cics questions
f) You can check check if the MDT MDT is is ON or OFF OFF by by a. Checking the Flag byte has a value of low-value b. No Checking technique technique is available g) AEY9 AEY9 ABEND ABEND code code means means? ? a. Read time-out encountered b. ABEND due to program interruption c. Resources security check files d. Unsupported command issued h) TSQs can can be written written in the main main storage storage or auxiliary auxiliary storage storage a. True b. False i) _______ _______ comman command d used for for termina terminatin ting g a browse browse operati operation on on a VSAM dataset. a. ENCBR b. ENDBR c. ENINR d. DUMP j) j)
ERAS ERASEA EAUP UP option option is used used for for a. Erase the screen before the map is send b. To erase all unprotected fields only c. To erase all the protected fields only d. None of the above
k) CICS commands commands are syntact syntacticall ically y checked checked by the the a. Precompiler b. Compiler c. Translator d. None of the above l) The comm commands ands used used to trans transfer fer progr program am cont control. rol. a. LINK b. XCTL c. RETURN
d. All of the above 8) The ________ command that will release a program loaded into the main storage using LOAD command. a. RELEASE b. LOAD c. DELETE d. ERASE 9) Following files can accessed from CICS a. VSAM , Physical Sequential b. VSAM , Physical Sequential, Partitioned Datasets c. VSAM, Partitioned Datasets d. VSAM, BDAM 10)_______ CICS command is used to access current date & time. a. ASKTIME b. CURRENTDATETIME c. ASKDATETIME d. ASKCURRENTTIME 11) _______ tells the application program if the last CICS command was executed successfully and if not why not. a. EIBRCODE b. EIBTRMID c. EIBTRNID d. EIBCALEN 12) To Skip a field in DFHMDF macro, the attribute is a. IC b. ASKIP c. PROT d. None of the above 13) What is the command to update existing records in TSQ? a. REWRITE b. WRITE
d. All of the above 8) The ________ command that will release a program loaded into the main storage using LOAD command. a. RELEASE b. LOAD c. DELETE d. ERASE 9) Following files can accessed from CICS a. VSAM , Physical Sequential b. VSAM , Physical Sequential, Partitioned Datasets c. VSAM, Partitioned Datasets d. VSAM, BDAM 10)_______ CICS command is used to access current date & time. a. ASKTIME b. CURRENTDATETIME c. ASKDATETIME d. ASKCURRENTTIME 11) _______ tells the application program if the last CICS command was executed successfully and if not why not. a. EIBRCODE b. EIBTRMID c. EIBTRNID d. EIBCALEN 12) To Skip a field in DFHMDF macro, the attribute is a. IC b. ASKIP c. PROT d. None of the above 13) What is the command to update existing records in TSQ? a. REWRITE b. WRITE
c. UPDATE d. None of the above 14) _________ command is used to send text to the screen without a MAP. a. b. c. d.
SEND MAP SEND TEXT SEND PAGE None of the above
15) __________ is used to transfer control to the paragraph when the exceptional condition occurs for which it is designed. a. Ignore Condition b. Handle Condition c. Error Condition d. None of the above 16) Communication area is used for a. Passing data between programs b. Passing data between tasks c. a & b d. None of the above 17) 17) When hen a trans ansaction is executed by 10 users there are _________ number of tasks running in the CICS region. a. 1 b. 10 c. 20 d. 100 18)__________is used to check if any data has been sent by the calling program. a. EIBCALEN b. DFHEIBLK c. EIBTRNID d. None of the above 19) EIB is required to a. check the SQLCODE generated
b. check the file status c. check the the response from cics d. all the above
20) The ________ map is the actual copybook member used in the program to reference the input and output fields on the screen. a. b. c. d.
Physical Symbolic Dynamic None of the above
m) a n) d o) a p) b q) b r) c s) d t) a u) d v) a w) a x) b y) a z) b aa)b bb)b cc)a dd)a ee)– ff) b
1) What is true about the XCTL command a. XCTL transfers control to a program at the same same level b. With XCTL XCTL command data cannot be passed
c. XCTLed program on issuing a RETURN will always pass control back to CICS d. Both a and c 2) RCT entry is required for naming the following resources a. Transaction-id and Program name d. Transaction-id and Package name c. Package name and PLAN name d. Transaction-id and PLAN name 3) The ________ recognizes EXEC CICS statements. a. Compiler b. Translator c. Precompiler d. None of the above 4) A _________ is a CICS option used for passing and receiving data between CICS programs. a. LINK b. XCTL c. RETURN d. COMMAREA 5) How can programs be started within CICS? a. START Command b. RETURN Command c. a & b d. None of the above 6) What are the outputs created as a result of generation of a map? a. Copybook b. Load Module c. a & b d. None of the above 7) IF you are reading a file, with GENERIC option what is also mandatory a. RBA b. GTEQ/EQUAL
c. KEYLENGTH d. all the above 8) To change a particular value in an already existing record of a VSAM KSDS file the record must be first locked exclusively with what command a. Read with Lock option b. Read with Rewrite option c. Read with Update option d. None of the above 9) Changes made to the VSAM file are saved at the execution of which command . a. SYNCPOINT b. RETURN c. RETURN with TRANSID(‘trans-id’) option d. All the above 10) The a. b. c. d.
________ command is used to remove a lock on a resource. RETURN SEND ENQ None of the above
11) _______ declares the needed constants, which can be used to alter field attributes. a. COPY DFHBMSCA b. COPY DFHAID c. COPY ATTRIBUTE d. COPY ‘mapsetname’ 12) The a. b. c. d.
________ contains the transient data queue definitions. Terminal Control Table Destination Control Table Temporary Storage Table System Initilization Table
13) The length of the working-storage field used with RESP option of a command is a. PIC S9(4) COMP
b. PIC S9(8) COMP-3 c. PIC S9(8) COMP d. None of the above 14) The _________ declares Attention Identifier constants for determining which key was pressed by the operator. a. COPY DFHEIB b. COPY DFHBMSCA c. COPY DFHAID d. None of the above
15) The program a. b. c. d.
following commands are not required in a CICS-COBOL OPEN, CLOSE MOVE DISPLAY a&c
16) To read the last record of a KSDS file (without knowing the key), what logic can be efficiently used. a. STARTBR on first key and do READNEXT till RESP is ENDFILE b. STARTBR on last key and do READPREV once c. READ File command till end of file d. none of the above 17)
When a transaction is executed by 10 users there are _________ number of tasks running in the CICS region. a. 1 b. 10 c. 20 gg)100
18) Which of the following CICS transaction code can be used to define the resources into CICS control tables. hh)CEMT ii) CECI jj) CEDA kk)CECS
19) Which of the following CICS command can cause a PGMIDERR when executed. ll) EXEC CICS LINK PROGRAM(‘PROGRAM1’) END-EXEC. mm)EXEC CICS RECEIVE MAP(‘MAP1’) MAPSET(‘MAPSET1’) END-EXEC. nn) EXEC CICS SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) DATAONLY END-EXEC. oo)None of the above. 20) The attribute values of skipper and stopper fields are pp)SKIP, PROT qq)ASKIP, PROT rr) SKIP, UNPROT ss)All the above. tt) d uu)c vv)b ww)d xx)c yy)c zz)c aaa)c bbb)d ccc)– ddd)a eee)b fff)c ggg)c hhh)d iii) b jjj) a kkk)c lll) d mmm)b
1)The Mapfail condition will occur at the __________ command
a) SEND b) RECEIVE c) READ. d) WRITE Ans: b 2) To send only the physical map on the screen , we will use which option of Send Map ? a) Data Only b) Map Only c) Send Only d) Send Ans: b 3) Execution of Cics programs take place within the a) CICS Region b) JES Region c) Initiator Address Space d) DB2 region Ans: a 4) _______ declares the needed constants, which can be used to alter field attributes. a) COPY DFHBMSCA b) COPY DFHAID c) COPY ATTRIBUTE d) COPY ‘mapsetname’ Ans: a 5) What is true about the XCTL command a) XCTL transfers control to a program at the same level b) With XCTL command data cannot be passed c) XCTLed program on issuing a RETURN will always pass control back to CICS d) a and c Ans: a 6) The ________ contains the transient data queue definitions. a) Terminal Control Table b) Destination Control Table
c) Temporary Storage Table d) System Initilization Table Ans: b
7) ATI is a functionality which can be achieved by definition of a) Intrapartition TDQs b) Extrapartition TDQs c) TSQs d) START comand Ans: a 8) The _________ command is used to pass control from an application program at one logical level to another application at next lower logical level. a) XCTL b) RETURN c) LINK d) None of the above Ans: c 9) DFHMDI is a ___________ macro. a) Mapset definition b) Map definition c) Field definition d) None of the above Ans: b 10) _______ transaction is generally used for defining resources to CICS. a) CECI b) CEDF c) CEDA d) CEMT Ans: c 11) RCT entry is required for naming the following resources a) Transaction-id and Program name d) Transaction-id and Package name c) Package name and PLAN name
d) Transaction-id and PLAN name Ans: d 12) The length of the working-storage field used with RESP option of a command is a) PIC S9(4) COMP b) PIC S9(8) COMP-3 c) PIC S9(8) COMP d) None of the above Ans: c 13) The ________ recognizes EXEC CICS statements. a) Compiler b) Translator c) Precompiler d) None of the above Ans: b 14) The _________ declares Attention Identifier constants for determining which key was pressed by the operator. a) COPY DFHEIB b) COPY DFHBMSCA c) COPY DFHAID d) None of the above Ans: c 15) A _________ is a CICS option used for passing and receiving data between CICS programs. a) LINK b) XCTL c) RETURN d) COMMAREA Ans: d 16) The following commands are not required in a CICS-COBOL program a) OPEN, CLOSE b) MOVE c) DISPLAY d) a & c
Ans: d 17) Which file access method CICS supports. a) VSAM b) BDAM c) a & b d) None of the above Ans: c 18) A mapset named MAP1 can have a map named MAP1 under it a) True b) False Ans: a
19) What tables must be updated when adding a new transaction and program? a) PCT b) PPT c) a & b d) FCT Ans: c 20) To change an attribute of a field, at execution time we can nnn)Move a character of data to the ‘A’ part of a field ooo)Move ATTRIB=(unprot,IC) to the field ppp)The change is not supported qqq)a and b option Ans: a 21) How can programs be started within CICS? a) START Command b) RETURN Command c) a & b d) None of the above Ans: c 22) Can you define multiple maps in a BMS mapset?
a) Yes b) No Ans: a 23) What are the outputs created as a result of generation of a map? a) Copybook b) Load Module c) a & b d) None of the above Ans: c 24) The following options are mandatory for reading a file with READ command a) FILE, INTO, RIDFLD b) FILE, INTO c) FILE, INTO, GTEQ d) All the above are correct syntax Ans: a 25) IF you are reading a file, with GENERIC option what is also mandatory a) RBA b) GTEQ/EQUAL c) KEYLENGTH d) all the above Ans: c 26) The EIBCALEN value is 4 when a) The variable used with commarea contains a value of 4 b) The length of the commarea variable is 4 c) The value and length of the commarea variable is 4 d) The value 4 must be moved into EIBCALEN with a Move statement. Ans: b 27) To change a particular value in an already existing record of a VSAM KSDS file the record must be first locked exclusively with what command a) Read with Lock option b) Read with Rewrite option
rrr)Read with Update option sss)None of the above Ans: c
28) Which command is used to actually update a record of the VSAM KSDS. a) Update b) Write with update option c) Read with rewrite option d) Rewrite Ans: d 29) The Command EXEC CICS DELETE FILE(‘filename’) RIDFLD(ws-record-key) will delete the file. a) True b) False Ans: b 30) The first READNEXT command after a STARTBR on the first key of a VSAM KSDS will retrieve the ______ record . a) Second b) Last c) First d) None of the records are retrieved Ans: c 31) To retrieve multiple rows from a DB2 table _______ is required in a CICS program a) Cursors ttt)Read uuu)Get vvv)Retrieve Ans: a 32) Which is the EIB field that gives the date when a task was started? a) EIBCURRENTDATE b) EIBDATETIME
c) EIBDATE d) None of the above Ans: c 33) Changes made to the VSAM file are saved at the execution of which command . a) SYNCPOINT b) RETURN www)RETURN with TRANSID(‘trans-id’) option xxx)All the above Ans: d 34) Changes made to a DB2 table are saved at the execution of which command. a) SYNCPOINT b) COMMIT yyy)RETURN zzz)All the above Ans: d 35) The ________ command is used to remove a lock on a resource. a) RETURN b) SEND c) ENQ d) None of the above Ans: a 36) When control is passed to the same transaction the subsequent time without a commarea, what will the value of EIBCALEN ? a) Zero b) One c) Two d) None of the above Ans: a 37) What is the CICS supplied transaction which can execute certain CICS command? a) CESF b) CEMT c) CEDA
d) CECI Ans: d
38) The READ command in CICS operates on which Mode a) Locate b) Move aaaa)Perform bbbb)None of the above Ans: b 39) MDT is automatically turned OFF on which command (if attribute is FRSET) a) RECEIVE b) READ c) WRITE d) SEND Ans: d 40) To read the last record of a KSDS file (without knowing the key), what logic can be efficiently used. a) STARTBR on first key and do READNEXT till RESP is ENDFILE b) STARTBR on last key and do READPREV once c) READ File command till end of file d) none of the above Ans: b 41) The default share option of a VSAM file defined as a resource to CICS is a) SHR(1,3) b) SHR(1,4) c) SHR(2,3) d) SHR(3,3) Ans: a 42) CICS is an option of the ISPF primary menu screen. a) True b) False Ans: b
43) To change an attribute of a field you will move a byte of information to _____ symbolic field a) fieldnameI b) fieldnameO c) fieldnameF d) fieldnameA Ans: d
44) EIBCPOSN field used for a) Function code b) Task Number c) Cursor Position d) Column Position Ans: c 45) Which of the following program-to-program statements causes CICS to change a logical level ? a) CICS LINK b) CICS XCTL c) CICS LOAD d) All the above Ans: a 46) If a user keys the trans-id INQY from a clear screen and presses the ENTER. Which of the following SEND MAP commands result in errors. a) SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) b) SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) DATAONLY cccc)a and b dddd)none of the above Ans: d 47) ABEND code ASRA means a) Read time-out encountered b) ABEND due to program interruption
c) Resource Security check failed d) None of the above Ans: b 48) CICS will have a LINKAGE SECTION in all COBOL-CICS programs. a) True b) False Ans: a 49) ABEND code AEI9 occurs because of which condition a) NORMAL b) EOF c) MAPFAIL d) None of the above Ans: c
50) IF SQLCODE is non-zero in a CICS-DB2 program , execution will continue. eeee)True ffff)False Ans: a
51) For debugging CICS transactions. a) CEDA b) CEDF c) CESF d) CESN Ans: b
transaction we
52) WHAT IS THE SIZE OF COMMAREA?
use
the
following
a) depends on the declaration of the variable b) is fixed at 4k c) is the size of the dfhcommarea d) is S9(8) comp Ans: a 53) What does EIB mean? a) Executive Interface Block. b) Execute Interface Block. c) Executive Internal Block. d) None of the above Ans: b 54) For executing CICS DB2 application programming you should have a) PCT Entry b) PPT Entry c) RCT Entry d) All of the above Ans: d 55) How do you access the records randomly in TSQ? a) By specifying the ACCESS option. b) By specifying the RANDOM option c) By specifying the ITEM option. d) By specifying DYNAMIC option. Ans: c
56)_______ contains a list of valid transaction IDs. a) TCT b) PCT c) PPT d) None of the above Ans: b 57)_______ indicates each program's location which pertains to a storage address if the program has already been loaded .
a) PCT b) TCT c) FCT d) PPT Ans: d 58) The ________ map is the actual copybook member used in the program to reference the input and output fields on the screen. a) Physical b) Symbolic c) Dynamic d) None of the above Ans: b 59) The command used to view the contents of TSQ. a) CEDA b) CEBR c) CESF d) All of above Ans: c 60) What will be the length of the EIBCALEN field, if a transaction is initiated in CICS the first time? a) 10 b) 0 c) 4 d) 2 Ans: b 61) EIB is required to gggg)check the SQLCODE generated hhhh)check the file status iiii)check the response from cics jjjj)all the above
62)_________ command is used to obtain a certain amount of
storage a) GETMAIN b) FREEMAIN c) XCTL d) None of the above Ans: a 63)_________ command is used to set a pointer to first record during the file browsing. a) STARTBR b) START c) ENDBR d) CEBR Ans: a 64)__________is used to check if any data has been sent by the calling program. a) EIBCALEN b) DFHEIBLK c) EIBTRNID d) None of the above Ans: a 65) When a transaction is executed by 10 users there are _________ number of tasks running in the CICS region. kkkk)1 llll)10 mmmm)20 nnnn)100 Ans: b 66) Communication area is used for oooo)Passing data between programs pppp)Passing data between tasks c) a & b d) None of the above Ans: c 67) To open a file in CICS region the transaction to be used
is
_________ qqqq)CEMT rrrr)CESF ssss)CEDA tttt)None of the above. Ans: a
68) __________ is used to transfer control to the paragraph when the exceptional condition occurs for which it is designed. uuuu)Ignore Condition vvvv)Handle Condition wwww)Error Condition xxxx)None of the above Ans: b 69)_______________command is used to suspend all handle conditions. yyyy)PUSH zzzz)POP aaaaa)THROUGH bbbbb)None of the above Ans: a 70) _________ command is used to send text to the screen without a MAP. a) SEND MAP b) SEND TEXT c) SEND PAGE d) None of the above Ans: b 71) Which CICS system program is responsible for handling the automatic task initiation. ccccc)TDP ddddd)TCT eeeee)KCP
fffff)PPT Ans: a) TDP 72) To define a transaction to the CICS , the transaction used is ____________ ggggg)CEMT hhhhh)CEDA iiiii)CESF jjjjj)None of the above Ans: b 73) What is the command to update existing records in TSQ? KKKKK)REWRITE LLLLL)WRITE MMMMM)UPDATE nnnnn)None of the above Ans: b
74)_________ command use to release exclusive control of a resource ooooo)ENQ ppppp)DEQ qqqqq)A & B rrrrr)None of the above Ans: b 75) To Skip a field in DFHMDF macro, the attribute is a) IC b) ASKIP c) PROT d) None of the above Ans: b 76) The _______ defines the characteristics of each terminal with which CICS can communicate. sssss)TCT
ttttt)FCP uuuuu)TDP vvvvv)DCT Ans: a 77) Flag is the _________ of the attribute character. wwwww)One byte xxxxx)One bit yyyyy)Three bit zzzzz) None of the above Ans: a 78) TYPE = &SYSPARM in BMS means. a) Symbolic & Physical map will be created. b) Only Symbolic map is created c) Only Physical map is created d) None of the above Ans: a 79) _______ tells the application program if the last CICS command was executed successfully and if not why not. aaaaaa)EIBRCODE bbbbbb)EIBTRMID cccccc)EIBTRNID dddddd)EIBCALEN Ans: a 80) ________ registers the control information of the system log and journal files. a) TDP b) JCT c) KCP d) PPT Ans: b 81)_______ CICS command is used to access current date & time. eeeeee)ASKTIME ffffff)CURRENTDATETIME gggggg)ASKDATETIME
hhhhhh)ASKCURRENTTIME Ans: a 82) ______ is the mechanism by which different CICS address spaces in the same CPU can communicate & share resources. iiiiii)RDO jjjjjj)MRO kkkkkk)CRO llllll)QDO Ans: b 83) Following files can accessed from CICS mmmmmm)VSAM , Physical Sequential nnnnnn)VSAM , Physical Sequential, Partitioned Datasets oooooo)VSAM, BDAM pppppp)VSAM, BDAM
Ansd 84) Transaction id and program name can be found in qqqqqq)PCT rrrrrr)PPT ssssss)TCT tttttt)RCT Ans: b
85) The ________ command that will release a program loaded into the main storage using LOAD command. uuuuuu)RELEASE vvvvvv)LOAD wwwwww)DELETE xxxxxx)ERASE
Ans: a 86) _________ is the name of the MAPSET definition macro. yyyyyy)DFHMDI zzzzzz)DFHEIBLK aaaaaaa)DFHMSD bbbbbbb)None of the above Ans: c 87) The commands used to transfer program control. ccccccc)LINK ddddddd)XCTL eeeeeee)RETURN fffffff)All of the above Ans: d 88) ______EIB field gives the date when a task was started. a) EIBTIME b) EIBDATE c) DATE d) DATETIME Ans: b 89) CICS commands are syntactically checked by the ggggggg)Precompiler hhhhhhh)Compiler iiiiiii)Translator jjjjjjj)None of the above Ans: c 90) For Multithreading an application program need not be reentrant . kkkkkkk)True lllllll)False Ans: b 91) ERASEAUP option is used for
a) Erase the screen before the map is send b) To erase all unprotected fields only mmmmmmm)To erase all the protected fields only nnnnnnn)None of the above Ans: b 92) What error happens if the TDQ that you want to delete is not in the DCT? a) IDERR b) PGMQERR c) QIDERR d) PGMIDERR Ans: c
93)_______ command used for terminating a browse operation on a VSAM dataset. a) ENCBR b) ENDBR c) ENINR d) DUMP Ans: b 94) In a Psuedoconversational program resources are __________during operator think-time. ooooooo)Locked b) Released ppppppp)a & b qqqqqqq)None of the above Ans: b 95) TSQs can be written in the main storage or auxiliary storage a) True b) False Ans: a 96) If anyone wants to restrict Trans-id to single user, enter trans-id with_________
rrrrrrr)TSQ sssssss)ENQ ttttttt)TDQ uuuuuuu)None of the above Ans: b 97) AEY9 ABEND code means? vvvvvvv)Read time-out encountered wwwwwww)ABEND due to program interruption xxxxxxx)Resources security check files yyyyyyy)Unsupported command issued Ans: d 98) Map fail error condition is raised because zzzzzzz)There are no fields on the map whose MDT is ON aaaaaaaa)There is no map definition in PCT bbbbbbbb)Map load module is not found cccccccc)The map has no fields Ans: a 99) You can check if the MDT is ON or OFF by dddddddd)Checking the Flag byte has a value of low-value or no eeeeeeee)Checking Ans: a 1) Can you define multiple maps in a BMS mapset? a. Yes b. No 2) What are the outputs created as a result of generation of a map? a. Copybook b. Load Module c. a & b d. None of the above 3) The following options are mandatory for reading a file with READ command
a. FILE, INTO, RIDFLD b. FILE, INTO c. FILE, INTO, GTEQ d. All the above are correct syntax 4) IF you are reading a file, with GENERIC option what is also mandatory. a. RBA b. GTEQ/EQUAL c. KEYLENGTH d. all the above 5) The EIBCALEN value is 4 when a. The variable used with commarea contains a value of 4 b. The length of the commarea variable is 4 c. The value and length of the commarea variable is 4 d. The value 4 must be moved into EIBCALEN with a Move statement. 6) To change a particular value in an already existing record of a VSAM KSDS file the record must be first locked exclusively with what command a. Read with Lock option b. Read with Rewrite option c. Read with Update option d. None of the above 7) Which command is used to actually update a record of the VSAM KSDS. a. Update b. Write with update option c. Read with rewrite option d. Rewrite 8) The Command EXEC CICS DELETE FILE(‘filename’) RIDFLD(ws-record-key) will delete the file. a) True b) False 9) The first READNEXT command after a STARTBR on the first key
of a VSAM KSDS will retrieve the ______ record. a. Second b. Last c. First d. None of the records are retrieved 10) To retrieve multiple rows from a DB2 table _______ is required in a CICS program a. Cursors b. Read c. Get d. Retrieve 11) What is the preferred method of handling exception conditions. a. HANDLE CONDITION b. Coding NOHANDLE and checking EIBRCODE/EIBRESP c. Coding RESP and checking EIBRESP. d. Allow CICS to take default action. 12) Which is the EIB field that gives the date when a task was started? a. EIBCURRENTDATE b. EIBDATETIME c. EIBDATE d. None of the above 13) Changes made to the VSAM file are saved at the execution of which command . a. SYNCPOINT b. RETURN c. RETURN with TRANSID(‘trans-id’) option d. All the above 14) Changes made to a DB2 table are saved at the execution of which command. a. SYNCPOINT b. COMMIT c. RETURN d. All the above
15) The a. b. c. d.
________ command is used to remove a lock on a resource. RETURN SEND ENQ None of the above
16) If a user keys the trans-id INQY from a clear screen and presses the ENTER. Which of the following SEND MAP commands result in errors. a. SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) b. SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) DATAONLY c. a and b d. none of the above 17) ABEND code ASRA means a. Read time-out encountered b. ABEND due to program interruption c. Resource Security check failed d. None of the above 18) CICS requires a LINKAGE SECTION in all COBOL-CICS programs. a. True b. False 19) ABEND code AEI9 means a. NONVAL b. EOF c. MAPFAIL d. None of the above 20) IF SQLCODE is non-zero in a CICS-DB2 program , execution will continue. ffffffff)True gggggggg)False ANS: 1 –a 2 –c
3 –a 4 –c 5 –b 6 –c 7 –d 8 –b 9 –c 10-a 11-c 12-c 13-d 14-d 15-a 16-d 17-b 18-a 19-c 20-a
1. Where can a program find the transaction identification that began a task. hhhhhhhh)In field EIBTRNID. iiiiiiii)In field EIBTRAN. jjjjjjjj)In the CSA. kkkkkkkk)In the TWA.
2.What action must a programmer take to ensure that CICS copies DFHEIBLK into an application program. llllllll)COPY DFHEIBLK mmmmmmmm)INCLUDE DFHEIBLK nnnnnnnn)COPY DFHCOMMAREA oooooooo)None of the above. 3. Which of the following COBOL commands should not be executed within a CICS program. pppppppp)OPEN INPUT FILE1. qqqqqqqq)STOP RUN rrrrrrrr)COMPUTE FIELD1 ROUNDED=FIELD2+FIELD3. ssssssss)MOVE CORRESPONDING TABLE1 TO TABLE2. tttttttt)None of the above. 4.What is the preferred method of handling exception conditions. uuuuuuuu)HANDLE CONDITION vvvvvvvv)Coding NOHANDLE and checking EIBRCODE/EIBRESP wwwwwwww)Coding RESP and checking EIBRESP. xxxxxxxx)Allow CICS to take default action. 5. Which of the following CICS transaction codes can be used to interactively execute CICS command language (commands that can be coded in a COBOL program) at a terminal. yyyyyyyy)CEMT zzzzzzzz)CSMT aaaaaaaaa)CECS bbbbbbbbb)CECI 6. Which of the following is not considered an extended attribute when creating BMS maps. ccccccccc)Color ddddddddd) Underlining eeeeeeeee)Outlining fffffffff)Transparency ggggggggg)All the above are extended attributes 7. Which of the following causes a MAPFAIL exception condition on a
RECEIVE MAP. hhhhhhhhh)The user entered the data and then erased the data using erase EOF. iiiiiiiii)The user entered the data and then erased the data using the space bar. jjjjjjjjj)The user pressed the CLEAR key. kkkkkkkkk)The user keyed the data and pressed an undefined PF key. lllllllll)All the above. 8. Which of the following statements correctly describe the following code. PROCEDURE DIVISION. ………. EXEC CICS HANDLE CONDITION NOTOPEN(NOTOPENPARA) END-EXEC. ………. NOTOPEN-PARA. mmmmmmmmm)Paragraph NOTOPEN-PARA will get control if a dataset does not exist in the FCT (File Control Table). nnnnnnnnn)The code is used to close the CICS file. ooooooooo)For each dataset referenced in a program, the code must be issued again. If 5 files are processed, the code must be issued 5 times. ppppppppp)It is used to pass control to NOTOPEN-PARA when a CICS file control command is executed upon a dataset that is closed. 9. Which of the following facilities are provided by Inter System Communication (ISC). qqqqqqqqq)Function shipping. rrrrrrrrr)Data transfer. sssssssss)Accessing the Db2 database. ttttttttt)All the above. 10. Which of the following CICS transaction code can be used to define the resources into CICS control tables. uuuuuuuuu)CEMT vvvvvvvvv)CECI
wwwwwwwww)CEDA xxxxxxxxx)CECS 11.Which of the following support Automatic Task Initiation. yyyyyyyyy)Extrapartition transient data queues. zzzzzzzzz)Intrapartition transient data queues. aaaaaaaaaa)Main temporary storage queues. bbbbbbbbbb)Auxiliary temporary storage queues. 12. The ________ contains the transient data queue definitions. a) Terminal Control Table b) Destination Control Table c) Temporary Storage Table d) System Initilization Table 13. A READ UPDATE COMMAND initiates VSAM exclusive control protection. Which of the following terminate exclusive control. cccccccccc)REWRITE command. dddddddddd)DELETE command. eeeeeeeeee)UNLOCK command. ffffffffff)End of task. gggggggggg)All the above. 14. Which of the following are valid for deleting rows of data. hhhhhhhhhh)DELETE without an open cursor. iiiiiiiiii)DELETE with an open cursor. jjjjjjjjjj)Both (a) and (b). kkkkkkkkkk)None of the above. 15. Which of the following statements must be executed before VSAM dataset FILE1 is used for update processing under CICS. llllllllll)EXEC CICS OPEN DATASET(‘FILE1’) UPDATE END-EXEC. mmmmmmmmmm)EXEC CICS READY DATASET(‘FILE1’) ENDEXEC. nnnnnnnnnn) EXEC CICS CONNECT DATASET(‘FILE1’) UPDATE END-EXEC. oooooooooo) EXEC CICS STARTBR DATASET(‘FILE1’) UPDATE END-EXEC. pppppppppp)None of the above.
16. Which of the following are proper ways to check for an end-of-file condition when the highlighted code is executed. DATA DIVISION. WORKING-STORAGE SECTION. 01 REC1-LENGTH PIC S9(4) COMP. 01 REC1-KEY PIC X(3) VALUE ‘111’. 01 REC1 PIC X(100). ……… PROCEDURE DIVISION. EXEC CICS READNEXT DATASET(‘FILE1’) RIDFLD(REC1-KEY) INTO(REC1) LENGTH(REC1-LENGTH) END-EXEC. ……. FILE-END. qqqqqqqqqq) Issue an ‘EXEC CICS HANDLE CONDITION ENDFILE(FILE-END) END-EXEC’ before executing the code. rrrrrrrrrr)Add an ‘AT END GO TO FILE-END’ clause before the END-EXEC in the code. ssssssssss) Issue an ‘EXEC CICS ENDFILE(FILE-END) ENDEXEC’ after executing the code. tttttttttt)After executing the READNEXT issue an ‘IF EIBENDFL=’10’ GO TO FILE-END’. 17. Which of the following statements correctly describe the highlighted code. PROCEDURE DIVISION. EXEC CICS STARTBR DATASET(‘FILE1’) RIDFLD(REC1KEY) REQID(REC1-REQID) END-EXEC. uuuuuuuuuu)It is required if more than 1 file is browsed within the same CICS program. vvvvvvvvvv) It is required if when multiple browse operations are to be concurrently used upon the same file. wwwwwwwwww)It contains the password of a VSAM password protected dataset. xxxxxxxxxx) It contains the CICS file security code defined in the FCT and is required for files defined as ‘high security’. yyyyyyyyyy)It will cause a CICS command language translator error.
18. To read the last record of a KSDS file (without knowing the key), what logic can be efficiently used. a) STARTBR on first key and do READNEXT till RESP is ENDFILE b) STARTBR on last key and do READPREV once c) READ File command till end of file d) none of the above 19. CICS is an option of the ISPF primary menu screen. a) True b) False 20. EIBCPOSN field used for a) Function code b) Task Number c) Cursor Position d) Column Position 1)The Mapfail condition will occur at the __________ command a) SEND b) RECEIVE c) READ. d) WRITE
3) Execution of Cics programs take place within the a) CICS Region b) JES Region c) Initiator Address Space d) DB2 region 5) What is true about the XCTL command a) XCTL transfers control to a program at the same level b) With XCTL command data cannot be passed c) XCTLed program on issuing a RETURN will always pass control back to CICS d) a and c
7) ATI is a functionality which can be achieved by definition of a) Intrapartition TDQs b) Extrapartition TDQs c) TSQs zzzzzzzzzz)START command
9) DFHMDI is a ___________ macro. a) Mapset definition b) Map definition c) Field definition d) None of the above 11) RCT entry is required for naming the following resources a) Transaction-id and Program name d) Transaction-id and Package name c) Package name and PLAN name d)Transaction-id and PLAN name
13) The ________ recognizes EXEC CICS statements. a) Compiler b) Translator c) Precompiler d) None of the above 15) A _________ is a CICS option used for passing and receiving data between CICS programs. a) LINK b) XCTL c) RETURN aaaaaaaaaaa)COMMAREA 17) Which file access method CICS supports. a) VSAM b) BDAM c) a & b d) None of the above
19) What tables must be updated when adding a new transaction and program? a) PCT b) PPT c) a & b d) FCT 21) How can programs be started within CICS? a) START Command b) RETURN Command c) a & b d) None of the above 23) What are the outputs created as a result of generation of a map? a) Copybook b) Load Module c) a & b d) None of the above
25) IF you are reading a file, with GENERIC option what is also mandatory a) RBA b) GTEQ/EQUAL c) KEYLENGTH d) all the above
To change a particular value in an already existing record of a VSAM KSDS file the record must be first locked exclusively with what command a) Read with Lock option b) Read with Rewrite option bbbbbbbbbbb)Read with Update option None of the above
29) The Command EXEC CICS DELETE FILE(‘filename’)
RIDFLD(ws-record-key) will delete the file. a) True b) False 31) To retrieve multiple rows from a DB2 table _______ is required in a CICS program a) Cursors ccccccccccc)Read ddddddddddd)Get eeeeeeeeeee)Retrieve 33) Changes made to the VSAM file are saved at the execution of which command . a) SYNCPOINT b) RETURN fffffffffff) RETURN with TRANSID(‘trans-id’) option ggggggggggg)All the above 35) The ________ command is used to remove a lock on a resource. a) RETURN b) SEND c) ENQ d) None of the above 37) What is the CICS supplied transaction which can execute certain CICS command? a) CESF b) CEMT c) CEDA d) CECI 39) MDT is automatically turned OFF on which command (if attribute is FRSET) a) RECEIVE b) READ c) WRITE d) SEND