0% found this document useful (0 votes)
120 views

What Information Do You Get When An EXEC CICS STARTCODE Is Issued? Answers

The document discusses several CICS concepts: 1) An EXEC CICS STARTCODE can indicate if an application was started by a trigger level, START command, user input, or distributed program link. 2) An ASRA ABEND occurs during program interruption, such as moving non-numeric data to a numeric field. 3) TDQ is read destructive while TSQ is not, and TSQ can be created dynamically unlike TDQ. 4) A CICS transaction can be initiated in several ways, including keying in the transaction ID, using EXEC CICS START, automatic task initiation, returning a transaction ID, associating an attention key, or using the program list table

Uploaded by

Shahnawaz Mohsin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views

What Information Do You Get When An EXEC CICS STARTCODE Is Issued? Answers

The document discusses several CICS concepts: 1) An EXEC CICS STARTCODE can indicate if an application was started by a trigger level, START command, user input, or distributed program link. 2) An ASRA ABEND occurs during program interruption, such as moving non-numeric data to a numeric field. 3) TDQ is read destructive while TSQ is not, and TSQ can be created dynamically unlike TDQ. 4) A CICS transaction can be initiated in several ways, including keying in the transaction ID, using EXEC CICS START, automatic task initiation, returning a transaction ID, associating an attention key, or using the program list table

Uploaded by

Shahnawaz Mohsin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

What information do you get when an EXEC CICS STARTCODE is issued?

Answers:

You will be able to determine if the application was started by (1) a transient data trigger level(QD), (2) a START command (S,SD), (3) user (U) or terminal input (TD), or (4) Distributed Program Link(D,DS).
What is ASRA ABEND in CICS? Answers:

It occurs when program interuption takes place.e.g.: when alphanumeric string moved to numeric data item OR when arithmetic calculations performed on nonnumeric data item OR when an attempt made to read an occurance of a table beyond the defined occurrences.

It is like soc7 abend in cobol.when the program interuption occurs it shows ASRA i.e moving non-numeric data item to numeric data item.
Difference between TSQ & TDQ? Answers:

TDQ is read destructive, TSQ is not. TSQ can be created dynamically, TDQ cannot be created dynamically. TSQ is temporary in nature (i:e it will be deleted when the program finishes execution, unless it is made permanent by making a entry in the Temporary Storage Table), TDQ is not.

These are the few difference point between TSQ & TDQ:TSQ-here item are enterd in entry order with item number createed relative item. TDQ-Items are entered in entry sequential order without item number. TSQ-Allow sequential & random Access. TDQ-Allow only sequential Access. TSQ-QID must be entered in TST table.(Temp. storage table) TDQ-QID must be entered in DCT(Destination control table). TSQ-No ATI(Automatic Task initiation) Possible. TDQ-ATI(Automatic Task initiation) Possible.

How many ways can we initiate a CICS Transaction? What are they? Answers:

A. Keying in the Transaction-id at the terminal B. By coding an EXEC CICS START in the application program

C. By coding the transaction id and trigger level in the DCT (Automatic Task Initiation) D. By coding the transaction id in the EXEC CICS return command E. By associating the attention key with the PCT F. By embedding the transaction id in the first four positions of a screen sent to the terminal G. By using the Program List Table.
what are the differences between DFHCOMMAREA and TSQ ?

Both are used to save data among tasks. But commarea is private to that transaction only, like every transaction has its own commarea created by cics as soon as the transaction is initiated . However TSQ , if QID is known, can be accessed by other transactions also. commarea length is s9(4) comp ie 65k . but TSQ can have any length. commarea is available only during the transaction is running. TSQ, if created with auxiliary option resides in aux memory and available even if main memory crashes. Normally commarea is used to tranfer data from one task to another while TSQ is used widely within the task as a scratch pad.
What is the difference between the LINK, XCTL & CALL statements? Answers:

XCTL passes control to another program, both programs are on the same logical level. When passed program execution ends, control is NOT passed back to main program. LINK passes control to another program, but when passed program ends, control will be passed back to main program. Main program will be on higher logical level compare to passed program

XCTL passes control to another program at same level and does not expect control back to main program. LINK passes control to another program on lower level and expect when program ends, control will be passed back to main program. In both of above case a single copy of called program can be accessed by any no of calling program. CALL send control to another program with parameter (if need to send some to called program). it is an efficient method as both calling and called program can be link edit in same module but in this case each calling program might have a separate copy of called program (STATIC CASE) and thus not memory efficient.
What is the difference between the enter key, the PF keys and the PA keys ? Answers:

The enter and PF keys transmit data from the screen; the PA keys tell CICS that a terminal action took place, but data is not transmitted.
What is the difference between the MRO & ISC?

Answers:

MRO: Multi-Region Operation. MRO is the mechanism by which different CICS address spaces with in the same CPU can communicate and share resources. MRO is communication between a CICS system and other CICS system in the same processor. ISC: Intersystem communication. ISC is the Communication between a CICS system and other non-CICS system or between a CICS system and other CICS system in the other processor.
The error code AEIV?

This is the error code for length, if length of the source data is more than the receiving field, This error will occur. This is the error code for length.If the length of source data is more than the receive data.This is called LUNGERROR

What does the CEDF,CEMT,CEBR,CECI transactions do?

Answers:

CEDF : CICS-supplied Execution Diagnostic Facility transaction. It provides interactive program execution and debugging functions of a CICS programs. CEMT : CICS-supplied Extended Master Terminal transaction. It displays or manipulates CICS control environment interactively. CEBR : CICS-supplied Temporary Storage Browse transaction. It displays the content of Temporary Storage Queue ( TSQ ). CECI : CICS-supplied Command Interpreter transaction. It verifies the syntax of a CICS command and executes the command.
How would you resolve an ASRA abend? Answers:

In COBOL II start with CEBR, and get the offset/instruction

How would you resolve an ASRA abend? a)In COBOL II start with CEBR, and get the offset/instruction

What is the difference between the Ignore Condition and the Nohandle condition? Answers:

IGNORE command causes no action to be taken if the condition specified (ex:

LENGERR) occurs in the program. Control will be returned to the next instruction following the command which encountered the exceptional condition. NOHANDLE option will cause no action to be taken for any exceptional condition occurring during execution of this command. This is useful to prevent loop on the exception condition. Control will be returned to the next stmt after this command. Request by the IGNORE CONDITON command is valid until the subsequent HANDLE CONDTION command for the same condition
What is an AEY9 abend ?

DB2/IDMS not up
How a CICS Transaction be initiated? Answers:

Involving CICS Control programs and Control tables. a. Trans-id entered in terminal b. TCP with TCT recognizes incoming data c. SCP acquires the storage for the Terminal Input-Output Area (TIOA) d. KCP prepares control data for this task e.KCP, through PCT, tries to find the application program associated with the Trans-id. f. If PPT entry of the application program does not show the resident address of the program, KCP passes control to PCP, which fetches the application program from the load library and places it into the main storage. g. KCP passes control to the application program. h. Application program starts its processing
LENGERR, NOTAUTH and PGMIDERR are some of the common exception conditions that can occur with LINK and XCTL (True or False). ? Answers:

False
What is ENQ in CICS?

If any one want to restrict Trans-Id to single user, enter trans-id with ENQ. It won't allow any one else to use the same trans-id.
Specify the requirements for Automatic Task Initiation. (Mention the control table, it?s entries and the corresponding Procedure division CICS command).? Answers:

DFHDCT TYPE=INTRA, DESTID=MSGS,TRANSID=MSW1, TRIGLEV=1000 EXEC CICS WRITEQ TD QUEUE(?MSGS?), FROM(DATA-AREA), LENGTH(MSG_LEN) END-EXEC.
What are the six different types of argument values in COBOL that can be placed in various options of a CICS command? Answers:

Data Value ? EX (Literal 8 or 77 KEYLEN PIC S9(4) COMP VALUE 8.) Data Area ? EX (01 RECORD-AREA. 05 FIELD1 PIC X(5). ) Pointer-Ref ? EX (05 POINTER-I PIC S9(8)

COMP. ) Name ? EX (05 FILE-NAME PIC X(5) VALUE ?FILEA?. ) Label ? Cobol paragraph name HHMMSS ? EX (77 TIMEVAL PIC S9(7) COMP3. )
What CICS command are used to read a VSAM KSDS sequentially in ascending order? Answers:

First issue a STARTBR(start browse), which will position the browse at the desired record. Retrieve records by using subsequent READNEXT commands. Indicate the end of sequential processing with the ENDBR command. If the generic key is specified in the STARTBR command positioning in the file will be before the first record satisfying the generic key. For reading in descending order use the READPREV instead of READNEXT.
How many exceptional condition can be given in a HANDLE CONDITION?

Max. of 12 exceptional conditions can be given in a single HANDLE CONDITION.


How do you execute a background CICS txn ?

With a START or ATI.


What is Pseudo-conversation?How it is achieved in CICS Programs? Answers:

The programming methodology in which the task will not wait for the terminal users response, but frees and resources after sending the message is call a PSEDUDO Conversational Technique. Terminating the task every time the application needs a response from the user and then starting the next transaction when the user presses a attention key is PSEUDO Conversational Processing.

When ever user interact with system, the system dump the screen to terminal and deactivated whenever user responce the system automatically inciate the program or connect and disconnect of interaction
What is the difference between CICS Program Control Table (PCT) and CICS Processing Program Table (PPT) ? Answers:

PCT contains a list of valid transaction ID. Each transaction ID is paired with the name of the program ,CICS will load and execute when the transaction is invoked. On the other hand, PPT indicates each program's location which pertains to a storage address if the program has already been loaded or a disk location if the program hasn't been loaded. PPT will also be used to determine whether it will load a new copy of the program when the transaction is invoked.

How to establish dynamic cursor position on a map? Answers:

We dynamically position a cursor through an application program using a symbolic name of the symbolic map by placing -1 into the field length field ( i.e., fieldname + L) of the field where you wish to place the cursor. The SEND MAP command to be issued must have the CURSOR option ( without value ). Also, the mapset must be coded with MODE = INOUT in the DFHMSD macro. We get the cursor position when we receive a map by checking EIBCPOSN, which is a halfword ( S9(4) COMP) binary field in EIB, and contains offset position (relatively to zero ) of the cursor on the screen.
What is the meaning and use of the EIBAID field ?

EIBAID is a key field in the execute interface block; it indicates which attention key the user pressed to initiate the task.
How do you make your BMS maps case sensitive?

Use ASIS.
WHAT IS DFHEIBLK?

DFHEIBLK is Execute Interface Block. It is placed in the linkage section automatically by CICS translator program. It must be the first entry in linkage section. CICS places values prior to giving control to the program and we can find almost any information about our transaction.
What is a mapset?

A mapset is a collection of BMS maps link-edited together.


I have done a START BROWSE on a VSAM Data Set Can I do another START BROWSE without doing an END BROWSE?

NO

If you want to reposition to next level, you can isue a RESETBR command
What is the meaning of the SYNCPOINT command ?

SYNCPOINT without the ROLLBACK option makes all updates to protected resources permanent, with the ROLLBACK option it reverses all updates.

Name three ways the Modified Data Tag can be set on?

Answers:

The Modified Data Tag can be set on: 1. When the user enters data into the field. 2. When the application program moves DFHBMFSE to the attribute character. 3. By defining it in the BMS macro definition.

What is the CICS command that gives the length of TWA area?

EXEC CICS ASSIGN TWALENG(data-value) END-EXEC.


What is the usage of language in the PPT entry? Answers:

Language interface and call parameters???


What is the meaning of BMS length of field = 0?

Data was not entered in the field

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy