For example the processing of the Orders collected for the whole day. In an Online processing. In a pseudo-conversational CICS program there is no basic looping structure. This is a sample PSEUDO-CONVERSATIONAL CICS program. CICS Interview Questions - mainframesguru. Customer Information Control System(CICS). By providing a sophisticated control and service database/data communication system, the application developer can concentrate on fulfilling specific business needs rather than on communication and internal system details. CICS allows data to be transmitted from the terminal to the host computer, have the data processed, access files/databases, and then have data to be transmitted from the terminal to the host computer, have the data processed, access files/databases, and then have data transmitted back to the terminal. To accomplish that, CICS uses a telecommunication package such as VTAM or TCAM and various file access methods: VSAM, DL/1, DB2, etc. Some of the language abbreviations of CICS are. The control is then passed to the application program (LOAD module). Give a brief description of these fields (Not exceeding a line). A8)FIELD+L? The transaction initiated should be in a position to retrieveinformation pertaining to which transaction has initiated it and from which terminal. Mention CURSOR option in the SEND command.? Code all the relevant options. Mention the one that has the highest priority. Assume that the size of TWA area is 3. What are the advantages if COBOL- II is used in the place of COBOL? Code the above requirement in COBOL- II. A3. 1). The information pertaining to an employee is present in a VSAM/KSDS dataset registered in FCT as . The map and the working storage section of the emp- info are given for reference. If the employee id is found the information has to be sent to the screen (Status field) with the message . If the emp- id key is not found then status field should array the message .
If the Exit option is set to . Use pseudo- conversation technique three (Single PCT and PPT). EMPID, EMPNAME, EMPDESIG, DEPART, SEX, SALARY, STATUS and EXITINP. Terminating the task every time the application needs a response from the user and specifying the next transaction to be started when the end user press any attention key (Enter, PF1 through PF2. PA1,PA2 and Clear) is pseudo- conversational processing. Storing and restoring of states, control flow, error handling)A3. There are CICS translators for Assembler, COBOL, and PL/1. Q3. 6). The XCTL continues task on the same terminal. START can initiate a task on another terminal. The I/O areas, the GETMAIN areas, and the chained Linkage Section areas (Commarea from a higher level) remain. All existing locks and queues also remain in effect. With a LINK, however, program storage is also saved, since the transaction expects to return and use it again. How it can be used? A4. 3). Handle Condition Command: It is used to transfer control to the procedure label specified if. Ignore Condition Command: It causes no action to be taken if the condition specified occurs in. That is control will be returned to the next instruction following the command. No Handle Option: This option can be specified in any CICS command and it will. RESP Option: This option can. If the RESP option is . Please check the application program reference manual for further explanation of these two commands. Once you know that the program won't need it anymore. If you need more, then you must code another HANDLE CONDITION command. An IGNORE command does not create a go- to environment; instead, it gives control back to the next sequential instruction following the command causing the condition. The abnormal condition that occurred will be ignored even if an EXEC CICS HANDLE condition exist. It has the same effect as the EXEC CICS IGNORE condition except that it will not cancel the previous HANDLE CONDITION for any other command. That way it can reenter to itself and continue. These constants will never be modified and shared. If BLL is used for the input commands (e. READ, RECEIVE), it will improve the performance. The parameter list is followed by a group of. Therefore, if an application. The called program may alter the data content of COMMAREA and the changes will be available to the calling program after the RETURN command is issued in the called program. This implies that the called program does not have to specify the COMMAREA option in the RETURN command. How to get the cursor position when we receive a map? A6. 1). The SEND MAP command to be issued must have the CURSOR option ( without. Code the insert cursor (IC) in the DFHMDF BMS macro. II. Code the CURSOR option with a value relative to zero(position 1,1 is zero) . III. Move high values or - 1 to the field length in the symbolic map(and code CURSOR on the SEND command). When the user enters data into the field. When the application program moves DFHBMFSE to the attribute character. By defining it in the BMS macro definition. Q6. 5). When a TDQ contains certain amount of records (Trigger level), a CICS transaction can be started automatically. This does not happen when using a TSQ. TDQ(extra partition) may be used by batch application; TSQ cannot be accessed in batch. The Transient Data Queue is actually a QSAM file. You may update an existing item in a TSQ. A record in a TDQ cannot be updated. Records in TSQ can be read randomly. The TDQ can be read only sequentially. Records in Temporary Storage can be read more than once, while records stored in Temporary Data Queues cannot. Actually this floating map concept is there only in Full BMS where as it is not available in Min. Hence these maps are normally. HEADER=YES,JUSTIFY=FIRST.......... LINE=NEXT.......... M3 DFHMDI .... TRAILER=YES,JUSTIFY=LAST.............. A programmer can use this condition as a way of determining first time usage(of the program). When processing is completed, a DEQ should be executed. What are some other ways that this function can be accomplished? A7. 9). Multithreading is the system environment where the tasks are sharing the same programs load module under the multitasking environment. It is a subset of multitasking since it concerns tasks which use the same program. Xctl is permanent transfer of control . It contains terminal id, time of day and response codes. CEMT is the master terminal transaction that lets you display and change the status of resources - it is the primary CICS service transaction. This method is transparent to CICS, which sees . FRSET turns off the attribute byte; it's used to transmit only changed data from the terminal. They are supported as extra partition transient data files. Dynamic transaction backout is the removal of partial changes made by a failed transaction. Locality of reference requires that the application program should consistently reference instructions and data within a relatively small number of pages. DATAONLY is the SEND MAP operand that specifies only data from the map area should be displayed. It creates a data base request module (DBRM) for the binding step. The link/edit step includes an interface to the CICS/DB2 attachment facility. Since release 1. 6 RDO allows resources (terminals, programs, transactions and files) to be defined interactively while CICS is running. ASRA - most common CICS abend, indicating a program check, identified by a one- byte code in the Program Status Word in the dump. BMS collects the separate output from each command and treats them as one entity. This technique may be used to build CICS reports. The ENQ command reserves any user defined resource for the specific task. Options, none of them good, include. This way, you will get an accurate report from NUMITEMS. Task control commands are SUSPEND, ENQ, and DEQ. How does one bind 2 versions of a CICS transaction with the same module name in two different CICS regions that share the same DB2 subsystem? Both contain optimized code for SQL statements - a package for a single program, module or subroutine contained in the database request module (DBRM) library. A plan may contain multiple packages and pointers to packages. The one CICS module would then exist in a package that could be referenced in two different plans. How many of the following will be needed ? A1. 50)? Define the field with IC in the BMS map. Use CURSOR(n m)??? What are FSET, FRSET ? A1. 64). Happens on an input operation. FSET: Sets MDT on to ensure field is transmitted. Happens on an output operation. FRSET: Resets MDT. Until this happens, field continues to be sent.? PA key is pressed? A1. 68). When PA key is pressed, Data transmission will not happen. This means largest map has to be the first.? As long as they run in the same region. Intrapartition TDQs are queues for communication within regn. Terminate the JCL with /*EOF.? What kind of TDQ can be used? A1. 92). This will not end the Xn. Is there a problem ? A2. 06)? Is a new task created ? Does it cause an implicit SYNCPOINT to be issued ? A2. 07). It is a interval control command. XCTL is used to pass control to a program within the same task. It is a program control command. Needs to be preprocessed. Will cause Storage violation. Random, Sequential, forward and backward. Define path as an FCT and use normal File control commands. In the PCT entry of the transactions that you wish to protect specify the TRANSEC=n. In case of link , it is not needed . COMMAREA is private to that transaction only . COMMAREA length is s. COMMAREA is available only during the transaction is running. TSQ if created with auxiliary option resides in aux memory and available even if main memory crashes. COMMAREA is used to transfer data from one task to another while tsq is used widely within the task as a scratch pad. The options specified within an EXEC CICS command can be in any order. For example 'exec CICS Send From(Msg. Length(3. 0) End- Exec' can also be coded 'exec Cics Send Length(3. From(Msg. 1) End- Exec'. The operator is not defined with the proper authority in the SNT (Sign- . D) EXEC CICS TASK SINGLE('SINGLE') LENGTH(6) END- EXEC. E) EXEC CICS EXCLUSIVE RESOURCE('SINGLE') LENGTH(6) END- EXEC. A3. 07). After the screen is displayed, the operator enters 1 character, the letter 'X'. Where will the cursor now appear on the screen? CICS Pseudo Programming. As of now, we have covered non- conversion and conversion programs. Conversion programs have a major drawback as their think time is considerably high. To overcome this problem, pseudo- conversion programming came into the picture. We will now discuss more about pseudo- conversion programs. Pseudo- Conversion Program. Following is the sequence of events which take place in a pseudo- conversion program . So we can utilize the resources in a pseudo- conversion program till the user gives the input. Step 3 . When the input is received, it is processed and the output is displayed. Step 4 . We will discuss about the techniques for passing data. COMMAREACOMMAREA is known as communication area. COMMAREA is used to pass data between tasks. The following example shows how to pass COMMAREA where WSCOMMAREA and WS- COMMAREA- LENGTH are declared in Working Storage Section . The programs can exist in the same transaction or in different transaction also. It is declared in the Linkage Section of the program at 0. It should have the same picture clause as WS- COMMAREA. Data can be moved back from DFHCOMMAREA to WS- COMMAREA using a MOVE statement. At this stage, the data needs to be saved, because though the task has ended, the transaction has not. When this transaction is to be resumed, it would require the prior status of the task. User enters the input. This now has to be received by the RECEIVE MAP command and then validated. The following example shows how to declare COMMAREA and DFHCOMMAREA . IF AID KEY PRESSED, NEXT *. TRANSACTION SHOULD BE TP0. DATA PASSED FROM WS- COMMAREA TO *. DFHCOMMAREA *. EXEC CICS RETURN. TRANSID('TP0. 02'). COMMAREA(WS- COMMAREA). END- EXEC. ******************************************************************. IF COMMAREA IS NOT EMPTY , THEN TP0. HAS BEEN EXECUTED ONCE *. ALREADY, USER INTERACTION IS FACILITATED BY RECEIVE *. ELSE. EXEC CICS RECEIVE. INTO(WS- MESSAGE). EXEC CICS SEND TEXT. FROM (WS- MESSAGE). END- EXEC. ******************************************************************. TASK ENDS AS A RESULT OF RETURN, NO NEXT TRANSACTION SPECIFIED *. TO BE EXECUTED *. EXEC CICS RETURN. END- EXEC. END- IF. Resources are released as soon as the program is suspended temporarily. It looks as if it is in conversational mode. It has better response time. Return Statements. Following are the two types of return statements which are used in CICS . The next transaction starts when the user presses an AID key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |