+-Question 1/80------18:42-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What is the general Command format of CICS ? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. EXEC PGM followed by the command ( ) ¦
¦2. EXEC TASK followed by the command ( ) ¦
¦3. EXEC CICS followed by the command ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 2/80------18:08-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ Only if the Modified Data Tag is set on the data will be transmitted from ¦
¦ the terminal to the application program ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 3/80------17:48-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ Which command is used to start a transaction at the specified terminal and ¦
¦ at the specified time or interval? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. START ( ) ¦
¦2. BEGIN ( ) ¦
¦3. INITIATE ( ) ¦
¦4. None of the above ( ) ¦
+------+
PgDn/PgUp-Next/Previous Question F10-End
+-Question 4/80------17:20-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ Native Mode Data Stream (NMDS) is a mixture of Buffer Control ¦
¦ Characters(BCC) and text data. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 5/80------17:03
¦
¦
¦
¦
¦ What happens if the program that is LINKed or XCTLed is not in the PPT
¦
¦
¦
¦
+------+------+------
¦1. Nothing happens ( ) ¦
¦2. PGMIDERR occurs ( ) ¦
¦3. LENGERR occurs ( ) ¦
¦4. NOTAUTH error occurs ( ) ¦
+------+
+-Question 6/80------16:48-
¦
¦
¦
¦ True or False
¦ A unique dynamic log is maintained in the virtual storage for each task
¦ associated with a recoverable transaction.
¦
¦
¦
+------+------+------
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 7/80------16:30-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ If the LINKed program in the remote CICS region abends the ABEND code is ¦
¦ returned to the calling program. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 8/80------16:15-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What are the beginning and end points of an LUW called? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. Commit point ( ) ¦
¦2. Sync point ( ) ¦
¦3. Milestones ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 9/80------15:58-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What is the command used to delete a record or a group of records from a ¦
¦ file ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. DELETE ( ) ¦
¦2. CANCEL ( ) ¦
¦3. ZAP ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 10/80------15:38-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What is the command used to obtain the values outside the application ¦
¦ program? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. ADDRESS ( ) ¦
¦2. ASSIGN ( ) ¦
¦3. ALLOCATE ( ) ¦
¦4. GETMAIN ( ) ¦
+------+
+-Question 11/80------15:21-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ When a READ with UPDATE or REWRITE command is used the task will not get ¦
¦ exclusive control over the records. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 12/80------14:54-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ Which is the CICS table where all the TDQ names are registered? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. TDQ Table ( ) ¦
¦2. Transient Data Table ( ) ¦
¦3. Destination Control Table ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 13/80------14:37-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What should be the value of the parameter EXTSEC when you are using an ¦
¦ external security manager? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. External Security Manager name ( ) ¦
¦2. YES ( ) ¦
¦3. NO ( ) ¦
¦4. NOP ( ) ¦
+------+
+-Question 14/80------14:18-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦In order to display a formatted screen, a terminal must receive a series of ¦
¦ data stream called Native Mode Data Stream. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
-Question 15/80------13:57-+
¦
¦
¦
¦
What is the macro that is used to define the database elements of a DL/I ¦
database, an application is authorised to use in the CICS control tables? ¦
¦
¦
¦
------+------+------+
¦1. DFHDLDPSB ( ) ¦
¦2. DFHDLPSB ( ) ¦
¦3. DFHPSB ( ) ¦
¦4. None of the above ( ) ¦
+-Question 16/80------13:04-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What should be the picture clause of the Response field on the working ¦
¦ storage section ? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. X(4) ( ) ¦
¦2. 9(4) ( ) ¦
¦3. S9(4) ( ) ¦
¦4. S9(4) COMP ( ) ¦
+------+
+-Question 17/80------11:38-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What is the command that is used to gain exclusive control over a CICS ¦
¦ resource? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. GET ( ) ¦
¦2. EXCLUSIVE CNTRL ( ) ¦
¦3. ENQ ( ) ¦
¦4. DEQ ( ) ¦
+------+
+-Question 18/80------11:20-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What is the command that is used to wait for an even to occur? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. WAIT ( ) ¦
¦2. WAIT EVENT ( ) ¦
¦3. EVENT WAIT ( ) ¦
¦4. PSOT ( ) ¦
+------+
+-Question 19/80------10:59-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦Reading a record from a TSQ will logically delete the record from the Queue. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 20/80------10:43-+
¦ ¦
¦ ¦
¦ ¦
¦What is the name of the facility which allows a CICS application program in ¦
¦ the local CICS system to access the resources owned by another remote CICS ¦
¦ system? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. Asynchronous Processing ( ) ¦
¦2. Transaction Processing ( ) ¦
¦3. Transaction routing ( ) ¦
¦4. Function request shipping ( ) ¦
+------+
+-Question 21/80------10:27-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What are the CICS sign-on transactions? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. CESN and CESF ( ) ¦
¦2. SESN and SESS ( ) ¦
¦3. CESN and CSSN ( ) ¦
¦4. logon and logoff ( ) ¦
+------+
+-Question 22/80------10:13-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ A HANDLE CONDITION remains active until the end of the program or until ¦
¦ another HANDLE CONDITION command. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 23/80------09:54-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What will happen if the TDQ that you want to delete is not in the DCT? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. QZERO will occur ( ) ¦
¦2. QIDERR will occur ( ) ¦
¦3. LENGERR will occur ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 24/80------09:33-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦The process of restarting a task automatically after abnormal termination is ¦
¦ called ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. Abend processing ( ) ¦
¦2. Automatic Transaction Restart ( ) ¦
¦3. Automatic Logging ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 25/80------09:15-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ Which of the following control program is not associated with the ¦
¦ corresponding control table ? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. File Control Program - File Control Table ( ) ¦
¦2. Task Control Program - Program Control table ( ) ¦
¦3. Task control program - Task control table ( ) ¦
¦4. Temporary Storage program - Temporary Storage Table ( ) ¦
+------+
+-Question 26/80------09:01-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What are the major functions of the CEMT transaction ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. INQUIRE ( ) ¦
¦2. SET ( ) ¦
¦3. PERFORM ( ) ¦
¦4. All of the above ( ) ¦
+------+
+-Question 27/80------08:48-+
¦ ¦
¦ ¦
¦ ¦
¦ Which is the EIB field that contains the value of the Attention Identifier ¦
¦that terminal operator has used to initiate the transfer of information form ¦
¦ the terminal to CICS? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. EIBCALEN ( ) ¦
¦2. EIBFN ( ) ¦
¦3. EIBAID ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 28/80------08:32-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ The command DELETEQ TD can be used to delete an Extrapartition TDQ? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 29/80------08:12-+
¦ ¦
¦ ¦
¦ ¦
¦ The trigger level for a task is defined as one in the DFHDCT. The task is ¦
¦ automatically started as soon as there is an entry in the TDQ. But while ¦
¦the task is running, another entry is written in the TDQ. What will happen? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. CICS will wait for the first transaction to finish ( ) ¦
¦2. CICS will start a new instance of the transaction ( ) ¦
¦3. The system will abend ( ) ¦
¦4. WRITEQ TD command will not be allowed ( ) ¦
+------+
+-Question 30/80------07:06-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ The PUSH and POP commands are used to suspend and reactivate all HANDLE ¦
¦ CONDITION requests currently in effect. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 31/80------04:37-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What is the function of the Terminal Control table? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. To register all CICS users ( ) ¦
¦2. To register all CICS terminals ( ) ¦
¦3. To register all the Programs ( ) ¦
¦4. All of the above ( ) ¦
+------+
+-Question 32/80------04:24-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦What is the option of the write command which is used for inserting a group ¦
¦ of records whose keys are in the ascending order into a file? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. INSERT ( ) ¦
¦2. INTO ( ) ¦
¦3. MASSINSERT ( ) ¦
¦4. GROUPINSERT ( ) ¦
+------+
+-Question 33/80------04:07-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ If you try to ENQ a resource which is already ENQed by another task what ¦
¦ will happen? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. QBUSY condition will be set ( ) ¦
¦2. ENQBUSY condition will be set ( ) ¦
¦3. The resource will be freed ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 34/80------03:53-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What is the command that is used to send un-formatted data to the terminal ¦
¦ or logical unit in a communication network? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. SEND MAP ( ) ¦
¦2. SEND MAPSET ( ) ¦
¦3. SEND ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 35/80------03:37-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦When the TDQ on which a READQ TD operation is performed contains no records ¦
¦ what will happen? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. QBUSY condition will be set ( ) ¦
¦2. QEMPTY condition will be set ( ) ¦
¦3. QZERO condition will be set ( ) ¦
¦4. TDQ will be deleted ( ) ¦
+------+
+-Question 36/80------03:21-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ How to get the sign-on user-id from an application program? ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. ASSIGN command with USERID option ( ) ¦
¦2. ASSIGN command with USER option ( ) ¦
¦3. ASSIGN command with ID option ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 37/80------01:19-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦Which of the following are the CICS application programming security control ¦
¦ facilities? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. Sign-on Table(SNT) ( ) ¦
¦2. Transaction Security ( ) ¦
¦3. Resource Security ( ) ¦
¦4. All of the above ( ) ¦
+------+
+-Question 38/80------01:02-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦CICS forms a layer between the application programs and the operating system ¦
¦ and acts as an interface between the two. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 39/80------00:46-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ What happens when an exceptional condition handling routine of a HANDLE ¦
¦ CONDITION command issues the same command which caused the exception? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. The task is terminated abnormally ( ) ¦
¦2. Nothing will happen ( ) ¦
¦3. Program will go into an infinite loop ( ) ¦
¦4. None of the above ( ) ¦
+------+
+-Question 40/80------00:34-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ DB2 is a hierarchical database ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 41/80------00:20-+
¦ ¦
¦ ¦
¦ ¦
¦ True or False ¦
¦ The attribute character is an visible 1 byte character which precedes a ¦
¦ screen field and determines the characteristics of the field. ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. True ( ) ¦
¦2. False ( ) ¦
+------+
+-Question 42/80------00:07-+
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦If REUSE=YES is specified in the DFHDCT definition of an Intrapartition TDQ, ¦
¦ after a record is read thus logically deleting it, is it recoverable? ¦
¦ ¦
¦ ¦
¦ ¦
+------+------+------+
¦1. Recoverable ( ) ¦
¦2. Not Recoverable ( ) ¦
¦3. Depends on the system ( ) ¦
¦4. Depends on the Task ( ) ¦
+------+