GO TO PARA-CLEAR.

d) After the code is executed, issue:IF EIBINPUT = 'CLEAR' GO TO PARA-CLEAR.

e) Which of the following CICS transaction codes can be used to interactively execute CICS command language (commands that can be coded in a COBOL program) at a terminal? ( d )

a) CEMT

b) CSMT

c) CECS

d) CECI

2.8 Which of the following commands are used to invoke EDF (The Execution Diagnostic Facility)?(b)

2.9 EDF12.10 CEDF 2.11 EDF2.12 EXDF

Page 6: CICS question Bank

3.1. It is desired to transmit the information within the symbolic map in a program and the constant data defined in the physical map. Which of the following code segments should be substituted for the asterisks (***********) below? (b )

PROCEDURE DIVISION. …. EXEC CICS SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) ************

…..a) DATAONLY END-EXEC.b) END-EXEC.c) MERGE END-EXEC.d) BOTH END-EXEC.e) MAPONLY END-EXEC.

3.2. Which of the following CICS commands can cause a PGMIDERR when executed ( b )

3.3. EXEC CICS RECEIVE MAP(‘MAP1’) MAPSET(‘MAPSET1’) END-EXEC.3.4. EXEC CICS XCTL PROGRAM(‘PROGRAM1’) END-EXEC.3.5. EXEC CICS SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) END-EXEC.3.6. None of the above.

3.3. If a user keys a valid transaction id (INQY) from a clear screen and presses ENTER, which of the following SEND MAP commands results in a 3270 data stream that may cause a terminal error? (e) 3.4. SEND MAP (‘MAP 1’) MAPSET(‘MAPSET1’)3.5. SEND MAP (‘MAP 1’) MAPSET(‘MAPSET1’) MAPONLY3.6. SEND MAP (‘MAP 1’) MAPSET(‘MAPSET1’) DATAONLY3.7. Any of the above3.8. None of the above

3.4. The constant data defined in a physical map is to be sent to a screen WITHOUT any variable information from the map copy member defined in the program.

Which of the following is the most efficient way to send the map?(b)

a) EXEC CICS SEND MAP1('MAP1') MAPSET('MAPSET1') NODATA END-EXEC.b) EXEC CICS SEND MAP('MAP1') MAPSET('MAPSET1') MAPONLY ERASE

END-EXEC.c) EXEC CICS SEND MAP('MAP1') MAPSET('MAPSET1') DATAONLY ERASE

END-EXEC.d) EXEC CICS SEND MAP('MAP1') MAPSET('MAPSET1') ERASE END-EXEC.e) EXEC CICS SEND MAP('MAP1') PHYSICAL END-EXEC.

3.5. Which of the following parameters can be substituted for the asterisks (*******) in the map field defined below?( c)

MAP1S DFHMSD TYPE=MAP,MODE=INOUT,CTRL=FREEKB,LANG=COBOL,TIOAPFX=YESMAP1 DFHMDI SIZE=(24,80)FIELD1 DFHMDF POS=(5,2),ATTRB=UNPROT,LENGTH=9,*******

Page 7: CICS question Bank

a) PIC='S9(7)V99' b) PICTURE='9(7)V99' c) PICIN='9(7)V99' d) PICOUT='$$,999.99'e) None of the above parameters are valid within a CICS map definition.

3.6. CICS map MAP1 appears below. Which of the following COBOL statements will place the cursor at FIELD2 when MAP1 is sent using symbolic cursor positioning?( c)

MAP1S DFHMSD TYPE=MAP,MODE=INOUT,CTRL=(FREEKB,FRSET),LANG=COBOL, X TIOAPFX=YESMAP1 DFHMDI SIZE=(24,80)FIELD1 DFHMDF POS=(4,2),ATTRB=ASKIP,LENGTH=2FIELD2 DFHMDF POS=(4,5),ATTRB=UNPROT,LENGTH=2FIELD3 DFHMDF POS=(4,8),ATTRB=UNPROT,LENGTH=2 DFHMDF POS=(4,11),ATTRB=ASKIP,LENGTH=1 DFHMSD TYPE=FINAL

a) MOVE -1 TO FIELD1L FIELD2L FIELD3L.b) MOVE -1 TO FIELD1L FIELD3L.c) MOVE -1 TO FIELD2L. d) MOVE -1 TO FIELD1L FIELD2L.e) MOVE 'Y' TO FIELD2L.

3.7. Which of the following statements correctly describe options that can be substituted for the asterisks (*********) below? ( d )

MAP1 DFHMSD TYPE=*******, MODE=INOUT, LANG=COBOL, CTRL=(FREEKB,FRSET), TIOAPFX=YES

a) LINK, to create a text deck that can linked into the CICS load library. b) LOAD, to create a text deck that can be linked into the CICS load library.c) COPY, to create a copy member for use by a program using the map.d) DSECT, to create a copy member for use by a program using the map.

e) Which of the following is not considered an extended attribute when creating BMS maps? ( c )

f) Colorg) Underliningh) Outliningi) Transparencyj) All of the above are extended attributes.

3.9. If the operator keys the data into field NAME and presses ENTER key, the information is passed to your program. If you want to turn off the modified data tag for name, you must move a one byte constant to which of the following data areas in your program? ( f )

3.10.NAME3.11.NAMEO3.12.NAMEL3.13.NAMEF

Page 8: CICS question Bank

3.14.NAMEC3.15.NAMEA

3.10. A field on a screen was erased by the operator hitting the EOF key. The map definition of the field is shown below. What are the values of FIELD1F, FIELD1L and FIELD1I when the map is received? ( e )

FIELD1 DFHMDF POS=(5,8),ATTRB=UNPROT,LENGTH=5

Choose the answer that indicates the correct values of the fields shown.

FIELD1F FIELD1L FIELD1Ia) Hexadecimal '80' 0 LOW-VALUES

b) LOW-VALUES 0 SPACES

c) LOW-VALUES 1 SPACES

d) Hexadecimal '80' 1 LOW-VALUES

e) Hexadecimal '80' 0 SPACES

3.11. Which of the following causes a MAPFAIL exception condition on a RECEIVE MAP?( e )

3.12. The user entered the data and then erased the data using Erase EOF3.13. The user entered data and then erased the data using the space bar.3.14. The user pressed the CLEAR key.3.15. The user keyed the data and pressed an undefined PF key.3.16. All of the above

4.1. Which of the following statements correctly describe the following code? ( d )

PROCEDURE DIVISION. …… EXEC CICS HANDLE CONDITION NOTOPEN(NOTOPEN-PARA ) END-EXEC. …..NOTOPEN-PARA.

a) Paragraph NOTOPEN-PARA will get control if a data set does not exist in the FCT( File Control Table ).

b) The code is used to close the CICS filec) For each data set referenced in a program, the code must be issued again. If 5 files are

processed, the code must be issued 5 timesd) It is used to pass control to NOTOPEN-PARA when a CICS file control command is

executed upon a data set that is closed.

4.2. Which of the following CICS commands can be added to the following program to browse a VSAM file backwards (in descending key order)? ( a )

PROCEDURE DIVISION. EXEC CICS STARTBR DATASET('FILE1') RIDFLD(REC1-KEY) KEYLENGTH(3) EQUAL END-EXEC.

a) EXEC CICS READPREV DATASET('FILE1') RIDFLD(REC1-KEY)

Page 9: CICS question Bank

INTO(REC1) LENGTH(REC1-LEN) END-EXEC.

b) EXEC CICS READBACK DATASET('FILE1') RIDFLD(REC1-KEY)INTO(REC1) LENGTH(REC1-LEN) END-EXEC.

c) EXEC CICS READ PRIOR DATASET('FILE1') RIDFLD(REC1-KEY)INTO(REC1) LENGTH(REC1-LEN) END-EXEC.

d) EXEC CICS READ REVERSE DATASET('FILE1') RIDFLD(REC1-KEY)INTO(REC1) LENGTH(REC1-LEN) END-EXEC.

e) A VSAM file may not be browsed backwards under CICS.

f) Which of the following statements CORRECTLY describe the highlighted code? ( b )

PROCEDURE DIVISION. EXEC CICS STARTBR DATASET('FILE1') RIDFLD(REC1-KEY) REQID(REC1-REQID) END-EXEC.

a) It is required if more than 1 file is browsed within the same CICS program.

b) It is required when multiple browse operations are to be concurrently used upon the same file.

c) It contains the password of a VSAM password protected data set.

d) It contains the CICS file security code defined in the FCT and is required for files defined as 'high-security'.

e) There is no such option. It will cause a CICS command language translator error.

Page 10: CICS question Bank

4.4. Which of the following are proper ways to check for an end-of-file condition when the highlighted code is executed? ( a )

DATA DIVISION. WORKING-STORAGE SECTION. 01 REC1-LENGTH PIC S9(4) COMP. 01 REC1-KEY PIC X(3) VALUE '111'. 01 REC1 PIC X(100). ... PROCEDURE DIVISION. EXEC CICS READNEXT DATASET('FILE1') RIDFLD(REC1-KEY) INTO(REC1) LENGTH(REC1-LENGTH) END-EXEC. ... FILE-END.

a) Issue an 'EXEC CICS HANDLE CONDITION ENDFILE(FILE-END) END-EXEC' before executing the code.

b) Add an 'AT END GO TO FILE-END' clause before the END-EXEC in thecode.

c) Issue an 'EXEC CICS ENDFILE(FILE-END) END-EXEC' after executing thecode.

d) After executing the READNEXT issue an 'IF EIBENDFL = '10' GO TO FILE-END.'e) Issue an 'EXEC CICS HANDLE CONDITION ENDFILE(FILE-END) END-EXEC' after

executing the code.

f) A READ UPDATE command iniitates VSAM exclusive control protection. Which of the following terminate exclusive control? ( e )

g) REWRITE commandh) DELETE commandi) UNLOCK commandj) End of taskk) All of the abovel) None of the above

4.6. Which of the following are valid for deleting rows of data? (b )

a) DELETE without an open cursorb) DELETE with an open cursorc) Both a) & b)d) None of the above

Page 11: CICS question Bank

4.7. Which of the following statements CORRECTLY describe the highlighted code? ( c)

PROCEDURE DIVISION. EXEC CICS WRITE FROM(REC1) LENGTH(1000) DATASET('FILE1') RIDFLD(REC1-KEY) MASSINSERT END-EXEC.

a) The highlighted code must be used when a write is done to a mass storage device.b) The code must be used when more than 10 records are added to a VSAM file by the same

program.c) It enables CICS to efficiently add several VSAM records, with ascending keys, into a

VSAM data set.d) There is no such option as MASSINSERT for a CICS WRITE statement.

4.8. Which of the following statements must be executed before VSAM data set FILE1 is used for update processing under CICS?(e)

a) EXEC CICS OPEN DATASET('FILE1') UPDATE END-EXEC.

b) EXEC CICS READY DATASET('FILE1) END-EXEC.

c) EXEC CICS CONNECT DATASET('FILE1') UPDATE END-EXEC.

d) EXEC CICS STARTBR DATASET('FILE1') UPDATE END-EXEC.

e) None of the above statements must be executed before using VSAM data set FILE1 for update processing

4.9. Which of the following statements CORRECTLY describe the highlighted code? ( d )

PROCEDURE DIVISION. EXEC CICS HANDLE CONDITION DUPREC(DUP-PARA) END-EXEC. DUP-PARA. ...

a) If 2 reads in a row are done with the same key, control will pass to DUP-PARA.

b) DUP-PARA will get control after a record with a duplicate key has successfully been written to a data set.

c) The code will cause an error during execution of the command language translator because there is no such error condition as DUPREC.

d) None of the above

Page 12: CICS question Bank

e) PROGRAMA issues: EXEC CICS LINK PROGRAM(PROGRAMB) END-EXEC.

PROGRAMB issues: EXEC CICS XCTL PROGRAM(PROGRAMC) END-EXEC.

PROGRAMC issues: EXEC CICS XCTL PROGRAM(PROGRAMD) END-EXEC.

What will happen when PROGRAMD issues the following code? ( a )

PROCEDURE DIVISION.……EXEC CICS RETURN END-EXEC.

……a) PROGRAMD will return to PROGRAMA.b) PROGRAMD will return to PROGRAMB.c) PROGRAMD will return to PROGRAMC.d) PROGRAMD will not return to any program. It will return to CICS.e) PROGRAMD will abend because it does not specify the XCTL option in the RETURN

statement.

5.2. Which of the following are required for VS COBOL II programs? (e)5.3. BLL cells5.4. SERVICE RELOAD statements5.5. ADD or COMPUTE verbs when acquired LINKAGE SECTION storage is greater than

4096 bytes.5.6. All of the above5.7. None of the above

5.8. In which of the following program-to-program statements do NOT return to the program issuing the statement?(d )

a) CICS LINKb) COBOL static CALLc) COBOL dynamic CALLd) CICS XCTLe) None of the above

5.4. Which of the following CICS commands can cause a PGMIDERR when executed? ( e)

a) EXEC CICS LINK PROGRAM('PROGRAM1') END-EXEC.b) EXEC CICS RECEIVE MAP('MAP1') MAPSET('MAPSET1') END-EXEC.c) EXEC CICS SEND MAP('MAP1') MAPSET('MAPSET1') DATAONLY END-

EXEC.d) All of the abovee) None of the above

Page 13: CICS question Bank

f) Which of the following are required for VS COBOL II programs? ( e)

g) BLL cellsh) SERVICE RELOAD statementsi) ADD or COMPUTE verbs when acquired LINKAGE SECTION storage is greater than 4096

bytes.j) All of the abovek) None of the above

5.6. Assume a message table is required for all users of the transaction. Which of the following is the best place to store the table address so that all tasks can access it. ( d )

a) DFHCOMMAREAb) TWAc) TCTUAd) CWAe) EIB

6.1. Which of the following support Automatic Task Initiation(ATI)? (b)6.2. Extrapartition transient data queues6.3. Intrapartition transient data queues6.4. Main Temporary storage queues6.5. Auxiliary Temporary storage queues6.6. All of the above6.7. None of the above

6.2. Which of the following commands can be used to update a record in temporary storage ( a )

a) EXEC CICS WRITEQ TS QUEUE(‘QUEUE1’) FROM (REC1) LENGTH(100) ITEM(FIELD1) REWRITE END-EXEC.

b) EXEC CICS WRITEQ TS QUEUE(‘QUEUE1’) FROM (REC1)

LENGTH(100) ITEM(FIELD1) UPDATE

END-EXEC.

c) EXEC CICS REWRITEQ TS QUEUE(‘QUEUE1’)FROM (REC1)LENGTH(100)ITEM(FIELD1)

END-EXEC.

d) EXEC CICS UPDATEQ TS QUEUE(‘QUEUE1’)FROM (REC1) LENGTH(100) ITEM(FIELD1)

END-EXEC.

6.3. Where is the definition of the queue specified in the highlighted code? ( e )

Page 14: CICS question Bank

DATA DIVISION. WORKING-STORAGE SECTION. 01 TS-1 PIC X(100). ... PROCEDURE DIVISION. EXEC CICS WRITEQ TS QUEUE('TEMP') FROM(TS-1) LENGTH(100) END-EXEC.

a) In the DCT (Destination Control Table)

b) In the FCT (File Control Table)

c) In the TST (Temporary Storage Table)

d) In the FPT (File Processing Table)

e) It is not defined in any of the above tables.

6.4. What is the purpose of the highlighted code? ( b )

DATA DIVISION. WORKING-STORAGE SECTION. 01 FIELD1 PIC S9(4) COMP. ... PROCEDURE DIVISION. EXEC CICS READQ TS ITEM(FIELD1) ...

a) It is used to specify the length of the record to be written.

b) It contains the record number when a specific record is to be retrieved from a temporary storage queue.

c) It specifies the key field when only the key field is to be retrieved from a temporary storage record.

d) It contains the length of the key of a temporary storage record.

e) None of the above statements correctly describe the highlighted code.

7.1. Which of the following CICS transaction code can be used to define the resources into CICS control tables ( c )

7.2. CEMT7.3. CECI7.4. CEDA7.5. CECS

7.6. Which of the following resources can be accessed using Function Shipping. ( e )

7.7. Application programs7.8. Mapsets7.9. VSAM files

Page 15: CICS question Bank

7.10.None of the above7.11.All of the above

7.3. Which of the following facilities are provided by Inter System Communication (ISC) ( a )

7.4. Function shipping7.5. Data transfer7.6. Accessing the DB2 database7.7. All of the above7.8. None of the above

SECTION - 2

True/False

1.1 The concept of a COMMAREA is incompatible with conversational programming (t)1.2 In a pseudo-conversational program, the EIB areas are created on each task initiation.(t)1.3 Pseudo-conversational programs are the preferred method of coding CICS applications (t)1.4 CICS requires a LINKAGE SECTION in all COBOL programs running under its control (t)1.5 The following two conditions are equivalent (f)

IF EIBRESP NOT EQUAL DFHRESP(NORMAL) andIF EIBRESP EQUAL DFHRESP(ERROR)

1.6 Language Environment/370 (LE/370) is supported by CICS/ESA 3.2 or later(t)1.7 CICS does not provide the facility to pass status information and data from task to task (f)

1.8 CECI is used for command syntax checking only(f).1.9 CEBR is used browse the contents of Temporary storage queues (t)1.10 User defined variables are valid only for current CICS task (t)1.11 CEBR can be invoked from the CEDF working storage screen (t)1.12 VS COBOL II places ABEND information in your default TS queue(t)1.13 Exception conditions cannot be handled by making use of HANDLE CONDITION

COMMAND in CICS. (f)1.14 The ERROR condition option is generic for all non-normal conditions which are not

specifically coded in a HANDLE CONDITION command (t)

1.15 There can be minimum of 1 space between 2 unprotected fields( t)1.16 There can be 2 spaces between 2 unprotected fields while writing BMS macro(f )1.17 The physical map is a member of copy library(f)1.18 The Symbolic map is the member of copy library(t)1.19 You can receive mapsets into WORKING-STORAGE or the LINKAGE SECTION of your

program.(t)1.20 The use of extended attributes may require more than one physical location per field on the

terminal screen (f)1.21 BIF DEEDIT is used to add the edit characters for the data items. (f)1.22 On a RECEIVE, CICS updates the EIB fields (t)

4.1. A STARTBR command reads the first record specified in the RIDFLD parameter(f)4.2. An ENDFILE condition should be handled with browsing(t)4.3. You can use either the CICS READ command or the COBOL READ verb to access VSAM

data in the CICS region.(f)4.4. For SQL processing you must define a CURSOR if the results table potentially contains more

than one row.(t)4.5. The concept of browse implies a sequential retrieval of records.(t)

Page 16: CICS question Bank

4.6. When you read a record specifying an update, no one else can access the record(t)4.7. The DUPREC condition should be handled whenever you delete a record(f) 4.8. EXEC CICS SYNCPOINT ROLLBACK END-EXEC. Is a correct statement. (f)4.9. You must include SYNCPOINT commands in updating protected VSAM files.(f)4.10. You must have a READ with UPDATE prior to a REWRITE statement. (t)

5.1. ECI call is a link to a program in CICS region(t)5.2. CICS programs that read a VSAM record using the set option require modification when

migrating from COBOL to VS COBOL II.(t)5.3. LINK is used to pass control to another program in the same logical level (f)5.4. XCTL is used to pass control to another program in the same logical lever (t)5.5. Data can be passed to a called program using the COMMAREA option of the LINK and

XCTL commands in the calling program (t)5.6. The BLL is an addressing convention used to address storage within the working-storage

section of an application program (f)5.7. We need not define BLL cells for addressing the storage in the LINKAGE SECTION in

VS/COBOL - II. (t) 5.8. SERVICE RELOAD statement is required for OS/COBOL programs which use BLL cells.(t)5.9. For VS COBOL II and non-VS COBOL II programs you can acquire and address

DFHCOMMAREA during the first task of pseudo-conversation. (f)5.10. CICS ADDRESS command can be used to access information from CICS system areas. (t)5.11. The NETNAME is field which contains VTAM network name(t)5.12. In OS/COBOL, you require one BLL cell for each 4096 bytes (t)5.13. BLL cells are used in VS COBOL II programs for providing addressability (f).

5.14. We cannot process intrapartition transient data queues using batch COBOL programs(t)5.15. We can read, update and delete individual items in temporary storage queue(f)5.16. Once you read an intrapartition transient data queue item, you cannot read the item a second

time(t)5.17. If you browse through temporary storage & transient data queues using CEBR, the queues

will always be in the same condition when you exit CEBR provided that you do not delete any of the queues.(f)

5.18. You cannot code CICS table entries for non-recoverable temporary storage queues.(t)

5.19. CEDA can be used to define and install the resources in CICS (t)5.20. MRO(Multi Region Operation )and ISC(Inter System Communication ) are used for

communication between two CICS systems (t)5.21. VSAM files can be accessed by making use of Function shipping (t) 5.22. All CICS platforms support DPL ( Distributed Program Link ) ( t)5.23. Remote resources may be accessed only in READ mode in Function shipping (f)5.24. The START command is used to asynchronously begin a task (t)

SECTION - 3

FILL IN THE BLANKS

1.1. The CICS provided transaction which facilitates debugging of a program containing CICS Commands is CEDF

1.2. The RECEIVE command is used to receive incoming data from the terminal .

1.3. The control table which is used to register all CICS application programs and BMS Maps is PPT.

Page 17: CICS question Bank

1.4. The control table which is used to register the control information of all CICS transactions is PCT

1.5. The CICS task control program (KCP) makes use of PCT table for identifying and initializing the transactions.

1.6. COMMAREA is a CICS-maintained unit of storage for passing and receiving data between tasks.

1.7. The CICS supplied transaction used to execute commands with defined variables for data area and data name options is CECI.

1.8. The CICS supplied transaction used to browse the information in TSQs is CEBR.1.9. The IGNORE CONDITION command causes the CICS to return to the next statement in the

application program if the named condition occurs.1.10. The ANYKEY option takes care of handling all the PF keys which have not been handled

except the ENTER key .

1.11. To change the attributes of map fields dynamically, we must have the COPY DFHBMSCA statement in the application program.

1.12. COPY DFHBMSCAdeclares the constants used to alter the field attribute bytes.1.13. The symbolic map description resides in the COPY library1.14. The physical map resides in the program load library.1.15. The symbolic map is placed in the source program by the compiler.1.16. COPY DFHAID declares the attention identifier constants for determining which key was

pressed by the operator.1.17. To use symbolic cursor positioning on the map field ERROR, you must code a COBOL

statement: MOVE -1 TO ERRORL.1.18. The EIB field which identifies the key pressed by the terminal user in the application program

is EIBAID .1.19. The EIB field used to determine the position of the cursor on the screen is EIBCPOSN.1.20. BIF DEEDIT command is used to remove the edit characters from the data.1.21. If you do not code PICIN or PICOUT, the default is always PIC X(length of field)1.22. The FRSET option is used with SEND MAP command to reset MDT to zero for all unprotected

fields of the screen.

4.1. The FCT of the CICS control table contains an entry for every File that is to be accessed in CICS.

4.2. The FCP of the CICS supplied program provides the application programs with services to read,update,add and delete records in a file.

4.3. The CICS file control supports the VSAM and BDAM data access methods.4.4. The GENERIC option with READ command is used to read a non specific record from the

file.4.5. The SQLCA is used to communicate the results of execution of SQL statements.4.6. The INVREQ exceptional condition is raised when the key length specified is greater than the

actual key length for a READ command with GENERIC option.4.7. The STARTBR command is used to establish the positioning within the file during the browse

operation.4.8. The INVREQ exceptional condition is raised when the REWRITE command is issued without

a prior READ command with the UPDATE option.4.9. The UNLOCK command is used to release the exclusive control from the record4.10. WRITE command with MASSINSERT option is used to add a group of records whose keys

are in ascending order into a file.4.11. When using a cursor only the current row may be deleted.4.12. The DELETE command is supported for VSAM KSDS and RRDS files.4.13. Only records from VSAM KSDS and RRDS files can be deleted.4.14. KEYLENGTH must be specified for a GENERIC DELETE.4.15. The argument with NUMREC option contains the number of records deleted on a GENERIC

delete

Page 18: CICS question Bank

4.16. REWRITE is valid only after a READ UPDATE command .

4.17. The LINK command is used to pass control from an application program at one logical level to another application at the next lower logical level.

4.18. The XCTL command is used to pass control from one application program to another application program at the same logical level.

4.19. Data can be passed to the called program through the COMMAREA option of LINK or XCTL commands.

4.20. The PGMIDERR exceptional condition is raised when the program specified with LINK or XCTL is not found in the PPT.

4.21. The BLL CELLS is an addressing convention used to address storage outside the working-storage section of application program in OS/COBOL.

4.22. The BLL cells must be defined in LINKAGE section of the application program.4.23. The SERVICE RELOAD statement is used to ensure addressability to a particular area

defined in the Linkage section of the application program in OS/COBOL, whenever the content of BLL cell is changed.

4.24. In OS COBOL, the argument provided with the SET option is a BLL cell.4.25. The SERVICE RELOAD instruction generates code to refresh the machine register with an

address from a BLL cell in OS/COBOL4.26. In OS/COBOL, we require one BLL cell for each 4096 bytes .4.27. The CICS command used to load the user table into the program is LOAD.4.28. The ADDRESS command is used to access information in the CICS system areas.4.29. The ASSIGN command is used to access the system value outside of the application program.4.30. The USERID option in ASSIGN command is used to access the user-id.

4.31. The Transient Data queue has a destructive read.4.32. The destination Ids and other characteristics of TDQs are defined in the DCT.4.33. The DELETEQ command is applicable only to intrapartition TDQs4.34. The QBUSY exceptional condition is raised when there is an attempt to access a record in

intrapartion TDQ when it is being written to or deleted by another task.4.35. If the TSQ is recoverable then it must be defined in the TST of CICS control tables.4.36. The argument with NUMITEMS option in READQ TS command specifies the number of

items in the queue.4.37. The QZERO condition is raised, if we attempt a READ operation on TDQ when there are no

records.4.38. The NEXT option on READQ TS command is used to retrieve the records sequentially.4.39. The ITEMERR exceptional condition is raised if end of queue is reached for READQ TS

NEXT command.4.40. The ITEMERR exceptional condition is raised if the specified record is not found for READQ

TS ITEM or WRITEQ TS REWRITE.

7.1. The CICS supplied transaction used to define the resources online is CEDA.7.2. The Function shipping facility allows a CICS application program in the local CICS system

to access the resources owned by another remote CICS system.7.3. The mirror transactions are the CICS supplied transactions for administrating Function

shipping.7.4. The Asynchronous processing facility allows a CICS application program in the local CICS

system to initiate remote transactions owned by the remote CICS system.7.5. The START command is used to initiate the remote transaction owned by remote CICS

system.7.6. The Transaction Routing facility allows a terminal connected to the local CICS system to run

remote transactions which are owned by the remote CICS system.7.7. The relay program is the CICS supplied program for administrating the Transaction Routing.7.8. The Distributed Transaction Processing facility allows a CICS application program on one

CICS system to perform synchronous communication with another program in the other CICS system.

Page 19: CICS question Bank
Page 20: CICS question Bank

SECTION - 4

Short answer questions

1.1. How do you indicate that CICS should branch to your coded routines when exception condition occurs.

Using HANDLE CONDITION 1.2. Which EIB field will give you the last executed CICS command?

EIBFN field in EIB 1.3. Name two COBOL commands that cannot be used in CICS.

OPEN,CLOSE,READ,REWRITE,WRITE,DISPLAY,ACCEPT ( any two is sufficient ) 1.4. Write the CICS command which makes the program pseudo-conversational

EXEC CICS RETURN TRANID(XXXX) END-EXEC.

1.5. What information can be obtained from the EIBRCODE?Return code of last executed CICS command

1.6. What are some of the information available in the Execute Interface Block (EIB) area?The cursor position in the map, transaction id, terminal id, task number, length of communication area, current date and time, Attention identifier etc.,

1.7. What is 1.8. EIBCALEN

- contains the length of the communication area1.9. EIBTIME

- contains the time on which the task is initiated1.10. EIBTRMID

- contains the terminal id on which the task is initiated.1.11. EIBCPOSN

- contains the current cursor position

1.12. Write syntax for…. Returning control to CICS ( without any working storage… program is running in standalone mode ).EXEC CICS RETURN END-EXEC.

1.13. What happens when a CICS command contains a RESP option?

No action is taken for any exceptional conditions occuring during the execution of the command. When the abnormal condition occurs, the CICs response code will be stored in the program work area and can be checked at the next sequential instruction.

1.14. Do you need to do a RECEIVE to look at the EIBAID field or any other field in the EIB?

No, all the fields in the EIB are made available to the user automatically by CICS.

1.15. Which are the options which facilitate exception handling1.16. RESP, NOHANDLE1.17. What is the function of the HANDLE CONDITION command?

To specify the program or paragraph label to which the control has to be passed if the exception condition specified in the HANDLE CONDITION occurs.

1.18. What does HANDLE ABEND command do?Allows the establishing of an exit, so that cleanup process can be done in the event of an abnormal task termination.

1.19. What is the difference between the HANDLE CONDITION and IGNORE commandA HANDLE CONDITION command specifies what should be done when the specified condition occurs. But the IGNORE command gives control back to the next sequential statement following the command causing the condition.

1.20. What happens when a CICS command contains the RESP option?

Page 21: CICS question Bank

No action is taken for any exceptional conditions occurring during the execution of this command. The abnormal condition that has occurred will be ignored even if a HANDLE CONDITION command exists. It has then same effect as the IGNORE command except that it will not cancel the previous HANDLE CONDITION for any other command.

1.21. What is the function of CEBR command? What does it access by default?CEBR command is used to browse the contents of TSQs. By default, it will access the default TSQ.

1.22. If an application uses a HANDLE AID ENTER(main-logic) and the HANDLE CONDITION ERROR(abort-rtn) commands. If a program issues a RECEIVE MAP and a MAPFAIL condition occurs, which process will take control: main-logic or abort-rtn? Justify your answer.

Main-logic will receive control because HANDLE AID has priority over HANDLE CONDITION.

1.23. In the application program how can you determine which key was pressed on the key-boardEither by checking the EIBAID value or by making use of HANDLE AID command

1.24. Why are RESP codes are more structured than HANDLE CONDITION commands?A GOTO is generated after each CICS command for each HANDLE CONDITION routine. RESP codes are tested inline after the CICS command is executed.

1.25. How long does the specific condition ( i.e., LENGERR) that is specified in a HANDLE CONDITION command remain in effect?A specific condition remains in effect until The end of a program or a transfer to another programAnother HANDLE CONDITION command is specified overriding the first conditionA HANDLE IGNORE CONDITION command is issued

1.26. If you specify a HANDLE CONDITION command in program ‘A’ and then a LINK or XCTL to program ‘B’. Will the HANDLE CONDITION still be effective?

No, Handle conditions are only effective in the program in which they are defined.1.27. What could happen to the transaction if an exception condition is not trapped?

The transaction could abend1.28. What happens when a CICS command contains the NOHANDLE option?

No action is going to be taken for any exceptional condition occurring during the execution of the statement in which it was specified.

3.1. Write any two differences between physical map and symbolic map.Physical contains the constant default data, attribute bytes member of load librarySymbolic map contains field definitions, attribute bytes to be accessed by the application programmember of copy library.

3.2. Given a mapset consisting of 3 maps and total 42 fields ( except stopper byte ), how many of the following will be needed.

a) DFHMSD ( 1 ) b) DFHMDI ( 3 ) c) DFHMDF ( 42 )

3.3. Write a macro to define a field with the following characteristics in a map

Named Input field to accept a 13 digit VISA number Positioned at 15,15 Cursor is inserted here, it is bright Field is unprotected, and the keyboard is freed after Input Initial value is set to ‘9999999999999’

Code should contain DFHMDF followed by all the parameters specified above

Page 22: CICS question Bank

3.4. Assume that you have been working with a mapset named TESTMST containing a map named TESTMAP. Write a CICS command to send only the symbolic map to the screen.

EXEC CICS SEND MAP(TESTMAP) MAPSET(TESTMST) DATA ONLY END-EXEC.

3.5. Explain briefly use of a) FSET Used to set the MDT on b) IC attributes of BMS Macro Used to insert the cursor at the field which contains the IC attribute

3.6. Explain the different methods of positioning the cursor on the mapStatic positioning : Code the IC in the DFHMDF BMS macroRelative positioning : Code the CURSOR option with a value relative to zero Symbolic positioning : Move HIGH-VALUES or -1 to the field length in the Symbolic map and code CURSOR on the SEND MAP.

3.7. Explain the different methods to set the Modified Data Tag ( MDT).MDT can be set to 1 byWhen the user enters data into the fieldWhen the application program moves the DFHBMSFSE to the attribute characterBy defining the FSET option while defining the field using BMS Macro

3.8. What are the BMS assembler macros?DFHMSD - mapset definition defining each map set.DFHMDI - defines individual maps within the mapset.DFHMDF - Defines each field within the individual map.

3.9. When a BMS map is assembled, How many types of BMS maps are created and what are they?Two types of maps are created. Physical map : member of CICS load library, contains constant default data, attribute bytes, starting positions,and length of each field.Symbolic map : Member of CICS copy library, contains field definitions, attribute bytes etc., to be accessed by the application.

3.10. What does the POS=(x,y) parameter of the DFHMDF macro do?It gives the row and column position of the attribute character of the field.

3.11. How do you allow data input in a filedby making the field unprotected.

3.12. When a terminal user modifies data in a field on the screen what enables that data to be transmitted?When a terminal operator enters / modifies the any data in a field on the screen the MDT attribute bit is set for that field.

Page 23: CICS question Bank

3.13. If you define a map with CNTRL=FRSET parameter specified ( on the DFHMSD or DFHMDI macros ) what happens to existing MDT that were previously set on screen fora) SEND MAP with DATAONLY

Retains MDT status from prior screen ( except if the attribute byte is explicitly changed by the application)

b) SEND MAP with MAPONLYAll MDT bits set/reset to off

c) SEND MAP both MAP & DATA ( DEFAULT)All MDT bits reset to off

3.14. What does ATTRB=FSET on the DFHMDF macro do?It initializes the MDT bit for that field to ON ( data is transmitted unless turned OFF by program

3.15. When you receive a map into your application program, how can you determine if has/has not been entered into a specific field?If no data has been entered, then the length will be zero and the input field contains LOW-VALUES.

3.16. If you issue a SEND MAP command, what happens to the output fields that contain LOW-VALUES?They do not get transmitted to the screen.

3.17. When you receive a map, how can you tell the cursor position?The EIB field EIBCPOSN contains the offset position of the cursor on the screen

3.18. What CICS facilities can you use to save data between transactions?COMMONAREA, TEMPORARY STORAGE and TRANSIENT DATA queues

3.19. What is wrong with the following commands. 3.20. EXEC CICS SEND MAP (‘XXXX’) MAPSET (‘YYYY’)

FROM(SYM-MAP)MAPONLYEND-EXECWhere SYM-MAP is symbolic map

MAPONLY cannot be used with SYMBOLIC MAP

3.21. EXEC CICS RECEIVE MAP(‘XXXX’) MAPSET(‘YYYY’)FROM(SYM-MAP)END-EXEC.

FROM(SYM-MAP) is invalid with RECEIVE MAP command.

Page 24: CICS question Bank

3.22. Assume that you have a VSAM KSDS file containing a 6 character key, the high order 2 characters beginning with ‘AA’, ‘BB’, …’ZZ’. Give the command(s) to retrieve the records whose partial key is ‘RR’.

MOVE ‘RR’ TO KEY-FIELD.MOVE 2 TO KEY-LEN.EXEC CICS READ FILE(KSDS1) RIDFLD(KEY-FIELD) KEYLENGTH(KEY-LEN) GENERIC EQUALEND-EXEC.

3.23. Write a CICS code to implement browse operation to read from the file ‘EMPFILE’ according to the key ‘EMP-NUMBER’ reading forward putting the data into EMP-RECORD.

The code should consists of STARTBR,READNEXT & ENDBR commands.

3.24. How would you READ a record with only partial key?By using the GENERIC option along with the READ command.

3.25. What is the major difference between a READ and a STARTBR commands?READ actually reads a record into the storage buffer. STARTBR sets a pointer to a starting location but does not actually reads a record.

3.26. How does a STARTBR command know which record to set the pointer to?The pointer position is identified by the RIDFLD parameter.

3.27. After a STARTBR and a READNEXTwhat does a READPREV do?It will retrieve the same record as the READ NEXT . The directoin of the browse will be changed so that any additional READPREV commands will retrieve prior records.

3.28. How would you start a browse operation at the first record?Move LOW-VALUES to the RIDFLD parameter before issuing the STARTBR command.

3.29. What will happen if you issue a STARTBR command with an EQUAL parameter and the record is not there?A NOTFND condition is raised.

3.30. Can you update a record that you retrieved using STARTBR and READNEXT commands?No, STARTBR and READ NEXT are used only for browsing.

3.31. What happens when you issue a READNEXT command and there are no records on the file?An ENDFILE condition is raised

3.32. What happens when you issue a READPREV command and you are beyond the beginning of the file?An ENDFILE condition is raised.

3.33. How would you reposition your browse starting position to a new location on the file?By either of these methods.RESETBR command to a new locationENDBR command followed by STARTBR for new location

Page 25: CICS question Bank

3.34. If you have a file with a 2 character key ‘AA’,’BB’,…..,’ZZ’ and you do a STARTBR on key ‘GG’ and then 3 READNEXTs and then 1 READPREV, which record would you have in your buffer?You would have ‘II’ in your buffer.

3.35. How do allocated resources get released when browsing?By either of these methodsENDBR commandEnd task - which releases all resources.

3.36. Specify the two ways of deleting a record ( VSAM/KSDS) Which would you use when?Issue a READ for UPDATE and then DELETE. This allows you to verify the record that you want to delete.Issue a direct DELETE ( without a READ for UPDATE) specifying the RIDFLD.

3.37. If an application has a VSAM/KSDS file READ command with update option and it finds that the update is no longer required, how does the application release the exclusive control of the record read? By using the UNLOCK command with file or dataset option By using a SYNCPOINT command.

3.38. While doing a mass delete using a generic key, how can you determine the no. of records deleted? Indicate the usage with the help of an exampleBy using the NUMREC option with GENERIC key.

3.39. What is the purpose of the UNLOCK command? Used to release the exclusive control of a resource.

3.40. Why must you be careful when you issue a READ command with UPDATE option?Because exclusive control is kept over the record for the entire duration of task.

3.41. How would you release control of the record in a READ for UPDATE?By issuing a REWRITE,DELETE, or UNLOCK command or by ending the task.

3.42. When you issue a WRITE command and a record with the same key already exists, What happens?A DUPREC condition is raised.

3.43. Can you WRITE,DELETE and REWRITE without a prior READ for UPDATE command?You can WRITE and DELETE a record without a prior READ for UPDATE command, but must issue a READ with UPDATE command before you can REWRITE.

3.44. If you want to delete all records with a partial key what should you do?Issue a direct DELETE with GENERIC and KEYLENGTH parameters.

3.45. What is the difference between a WRITE and REWRITE command? The WRITE command writes a new record that doesnot exists. The REWRITE command updates a record already existing on the file and READ for UPDATE must be issued prior to this REWRITE.

Page 26: CICS question Bank

3.46. From your program you wish to transfer control to a program named THISPROG at the next logical level. You wish to pass the field named STUFF to THISPROG. Write a CICS command to accomplish the above task.

Code should contain LINK command.

3.47. What is the function of the Base Locator for Linkage ( BLL)?The BLL is used to address the storage outside the working storage section of the application program. Used in OS/COBOL.

3.48. Why SET option is more efficient than INTO optionSET option returns the address of the TIOA to application program while INTO option moves the information in the TIOA into the specified area.

3.49. What is the difference between a LINK and XCTL?LINK passes control to a program at the next lower logical level. The calling program remains in storage and expects control to be returned to it.XCTL passes control to a program at the same logical level. The calling program does not expect the control to be returned to it.

3.50. What does the RETURN statement do?Returns control to the next higher logical level. If there is no higher logical level control is passed to CICS.

3.51. If you have a program A that LINKs to Program B, Program B issues a XCTL to program C, and Program C issues a RETURN, What is the status of programs A,B and C and what does the RETURN do?Program A remains in storage expecting a returnProgram B does not remain in storage, does not expect a returnProgram C remains in storage, returns to A

3.52. Can you issue a CALL statement in CICS? If so, can you pass data to the called program? How are the caller and the called programs related? Yes, In CICS, you can issue a CALL to another program and pass data with the USING option. Both the called program and calling programs will be linked together in the same load module. In OS/COBOL the called program cannot contain CICS commands. In VS-COBOL, the called program can contain CICS commands.

3.53. Why is the LOAD command used for and how do you set up addressability to it?The LOAD command is used to load a separately assembled program or dynamically into storage. It is referenced thru the linkage section definitions.

3.54. What is the difference between an ASSIGN and ADDRESS command?ASSIGN command is used to access the system value outside of the application programADDRESS command is used to access the information in the system areas.

3.55. When will you use a SERVICE RELOAD statement in OS/COBOL application programThis statement must be used whenver the content of BLL cell is changed.

3.56. How will you access information in CICS system areas in your application program?The ADDRESS command is used to access the information in the CICS system areas.

Page 27: CICS question Bank

3.57. Write a CICS command to obtain the user log-on id?EXEC CICS ASSIGN USERID(user-id) END-EXEC.

3.58. Which CICS system program is responsible for handling the automatic task initiation (ATI)?DCP ( Destination Control Program )

3.59. What will happen if a task issues an EXEC CICS DELETEQ TD against an extrapartition TDQ?An INVREQ condition will occur. The default action is to terminate the task.

3.60. What is stored in the temporary storage table (TST)?The ids of the recoverable TSQs are stored in TST.

3.61. What will happen, If you read a TSQ sequentially and you reach the end of file?An ITEMERR condition is raised

3.62. What are the different types of READs which can be issued for a TSQ?Direct Read using READQ with the ITEM parameter; sequential read using READQ with the NEXT parameter.

3.63. How do you delete a TSQBy issuing a DELETEQ command

3.64. What CICS facility has a trigger level and what does it do?TDQs has a trigger level. It will initiate a transaction when the number of records on the queue reaches the trigger level.

3.65. What are the two types of TDQs and how are they define? What is the difference between the two?Intrapartition TDQs - located within the CICS regionExtrapartition TDQs - located outside the CICS region. Both are defined in the DCT.

3.66. If you have an MVS batch job that creates a sequential file that you need to process via a CICS transactions, how would you accomplish this?Define an input Extrapartition TDQ and issue a READQ TD from the CICS transaction

3.67. If you read an intrapartition TDQ record, can the same record be reread?No, once a record is read it is unavailable

3.68. What are the two types of TDQsIntrapartition TDQsExtrapartition TDQs

3.69. What is the difference between the intrapartition TDQ and extrapartition TDQ?Intrapartition TDQ is read or wrote by the programs in the same CICS system while Extrapartition TDQ is used by the applications outside of the CICS system.

3.70. Specify the resources that a CICS region using Function shipping can accessVSAM files, DL/I databases,TDQs and TSQs

3.71. Explain in brief the MRO( Multi Region Operation ) and ISC ( Inter System Communication)

Page 28: CICS question Bank

MRO - provides intercommunication between different CICS systems running under the same processorISC - provides intercommunication between different CICS systems running under different processors.

3.72. Explain Function request shippingIt allows an application program in a local CICS system to access resources owned by a remote CICS subsystem.

3.73. What is Transaction routingAllows the terminal connected to a local system to run remote transactions which are owned by remote CICS system .

3.74. What is a relay programA relay program is a CICS supplied program for administrating Transaction Routing and resides in the local system.

3.75. Explain the Distributed transaction routing.The DTP allows a CICS application program in one CICS system to perform asynchronous communication with another program in another system