Вы находитесь на странице: 1из 41

cics questions

f) You can check if the MDT is ON or OFF by


a. Checking the Flag byte has a value of low-value
b. No Checking technique is available

g) AEY9 ABEND code means?


a. Read time-out encountered
b. ABEND due to program interruption
c. Resources security check files
d. Unsupported command issued

h) TSQs can be written in the main storage or auxiliary storage


a. True
b. False

i) _______ command used for terminating a browse operation on


a VSAM dataset.
a. ENCBR
b. ENDBR
c. ENINR
d. DUMP

j) ERASEAUP option is used for


a. Erase the screen before the map is send
b. To erase all unprotected fields only
c. To erase all the protected fields only
d. None of the above

k) CICS commands are syntactically checked by the


a. Precompiler
b. Compiler
c. Translator
d. None of the above

l) The commands used to transfer program control.


a. LINK
b. XCTL
c. RETURN
d. All of the above

8) The ________ command that will release a program loaded into


the main storage using LOAD command.
a. RELEASE
b. LOAD
c. DELETE
d. ERASE

9) Following files can accessed from CICS


a. VSAM , Physical Sequential
b. VSAM , Physical Sequential, Partitioned Datasets
c. VSAM, Partitioned Datasets
d. VSAM, BDAM

10)_______ CICS command is used to access current date & time.


a. ASKTIME
b. CURRENTDATETIME
c. ASKDATETIME
d. ASKCURRENTTIME

11) _______ tells the application program if the last CICS command
was executed successfully and if not why not.
a. EIBRCODE
b. EIBTRMID
c. EIBTRNID
d. EIBCALEN

12) To Skip a field in DFHMDF macro, the attribute is


a. IC
b. ASKIP
c. PROT
d. None of the above

13) What is the command to update existing records in TSQ?


a. REWRITE
b. WRITE
c. UPDATE
d. None of the above

14) _________ command is used to send text to the screen without a


MAP.
a. SEND MAP
b. SEND TEXT
c. SEND PAGE
d. None of the above

15) __________ is used to transfer control to the paragraph when the


exceptional condition occurs for which it is designed.
a. Ignore Condition
b. Handle Condition
c. Error Condition
d. None of the above

16) Communication area is used for


a. Passing data between programs
b. Passing data between tasks
c. a & b
d. None of the above

17) When a transaction is executed by 10 users there are


_________ number of tasks running in the CICS region.
a. 1
b. 10
c. 20
d. 100

18)__________is used to check if any data has been sent by the


calling program.
a. EIBCALEN
b. DFHEIBLK
c. EIBTRNID
d. None of the above

19) EIB is required to


a. check the SQLCODE generated
b. check the file status
c. check the response from cics
d. all the above

20) The ________ map is the actual copybook member used in the
program to reference the input and output fields on the screen.
a. Physical
b. Symbolic
c. Dynamic
d. None of the above

m) a
n) d
o) a
p) b
q) b
r) c
s) d
t) a
u) d
v) a
w) a
x) b
y) a
z) b
aa)b
bb)b
cc)a
dd)a
ee)–
ff) b

1) What is true about the XCTL command


a. XCTL transfers control to a program at the same level
b. With XCTL command data cannot be passed
c. XCTLed program on issuing a RETURN will always pass
control back to CICS
d. Both a and c

2) RCT entry is required for naming the following resources


a. Transaction-id and Program name
d. Transaction-id and Package name
c. Package name and PLAN name
d. Transaction-id and PLAN name

3) The ________ recognizes EXEC CICS statements.


a. Compiler
b. Translator
c. Precompiler
d. None of the above

4) A _________ is a CICS option used for passing and receiving


data between CICS programs.
a. LINK
b. XCTL
c. RETURN
d. COMMAREA

5) How can programs be started within CICS?


a. START Command
b. RETURN Command
c. a & b
d. None of the above

6) What are the outputs created as a result of generation of a map?


a. Copybook
b. Load Module
c. a & b
d. None of the above

7) IF you are reading a file, with GENERIC option what is also


mandatory
a. RBA
b. GTEQ/EQUAL
c. KEYLENGTH
d. all the above

8) To change a particular value in an already existing record of a


VSAM KSDS file the record must be first locked exclusively with
what command
a. Read with Lock option
b. Read with Rewrite option
c. Read with Update option
d. None of the above

9) Changes made to the VSAM file are saved at the execution of


which command .
a. SYNCPOINT
b. RETURN
c. RETURN with TRANSID(‘trans-id’) option
d. All the above

10) The ________ command is used to remove a lock on a resource.


a. RETURN
b. SEND
c. ENQ
d. None of the above

11) _______ declares the needed constants, which can be used to


alter field attributes.
a. COPY DFHBMSCA
b. COPY DFHAID
c. COPY ATTRIBUTE
d. COPY ‘mapsetname’

12) The ________ contains the transient data queue definitions.


a. Terminal Control Table
b. Destination Control Table
c. Temporary Storage Table
d. System Initilization Table

13) The length of the working-storage field used with RESP option
of a command is
a. PIC S9(4) COMP
b. PIC S9(8) COMP-3
c. PIC S9(8) COMP
d. None of the above

14) The _________ declares Attention Identifier constants for


determining which key was pressed by the operator.
a. COPY DFHEIB
b. COPY DFHBMSCA
c. COPY DFHAID
d. None of the above

15) The following commands are not required in a CICS-COBOL


program
a. OPEN, CLOSE
b. MOVE
c. DISPLAY
d. a&c

16) To read the last record of a KSDS file (without knowing the key),
what logic can be efficiently used.
a. STARTBR on first key and do READNEXT till RESP is
ENDFILE
b. STARTBR on last key and do READPREV once
c. READ File command till end of file
d. none of the above

17) When a transaction is executed by 10 users there are


_________ number of tasks running in the CICS region.
a. 1
b. 10
c. 20
gg)100

18) Which of the following CICS transaction code can be used to


define the resources into CICS control tables.
hh)CEMT
ii) CECI
jj) CEDA
kk)CECS
19) Which of the following CICS command can cause a PGMIDERR
when executed.
ll) EXEC CICS LINK PROGRAM(‘PROGRAM1’) END-EXEC.
mm)EXEC CICS RECEIVE MAP(‘MAP1’) MAPSET(‘MAPSET1’)
END-EXEC.
nn) EXEC CICS SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’)
DATAONLY END-EXEC.
oo)None of the above.

20) The attribute values of skipper and stopper fields are


pp)SKIP, PROT
qq)ASKIP, PROT
rr) SKIP, UNPROT
ss)All the above.

tt) d
uu)c
vv)b
ww)d
xx)c
yy)c
zz)c
aaa)c
bbb)d
ccc)–
ddd)a
eee)b
fff) c
ggg)c
hhh)d
iii) b
jjj) a
kkk)c
lll) d
mmm)b

1)The Mapfail condition will occur at the __________ command


a) SEND
b) RECEIVE
c) READ.
d) WRITE
Ans: b

2) To send only the physical map on the screen , we will use which
option of Send Map ?
a) Data Only
b) Map Only
c) Send Only
d) Send
Ans: b

3) Execution of Cics programs take place within the


a) CICS Region
b) JES Region
c) Initiator Address Space
d) DB2 region
Ans: a

4) _______ declares the needed constants, which can be used to


alter field attributes.
a) COPY DFHBMSCA
b) COPY DFHAID
c) COPY ATTRIBUTE
d) COPY ‘mapsetname’
Ans: a

5) What is true about the XCTL command


a) XCTL transfers control to a program at the same level
b) With XCTL command data cannot be passed
c) XCTLed program on issuing a RETURN will always pass
control back to CICS
d) a and c
Ans: a

6) The ________ contains the transient data queue definitions.


a) Terminal Control Table
b) Destination Control Table
c) Temporary Storage Table
d) System Initilization Table
Ans: b

7) ATI is a functionality which can be achieved by definition of


a) Intrapartition TDQs
b) Extrapartition TDQs
c) TSQs
d) START comand
Ans: a

8) The _________ command is used to pass control from an


application program at one logical level to another application at next
lower logical level.
a) XCTL
b) RETURN
c) LINK
d) None of the above
Ans: c

9) DFHMDI is a ___________ macro.


a) Mapset definition
b) Map definition
c) Field definition
d) None of the above
Ans: b

10) _______ transaction is generally used for defining resources to


CICS.
a) CECI
b) CEDF
c) CEDA
d) CEMT
Ans: c

11) RCT entry is required for naming the following resources


a) Transaction-id and Program name
d) Transaction-id and Package name
c) Package name and PLAN name
d) Transaction-id and PLAN name
Ans: d

12) The length of the working-storage field used with RESP option
of a command is
a) PIC S9(4) COMP
b) PIC S9(8) COMP-3
c) PIC S9(8) COMP
d) None of the above
Ans: c

13) The ________ recognizes EXEC CICS statements.


a) Compiler
b) Translator
c) Precompiler
d) None of the above
Ans: b

14) The _________ declares Attention Identifier constants for


determining which key was pressed by the operator.
a) COPY DFHEIB
b) COPY DFHBMSCA
c) COPY DFHAID
d) None of the above
Ans: c

15) A _________ is a CICS option used for passing and receiving


data between CICS programs.
a) LINK
b) XCTL
c) RETURN
d) COMMAREA
Ans: d

16) The following commands are not required in a CICS-COBOL


program
a) OPEN, CLOSE
b) MOVE
c) DISPLAY
d) a & c
Ans: d

17) Which file access method CICS supports.


a) VSAM
b) BDAM
c) a & b
d) None of the above
Ans: c

18) A mapset named MAP1 can have a map named MAP1 under it
a) True
b) False
Ans: a

19) What tables must be updated when adding a new transaction and
program?
a) PCT
b) PPT
c) a & b
d) FCT
Ans: c

20) To change an attribute of a field, at execution time we can


nnn)Move a character of data to the ‘A’ part of a field
ooo)Move ATTRIB=(unprot,IC) to the field
ppp)The change is not supported
qqq)a and b option
Ans: a

21) How can programs be started within CICS?


a) START Command
b) RETURN Command
c) a & b
d) None of the above
Ans: c

22) Can you define multiple maps in a BMS mapset?


a) Yes
b) No
Ans: a

23) What are the outputs created as a result of generation of a map?


a) Copybook
b) Load Module
c) a & b
d) None of the above
Ans: c

24) The following options are mandatory for reading a file with READ
command
a) FILE, INTO, RIDFLD
b) FILE, INTO
c) FILE, INTO, GTEQ
d) All the above are correct syntax
Ans: a

25) IF you are reading a file, with GENERIC option what is also
mandatory
a) RBA
b) GTEQ/EQUAL
c) KEYLENGTH
d) all the above
Ans: c

26) The EIBCALEN value is 4 when


a) The variable used with commarea contains a value of 4
b) The length of the commarea variable is 4
c) The value and length of the commarea variable is 4
d) The value 4 must be moved into EIBCALEN with a Move
statement.
Ans: b

27) To change a particular value in an already existing record of a


VSAM KSDS file the record must be first locked exclusively with
what command
a) Read with Lock option
b) Read with Rewrite option
rrr)Read with Update option
sss)None of the above
Ans: c

28) Which command is used to actually update a record of the VSAM


KSDS.
a) Update
b) Write with update option
c) Read with rewrite option
d) Rewrite
Ans: d

29) The Command EXEC CICS DELETE FILE(‘filename’)


RIDFLD(ws-record-key) will delete the file.
a) True
b) False
Ans: b

30) The first READNEXT command after a STARTBR on the first


key of a VSAM KSDS will retrieve the ______ record .
a) Second
b) Last
c) First
d) None of the records are retrieved
Ans: c

31) To retrieve multiple rows from a DB2 table _______ is required


in a CICS program
a) Cursors
ttt) Read
uuu)Get
vvv)Retrieve
Ans: a

32) Which is the EIB field that gives the date when a task was
started?
a) EIBCURRENTDATE
b) EIBDATETIME
c) EIBDATE
d) None of the above
Ans: c

33) Changes made to the VSAM file are saved at the execution of
which command .
a) SYNCPOINT
b) RETURN
www)RETURN with TRANSID(‘trans-id’) option
xxx)All the above
Ans: d

34) Changes made to a DB2 table are saved at the execution of


which command.
a) SYNCPOINT
b) COMMIT
yyy)RETURN
zzz)All the above
Ans: d

35) The ________ command is used to remove a lock on a resource.


a) RETURN
b) SEND
c) ENQ
d) None of the above
Ans: a

36) When control is passed to the same transaction the subsequent


time without a commarea, what will the value of EIBCALEN ?
a) Zero
b) One
c) Two
d) None of the above
Ans: a

37) What is the CICS supplied transaction which can execute certain
CICS command?
a) CESF
b) CEMT
c) CEDA
d) CECI
Ans: d

38) The READ command in CICS operates on which Mode


a) Locate
b) Move
aaaa)Perform
bbbb)None of the above
Ans: b

39) MDT is automatically turned OFF on which command (if attribute


is FRSET)
a) RECEIVE
b) READ
c) WRITE
d) SEND
Ans: d

40) To read the last record of a KSDS file (without knowing the key),
what logic can be efficiently used.
a) STARTBR on first key and do READNEXT till RESP is
ENDFILE
b) STARTBR on last key and do READPREV once
c) READ File command till end of file
d) none of the above
Ans: b

41) The default share option of a VSAM file defined as a resource to


CICS is
a) SHR(1,3)
b) SHR(1,4)
c) SHR(2,3)
d) SHR(3,3)
Ans: a

42) CICS is an option of the ISPF primary menu screen.


a) True
b) False
Ans: b
43) To change an attribute of a field you will move a byte of
information to _____ symbolic field
a) fieldnameI
b) fieldnameO
c) fieldnameF
d) fieldnameA
Ans: d

44) EIBCPOSN field used for


a) Function code
b) Task Number
c) Cursor Position
d) Column Position
Ans: c

45) Which of the following program-to-program statements causes


CICS to change a logical level ?
a) CICS LINK
b) CICS XCTL
c) CICS LOAD
d) All the above
Ans: a

46) If a user keys the trans-id INQY from a clear screen and presses
the ENTER. Which of the following SEND MAP commands result in
errors.
a) SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’)
b) SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) DATAONLY
cccc)a and b
dddd)none of the above
Ans: d

47) ABEND code ASRA means


a) Read time-out encountered
b) ABEND due to program interruption
c) Resource Security check failed
d) None of the above
Ans: b

48) CICS will have a LINKAGE SECTION in all COBOL-CICS


programs.
a) True
b) False
Ans: a

49) ABEND code AEI9 occurs because of which condition


a) NORMAL
b) EOF
c) MAPFAIL
d) None of the above
Ans: c

50) IF SQLCODE is non-zero in a CICS-DB2 program , execution


will continue.
eeee)True
ffff)False
Ans: a

51) For debugging CICS transaction we use the following


transactions.
a) CEDA
b) CEDF
c) CESF
d) CESN
Ans: b

52) WHAT IS THE SIZE OF COMMAREA?


a) depends on the declaration of the variable
b) is fixed at 4k
c) is the size of the dfhcommarea
d) is S9(8) comp
Ans: a

53) What does EIB mean?


a) Executive Interface Block.
b) Execute Interface Block.
c) Executive Internal Block.
d) None of the above
Ans: b

54) For executing CICS DB2 application programming you should


have
a) PCT Entry
b) PPT Entry
c) RCT Entry
d) All of the above
Ans: d

55) How do you access the records randomly in TSQ?


a) By specifying the ACCESS option.
b) By specifying the RANDOM option
c) By specifying the ITEM option.
d) By specifying DYNAMIC option.
Ans: c

56)_______ contains a list of valid transaction IDs.


a) TCT
b) PCT
c) PPT
d) None of the above
Ans: b

57)_______ indicates each program's location which pertains to a


storage address if the program has already been loaded .
a) PCT
b) TCT
c) FCT
d) PPT
Ans: d

58) The ________ map is the actual copybook member used in the
program to reference the input and output fields on the screen.
a) Physical
b) Symbolic
c) Dynamic
d) None of the above
Ans: b

59) The command used to view the contents of TSQ.


a) CEDA
b) CEBR
c) CESF
d) All of above
Ans: c

60) What will be the length of the EIBCALEN field, if a transaction is


initiated in CICS the first time?
a) 10
b) 0
c) 4
d) 2
Ans: b

61) EIB is required to


gggg)check the SQLCODE generated
hhhh)check the file status
iiii)check the response from cics
jjjj)all the above

62)_________ command is used to obtain a certain amount of


storage
a) GETMAIN
b) FREEMAIN
c) XCTL
d) None of the above
Ans: a

63)_________ command is used to set a pointer to first record during


the file browsing.
a) STARTBR
b) START
c) ENDBR
d) CEBR
Ans: a

64)__________is used to check if any data has been sent by the


calling program.
a) EIBCALEN
b) DFHEIBLK
c) EIBTRNID
d) None of the above
Ans: a

65) When a transaction is executed by 10 users there are


_________ number of tasks running in the CICS region.
kkkk)1
llll)10
mmmm)20
nnnn)100
Ans: b

66) Communication area is used for


oooo)Passing data between programs
pppp)Passing data between tasks
c) a & b
d) None of the above
Ans: c

67) To open a file in CICS region the transaction to be used is


_________
qqqq)CEMT
rrrr)CESF
ssss)CEDA
tttt)None of the above.
Ans: a

68) __________ is used to transfer control to the paragraph when the


exceptional condition occurs for which it is designed.
uuuu)Ignore Condition
vvvv)Handle Condition
wwww)Error Condition
xxxx)None of the above
Ans: b

69)_______________command is used to suspend all handle


conditions.
yyyy)PUSH
zzzz)POP
aaaaa)THROUGH
bbbbb)None of the above
Ans: a

70) _________ command is used to send text to the screen without a


MAP.
a) SEND MAP
b) SEND TEXT
c) SEND PAGE
d) None of the above
Ans: b

71) Which CICS system program is responsible for handling the


automatic task initiation.
ccccc)TDP
ddddd)TCT
eeeee)KCP
fffff)PPT
Ans: a) TDP

72) To define a transaction to the CICS , the transaction used is


____________
ggggg)CEMT
hhhhh)CEDA
iiiii)CESF
jjjjj)None of the above
Ans: b

73) What is the command to update existing records in TSQ?


KKKKK)REWRITE
LLLLL)WRITE
MMMMM)UPDATE
nnnnn)None of the above
Ans: b

74)_________ command use to release exclusive control of a


resource
ooooo)ENQ
ppppp)DEQ
qqqqq)A & B
rrrrr)None of the above
Ans: b

75) To Skip a field in DFHMDF macro, the attribute is


a) IC
b) ASKIP
c) PROT
d) None of the above
Ans: b

76) The _______ defines the characteristics of each terminal with


which CICS can communicate.
sssss)TCT
ttttt)FCP
uuuuu)TDP
vvvvv)DCT
Ans: a

77) Flag is the _________ of the attribute character.


wwwww)One byte
xxxxx)One bit
yyyyy)Three bit
zzzzz) None of the above
Ans: a

78) TYPE = &SYSPARM in BMS means.


a) Symbolic & Physical map will be created.
b) Only Symbolic map is created
c) Only Physical map is created
d) None of the above
Ans: a

79) _______ tells the application program if the last CICS command
was executed successfully and if not why not.
aaaaaa)EIBRCODE
bbbbbb)EIBTRMID
cccccc)EIBTRNID
dddddd)EIBCALEN
Ans: a

80) ________ registers the control information of the system log and
journal files.
a) TDP
b) JCT
c) KCP
d) PPT
Ans: b

81)_______ CICS command is used to access current date & time.


eeeeee)ASKTIME
ffffff)CURRENTDATETIME
gggggg)ASKDATETIME
hhhhhh)ASKCURRENTTIME
Ans: a

82) ______ is the mechanism by which different CICS address


spaces in the same CPU can communicate & share resources.
iiiiii)RDO
jjjjjj)MRO
kkkkkk)CRO
llllll)QDO
Ans: b

83) Following files can accessed from CICS


mmmmmm)VSAM , Physical Sequential
nnnnnn)VSAM , Physical Sequential, Partitioned Datasets
oooooo)VSAM, BDAM
pppppp)VSAM, BDAM

Ansd

84) Transaction id and program name can be found in


qqqqqq)PCT
rrrrrr)PPT
ssssss)TCT
tttttt)RCT

Ans: b

85) The ________ command that will release a program loaded into
the main storage using LOAD command.
uuuuuu)RELEASE
vvvvvv)LOAD
wwwwww)DELETE
xxxxxx)ERASE
Ans: a

86) _________ is the name of the MAPSET definition macro.


yyyyyy)DFHMDI
zzzzzz)DFHEIBLK
aaaaaaa)DFHMSD
bbbbbbb)None of the above
Ans: c

87) The commands used to transfer program control.


ccccccc)LINK
ddddddd)XCTL
eeeeeee)RETURN
fffffff)All of the above

Ans: d

88) ______EIB field gives the date when a task was started.
a) EIBTIME
b) EIBDATE
c) DATE
d) DATETIME
Ans: b

89) CICS commands are syntactically checked by the


ggggggg)Precompiler
hhhhhhh)Compiler
iiiiiii)Translator
jjjjjjj)None of the above
Ans: c

90) For Multithreading an application program need not be re-


entrant .
kkkkkkk)True
lllllll)False
Ans: b

91) ERASEAUP option is used for


a) Erase the screen before the map is send
b) To erase all unprotected fields only
mmmmmmm)To erase all the protected fields only
nnnnnnn)None of the above
Ans: b

92) What error happens if the TDQ that you want to delete is not in
the DCT?
a) IDERR
b) PGMQERR
c) QIDERR
d) PGMIDERR
Ans: c

93)_______ command used for terminating a browse operation on a


VSAM dataset.
a) ENCBR
b) ENDBR
c) ENINR
d) DUMP
Ans: b

94) In a Psuedoconversational program resources are


__________during operator think-time.
ooooooo)Locked
b) Released
ppppppp)a & b
qqqqqqq)None of the above
Ans: b

95) TSQs can be written in the main storage or auxiliary storage


a) True
b) False
Ans: a

96) If anyone wants to restrict Trans-id to single user, enter trans-id


with_________
rrrrrrr)TSQ
sssssss)ENQ
ttttttt)TDQ
uuuuuuu)None of the above
Ans: b

97) AEY9 ABEND code means?


vvvvvvv)Read time-out encountered
wwwwwww)ABEND due to program interruption
xxxxxxx)Resources security check files
yyyyyyy)Unsupported command issued
Ans: d

98) Map fail error condition is raised because


zzzzzzz)There are no fields on the map whose MDT is ON
aaaaaaaa)There is no map definition in PCT
bbbbbbbb)Map load module is not found
cccccccc)The map has no fields

Ans: a

99) You can check if the MDT is ON or OFF by


dddddddd)Checking the Flag byte has a value of low-value or
no
eeeeeeee)Checking
Ans: a

1) Can you define multiple maps in a BMS mapset?


a. Yes
b. No

2) What are the outputs created as a result of generation of a map?


a. Copybook
b. Load Module
c. a & b
d. None of the above

3) The following options are mandatory for reading a file with READ
command
a. FILE, INTO, RIDFLD
b. FILE, INTO
c. FILE, INTO, GTEQ
d. All the above are correct syntax

4) IF you are reading a file, with GENERIC option what is also


mandatory.
a. RBA
b. GTEQ/EQUAL
c. KEYLENGTH
d. all the above

5) The EIBCALEN value is 4 when


a. The variable used with commarea contains a value of 4
b. The length of the commarea variable is 4
c. The value and length of the commarea variable is 4
d. The value 4 must be moved into EIBCALEN with a Move
statement.

6) To change a particular value in an already existing record of a


VSAM KSDS file the record must be first locked exclusively with
what command
a. Read with Lock option
b. Read with Rewrite option
c. Read with Update option
d. None of the above

7) Which command is used to actually update a record of the VSAM


KSDS.
a. Update
b. Write with update option
c. Read with rewrite option
d. Rewrite

8) The Command EXEC CICS DELETE FILE(‘filename’)


RIDFLD(ws-record-key) will delete the file.
a) True
b) False

9) The first READNEXT command after a STARTBR on the first key


of a VSAM KSDS will retrieve the ______ record.
a. Second
b. Last
c. First
d. None of the records are retrieved

10) To retrieve multiple rows from a DB2 table _______ is required


in a CICS program
a. Cursors
b. Read
c. Get
d. Retrieve

11) What is the preferred method of handling exception conditions.


a. HANDLE CONDITION
b. Coding NOHANDLE and checking EIBRCODE/EIBRESP
c. Coding RESP and checking EIBRESP.
d. Allow CICS to take default action.

12) Which is the EIB field that gives the date when a task was
started?
a. EIBCURRENTDATE
b. EIBDATETIME
c. EIBDATE
d. None of the above

13) Changes made to the VSAM file are saved at the execution of
which command .
a. SYNCPOINT
b. RETURN
c. RETURN with TRANSID(‘trans-id’) option
d. All the above

14) Changes made to a DB2 table are saved at the execution of


which command.
a. SYNCPOINT
b. COMMIT
c. RETURN
d. All the above
15) The ________ command is used to remove a lock on a resource.
a. RETURN
b. SEND
c. ENQ
d. None of the above

16) If a user keys the trans-id INQY from a clear screen and presses
the ENTER. Which of the following SEND MAP commands result
in errors.
a. SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’)
b. SEND MAP(‘MAP1’) MAPSET(‘MAPSET1’) DATAONLY
c. a and b
d. none of the above

17) ABEND code ASRA means


a. Read time-out encountered
b. ABEND due to program interruption
c. Resource Security check failed
d. None of the above

18) CICS requires a LINKAGE SECTION in all COBOL-CICS


programs.
a. True
b. False

19) ABEND code AEI9 means


a. NONVAL
b. EOF
c. MAPFAIL
d. None of the above

20) IF SQLCODE is non-zero in a CICS-DB2 program , execution


will continue.
ffffffff)True
gggggggg)False

ANS:

1 –a
2 –c
3 –a
4 –c
5 –b
6 –c
7 –d
8 –b
9 –c
10-a
11-c
12-c
13-d
14-d
15-a
16-d
17-b
18-a
19-c
20-a

1. Where can a program find the transaction identification that began


a task.
hhhhhhhh)In field EIBTRNID.
iiiiiiii)In field EIBTRAN.
jjjjjjjj)In the CSA.
kkkkkkkk)In the TWA.
2.What action must a programmer take to ensure that CICS copies
DFHEIBLK into an application program.
llllllll)COPY DFHEIBLK
mmmmmmmm)INCLUDE DFHEIBLK
nnnnnnnn)COPY DFHCOMMAREA
oooooooo)None of the above.

3. Which of the following COBOL commands should not be executed


within a CICS program.
pppppppp)OPEN INPUT FILE1.
qqqqqqqq)STOP RUN
rrrrrrrr)COMPUTE FIELD1 ROUNDED=FIELD2+FIELD3.
ssssssss)MOVE CORRESPONDING TABLE1 TO TABLE2.
tttttttt)None of the above.

4.What is the preferred method of handling exception conditions.


uuuuuuuu)HANDLE CONDITION
vvvvvvvv)Coding NOHANDLE and checking
EIBRCODE/EIBRESP
wwwwwwww)Coding RESP and checking EIBRESP.
xxxxxxxx)Allow CICS to take default action.

5. Which of the following CICS transaction codes can be used to


interactively execute CICS command language (commands that can
be coded in a COBOL program) at a terminal.
yyyyyyyy)CEMT
zzzzzzzz)CSMT
aaaaaaaaa)CECS
bbbbbbbbb)CECI

6. Which of the following is not considered an extended attribute


when creating BMS maps.
ccccccccc)Color
ddddddddd) Underlining
eeeeeeeee)Outlining
fffffffff)Transparency
ggggggggg)All the above are extended attributes

7. Which of the following causes a MAPFAIL exception condition on a


RECEIVE MAP.
hhhhhhhhh)The user entered the data and then erased the data
using erase EOF.
iiiiiiiii)The user entered the data and then erased the data using the
space bar.
jjjjjjjjj)The user pressed the CLEAR key.
kkkkkkkkk)The user keyed the data and pressed an undefined PF
key.
lllllllll)All the above.

8. Which of the following statements correctly describe the following


code.
PROCEDURE DIVISION.
……….
EXEC CICS HANDLE CONDITION NOTOPEN(NOTOPEN-
PARA)
END-EXEC.
……….
NOTOPEN-PARA.
mmmmmmmmm)Paragraph NOTOPEN-PARA will get control if a
dataset does not exist in the FCT (File Control Table).
nnnnnnnnn)The code is used to close the CICS file.
ooooooooo)For each dataset referenced in a program, the code
must be issued again. If 5 files are processed, the code must
be issued 5 times.
ppppppppp)It is used to pass control to NOTOPEN-PARA when a
CICS file control command is executed upon a dataset that is
closed.

9. Which of the following facilities are provided by Inter System


Communication (ISC).
qqqqqqqqq)Function shipping.
rrrrrrrrr)Data transfer.
sssssssss)Accessing the Db2 database.
ttttttttt)All the above.

10. Which of the following CICS transaction code can be used to


define the resources into CICS control tables.
uuuuuuuuu)CEMT
vvvvvvvvv)CECI
wwwwwwwww)CEDA
xxxxxxxxx)CECS

11.Which of the following support Automatic Task Initiation.


yyyyyyyyy)Extrapartition transient data queues.
zzzzzzzzz)Intrapartition transient data queues.
aaaaaaaaaa)Main temporary storage queues.
bbbbbbbbbb)Auxiliary temporary storage queues.

12. The ________ contains the transient data queue definitions.


a) Terminal Control Table
b) Destination Control Table
c) Temporary Storage Table
d) System Initilization Table

13. A READ UPDATE COMMAND initiates VSAM exclusive control


protection. Which of the following terminate exclusive control.
cccccccccc)REWRITE command.
dddddddddd)DELETE command.
eeeeeeeeee)UNLOCK command.
ffffffffff)End of task.
gggggggggg)All the above.

14. Which of the following are valid for deleting rows of data.
hhhhhhhhhh)DELETE without an open cursor.
iiiiiiiiii)DELETE with an open cursor.
jjjjjjjjjj)Both (a) and (b).
kkkkkkkkkk)None of the above.

15. Which of the following statements must be executed before


VSAM dataset FILE1 is used for update processing under CICS.
llllllllll)EXEC CICS OPEN DATASET(‘FILE1’) UPDATE END-EXEC.
mmmmmmmmmm)EXEC CICS READY DATASET(‘FILE1’) END-
EXEC.
nnnnnnnnnn)EXEC CICS CONNECT DATASET(‘FILE1’) UPDATE
END-EXEC.
oooooooooo)EXEC CICS STARTBR DATASET(‘FILE1’) UPDATE
END-EXEC.
pppppppppp)None of the above.
16. Which of the following are proper ways to check for an end-of-file
condition when the highlighted code is executed.
DATA DIVISION.
WORKING-STORAGE SECTION.
01 REC1-LENGTH PIC S9(4) COMP.
01 REC1-KEY PIC X(3) VALUE ‘111’.
01 REC1 PIC X(100).
………
PROCEDURE DIVISION.
EXEC CICS READNEXT
DATASET(‘FILE1’) RIDFLD(REC1-KEY)
INTO(REC1) LENGTH(REC1-LENGTH)
END-EXEC.
…….
FILE-END.
qqqqqqqqqq)Issue an ‘EXEC CICS HANDLE CONDITION
ENDFILE(FILE-END) END-EXEC’ before executing the code.
rrrrrrrrrr)Add an ‘AT END GO TO FILE-END’ clause before the
END-EXEC in the code.
ssssssssss)Issue an ‘EXEC CICS ENDFILE(FILE-END) END-
EXEC’ after executing the code.
tttttttttt)After executing the READNEXT issue an ‘IF EIBENDFL=’10’
GO TO FILE-END’.

17. Which of the following statements correctly describe the


highlighted code.
PROCEDURE DIVISION.
EXEC CICS STARTBR DATASET(‘FILE1’) RIDFLD(REC1-
KEY)
REQID(REC1-REQID) END-EXEC.
uuuuuuuuuu)It is required if more than 1 file is browsed within the
same CICS program.
vvvvvvvvvv) It is required if when multiple browse operations are to
be concurrently used upon the same file.
wwwwwwwwww)It contains the password of a VSAM password
protected dataset.
xxxxxxxxxx)It contains the CICS file security code defined in the
FCT and is required for files defined as ‘high security’.
yyyyyyyyyy)It will cause a CICS command language translator
error.
18. To read the last record of a KSDS file (without knowing the key),
what logic can be efficiently used.
a) STARTBR on first key and do READNEXT till RESP is
ENDFILE
b) STARTBR on last key and do READPREV once
c) READ File command till end of file
d) none of the above

19. CICS is an option of the ISPF primary menu screen.


a) True
b) False

20. EIBCPOSN field used for


a) Function code
b) Task Number
c) Cursor Position
d) Column Position

1)The Mapfail condition will occur at the __________ command


a) SEND
b) RECEIVE
c) READ.
d) WRITE

3) Execution of Cics programs take place within the


a) CICS Region
b) JES Region
c) Initiator Address Space
d) DB2 region

5) What is true about the XCTL command


a) XCTL transfers control to a program at the same level
b) With XCTL command data cannot be passed
c) XCTLed program on issuing a RETURN will always pass
control back to CICS
d) a and c
7) ATI is a functionality which can be achieved by definition of
a) Intrapartition TDQs
b) Extrapartition TDQs
c) TSQs
zzzzzzzzzz)START command

9) DFHMDI is a ___________ macro.


a) Mapset definition
b) Map definition
c) Field definition
d) None of the above

11) RCT entry is required for naming the following resources


a) Transaction-id and Program name
d) Transaction-id and Package name
c) Package name and PLAN name
d)Transaction-id and PLAN name

13) The ________ recognizes EXEC CICS statements.


a) Compiler
b) Translator
c) Precompiler
d) None of the above

15) A _________ is a CICS option used for passing and receiving


data between CICS programs.
a) LINK
b) XCTL
c) RETURN
aaaaaaaaaaa)COMMAREA

17) Which file access method CICS supports.


a) VSAM
b) BDAM
c) a & b
d) None of the above
19) What tables must be updated when adding a new transaction and
program?
a) PCT
b) PPT
c) a & b
d) FCT

21) How can programs be started within CICS?


a) START Command
b) RETURN Command
c) a & b
d) None of the above

23) What are the outputs created as a result of generation of a map?


a) Copybook
b) Load Module
c) a & b
d) None of the above

25) IF you are reading a file, with GENERIC option what is also
mandatory
a) RBA
b) GTEQ/EQUAL
c) KEYLENGTH
d) all the above

To change a particular value in an already existing record of a VSAM


KSDS file the record must be first locked exclusively with what
command
a) Read with Lock option
b) Read with Rewrite option
bbbbbbbbbbb)Read with Update option
None of the above

29) The Command EXEC CICS DELETE FILE(‘filename’)


RIDFLD(ws-record-key) will delete the file.
a) True
b) False

31) To retrieve multiple rows from a DB2 table _______ is required


in a CICS program
a) Cursors
ccccccccccc)Read
ddddddddddd)Get
eeeeeeeeeee)Retrieve

33) Changes made to the VSAM file are saved at the execution of
which command .
a) SYNCPOINT
b) RETURN
fffffffffff)RETURN with TRANSID(‘trans-id’) option
ggggggggggg)All the above

35) The ________ command is used to remove a lock on a resource.


a) RETURN
b) SEND
c) ENQ
d) None of the above

37) What is the CICS supplied transaction which can execute certain
CICS command?
a) CESF
b) CEMT
c) CEDA
d) CECI

39) MDT is automatically turned OFF on which command (if attribute


is FRSET)
a) RECEIVE
b) READ
c) WRITE
d) SEND

Вам также может понравиться