+-Question 1/80------18:42-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What is the general Command format of CICS ? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. EXEC PGM followed by the command ( ) ¦

¦2. EXEC TASK followed by the command ( ) ¦

¦3. EXEC CICS followed by the command ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 2/80------18:08-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ Only if the Modified Data Tag is set on the data will be transmitted from ¦

¦ the terminal to the application program ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 3/80------17:48-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ Which command is used to start a transaction at the specified terminal and ¦

¦ at the specified time or interval? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. START ( ) ¦

¦2. BEGIN ( ) ¦

¦3. INITIATE ( ) ¦

¦4. None of the above ( ) ¦

+------+

PgDn/PgUp-Next/Previous Question F10-End

+-Question 4/80------17:20-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ Native Mode Data Stream (NMDS) is a mixture of Buffer Control ¦

¦ Characters(BCC) and text data. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 5/80------17:03

¦

¦

¦

¦

¦ What happens if the program that is LINKed or XCTLed is not in the PPT

¦

¦

¦

¦

+------+------+------

¦1. Nothing happens ( ) ¦

¦2. PGMIDERR occurs ( ) ¦

¦3. LENGERR occurs ( ) ¦

¦4. NOTAUTH error occurs ( ) ¦

+------+

+-Question 6/80------16:48-

¦

¦

¦

¦ True or False

¦ A unique dynamic log is maintained in the virtual storage for each task

¦ associated with a recoverable transaction.

¦

¦

¦

+------+------+------

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 7/80------16:30-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ If the LINKed program in the remote CICS region abends the ABEND code is ¦

¦ returned to the calling program. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 8/80------16:15-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What are the beginning and end points of an LUW called? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. Commit point ( ) ¦

¦2. Sync point ( ) ¦

¦3. Milestones ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 9/80------15:58-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What is the command used to delete a record or a group of records from a ¦

¦ file ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. DELETE ( ) ¦

¦2. CANCEL ( ) ¦

¦3. ZAP ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 10/80------15:38-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What is the command used to obtain the values outside the application ¦

¦ program? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. ADDRESS ( ) ¦

¦2. ASSIGN ( ) ¦

¦3. ALLOCATE ( ) ¦

¦4. GETMAIN ( ) ¦

+------+

+-Question 11/80------15:21-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ When a READ with UPDATE or REWRITE command is used the task will not get ¦

¦ exclusive control over the records. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 12/80------14:54-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ Which is the CICS table where all the TDQ names are registered? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. TDQ Table ( ) ¦

¦2. Transient Data Table ( ) ¦

¦3. Destination Control Table ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 13/80------14:37-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What should be the value of the parameter EXTSEC when you are using an ¦

¦ external security manager? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. External Security Manager name ( ) ¦

¦2. YES ( ) ¦

¦3. NO ( ) ¦

¦4. NOP ( ) ¦

+------+

+-Question 14/80------14:18-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦In order to display a formatted screen, a terminal must receive a series of ¦

¦ data stream called Native Mode Data Stream. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

-Question 15/80------13:57-+

¦

¦

¦

¦

What is the macro that is used to define the database elements of a DL/I ¦

database, an application is authorised to use in the CICS control tables? ¦

¦

¦

¦

------+------+------+

¦1. DFHDLDPSB ( ) ¦

¦2. DFHDLPSB ( ) ¦

¦3. DFHPSB ( ) ¦

¦4. None of the above ( ) ¦

+-Question 16/80------13:04-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What should be the picture clause of the Response field on the working ¦

¦ storage section ? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. X(4) ( ) ¦

¦2. 9(4) ( ) ¦

¦3. S9(4) ( ) ¦

¦4. S9(4) COMP ( ) ¦

+------+

+-Question 17/80------11:38-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What is the command that is used to gain exclusive control over a CICS ¦

¦ resource? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. GET ( ) ¦

¦2. EXCLUSIVE CNTRL ( ) ¦

¦3. ENQ ( ) ¦

¦4. DEQ ( ) ¦

+------+

+-Question 18/80------11:20-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What is the command that is used to wait for an even to occur? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. WAIT ( ) ¦

¦2. WAIT EVENT ( ) ¦

¦3. EVENT WAIT ( ) ¦

¦4. PSOT ( ) ¦

+------+

+-Question 19/80------10:59-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦Reading a record from a TSQ will logically delete the record from the Queue. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 20/80------10:43-+

¦ ¦

¦ ¦

¦ ¦

¦What is the name of the facility which allows a CICS application program in ¦

¦ the local CICS system to access the resources owned by another remote CICS ¦

¦ system? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. Asynchronous Processing ( ) ¦

¦2. Transaction Processing ( ) ¦

¦3. Transaction routing ( ) ¦

¦4. Function request shipping ( ) ¦

+------+

+-Question 21/80------10:27-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What are the CICS sign-on transactions? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. CESN and CESF ( ) ¦

¦2. SESN and SESS ( ) ¦

¦3. CESN and CSSN ( ) ¦

¦4. logon and logoff ( ) ¦

+------+

+-Question 22/80------10:13-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ A HANDLE CONDITION remains active until the end of the program or until ¦

¦ another HANDLE CONDITION command. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 23/80------09:54-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What will happen if the TDQ that you want to delete is not in the DCT? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. QZERO will occur ( ) ¦

¦2. QIDERR will occur ( ) ¦

¦3. LENGERR will occur ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 24/80------09:33-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦The process of restarting a task automatically after abnormal termination is ¦

¦ called ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. Abend processing ( ) ¦

¦2. Automatic Transaction Restart ( ) ¦

¦3. Automatic Logging ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 25/80------09:15-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ Which of the following control program is not associated with the ¦

¦ corresponding control table ? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. File Control Program - File Control Table ( ) ¦

¦2. Task Control Program - Program Control table ( ) ¦

¦3. Task control program - Task control table ( ) ¦

¦4. Temporary Storage program - Temporary Storage Table ( ) ¦

+------+

+-Question 26/80------09:01-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What are the major functions of the CEMT transaction ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. INQUIRE ( ) ¦

¦2. SET ( ) ¦

¦3. PERFORM ( ) ¦

¦4. All of the above ( ) ¦

+------+

+-Question 27/80------08:48-+

¦ ¦

¦ ¦

¦ ¦

¦ Which is the EIB field that contains the value of the Attention Identifier ¦

¦that terminal operator has used to initiate the transfer of information form ¦

¦ the terminal to CICS? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. EIBCALEN ( ) ¦

¦2. EIBFN ( ) ¦

¦3. EIBAID ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 28/80------08:32-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ The command DELETEQ TD can be used to delete an Extrapartition TDQ? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 29/80------08:12-+

¦ ¦

¦ ¦

¦ ¦

¦ The trigger level for a task is defined as one in the DFHDCT. The task is ¦

¦ automatically started as soon as there is an entry in the TDQ. But while ¦

¦the task is running, another entry is written in the TDQ. What will happen? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. CICS will wait for the first transaction to finish ( ) ¦

¦2. CICS will start a new instance of the transaction ( ) ¦

¦3. The system will abend ( ) ¦

¦4. WRITEQ TD command will not be allowed ( ) ¦

+------+

+-Question 30/80------07:06-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ The PUSH and POP commands are used to suspend and reactivate all HANDLE ¦

¦ CONDITION requests currently in effect. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 31/80------04:37-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What is the function of the Terminal Control table? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. To register all CICS users ( ) ¦

¦2. To register all CICS terminals ( ) ¦

¦3. To register all the Programs ( ) ¦

¦4. All of the above ( ) ¦

+------+

+-Question 32/80------04:24-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦What is the option of the write command which is used for inserting a group ¦

¦ of records whose keys are in the ascending order into a file? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. INSERT ( ) ¦

¦2. INTO ( ) ¦

¦3. MASSINSERT ( ) ¦

¦4. GROUPINSERT ( ) ¦

+------+

+-Question 33/80------04:07-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ If you try to ENQ a resource which is already ENQed by another task what ¦

¦ will happen? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. QBUSY condition will be set ( ) ¦

¦2. ENQBUSY condition will be set ( ) ¦

¦3. The resource will be freed ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 34/80------03:53-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What is the command that is used to send un-formatted data to the terminal ¦

¦ or logical unit in a communication network? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. SEND MAP ( ) ¦

¦2. SEND MAPSET ( ) ¦

¦3. SEND ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 35/80------03:37-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦When the TDQ on which a READQ TD operation is performed contains no records ¦

¦ what will happen? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. QBUSY condition will be set ( ) ¦

¦2. QEMPTY condition will be set ( ) ¦

¦3. QZERO condition will be set ( ) ¦

¦4. TDQ will be deleted ( ) ¦

+------+

+-Question 36/80------03:21-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ How to get the sign-on user-id from an application program? ¦

¦ ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. ASSIGN command with USERID option ( ) ¦

¦2. ASSIGN command with USER option ( ) ¦

¦3. ASSIGN command with ID option ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 37/80------01:19-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦Which of the following are the CICS application programming security control ¦

¦ facilities? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. Sign-on Table(SNT) ( ) ¦

¦2. Transaction Security ( ) ¦

¦3. Resource Security ( ) ¦

¦4. All of the above ( ) ¦

+------+

+-Question 38/80------01:02-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦CICS forms a layer between the application programs and the operating system ¦

¦ and acts as an interface between the two. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 39/80------00:46-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ What happens when an exceptional condition handling routine of a HANDLE ¦

¦ CONDITION command issues the same command which caused the exception? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. The task is terminated abnormally ( ) ¦

¦2. Nothing will happen ( ) ¦

¦3. Program will go into an infinite loop ( ) ¦

¦4. None of the above ( ) ¦

+------+

+-Question 40/80------00:34-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ DB2 is a hierarchical database ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 41/80------00:20-+

¦ ¦

¦ ¦

¦ ¦

¦ True or False ¦

¦ The attribute character is an visible 1 byte character which precedes a ¦

¦ screen field and determines the characteristics of the field. ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. True ( ) ¦

¦2. False ( ) ¦

+------+

+-Question 42/80------00:07-+

¦ ¦

¦ ¦

¦ ¦

¦ ¦

¦If REUSE=YES is specified in the DFHDCT definition of an Intrapartition TDQ, ¦

¦ after a record is read thus logically deleting it, is it recoverable? ¦

¦ ¦

¦ ¦

¦ ¦

+------+------+------+

¦1. Recoverable ( ) ¦

¦2. Not Recoverable ( ) ¦

¦3. Depends on the system ( ) ¦

¦4. Depends on the Task ( ) ¦

+------+