Do you want to get hired for a job in the Customer Information Control System? Are you planning on appearing in the interview for your next dream job? Do you want to be prepared enough to crack the interview for your next dream job? Here are some handpicked questions that might help you in a CICS interview. We intend to educate you through this article about the probable questions you might face in an interview.
In this growing and fast-paced world, there is a need for effective resource-sharing management with a faster response. It has become quite important for organizations to get a system that authorizes users, effectively allocates resources, and passes on database requests by applications to the appropriate managers. In these aspects, CICS, or Customer Information Control System helps organizations. It is a middleware made to support high-volume, rapid online transactions. CICS replaces the functions and structure of an operating system, specifically regarding communication with numerous terminal devices.
Now we will go through some FAQs about CICS Interviews. Then we will move on to the CICS Interview questions and answers separately for each of the following-
The function of the COBOL compiler depends upon the Integrated CICS translator when one uses it from the compiler option. The integrated CICS translator is put into use by the compiler to interact with CICS statements that are found in the source program. The translator then acts on the CICS statements before going back and telling the compiler what native language statements are supposed to be produced. Comparing Integrated Translator to Separate translator, there are no constraints in managing statements included in CICS and native Cobol in the Source Program.
ASKTIME is the command one should use if one wants to access the current date and time.
|If you want to enrich your career and become a professional in IBM DB2, then enroll in "IBM DB2 Training". This course will help you to achieve excellence in this domain.|
The main difference is that the XTCL command transfers the control to an application that lies at the same logical level and does not expect to control it back. On the other hand, the LINK command passes the control to an application program to the next logical level and expects a control back.
CICS, which stands for Customer Information Control System, is software created by IBM that keeps track of communications. Batch and time-sharing are IBM's mainframe operating systems.
A CICS task is essentially a single-time CICS transaction execution. When the enter key is hit after entering the key into the transaction, this procedure kickstarts. Until the software returns control to CICS, the execution process is still in progress.
Program Control Table, or PCT, collects all transaction IDs linked to their related programs. Whereas the FCT, which stands for File Control Table, contains an exhaustive list of all the files utilized by CICS, together with information on their status and record length.
The process to start a CICS transaction is very simple. You can initiate by pressing the CLEAR button to clear the screen. Following that, you enter the transaction identifier, either by itself or follow it up with data on the screen's command line.
Every job in a command-level environment has a control block known as the EXEC interface block (EIB) associated with it, apart from the usual CICS control blocks. All fields in the EIB can be accessed by name by an application program.
Yes. If one wants to use dynamic calls in CICS, one must specify the call function in a PPT, and the calling program must use the CALL identifier.\
CICS primarily deals with the creation and execution of web applications. It makes a seamless communication channel through the terminal for structured data to be received and sent. The accessibility of databases and the files they contain is one of the most important features of CICS.
CICS is an acronym for the term Customer Information Control System. It is a system control software in charge of online transactions of IBM management. It also assesses the telecommunication from IBM. The mainframe OS of IBM is primarily time-sharing as well as batch. CICS is a kind of processing that was mainly started by using a single request that one or more objects can also effectuate.
Following are the reasons Integrated CICS translators are used:
The most important difference between call and link in CICS is that when it comes to calling, whenever any changes or alterations are made to the program, one also needs to compile the calling program. The same is not necessary when it comes to links.
One can initiate a new task with the help of the START command. It is a command specifically for interval control. Whereas the XCTL command is used to transfer control to a program running within the same job, it is a command specifically for program control
|Related Article: Oracle DBA Tutorial|
CICS Execute Master Terminal is the full form of CEMT. Its purpose is to serve as a transactional ID for the system, and it is primarily used to check on and change the status of CICS environments and other system processes. Transactions, tasks, files, programs, etc., may all be managed with ease because of CEMT. One can also change the status of the resources with CEMT's help. By entering CEMT and clicking ENTER, we can view all available possibilities.
CICS uses BMS or Basic Mapping Support to define and format the screen. The screen so defined is referred to as MAP. The collection of it is called the Mapset.
Some IBM-supplied control tables that CICS uses need to be updated regularly with the application information. Here is the list of some of the most important control tables:
The most popular and concise name for a communication area happens to be COMMAREA. It is the name of the data area where information or data is stored and transmitted between programs. It serves as a data transmission medium between various programs loaded by a group of transactions or a single transaction. COMMAREA is primarily a temporary storage place. To provide information back to the program that performs the Transaction ID so that the user may utilize it when performing that transit, COMMAREA is typically used in parallel with the TRANSID option. The longest piece of data that can transit over COMMAREA can go up to 64K.
In the context of CICS, the primary difference lies between task and transaction because many users can invoke a transaction at once, but each user has to initiate their task.
Here are some of the most commonly used CICS programs:
TRANSID is an acronym for the term transaction identifier. Four letters in this character code can be used to invoke a task in CICS.
Minimum, Standard, and Full are the 3 BMS options used in CICS.
We can make use of ASKIP for the attribute value of the Skipper field. When it comes to the stopper field, we can make use of PROT.
We can utilize the EXEC CICS UNLOCK END-EXEC command to release a record where you gain exclusive control.
There are three types of processes one can utilize to create a MAP in CICS, namely, DFHMDF, DFHMSD, and DFHMDI.
Mapset is a collection of edited and linked maps that form a load module. It must consist of a PPT entry with names starting from one to seven chars.
Modified Data Tag is known by its acronym MDT. During the execution of an input operation, MDT is put to use. When you alter a field's value on the screen, MDT acts like a bit of an attribute byte. Flag Reset is known by its acronym FRSET. It is used mainly to reset MDT and disable the modified data tag in all the fields on the screen's attribute bytes. An altered data tag that has been turned on once—by the user or the program—continues to remain on until expressly turned off, even across multiple screen broadcasts. FSET, however, activates the changed data tag. FSET, on the other hand, activates the altered data tag. To ensure that MDT sends out the field, it is put to. During an output operation, FSET is utilized. The user may update the field if you don't mention this.
One can classify CICS programs into the following types:
- Conversational Programs
- Pseudo Conversational Programs
- Non-conversational programs
The information collected and stored in TIOA is transferred into the designated, reserved space in CICS using the INTO option. Moreover, the address of the TIOA to the designated BLL cell or "address-of" a linkage section is also returned to the original position with the use of the SET option.
If there are multiple maps in usage and one wants to determine the storage in the symbolic map, then the first and foremost thing to be done is the largest map.
The way that several CICS address spaces inside a single CPU may communicate and share resources is possible with the help of MRO or Multi-Region Operation.
The acronym PCT in the context of CICS stands for Program Control Table. A comprehensive collection of transaction IDs, along with their appropriate related applications, altogether make up for the list of PCT. On the contrary, FCT is the acronym used for File Control Table. It consists of a comprehensive list of all the files that CICS uses and information on their status and record length.
Deadlock occurs when two or more tasks are waiting for a resource to either be held free or prevent each other from accessing it.
To solve an ASRA ABEND, one has to begin with CEBRA and then reach out for instructions on offsets.
After calling the program, one needs to check the EIBRESP to handle problems better in CICS processes. The HANDLE condition is then put to use to implement a substitute option.
AEIY is primarily the length error code. This error occurs when the length of the source data crosses the limit of the length of the receiving field.
With a DFHMSD process, you can group a single map into a map set.
When one presses the PF key, there is a data transmission on RECEIVE MAP. In contrast, there would be no data transmission if one presses the PA key.
We can use the EXEC CICS SYNCPOINT and assume it is LUW. There will be no termination of Xn, but it will terminate the transaction.
The benefits of implementing CICS are manifold. A lot of enterprises have traditionally run various CICS regions with dedicated responsibilities to each one of them. Because of its high availability and continuous operation, CICS has exceeded the business requirements. This is the reason why it is in demand these days. It has been able to create a lot of opportunities for youth these days. We hope we were able to effectively contribute to your preparation of CICS interview questions through this article.
Stay updated with our newsletter, packed with Tutorials, Interview Questions, How-to's, Tips & Tricks, Latest Trends & Updates, and more ➤ Straight to your inbox!
|IBM DB2 Training||Dec 10 to Dec 25|
|IBM DB2 Training||Dec 13 to Dec 28|
|IBM DB2 Training||Dec 17 to Jan 01|
|IBM DB2 Training||Dec 20 to Jan 04|
Madhuri is a Senior Content Creator at MindMajix. She has written about a range of different topics on various technologies, which include, Splunk, Tensorflow, Selenium, and CEH. She spends most of her time researching on technology, and startups. Connect with her via LinkedIn and Twitter .
Copyright © 2013 - 2022 MindMajix Technologies