Sei sulla pagina 1di 10

CICS Related Questions

Code Q (Ques)
( A: A (Ans)
Mostly
Likely
B:
Moderate
C: Least
Likely)
A Q1 Where are the file FD’s coded in a CICS program ?
A1 FD’s are not necessary nor are they permitted in a CICS program. The
equivalent of the FD’s are coded in the FCT (File Control Table).
A Q2 What is the difference between ‘XCTL’ and ‘LINK’ ?
A2 A XCTL does not provide for a return to the calling program.
The control transfer is done on the same logical program level.
At transfer, the calling program is released. A LINK provides for a
return to the calling program. The transfer involves a pass to the next
lower
logical level and the calling program is retained.
A Q3 What area is the buffer for all terminal I/O within a CICS
environment ?
A3 The TIOA (Terminal Input Output Area).
A Q4 What is an ASRA ?
A4 An error code denoting a data exception (S0C7), which will cause the
transaction (task) to Abend.
A Q5 Which is better, a conversational or pseudo-conversational
transaction and
why ?
A5 Pseudo-conversational is better because it doesn’t tie-up CICS
resources
while waiting for an operator response.
A Q6 Can more than one task be active within CICS at any given time ?
A6 Yes. The maximum number of tasks as defined by the user, is the
number of active tasks. Only one task can be executing at one time.
A Q7 What two statements are considered ‘native mode’ CICS terminal
I/O
commands ?
A7 RECEIVE and SEND.
A Q8 When you enter a transaction ID on the terminal to begin a
transaction, how does CICS know what program to execute ?
A8 CICS determines which program to execute by first locating the
transaction ID in the PCT (Program Control Table) which points to the
correct program to be executed. Before execution though, the PPT

1
(Program Processing Table) is checked to determine the program
availability.
A Q9 Which access method is ‘native’ to CICS ?
A9 VSAM
A Q10 When a transaction or program is invoked , what does CICS do to
execute the
Program ?
A10 The terminal management reads the terminal, invokes task
management
Passing the information in the TIOA (Terminal Input/Output Area).
Task
Management searches the PCT and PPT to verify the transaction ID
that is in
The TIOA. Task management then asks program management to load
the
Program then task management schedules the program for execution.
A Q11 What is transient data ?
A11 Transient data is data used by other tasks.
A Q12 Is the DFHCOMMAREA required in a CICS program?
A12 No. It is optional.
A Q13 What is multitasking in CICS ?
A13 Multitasking is when more than one task is active within the same
CICS region at the same time.
A Q14 What is Multithreading ?
A14 Multithreading is when more than one active task is using the same
program
within the same CICS region running under the multitasking feature.
A Q15 What type of storage would be used for I/O work areas to insure
that application programs are quasi-reentrant ?
A15 Dynamic.
A Q16 What is the PCT (Program Control Table) used for ?
A16 The PCT (Program Control Table) contains; all transaction names and
their corresponding initial program names, the status of the transaction
and the transaction use count.
A Q17 What is the PPT (Program Processing Table) used for ?
A17 The PPT (Program Processing Table) contains all the module and map
names defined to the specific CICS region and also general
information (i.e. enabled, disabled, use count, etc.)
A Q18 True or False.( An application cannot have more than one
CICS/VS return
command in it.)
A18 False.
A Q19 What is the name of the communication area available for use in
the CICS program that ties CICS and the task (program)
together ?
A19 The EIB (Executive Interface Block).

2
A Q20 What commands can be used to control the processing in the event
of an exception condition ?
A20 HANDLE CONDITION - To direct processing., IGNORE
CONDITION - To bypass the error.
A Q21 What does EIBAID indicate ?
A21 The AID (Attention Identifier) indicates which key was used to initiate
the transmission and thereby the task. The keys could be any of the
following ; ENTER, CLEAR, PA1, PA2, or one of the PF keys.
A Q22 Name six types of information provided by the EIB (Executive
Interface
Block).
A22 1.Date 2. Time 3. Transaction ID 4. Return Code 5. The last
function performed 6. Terminal ID
A Q23 What CICS Command Level functions permit the passing of data
using the Commarea (Communications Area) ?
A23 XCTL, LINK, RETURN and TRANSID.
A Q24 What file control command must precede a REWRITE ?
A24 A READ with the UPDATE option.
A Q25 What function and valid option is used to override a default cursor
location ?
A25 The CURSOR option is specified in the SEND command.
A Q26 What does an EIBCALEN equal to zero usually mean ?
A26 It usually means that it’s the first entry into the program, because no
preceding task created a COMMAREA and passed it on.
A Q27 What is a Syncpoint and when and how are they taken and used ?
A27 When CICS command XCTL is issued, a syncpoint is taken. When
CICS
command LINK is issued a syncpoint is not taken unless specifically
programmed. A syncpoint commits data and releases resources.
A Q28 What are the general functions of PCP?
A28 1.To locate the application Program for a given task and transfer
control to it.
2.To return control to CICS/VS when the application program finishes
executing.
3.To maintain a use counter associated with each application program
in storage.
A Q29 Distinguish between a conversational and a pseudo-conversational
transaction.
A29 In a conversational transaction, the task may be in a wait state for
relatively long periods of time waiting for the operator. Thus the
storage required for the application program and other storage areas
required by the task remain in use for the entire “conversation”.
A pseudo-conversational transaction does not tie up storage during the
time needed for operator decision-making. This is because the psudo-
conversational transaction is divided into two or more tasks where each
task handles one operator request at a time.

3
A Q30 Distinguish between Extrapartition destinations and Intrapartition
destinations.
A30 Extrapartition destinations are transient data queues that can be created
by a CICS/VS task and processed outside the CICS/VS partition/region
and vice versa. Intrapartition destinations are transient data queues
that are created and processed only within the CICS/VS partition.
A Q31 How many times may data in a queue be read?
A31 As often as needed until the data is purged by the application program
that issues a DLETEQ command for a given data ID.
A Q32 To browse a file at one place and then move to another portion of
the file and browse again, what command(s) must be coded?
A32 1) A current browse could b stopped and a second started by the
sequence ENDBR/STARTBR and READNEXT, etc.
2) Use the RESETBR command after setting RIDFLD parameter
specified in the first STARTBR command to the key of the new
location where browse is to resume.
A Q33 To directly retrieve records from a message set(queue), what
option must be specified in the READQ command?
A33 The ITEM option must be specified with a parameter indicating the
record number to be read.
A Q34 Under what conditions is the DUPKEY condition raised?
A34 When processing VSAM alternate index files in which the alternate
index may contain duplicate keys(which, from an application point of
view may not be an error but rather what is expected.)

B Q1 What program control statement will not cause return to calling


program
from a called program ?
A1 XCTL - This causes transfer of control.
B Q2 Because of ‘wrap around’ , where is the oldest entry shown in a
trace table ?
A2 Directly below the current entry.
B Q3 In a pseudo-conversational design, is a record under exclusive
control of the operator during processing?
A3 No. The record is read for update only after the operator has entered
changes.
B Q4 What is Temporary Storage and how is it managed ?
A4 Temporary Storage is a sequential data set containing variable-length
records and is managed entirely by the CICS TSP (CICS Temporary
Storage Program)
B Q5 Where is the file DCB information stored in CICS ?
A5 the FCT (File Control Table) holds all file DCB information.
B Q6 What is the SNT (Sign-on Table) used for ?

4
A6 The SNT (Sign-on Table) provides all the user sign-on data including
passwords.
B Q7 What function is automatically performed at the end of each task ?
A7 Sync Point.
B Q8 What is EDF and what is it used for ?
A8 EDF (Execution Diagnostic Facility) - it is used in CICS for testing
and
debugging CICS on-line programs.
B Q9 Which HANDLE AID subcommand will cover the use of any of the
Attention Identifier keys ?
A9 ANYKEY.
B Q10 What does the ASSIGN function do ?
A10 The ASSIGN function of CICS is used to extract data from outside the
local program environment, but within a specified group of CICS
fields.
B Q11 What is the function of the CICS Command Level Translator ?
A11 The CICS Command Level Translator converts the CICS Command
Level instructions into ones that can be interpreted by the compiler in
use.
B Q12 Name one CICS command function in which the TRANSID option
can be found.
A12 The RETURN command.
B Q13 Is GENERIC a valid option with the file control READ
command ?
A13 Yes.
B Q14 What are the two storage control commands ?
A14 GETMAIN and FREEMAIN.
B Q15 What CICS transaction allows you to check the syntax of a CICS
command but does not allow you to execute a command ?
A15 CECS transaction.
B Q16 What CICS transaction enables you to browse, copy or delete
temporary storage queues ?
A16 CEBR transaction.
B Q17 Explain a SEND MAP command in CICS.
A17 SEND MAP moves data to the buffer (hold area) under CICS control.
B Q18 Explain a RECEIVE MAP command in CICS.
A18 RECEIVE MAP instructs CICS to move data from the buffer (hold
area) to the application program’s working storage.
B Q19 How does CICS establish communication with an IMS database ?
A19 A PSB is scheduled.
B Q20 When are files opened?
A20 When CICS/VS is initialized.
B Q21 Under what conditions should the UNLOCK command be
specified?
A21 The UNLOCK command should be executed to release exclusive

5
control of a record after a READ for update in which the application
program determines that a REWRITE or DELETE is not needed. It
may also be executed to terminate the MASSINSERT function.
B Q22 Explain MASSINSERT; in what access methods may it be
specified?
A22 MASSINSERT provides for the addition of a group of new records
whose keys are in ascending sequence to a file. It applies to VSAM
files only.
B Q23 When does QIDERR exception condition occurs?
A23 QIDERR occurs if a destination ID referenced in a transient data
command is not in the DCT(Destination Control Table).
B Q24 How can a transaction be started automatically?
A24 When an Intrapartition destination reaches the number of records
specified in the trigger level, a transaction is automatically started.
B Q25 What is Journaling?
A25 Journaling is the process of creating sequential data sets(called
Journals) that could later be used to reconstruct recorded data in the
event of an abend or other error.
B Q26 What is the primary use of the TWA?
A26 To pass data between Macro level Programs and Command Level
Programs.
B Q27 What are the three basic steps and CICS/VS command function
keywords in a browse?
A27 1. Establish position (STARTBR)
2. Retrieve records sequentially (READNEXT or READPREV)
3. Terminate Browse (ENDBR)
B Q28 When must the REQID option be specified and what is it for?
A28 The REQID option must be specified when multiple Browses are
performed against the same file. It is used to control multiple browse
operations.

C Q1 True or false. CICS transaction codes are usually three


characters in length.
A1 False. CICS transaction codes are usually four (4) characters in length.
C Q2 What defines and controls the CICS environment ?
A2 Tables.
C Q3 What two words always proceed a CICS procedural command ?
A3 EXEC CICS or EXECUTE CICS.
C Q4 What storage area can only be used between Command Level
CICS programs to pass data ?
A4 The COMMAREA (Communication Area).
C Q5 Does pseudo-conversational use the CONVERSE function ?
A5 No. Conversational does.
C Q6 What does the field EIBFN contain ?
A6 The last CICS function requested.

6
C Q7 What function can be used to obtain the input terminal
information ?
A7 The RECEIVE function.
C Q8 What CICS transaction allows you to display a BMS map ?
A8 CECI SEND MAP(‘mapname’) MAPSET(‘mapset name’).
C Q9 What CICS transaction allows you to bring in a new version of a
CICS program or BMS map ?
A9 CEMT SET PROGRAM(program name) NEWCOPY
C Q10 What EIB field is used to check the length of the COMMAREA ?
A10 The EIBCALEN field.
C Q11 What is Logging?
A11 Logging is the process of recording information that could later be
used to backout a protected resource should a task or CICS/VS itself
abend.
C Q12 What is a BLL cell?
A12 BLL cells(Base Linkage Locator cells) are used to address the areas
outside the programs.
C Q13 Where in the COBOL program is the BLL cell list defined?
A13 In the LINKAGE SECTION.
C Q14 When is the input area’s address loaded into either the BLL cell,
pointer or register?
A14 When the EXEC CICS…..SET(pointer-reference) command is used.
C Q15 What determines the length of the message sent to a terminal-the
LENGTH specification in the SEND command or the actual length
fo the data-area named in the FROM option?
A15 The LENGTH specification in the SEND command.
C Q16 How does the application program indicate whether the record is
to be sotred in a main storage or disk storage?
A16 By specifying the option MAIN, the record is placed in main storage;
otherwise the record is written to auxiliary storage by default.
C Q17 At what point in time is the user transaction intercepted by the
CEDF transaction?
A17 At each EXEC CICS command or only at specified type of commands
and/or conditions.
C Q18 What is the attribute of the identifier that will be used to establish
addressability?
A18 Pointer Attribute.

CICS/BMS Related Questions

7
Code Q
( A: Mostly (Question)
Likely A
B: Moderate (Answer)
C: Least
Likely)
A Q1 What CICS commands are used by BMS ?
A1 RECEIVE MAP, SEND MAP, SEND TEXT, SEND
PURGE, PURGE
MESSAGE, ROUTE
A Q2 What are the primary BMS services ?
A2 Mapping in and out (terminal read optional)
Page building , Text building
A Q3 What are the three Macro instructions used in defining
maps ?
A3 DFHMSD - Define map set
DFHMDI - Define map in the map set
DFHMDF - Define fields in a map
A Q4 How do you indicate cursor position on a screen display ?
A4 The initial cursor (IC) position is specified in the map.
A Q5 How many DFHMSD macro calls are made in each BMS
mapset ?
A5 Two - One at the very beginning and one at the very end to mark
the
boundaries of the mapset.
A Q6 What is the physical map ?
A6 The physical map contains the physical location “position =
row, column” of
all the fields, literals, headings and all physical characteristics of
the map.
A Q7 What is the symbolic map ?
A7 The symbolic map only contains the fields that a program can
reference.
A Q8 What happens to fields that have their MDT (Modified Data
Tag) set off at the time of execution ?
A8 The data is not transmitted.
A Q9 Does BMS use the physical or symbolic map?
A9 BMS, using the physical map, parses the data stream into a
standard format
known to the programmer for use in the program’s symbolic
description map.
A Q10 How can the initial cursor position be overridden by the
program ?
A10 By placing a -1 in the field’s length or passing the absolute
screen displacement (0 - 1919) to BMS.
A Q11 Does the SEND MAP DATAONLY command use the

8
Symbolic or Physical map?
A11 It uses the symbolic description map fields.
A Q12 A BMS data field is actually made up of three separate
fields. What are they?
A12 The data field itself, The attribute field, The length field

B Q1 What does BMS stand for ?


A1 Basic Mapping Support.
B Q2 BMS commands are coded in what programming language ?
A2 ASSEMBLER
B Q3 Physical maps are stored in what CICS/VS library ?
A3 The Load library.
B Q4 Symbolic maps are stored in what CICS/VS library ?
A4 The Source library.
B Q5 When is FSET used and what does it mean ?
A5 FSET is used with BMS to give a field defined on the screen ,
the
Characteristics of having been modified. It is synonymous with
MDT ON.
B Q6 What is the physical output of a BMS assembly ?
A6 The physical output is the CSECT or output text (object code) of
the
Assembly.
B Q7 What is the symbolic output of a BMS assembly ?
A7 The symbolic output is the DSECT or copy member of the
assembly.
B Q8 What can set the MDT (Modified Data Tag) of a field on ?
A8 The MDT is turned on when the user modifies the screen field
or the FSET
Attribute has been coded in the map.
B Q9 What is MDT?
A9 The MDT(modified data tag) is the last bit in the attribute byte
for each screen field. It indicates whether the corresponding
field has been changed.
B Q10 What are the advantages of BMS
A10 BMS makes the Application Program independent of Device
and Format for data.
B Q11 What is MAPFAIL condition?
A11 This condition occurs if no data is entered in a formatted screen
or if data entered in an unformatted screen is received with a
mapping command.

C Q1 Specifically, in what form of Assembler code are BMS maps


coded ?
A1 Macro instructions.

9
10

Potrebbero piacerti anche