|
Related Questions |
View Answer |
|
What are the various types of accesses that can be allowed by the SERVREQ option of the DFHFCT?
|
View Answer
|
|
For protecting a transaction using the transaction security function, the two things that must be done are?
|
View Answer
|
|
What is the error condition that is set when the file specified in the NAME option is not in the FCT?
|
View Answer
|
|
Before issuing an ASKTIME command what will be the values in the EIBDATE and EIBTIME fields if the EIB?
|
View Answer
|
|
For multithreading an application program need not be re-entrant(True or False).?
|
View Answer
|
|
If you use the OPTIMIZE compiler option the size of the program can be reduced by 5 to 10%(True or False).?
|
View Answer
|
|
How do you use extended attributes ?
|
View Answer
|
|
What is the attribute byte?
|
View Answer
|
|
What are the two outputs created as a result of generation of a map?
|
View Answer
|
|
How will you place cursor on a field called ‘EMPNO’. This field belongs to mapset ‘MAPEMPG’ and map ‘MAPEMPM’ and Symbolic map ‘Empid-Rec’ ?
|
View Answer
|
|
which CICS defined field can you determine the position of the cursor on the map ?
|
View Answer
|
|
How is the stopper byte different from an auto skip byte ?
|
View Answer
|
|
Can a program change protected field ?
|
View Answer
|
|
Can a program change protected field ?
|
View Answer
|
|
Can a program change protected field ?
|
View Answer
|
|
What is the difference between a Symbolic map and Physical map ?
|
View Answer
|
|
Why doesn’t CICS use the Cobol Open and Close statements ?
|
View Answer
|
|
How are programs reinitiated under CICS ?
|
View Answer
|
|
mapset consists of three maps and 10 fields on each map . How many of the following will be needed ?
|
View Answer
|
|
Why must all CICS programs have a Linkage Section ?
|
View Answer
|