IBM Mainframe Forum Index
 
Log In
 
IBM Mainframe Forum Index Mainframe: Search IBM Mainframe Forum: FAQ Register
 

CICS Interview Questions


IBM Mainframe Forums -> Mainframe Interview Questions
Post new topic   Reply to topic
View previous topic :: View next topic  
Author Message
sandeep kumar302

New User


Joined: 14 Mar 2012
Posts: 81
Location: India

PostPosted: Sun Oct 05, 2014 5:22 pm
Reply with quote

Hello,

Here is the list of Interview questions for CICS downloaded from Google.
The list contains only Questions. Can we discuss the answers here.

Can we have answers for these questions also. This might help the fresher's or those who do not have enough CICS experience like me. It will also help the associates who prepare for interview for CICS.

1. Customer Information Control System is an

a) DB/DC control system.
b) Database System.
c) Batch job submission system.
d) Operating system.
a)

2. The general syntax of a macro level statement is EXEC CICS function option (argument)....

a) True. b) False. 

3. CICS commands are the high level language version of CICS macros.

a) True.  b) False.
a)

4. CICS command can be included in application program written in the following languages.

a) COBOL, PL/1, FORTRAN, Assembler.
b) COBOL, PL/1, Assembler, PASCAL.
c) COBOL, FORTRAN, PASCAL, PL/1.
d) None of the above. 
Cics supports cobol, Pl/1, Assembler, pascal…it does not support FORTRAN. So answer is (b)
5. CICS tables are user specified.

a) True.  b) False. ( false—hope)

6. CICS is executed

a) Like an on-line job.
b) Like a batch job. 
c) Combination of on-line and batch.
d) None of the above.
a) or c)

7. The main job step (or the first) in the CICS job is

a) Load system initialization table.
b) Load system set-up.
c) Run system initialization program. 
d) Load CICS batch files.

8. Requirement for COBOL-CICS Program

a) Configuration section, Input-output section, File-control section not needed  b) Environment division is required.
c) File section is required.
d) Linkage section is a must.
a)
9. The following COBOL statements are protected in CICS program.

a) ACCEPT, DISPLAY, RETURN, DATE.
b) DISPLAY, EXHIBIT, DATE, GOBACK.
c) ACCEPT, STOP-RUN, DATE, DISPLAY. 
d) None of the above.

10. The following sequences of steps are performed to create CICS-COBOL program load
module.

a) Translate, Compile, Link edit. 
b) Compile, Translate, Link edit.
c) Compile, Link edit, Translate.
d) Load module is not needed to execute the COBOL program under CICS.
e) None of the above.

11. Multiple CICS regions can not exist under one O/S.

a) True. b) False. 

12. At the link edit time of a CICS application program the load module name must be

a) The program name in PPT & TCP.
b) The program name in PPT & PCT. 
c) The program name in PCT & PCP.
d) The program name in PPT & TCP.
e) None of the above.

13. CSSN is the CICS new sign-on transaction.

a) True. b) False. 

14. A CICS transaction can be initiated

a) Issuing the command run program in the terminal.
b) Initiation a task by the command START TASK.
c) By a 3270 attention identifier. 
d) Submitting a batch job under TSO.

15. CICS-COBOL applications are

a) Fully re-entrant.
b) Quasi re-entrant. 
c) Serially reusable.
d) None of the above.

16. Multithreading is the system environment where multiple Tasks are sharing the same program.

a) True.  b) False.

17. Multitasking is the system environment where multiple tasks are sharing the same program.

a) True. b) False. 

18. Multitasking is a subset of multithreading.

a) True. b) False. 

19. VS COBOL supports

a) CICS command level only. 
b) CICS macro level only.
c) CICS macro & command level.
d) CICS command level with some enhancement.

20. To achieve quasi-reentrancy in COBOL program

a) Separate copy of working storage for each tasks is provided by CICS. 
b) Separate copy of program is provided for each task by CICS.
c) No variable must be placed in the working storage.
d) Quasi-reentrancy is not possible in COBOL program.

21. The HANDLE CONDITION command is used to transfer control to

a) Error routine specified when there is no exception condition.
b) Produce label specified if the exception condition specified occur. 
c) Terminate the program if the error condition occur
d) To the program specified in the CICS RETURN command.

22. A HANDLE CONDITION request is effective only within the Program which uses the handle condition command.

a) True.  b) False.

23. In a single Handle Command the following numbers of conditions can be used.

a) 12  b) 15 c) 8 d) Any number.

24. In a single Ignore Condition the following number of Ignore Condition can be used.

a) 15 b) 12  c) 6 d) none of the above.

25. Once the HANDLE CONDITION Command executed for a condition

a) The specification remains in effect until the program ends or until another HANDLE
CONDITION 
b) The specification remains same until the program ends.
c) The specification remains in effect until another
HANDLE CONDITION.
d) The specification remains in effect until Ignore Condition.

26. The push command is used to reactivate all HANDLE CONDITION requests currently in
effect.

a) True. b) False. 

27. The POP command is used to suspend all HANDLE Conditions requests
currently in effect.

a) True. b) False. 

28. RESP & NOHANDLE are two options available as alternative for HANDLE CONDITION
command for dealing with exceptional condition.

a) True.  b) False.

29. The alternative available for HANDLE CONDITION command for
dealing with exceptional condition.

a) IGNORE CONDITION. 
b) HANDLE AID.
c) RESP Command.
d) RESP & NOHANDLE options.

30. Base locator for linkage is used for Input Command to

a) Improve storage utilization.
b) To protect storage areas.
c) To improve performance. 
d) None of the above.

31. The ADDRESS Command is used to

a) Access information in the CICS system area. 
b) Ensure addressability to a particular area defined in the linkage section.
c) Access information about CICS region.
d) Access information in the CICS work area.

32. The ASSIGN command is used to access the system value outside of the application program.

a) True.  b) False.

33. On specific request CICS provides system related information to each tusk in the form of
Exec Interface Block.

a) True. b) False. 

34. Exceptional condition common to GETMAIN command s

a) NOSTG & NOMEMORY.
b) NOMEMORY & LENGERR.
c) NOSTG & INVRES
d) NOSTG & LENGERR. 

35. In CICS command level, the storage control functions like GETMAIN & FREEMAIN

a) are not necessary.
b) Are necessary since quasi-reentrancy is guaranteed
c) are not necessary since quasi-reentrancy is guaranteed 
d) None of the above.

36. LINK pass control to another program at the same level not expecting to be returned.

a) True. b) False. 

37. The following are the exceptional condition common to both LINK & XCTL command.

a) PGMIDERR & TRNERR.
b) NOAUTH & PGMIDERR. 
c) INVREQ & TRNERR.
d) INVREQ & PGMIDERR.

38. In VS COBOL II CALL statement can also be used in place of LINK or XCTL commands.

a) True.  b) False.

39. If none of TransID, COMMAREA OR LENGTH is specified and if COMMAREA has been
passed by a calling program which command makes the data in COMMAREA available to
the calling program.

a) The XCTL Command.
b) The RETURN Command. 
c) LINK.
d) ROUTE.

40. Load command is used for loading a table dynamically.

a) True.  b) False.

41. PCP uses the following table for controlling applications programs.

a) Processing Program Table. 
b) Program Processing Table.
c) Program Control Table.
d) Process Control Table.

42. PGMLANG is not specified, the default language assumed is

a) Assembler. 
b) COBOL.
c) FORTRAN.
d) PL/1.

43. CICS transaction can be initiated under CICS without registering in PCT.

a) True. b) False. 

44. The need for pseudo-conversational technique is

a) To release working storage during operator entry.
b) To achieve quasi-reentrancy.
c) To release resources during operator entry. 
d) To save memory.

45. The most commonly used pseudo-conversational technique is

a) Multiple transaction identifiers & multiple programs.
b) One transaction identifier & one program. 
c) Multiple transaction identifier and one program.
d) One transaction identifier and multiple program.

46. FCP manages exclusive control over the records in order to maintain the data integrity during record updates.

a) True.  b) False.
47. CICS File Control provides the following services

a) Reading, Writing, Data independence, File open/close.
b) Reading, Writing, Updating and deleting.
c) Reading, Writing, Updating, Deleting, Data Independence, File open/close, Exclusive
control over resource during updation. 
d) Data independence, exclusive control over resources during updation and File
open/close.

48. In CICS file open/ close should taken care by application program.

a) True. b) False. 

49. When using READ command with INTO option to check the file open/ close status

a) Exception NOTOPEN should be used condition.
b) Exception condition NOTFND should be used.
c) No need to check, CICS automatically opens the file. 
d) INVERQ should be used.

50. SET option in READ command reduces the performance compared to INTO option.

a) True. b) False. 

51. To read a non specific record based on a higher part of the key specified, instead of the pull
key,

a) Generic command is used.
b) Read with set option is used.
c) Generic option is used. 
d) None of the above.

52. While updating, exclusive control over the record will be achieved by using

a) SET option
b) UPDATE option. 
c) REWRITE command.
d) LOCK command.
53. In CICS-COBOL program records are updated by using UPDATE command

a) True. b) False. 

54. Common exceptional conditions to WRITE command

a) DUPREC, NOSPACE, LENGERR 
b) INVREQ, DUPREC, LENGERR
c) NOTFND, DUPREC, NOSPACE
d) LENGERR, DUPKEY, NOSPACE

55. DELETE command can also be used as per the following method

a) DELETE command without DATASET option
b) DELETE command with only DATASET option 
c) DELETE command with only RIDFLD option
d) None of the above.

56. To break a transaction dead lock

a) First transaction should be cancelled.
b) First & second both transaction to be cancelled.
c) Second transaction to be cancelled
d) One or both the transaction can be cancelled. 

57. STARTBR command is used to read the starting position of the file

a) True. b) False. 

58. To use READPREV command, the following command must be used prior.

a) STARTBR command 
b) RESETBR command
c) READNEXT command
d) START

59. For multiple browse operations, all commands must have the following parameter options.

a) PARM
b) REQID 
c) COMMAREA
d) RBA

60. WRITE command with RBA option is used to write records sequentially in a file.

a) True.  b) False.

61. Size of PRN Field working storage section is

a) S9(4) COMP
b) S9(6)
c) S9(8) COMP 
d) S9(8)

62. The SQL commands to be used in a CICS application program are limited to the ones listed
below.

a) SELECT, FETCH, UPDATE, DELETE, INSERT 
b) SELECT, OPEN, UPDATE, DELETE, INERT
c) SELECT, FETCH, INCLUDE, UPDATE, INSERT
d) SELECT, INCLUDE, UPDATE, DELETE, INSERT

63. The following interface mechanism connects DB2 to CICS

a) DL/I interface service.
b) CICS attachment facilities. 
c) Program managers.
d) CICS command translator.

64. Terminal control program provides communication services between application programs
and terminals.

a) True.  b) False.

65. ISSUE COPY command is to copy a file from one terminal to another terminal.

a) True. b) False. 

66. Standard Attention Identification list is available in the following

a) EIBAID.
b) DFHAID. 
c) EIBLIB.
d) DFHLIB.
67. HANDLE AID command is used to pass the control to specific label when exception
condition occurs.

a) True. b) False. 

68. HANDLE AID command can be used as alternate to EIBAID checking approach.

a) True.  b) False.

69. The following number of options can be specified in HANDLE AID command.

a) 16
b) 12
c) 8
d) any number. 

70. What happens when executing READ INTO command if the length of the record is less than
the length specified in the LENGTH option

a) will get ERROR
b) will get LENGERR
c) will get ITEMERR
d) None of the above. 
71. To display a formatted screen on an IBM 3270 type terminal

a) A map should be sent to the terminal
b) NMDS to be constructed 
c) BMS map should be constructed
d) None of the above.
72. NMDS is both device independent and format dependent

a) True. b) False. 

73. Symbolic map is primarily used for CICS

a) True. b) False. 

74. BMS map is nothing but

a) Set of instructions written in machine language.
b) A program written in machine language.
c) Set of BMS macros. 
d) A program written in machine language.

75. Within one mapset definition, the map definition can be specified as many times you want.

a) True.  b) False.

76. MFDMSD is used to define a map and its characteristics.

a) True. b) False. 

77. The following are the options used in DFHMSD macro for type parameter.

a) DSECT, MAP &SYSPARM, FINAL. 
b) &SYSPARM, FINAL, LANG, DSECT
c) MAP, &SYSPARM, FINAL, LANG
d) DSECT, MAP, &SYSPARM, LANG

78. The following are the options used in DFHMSD macro for CNTL parameter.

a) FREEKB, FRSET, DSECT, ALARM
b) FREEKB, FRSET, ALARM, PRINT 
c) ALARM, FRSET, DSECT, FREEKB
d) FREEKB, DSECT, ALARM, PRINT.

79. If the DFHMDI marco has the same options specified in the DFHMSD marco, the options
specified in the DFHMDI marco override the ones specified in the DFHMSD marco.

a) True  b) False

80. To enter data into a field which ATTRB option is a must

a) UNPROT
b) PROT
c) IC
d) FSET
81. The main advantage of modified data tag (MDT) is

a) operation speed increases
b) improved communication
c) reduction in data traffic 
d) none of the above

82. If FSET is specified in the ATTRB parameter, the MDT will be set to '1' if the field is
modified, otherwise MDT will be set to '0'

a) True  b) False

83. Data can be received from output field if MDT is set on

a) T rue b) False.

84. Field titles in a map should be defined with the following options
a) PROT, SKIP, BRT
b) PROT, BRT, ASKIP
c) ASKIP, INITIAL, UNPROT
d) INITIAL, ASKIP, PROT 

85. Since physical map is a member of the copy library, we can include the same in application
program by using COBOL copy statement

a) True  b) False

86. For each field specified in the DFHMDF marco, BMS creates

a) Three fields for input and two fields for output
b) Two fields for input and two fields for output
c) Two fields for input and three fields for output
d) three fields for input and three fields for output 

87. All mapsets must be registered in

a) DCT
b) PCT
c) FCT
d) None of the above. 

88. SDF is

a) Screen Definition Facility. 
b) Screen Design Facility.
c) Screen Drafting Facility.
d) None of the above.

89. Z, + and - COBOL edited picture characters can be used in BMS maps to edit numeric
values

a) True  b) False.

90. When using receive map, MAP FAIL exception condition occurs due to

a) When map set is not registered in PPT table
b) When user presses ENTER key without typing data if no FSET is specified 
c) The length of the data mapped is more than zero
d) None of the above

91. To send a map to a terminal, the following fields are needed for each field

a) Length field, flag field, attribute field
b) Attribute field, output field, length field 
c) Flag field, attribute field, output field
d) Attribute field, length field, input field

92. ERASE UP option erases all unprotected fields

a) True  b) False

93. How to clear a screen without using send map

a) By using ERASE.
b) By using SEND CONTROL 
c) By using ERASEUP
d) By using CLEAR SCREEN
e) Can not be cleared without a SEND MAP command.

94. Defining a cursor position by placing -l into the length field is called

a) Static positioning.
b) Relative positioning
c) Symbolic positioning . 
d) None of the above

95. Defining a cursor position by placing 'IC' in the ATTRB parameter of the field is called
dynamic positioning

a) T rue b) False 

96. CICS standard attribute characters list available in the following copy book

a) DFHBMSCA 
b) DFHATTRB
c) DFHEIB
d) DFHEIBLK

97. UCTRAN option is used to translate all lower-case characters to upper-case characters

a) True  b) False

98. CICS treats all characters as upper case only unless we specify TERMINAL ASIS

a) True b) False 

99. BMS maps are not required for BMS text operations

a) True  b) False

100. For multi-text operations

a) ACCUM TEXT and SEND TEXT commands used.
b) SEND TEXT command with ACCUM option and then
SEND PAGE commands used. 
c) SEND TEXT and ACCUM options are used.
d) None of the above.

101. In multi-paging concept, the physical pages are stored in

a) Temporary storage queue. 
b) Transient data queue.
c) Temporary work area.
d) None of the above

102. If panel consists of more than one map and maps position is relative to other maps, then it
is called

a) Static panel .
b) Dynamic map.
c) Dynamic panel 
d) Multi panel.

103. PAGING option with SEND MAP command sends the accumulated maps to the terminal

a) True  b) False

104. Message can be passed to one or more terminal by using

a) ROUTE command. 
b) SEND MESSAGE command
c) ROUTE OPTION in send message command
d) None of the above

105. To use same storage area for more than one map set and map, the following option
should be specified

a) STORAGE = AUTO
b) STORAGE = SAME
c) BASE 
d) TIOAPFX

106. The transient data queue can also be called as

a) Sequential data files
b) Transient data storage
c) Temporary storage file
d) Transient data destination 

107. TDQ can either be input file or an output file but cannot be both.

a) True  b) False

108. TDQ are to be registered in Destination Control Table.

a) T rue  b) False

109. Extra-partition TDQ is typically used for

a) Interface to batch jobs. 
b) Interface among CICS transaction .
c) Message routing.
d) Message broadcast.

110. Intra-partition TDQ can be randomly read

a) True b) False 

111. DELETEQ command cannot be used for

a) Intrapartition TDQ
b) Extrapartition TDQ. 
c) TSQ.
d) None of the above

112. DELETEQTD command deletes the previously read record in the TDQ

a) True b) False 

113. Primary function of the Destination Control Table is

a) To perform input/output operations.
b) To identify all TDQ's and TSQ's.
c) To register control information of TDQ's. 
d) To register control information of TSQ's.

114. Once a record of intra-partition TDQ is read by a transaction

a) The record is logically removed and cannot be recovered.
b) The record is physically removed.
c) The record is physically removed and can be recovered
d) The record is logically removed and can not be read again. 

115. ATI stands for

a) Automatic Task Initiation. 
b) Automatic Transaction Initiation.
c) Automatic Trigger Initiation.
d) None of the above.

116. ATI cannot be used with Extra-partition TDQ

a) True  b)False

117. TDQ's are stored as QSAM files

a) True b) False 

118. TSQ's should be registered in

a) DCT.
b) PCT.
c) FCT
d) None of the above . 

119. The records in TSQ can be read only sequentially

a) True b) False 

120. TSQ can be updated by using

a) WRITEQ 
b) REWRITEQ
c) UPDATE
d) None of the above.

121. To recover a TSQ, it should be registered in TST.

a) True  b) False

122. NUMITEMS option in READQ command is used

a) To number the items in the TSQ.
b) To find the actual number of records in the TSQ. 
c) To find the relative number of the record.
d) None of the above

123. For reading sequentially, NEXT option must be specified in READQ TS command

a) True b) False. 

124. To have exclusive control over TSQ, while using READQ command.

a) ENQ and DEQ commands to be used.
b) UPDATE option to be used. 
c) PROTECT option.
d) None of the above.

125. ASKTIME will place the current date and time in specified working storage area.

a) True b) False 

126. Which option will be used to put current time in working storage area.

a) TIME
b) FORMATTIME 
c) ASKTIME
d) None of the above

127. DELAY command is used to delay processing of a task until the specified time.

a) T rue  b) False

128. POST and DELAY commands are used as pair, as an alternative to the WAIT EVENT.

a) True  b) False

129. The following option is used with START command to start a transaction at a specified
time

a) TIME
b) INTERVAL
c) DELAY with INTERVAL/TIME 
d) TIME or INTERVAL


130. Which specifies the list of programs to be automatically executed by CICS immediately
after startup

a) STI
b) PLT 
c) PPT
d) None of the above.

131. CANCEL command is used to cancel a transaction started by CICS

a) True b) False 

132. SUSPEND command is used to suspend a task

a) True  b) False

133. ENQ command is used to gain exclusive control from the resource .

a) True  b) False

134. RACF stands for

a) Random Access Control Facility
b) Remote Access Control Facility
c) Resource Access Control Facility 
d) None of the above

135. CSSN is the sign-on transaction with ESM
a) True b) False 

136. Under CICS, some of the resources which are considered recoverable are

a) VSAM file, Intra-partition TDQ and Input/output messages from transaction in a
VTAM network. 
b) VSAM files, TSQ, Extrapartition TDQ
c) TDQ, TSQ, Input/ output messages from transaction in a VTAM network.
d) Non-VSAM files, TDQ, TSQ

137. DTB stands for

a) Dynamic Transaction Backup
b) Distributed Transaction Backup
c) Dynamic Transaction Backout 
d) Dynamic Task Backup

138. XRF is Extended Resource Facility

a) True b) False 

139. In CICS, recoverable information are stored in

a) Recovery log.
b) Dynamic log.
c) System log
d) None of the above. 

140. DTB is called ‘backward recovery’

a) True  b) False.
141. Sync points can be declared only from beginning of a task and at the end of the task

a) True b) False. 

142. Automatic Transaction Restart is a CICS capability to restart a transaction

a) Before recovering recoverable resources
b) After the specified interval
c) After the completion of specified task
d) None of the above 

143. To perform automatic logging, the system log must be defined in

a) JCT 
b) PCT
c) PPT
d) TST

144. The tasks which are inactive at the time of crash are called ‘in-flight’ tasks
a) True b) False 

145. After a system crash, the CICS, recovery control program recovers records by

a) Reading the system log forward.
b) Reading the dynamic log
c) Reading ‘in-flight’ task record one by one 
d) Reading ‘not in-flight’ task records

146. Automatic journaling is done by using

a) ‘After image’ record 
b) Dynamic log .
c) ‘Before image’ record
d) System log

147. Using JOURNAL command, to write user defined journal record into a journal file is
called implicit journaling.

a) True b) False 

148. CICS system can be started in one of the following mode

a) Cold start, warm start, emergency restart
b) Cold start, warm start, automatic system restart.
c) Cold start, emergency restart, automatic restart
d) Cold start, warm start, emergency system restart 

149. In the cold start, CICS and system control tables will be completely initialized irrespective
of the previous system activities.

a) True  b) False.

150. Recovery is done in XRF by using

a) ‘Before image’
b) Dual system. 
c) ‘After image’
d) Automatic journaling.

151. ACF stands for Advanced Communication Function

a) True.  b) False.

152. Which is used for debugging purposes.

a) Dump table.
b) Trace table. 
c) TCA.
d) CSA.

153. HANDLE ABEND command is used to intercept as abnormal conditions
of the CICS command executions.

a) True. b) False. 

154. Task can be terminated intentionally by the command

a) CANCEL.
b) ABEND. 
c) SUSPEND.
d) PURGE.

155. DUMP command is used to dump the auxiliary storage areas related to the task.

a) True. b) False. 

156. The CICS Trace Control Program is a

a) Debugging aid. 
b) Recovery tool.
c) Testing tool.
d) Dumping aid.

157. The TRACE command is used to both activate and deactivate the
CICS trace control facility.

a) True.  b) False.

158. EDF stands for

a) Execution Diagnostic Function.
b) Extend Diagnostic Facility.
c) Execution Diagnostic Facility. 
d) Extend Diagnostic Function.

159. Depending on the type of telecommunication access method associated with CICS, EDF
operation have the following no.of modes.

a) One.
b) Two. 
c) Three.
d) None of the above.

160. CECI can only perform syntax checking by a CICS command.

a) True. b) False. 

161. CEBR is used to browse Transient Data Queue.

a) True. b) False. 

162. CEMT transaction performs the following major functions.

a) BROWSE, INQUIRE, PERFORM.
b) INQUIRE, TRACE, BROWSE.
c) PERFORM, SET, TRACE.
d) INQUIRE, PERFORM, SET. 

163. CICS intercommunication can be achieved by

a) Multi-Region operation. 
b) Inter communication
c) Inter active system communication
d) Remote system communication

164. Function Request Shipping is used for intercommunication.

a) True.  b) False.

165. Mirror transactions are the CICS supplied transactions for administrating

a) Asynchronous Processing.
b) Function Request Shipping. 
c) Transaction Routing.
d) Distributed Transaction Processing.

166. In asynchronous Processing, a local CICS application program can initiate remote transaction,
owned by the remote system.

a) True.  b) False.

167. The Relay Program is the CICS supplied program for administrating

a) Asynchronous Processing.
b) Distributed Transaction Processing.
c) Function Request Shipping.
d) Transaction Routing. 

168. Distributed Transaction Processing facility allows to run remote transactions from a local
CICS system.

a) True. b) False. 

167. The function of CICS Translator is

a) Checks the syntax of CICS commands.
b) Converts CICS commands into call statements of host language. 
c) Extracts the CICS commands separately.
d) None of the above

168. Purpose of Program List table is

a) To list the application programs which are to be executed automatically at CICS start-up
time. 
b) To list the application programs which are to be recovered at the time of termination.
c) To lists the programs recorded in PPT.
d) To list the programs and BMS maps recorded in PPT.

169. CICS command to obtain logon-id

a) EXEC CICS ASSIGN with the OPERID option. 
b) EXEC CICS ASSIGN with the USERID option
c) EXEC CICS ASSIGN with the REQID option
d) EXEC CICS ASSIGN without any option.

170. Resident program is a program or map loaded into CICS nucleus.

a) True  b)False

171. Which code is used to obtain information about the status of previously executed CICS
commad.

a) RESPCODE
b) ERRCODE
c) EIBRESP
d) EIBRCODE 

172. In an on-line environment, how can you prevent more than one user accessing the same TDQ
at the same time ?.

a) By issuing EXEC CICS DEQ.
b) By using LOCK option.
c) By using HOLD option.
d) By issuing EXEC CICS ENQ. 

173. When an application is invoked via the EXEC CICS START command with the FROM
option, how does the application gain access to the common area?

a) By issuing EXEC CICS RETRIEVE command. 
b) By issuing EXEC CICS READ command
c) By using DFHCOMMAREA
d) By issuing RETRIEVE option with START command

174. Where Task work Area is defined ?

a) KCT 
b) PCT
c) PPT
d) TCA

175. Which CICS program is responsible for the management of the DSA ?

a) TCP
b) PCP
c) SCP 
d) EIP

176. CEDA transaction is used to add, delete, and change table entries.

a) True  b)False

177. The CICS IF DEEDIT remove all characters other than digits from an alphanumeric field.

a) True  b) False

178. Transaction routing is used for

a) Communicate between local terminals.
b) Communicate between remote terminals.
c) Communicate between CICS transaction and batch program.
d) execute another transaction owned by remote terminal. 

179. When a second READ WITH UPDATE is given against the same file
in the same task prior to releasing the file, what will happen?

a) You will get an INVOPT
b) An INVREQ will take place. 
c)Nothing will happen
d)Program will abend

180. While using SRARTBR with generic key, a backward browse will not work.

a) True  b) False

181. You are doing a mass delete using a generic key. What could you do to determine the number
of records that have been deleted?

a) Using COUNTREC option
b) Using NUMREC option 
c) Using NUMBER option
d) none of the above

182. How should the data area used with NUMREC option be defined?

a) S9(8) comp
b) S9(4) comp-3
c) S9(8) Comp-3
d) S9(4) comp 

183. How do you release page buffers?

a) By issuing UNLOCK
b) By issuing CLEAR
c) By issuing FREEMAIN 
d) By issuing DEQ

184. BROWSE command can not be issued in a CICS program that is pseudo conversational.

a) True b) False 
Back to top
View user's profile Send private message
Bill O'Boyle

CICS Moderator


Joined: 14 Jan 2008
Posts: 2501
Location: Atlanta, Georgia, USA

PostPosted: Mon Oct 06, 2014 6:42 pm
Reply with quote

One hundred eighty four questions? Not on my watch. Where have you demonstrated an attempt to answer some of these on your own?

You've got a pair of brass cohunes....
Back to top
View user's profile Send private message
Rohit Umarjikar

Global Moderator


Joined: 21 Sep 2010
Posts: 3076
Location: NYC,USA

PostPosted: Mon Oct 06, 2014 8:25 pm
Reply with quote

By knowing the answers to these questions might help in getting interview cleared but when it comes to real work then it looks like icon_eek.gif

So instead if one clear the concepts then things becomes more smoother, Personal experience.

So as Bill said let us know if you don't get any question(s), we will try to answers them and you also have to do some reasearch and put some efforts getting the answers as much as you can.
Back to top
View user's profile Send private message
sandeep kumar302

New User


Joined: 14 Mar 2012
Posts: 81
Location: India

PostPosted: Tue Oct 07, 2014 9:46 am
Reply with quote

Bill,
I got the answers of most of the questions which I posted here. I will share those answers here.

Yes Rohit,
I completely agree with you but my intention here was to post a list of questions which might help the associates for interview preparation especially in India.
Back to top
View user's profile Send private message
Rohit Umarjikar

Global Moderator


Joined: 21 Sep 2010
Posts: 3076
Location: NYC,USA

PostPosted: Tue Oct 07, 2014 8:44 pm
Reply with quote

Sandeep, This is really helpful and Great to have a comprehensive list of questions !! icon_smile.gif
Back to top
View user's profile Send private message
sandeep kumar302

New User


Joined: 14 Mar 2012
Posts: 81
Location: India

PostPosted: Wed Oct 08, 2014 6:24 pm
Reply with quote

As discussed, Please find the answers( in green) for first 95 questions. Please correct if the answer is wrong.

1. Customer Information Control System is an

a) DB/DC control system.
b) Database System.
c) Batch job submission system.
d) Operating system.

2. The general syntax of a macro level statement is EXEC CICS function option (argument)....

a) True. b) False. 

3. CICS commands are the high level language version of CICS macros.

a) True.  b) False.

4. CICS command can be included in application program written in the following languages.

a) COBOL, PL/1, FORTRAN, Assembler.
b) COBOL, PL/1, Assembler, PASCAL.
c) COBOL, FORTRAN, PASCAL, PL/1.
d) None of the above.

Cics supports cobol, Pl/1, Assembler. I am not sure but it can be b) or D)

5. CICS tables are user specified.

a) True.  b) False.

6. CICS is executed

a) Like an on-line job.
b) Like a batch job. 
c) Combination of on-line and batch.
d) None of the above.

confusion here

7. The main job step (or the first) in the CICS job is

a) Load system initialization table.
b) Load system set-up.
c) Run system initialization program. 
d) Load CICS batch files.

8. Requirement for COBOL-CICS Program

a) Configuration section, Input-output section, File-control section not needed
b) Environment division is required.
c) File section is required.
d) Linkage section is a must.
a)
9. The following COBOL statements are protected in CICS program.

a) ACCEPT, DISPLAY, RETURN, DATE.
b) DISPLAY, EXHIBIT, DATE, GOBACK.
c) ACCEPT, STOP-RUN, DATE, DISPLAY. 
d) None of the above.

10. The following sequences of steps are performed to create CICS-COBOL program load
module.

a) Translate, Compile, Link edit.
b) Compile, Translate, Link edit.
c) Compile, Link edit, Translate.
d) Load module is not needed to execute the COBOL program under CICS.
e) None of the above.

11. Multiple CICS regions can not exist under one O/S.

a) True. b) False. 

12. At the link edit time of a CICS application program the load module name must be

a) The program name in PPT & TCP.
b) The program name in PPT & PCT.
c) The program name in PCT & PCP.
d) The program name in PPT & TCP.
e) None of the above.

13. CSSN is the CICS new sign-on transaction.

a) True. b) False. 

14. A CICS transaction can be initiated

a) Issuing the command run program in the terminal.
b) Initiation a task by the command START TASK.
c) By a 3270 attention identifier. 
d) Submitting a batch job under TSO.

Please confirm the answers here.

15. CICS-COBOL applications are

a) Fully re-entrant.
b) Quasi re-entrant.
c) Serially reusable.
d) None of the above.

16. Multithreading is the system environment where multiple Tasks are sharing the same program.

a) True.  b) False.

17. Multitasking is the system environment where multiple tasks are sharing the same program.

a) True. b) False. 

18. Multitasking is a subset of multithreading.

a) True. b) False. 

19. VS COBOL supports

a) CICS command level only. 
b) CICS macro level only.
c) CICS macro & command level.
d) CICS command level with some enhancement.
Please confirm this

20. To achieve quasi-reentrancy in COBOL program

a) Separate copy of working storage for each tasks is provided by CICS.
b) Separate copy of program is provided for each task by CICS.
c) No variable must be placed in the working storage.
d) Quasi-reentrancy is not possible in COBOL program.

21. The HANDLE CONDITION command is used to transfer control to

a) Error routine specified when there is no exception condition.
b) Produce label specified if the exception condition specified occur. 
c) Terminate the program if the error condition occur
d) To the program specified in the CICS RETURN command.

22. A HANDLE CONDITION request is effective only within the Program which uses the handle condition command.

a) True.  b) False.

23. In a single Handle Command the following numbers of conditions can be used.

a) 12  b) 15 c) 8 d) Any number.

24. In a single Ignore Condition the following number of Ignore Condition can be used.

a) 15 b) 12  c) 6 d) none of the above.

25. Once the HANDLE CONDITION Command executed for a condition

a) The specification remains in effect until the program ends or until another HANDLE CONDITION
b) The specification remains same until the program ends.
c) The specification remains in effect until another
HANDLE CONDITION.
d) The specification remains in effect until Ignore Condition.

26. The push command is used to reactivate all HANDLE CONDITION requests currently in effect.

a) True. b) False. 

27. The POP command is used to suspend all HANDLE Conditions requests
currently in effect.

a) True. b) False. 

28. RESP & NOHANDLE are two options available as alternative for HANDLE CONDITION command for dealing with exceptional condition.

a) True.  b) False.

29. The alternative available for HANDLE CONDITION command for
dealing with exceptional condition.

a) IGNORE CONDITION. 
b) HANDLE AID.
c) RESP Command.
d) RESP & NOHANDLE options.

30. Base locator for linkage is used for Input Command to

a) Improve storage utilization.
b) To protect storage areas.
c) To improve performance.
d) None of the above.

31. The ADDRESS Command is used to

a) Access information in the CICS system area.
b) Ensure addressability to a particular area defined in the linkage section.
c) Access information about CICS region.
d) Access information in the CICS work area.

32. The ASSIGN command is used to access the system value outside of the application program.

a) True.  b) False.

33. On specific request CICS provides system related information to each tusk in the form of Exec Interface Block.

a) True. b) False. 

34. Exceptional condition common to GETMAIN command s

a) NOSTG & NOMEMORY.
b) NOMEMORY & LENGERR.
c) NOSTG & INVRES
d) NOSTG & LENGERR. 

35. In CICS command level, the storage control functions like GETMAIN & FREEMAIN

a) are not necessary.
b) Are necessary since quasi-reentrancy is guaranteed
c) are not necessary since quasi-reentrancy is guaranteed
d) None of the above.

36. LINK pass control to another program at the same level not expecting to be returned.

a) True. b) False. 

37. The following are the exceptional condition common to both LINK & XCTL command.

a) PGMIDERR & TRNERR.
b) NOAUTH & PGMIDERR. 
c) INVREQ & TRNERR.
d) INVREQ & PGMIDERR.

38. In VS COBOL II CALL statement can also be used in place of LINK or XCTL commands.

a) True.  b) False.

39. If none of TransID, COMMAREA OR LENGTH is specified and if COMMAREA has been passed by a calling program which command makes the data in COMMAREA available to the calling program.

a) The XCTL Command.
b) The RETURN Command. 
c) LINK.
d) ROUTE.

40. Load command is used for loading a table dynamically.

a) True.  b) False.

41. PCP uses the following table for controlling applications programs.

a) Processing Program Table.
b) Program Processing Table.
c) Program Control Table.
d) Process Control Table.

42. PGMLANG is not specified, the default language assumed is

a) Assembler. 
b) COBOL.
c) FORTRAN.
d) PL/1.

43. CICS transaction can be initiated under CICS without registering in PCT.

a) True. b) False. 

44. The need for pseudo-conversational technique is

a) To release working storage during operator entry.
b) To achieve quasi-reentrancy.
c) To release resources during operator entry.
d) To save memory.

45. The most commonly used pseudo-conversational technique is

a) Multiple transaction identifiers & multiple programs.
b) One transaction identifier & one program.
c) Multiple transaction identifier and one program.
d) One transaction identifier and multiple program.

46. FCP manages exclusive control over the records in order to maintain the data integrity during record updates.
a) True.  b) False.

47. CICS File Control provides the following services

a) Reading, Writing, Data independence, File open/close.
b) Reading, Writing, Updating and deleting.
c) Reading, Writing, Updating, Deleting, Data Independence, File open/close, Exclusive
control over resource during updation. 
d) Data independence, exclusive control over resources during updation and File
open/close.

48. In CICS file open/ close should taken care by application program.

a) True. b) False. 

49. When using READ command with INTO option to check the file open/ close status

a) Exception NOTOPEN should be used condition.
b) Exception condition NOTFND should be used.
c) No need to check, CICS automatically opens the file. 
d) INVERQ should be used.

50. SET option in READ command reduces the performance compared to INTO option.

a) True. b) False. 

51. To read a non specific record based on a higher part of the key specified, instead of the pull key,

a) Generic command is used.
b) Read with set option is used.
c) Generic option is used.
d) None of the above.

52. While updating, exclusive control over the record will be achieved by using

a) SET option
b) UPDATE option. 
c) REWRITE command.
d) LOCK command.

53. In CICS-COBOL program records are updated by using UPDATE command

a) True. b) False. 

54. Common exceptional conditions to WRITE command

a) DUPREC, NOSPACE, LENGERR
b) INVREQ, DUPREC, LENGERR
c) NOTFND, DUPREC, NOSPACE
d) LENGERR, DUPKEY, NOSPACE

55. DELETE command can also be used as per the following method
a) DELETE command without DATASET option
b) DELETE command with only DATASET option
c) DELETE command with only RIDFLD option
d) None of the above.

56. To break a transaction dead lock

a) First transaction should be cancelled.
b) First & second both transaction to be cancelled.
c) Second transaction to be cancelled
d) One or both the transaction can be cancelled. 

57. STARTBR command is used to read the starting position of the file

a) True. b) False. 

58. To use READPREV command, the following command must be used prior.

a) STARTBR command
b) RESETBR command
c) READNEXT command
d) START

59. For multiple browse operations, all commands must have the following parameter options.

a) PARM
b) REQID
c) COMMAREA
d) RBA

60. WRITE command with RBA option is used to write records sequentially in a file.

a) True.  b) False.

61. Size of PRN Field working storage section is

a) S9(4) COMP
b) S9(6)
c) S9(8) COMP
d) S9(8)

62. The SQL commands to be used in a CICS application program are limited to the ones listed below.

a) SELECT, FETCH, UPDATE, DELETE, INSERT
b) SELECT, OPEN, UPDATE, DELETE, INERT
c) SELECT, FETCH, INCLUDE, UPDATE, INSERT
d) SELECT, INCLUDE, UPDATE, DELETE, INSERT

63. The following interface mechanism connects DB2 to CICS

a) DL/I interface service.
b) CICS attachment facilities. 
c) Program managers.
d) CICS command translator.

64. Terminal control program provides communication services between application programs and terminals.
a) True.  b) False.

65. ISSUE COPY command is to copy a file from one terminal to another terminal.

a) True. b) False. 

66. Standard Attention Identification list is available in the following

a) EIBAID.
b) DFHAID. 
c) EIBLIB.
d) DFHLIB.

67. HANDLE AID command is used to pass the control to specific label when exception condition occurs.

a) True. b) False. 

68. HANDLE AID command can be used as alternate to EIBAID checking approach.

a) True.  b) False.

69. The following number of options can be specified in HANDLE AID command.

a) 16
b) 12
c) 8
d) any number. 

70. What happens when executing READ INTO command if the length of the record is less than the length specified in the LENGTH option

a) will get ERROR
b) will get LENGERR
c) will get ITEMERR
d) None of the above.

71. To display a formatted screen on an IBM 3270 type terminal

a) A map should be sent to the terminal
b) NMDS to be constructed 
c) BMS map should be constructed
d) None of the above.

72. NMDS is both device independent and format dependent

a) True. b) False. 

73. Symbolic map is primarily used for CICS

a) True. b) False. 

74. BMS map is nothing but

a) Set of instructions written in machine language.
b) A program written in machine language.
c) Set of BMS macros.
d) A program written in machine language.

75. Within one mapset definition, the map definition can be specified as many times you want.

a) True.  b) False.

76. MFDMSD is used to define a map and its characteristics.

a) True. b) False. 

77. The following are the options used in DFHMSD macro for type parameter.

a) DSECT, MAP &SYSPARM, FINAL.
b) &SYSPARM, FINAL, LANG, DSECT
c) MAP, &SYSPARM, FINAL, LANG
d) DSECT, MAP, &SYSPARM, LANG

78. The following are the options used in DFHMSD macro for CNTL parameter.

a) FREEKB, FRSET, DSECT, ALARM
b) FREEKB, FRSET, ALARM, PRINT
c) ALARM, FRSET, DSECT, FREEKB
d) FREEKB, DSECT, ALARM, PRINT.

79. If the DFHMDI marco has the same options specified in the DFHMSD marco, the options
specified in the DFHMDI marco override the ones specified in the DFHMSD marco.

a) True  b) False

80. To enter data into a field which ATTRB option is a must

a) UNPROT
b) PROT
c) IC
d) FSET
81. The main advantage of modified data tag (MDT) is

a) operation speed increases
b) improved communication
c) reduction in data traffic
d) none of the above

82. If FSET is specified in the ATTRB parameter, the MDT will be set to '1' if the field is modified, otherwise MDT will be set to '0'

a) True  b) False

83. Data can be received from output field if MDT is set on

a) True b) False.

84. Field titles in a map should be defined with the following options
a) PROT, SKIP, BRT
b) PROT, BRT, ASKIP
c) ASKIP, INITIAL, UNPROT
d) INITIAL, ASKIP, PROT

85. Since physical map is a member of the copy library, we can include the same in application program by using COBOL copy statement

a) True  b) False

86. For each field specified in the DFHMDF marco, BMS creates

a) Three fields for input and two fields for output
b) Two fields for input and two fields for output
c) Two fields for input and three fields for output
d) three fields for input and three fields for output

87. All mapsets must be registered in

a) DCT
b) PCT
c) FCT
d) None of the above.

88. SDF is

a) Screen Definition Facility.
b) Screen Design Facility.
c) Screen Drafting Facility.
d) None of the above.

89. Z, + and - COBOL edited picture characters can be used in BMS maps to edit numeric values

a) True  b) False.

90. When using receive map, MAP FAIL exception condition occurs due to

a) When map set is not registered in PPT table
b) When user presses ENTER key without typing data if no FSET is specified
c) The length of the data mapped is more than zero
d) None of the above

91. To send a map to a terminal, the following fields are needed for each field

a) Length field, flag field, attribute field
b) Attribute field, output field, length field
c) Flag field, attribute field, output field
d) Attribute field, length field, input field

92. ERASE UP option erases all unprotected fields

a) True  b) False

93. How to clear a screen without using send map

a) By using ERASE.
b) By using SEND CONTROL 
c) By using ERASEUP
d) By using CLEAR SCREEN
e) Can not be cleared without a SEND MAP command.

94. Defining a cursor position by placing -l into the length field is called

a) Static positioning.
b) Relative positioning
c) Symbolic positioning .
d) None of the above

95. Defining a cursor position by placing 'IC' in the ATTRB parameter of the field is called dynamic positioning

a) T rue b) False

I will try to provide the answers for remaining quesitons.
Back to top
View user's profile Send private message
View previous topic :: :: View next topic  
Post new topic   Reply to topic View Bookmarks
All times are GMT + 6 Hours
Forum Index -> Mainframe Interview Questions

 


Similar Topics
Topic Forum Replies
No new posts Associating a USERID with a CICS-Libe... CICS 0
No new posts omegamon for cics -UNSUPPORTED ENVIRO... CICS 2
No new posts Help needed in automation cics transa... CLIST & REXX 1
No new posts How to Login in to cics region and is... CICS 9
No new posts Spoolopen cics CICS 0
Search our Forums:

Back to Top