0% found this document useful (0 votes)
483 views159 pages

Questions

IBMMAINFRAMES.com IMPORTANT INTERVIEW TOPICS COBOL Redefines, Renames and condition names Index and Subscript Static Call and Dynamic Call String, Unstring and Inspect.

Uploaded by

Ravindra Bisht
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
483 views159 pages

Questions

IBMMAINFRAMES.com IMPORTANT INTERVIEW TOPICS COBOL Redefines, Renames and condition names Index and Subscript Static Call and Dynamic Call String, Unstring and Inspect.

Uploaded by

Ravindra Bisht
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 159

IBMMAINFRAMES.

com

IMPORTANT INTERVIEW TOPICS


COBOL
Redefines, Renames & Condition Names
Search & Search All
Perform varying.
Index & Subscript
Static Call & Dynamic Call
String, Unstring & Inspect.
Usage Clauses.
Error Codes.
Amode & Rmode
CICS
TSQ & TDQ
IBM Supplied Transaction.
Types of transaction inititation.
BMS (MDT, Cursor Positioning, TIOA,Skipper&stopper)
Pseudo Conversation (Types)
Link & Xctl
Browsing & Read Prev
STI & ATI
Start, Delay, Load, DEQ, Rollback, SyncPoint.
Page 1 of 260 IBMMAINFRAMES.com
DB2
Tables,TableSpace,DataBase,Index,IndexSpace,BufferPool
Type of tablespaces
DML --Queries,SubQueries,Joins,Corr.SubQuery
DCL -Grant, Revoke
Cursors -Fetch, Open, Close
Bind , Rebind.
DCLGEN, SPUFI, QMF
Locks, Isolation Level, Cursor Stability, Repetable Read.
Coming, Rollback, Database Recovery.
Utilities: Load, runstats, Copy
SQL Codes.
MVS
JES2, JES3
O/S -MVS, DOS, VSAM
Paging, Swapping.
Frames, Slots
Communication Devices, Control Units.
Processors
System Initialisation.
System DataSet.

Page 2 of 260 IBMMAINFRAMES.com


JCL
Job Card
Exec, Prgm/ Proc, Restart, Cond, Param
DD ------Disp, Space, DCB
Sysin,Sysout, Sysprint, Sysdumb,Sysabend
Instream & Catalog Procedure
Utilities -IEBGEN, SORT, IEBCOPY
RESTART & check pont parameter
COND Parameter
Notify, Parm, Dprty, class
GDG --Limit, Scratch
VSAM
CI, CA, Splits
Freespaces.
Organisation of VSAM
ESDS, KSDS, RRDS, LDS
Define Cluster , AIX, BuildAoix, Verify, REPRO
IDCAMS
Page 3 of 260 IBMMAINFRAMES.com
POPULAR INTERVIEW QUESTIONS

COBOL & COBOL II


Q1) Name the divisions in a COBOL program ?.
A1) IDENTIFICATION DIVISION, ENVIRONMENT DIVISION, DATA DIVISION, PROCEDURE
DIVISION.
Q2) What are the different data types available in COBOL?
A2) Alpha-numeric (X), alphabetic (A) and numeric (9).
Q3) What does the INITIALIZE verb do? -GS
A3) Alphabetic, Alphanumeric fields & alphanumeric edited items are set to SPACE
S. Numeric, Numeric
edited items set to ZERO. FILLER , OCCURS DEPENDING ON items left untouched.
Q4) What is 77 level used for ?
A4) Elementary level item. Cannot be subdivisions of other items (cannot be qual
ified), nor can they be
subdivided themselves.
Q5) What is 88 level used for ?
A5) For condition names.
Q6) What is level 66 used for ?
A6) For RENAMES clause.
Q7) What does the IS NUMERIC clause establish ?
A7) IS NUMERIC can be used on alphanumeric items, signed numeric & packed decima
l items and
unsigned numeric & packed decimal items. IS NUMERIC returns TRUE if the item onl
y consists of 0

9. However, if the item being tested is a signed item, then it may contain 0-9,
+ and -.
Q8) How do you define a table/array in COBOL?
A8) ARRAYS.
05 ARRAY1 PIC X(9) OCCURS 10 TIMES.
05 ARRAY2 PIC X(6) OCCURS 20 TIMES INDEXED BY WS-INDEX.
Q9) Can the OCCURS clause be at the 01 level?
A9) No.
Q10) What is the difference between index and subscript? -GS
A10) Subscript refers to the array occurrence while index is the displacement (i
n no of bytes) from the
beginning of the
array. An index can only be modified using PERFORM, SEARCH & SET. Need to have i
ndex for a
table in order to
use SEARCH, SEARCH ALL.
Q11) What is the difference between SEARCH and SEARCH ALL? -GS
A11) SEARCH -is a serial search.
SEARCH ALL -is a binary search & the table must be sorted ( ASCENDING/DESCENDING
KEY
clause to be used & data loaded in this order) before using SEARCH ALL.
Q12) What should be the sorting order for SEARCH ALL? -GS
A12) It can be either ASCENDING or DESCENDING. ASCENDING is default. If you want
the search
to be done on an
Page 4 of 260 IBMMAINFRAMES.com
array sorted in descending order, then while defining the array, you should give
DESCENDING
KEY clause. (You
must load the table in the specified order).
Q13) What is binary search?
A13) Search on a sorted array. Compare the item to be searched with the item at
the center. If it matches,
fine else repeat the process with the left half or the right half depending on w
here the item lies.
Q14) My program has an array defined to have 10 items. Due to a bug, I find that
even if the
program access the
11th item in this array, the program does not abend. What is wrong with it?
A14)
Must use compiler option SSRANGE if you want array bounds checking. Default is N
OSSRANGE.
Q15) How do you sort in a COBOL program? Give sort file definition, sort stateme
nt syntax and
meaning. -GS
A15) Syntax: SORT file-1 ON ASCENDING/DESCENDING KEY key.... USING file-2 GIVING
file-3.
USING can be substituted by INPUT PROCEDURE IS para-1 THRU para-2
GIVING can be substituted by OUTPUT PROCEDURE IS para-1 THRU para-2.

file-1 is the sort (work) file and must be described using SD entry in FILE SECT
ION.
file-2 is the input file for the SORT and must be described using an FD entry in
FILE SECTION and
SELECT
clause in FILE CONTROL.
file-3 is the out file from the SORT and must be described using an FD entry in
FILE SECTION and
SELECT
clause in FILE CONTROL.
file-1, file-2 & file-3 should not be opened explicitly.

INPUT PROCEDURE is executed before the sort and records must be RELEASEd to the
sort work
file from the input procedure.
OUTPUT PROCEDURE is executed after all records have been sorted. Records from th
e sort work
file must be RETURNed one at a time to the output procedure.

Q16) How do you define a sort file in JCL that runs the COBOL program?
A16) Use the SORTWK01, SORTWK02,..... dd names in the step. Number of sort datas
ets depends on the
volume of data
being sorted, but a minimum of 3 is required.
Q17) What is the difference between performing a SECTION and a PARAGRAPH? -GS
A17)
Performing a SECTION will cause all the paragraphs that are part of the section,
to be performed.
Performing a PARAGRAPH will cause only that paragraph to be performed.
Q18) What is the use of EVALUATE statement? -GS
A18) Evaluate is like a case statement and can be used to replace nested Ifs. Th
e difference between
EVALUATE and
case is that no 'break' is required for EVALUATE i.e. control comes out of the E
VALUATE as soon
as one match is
made.
Q19) What are the different forms of EVALUATE statement?
A19)
EVALUATE EVALUATE SQLCODE ALSO FILE-STATUS
WHEN A=B AND C=D WHEN 100 ALSO '00'
imperative stmt imperative stmt
Page 5 of 260
IBMMAINFRAMES.com
WHEN (D+X)/Y = 4 WHEN -305 ALSO '32'
imperative stmt imperative stmt
WHEN OTHER WHEN OTHER
imperative stmt imperative stmt
END-EVALUATE END-EVALUATE

EVALUATE SQLCODE ALSO A=B EVALUATE SQLCODE ALSO TRUE


WHEN 100 ALSO TRUE WHEN 100 ALSO A=B
imperative stmt imperative stmt
WHEN -305 ALSO FALSE WHEN -305 ALSO (A/C=4)
imperative stmt imperative stmt
END-EVALUATE END-EVALUATE

Q20) How do you come out of an EVALUATE statement? -GS


A20) After the execution of one of the when clauses, the control is automaticall
y passed on to the next
sentence after the
EVALUATE statement. There is no need of any extra code.
Q21) In an EVALUATE statement, can I give a complex condition on a when clause?
A21)
Yes.
Q22) What is a scope terminator? Give examples.
A22) Scope terminator is used to mark the end of a verb e.g. EVALUATE, END-EVALU
ATE; IF, ENDIF.

Q23) How do you do in-line PERFORM? -GS


A23)
PERFORM ... <UNTIL> ...
<sentences>
END-PERFORM
Q24) When would you use in-line perform?
A24) When the body of the perform will not be used in other paragraphs. If the b
ody of the perform is a
generic type of code
(used from various other places in the program), it would be better to put the c
ode in a separate Para
and use
PERFORM Para name rather than in-line perform.
Q25) What is the difference between CONTINUE & NEXT SENTENCE ?
A25) They appear to be similar, that is, the control goes to the next sentence i
n the paragraph. But, Next
Sentence would
take the control to the sentence after it finds a full stop (.). Check out by wr
iting the following code
example, one if
sentence followed by 3 display statements (sorry they appear one line here becau
se of formatting
restrictions) If 1 > 0
then next sentence end if display 'line 1' display 'line 2'. display 'line 3'. *
** Note-there is a dot (.)
only at the end of
the last 2 statements, see the effect by replacing Next Sentence with Continue *
**
Q26) What does EXIT do ?
A26)
Does nothing ! If used, must be the only sentence within a paragraph.
Q27) Can I redefine an X(100) field with a field of X(200)?
A27)
Yes. Redefines just causes both fields to start at the same location. For exampl
e:
01 WS-TOP PIC X(1)
Page 6 of 260
IBMMAINFRAMES.com
01 WS-TOP-RED REDEFINES WS-TOP PIC X(2).
If you MOVE '12' to WS-TOP-RED,
DISPLAY WS-TOP will show 1 while
DISPLAY WS-TOP-RED will show 12.
A28)
Can I redefine an X(200) field with a field of X(100) ?
Q31)1 Yes.
Q31)2What do you do to resolve SOC-7 error? -GS
Q31) Basically you need to correcting the offending data. Many times the reason
for SOC7 is an uninitialized
numeric item.
Examine that possibility first. Many installations provide you a dump for run ti
me abend s ( it can be
generated also
by calling some subroutines or OS services thru assembly language). These dumps
provide the
offset of the last
instruction at which the abend occurred. Examine the compilation output XREF lis
ting to get the
verb and the line
number of the source code at this offset. Then you can look at the source code t
o find the bug. To
get capture the
runtime dumps, you will have to define some datasets (SYSABOUT etc ) in the JCL.
If none of
these are helpful, use
judgement and DISPLAY to localize the source of error. Some installation might h
ave batch
program debugging
tools. Use them.
Q32) How is sign stored in Packed Decimal fields and Zoned Decimal fields?
Q32)
Packed Decimal fields: Sign is stored as a hex value in the last nibble (4 bits
) of the storage.
Zoned Decimal fields: As a default, sign is over punched with the numeric value
stored in the
last bite.
Q33) How is sign stored in a comp-3 field? -GS
Q33) It is stored in the last nibble. For example if your number is +100, it sto
res hex 0C in the last byte,
hex 1C if
your number is 101, hex 2C if your number is 102, hex 1D if the number is -101,
hex 2D if the
number is -102 etc...
Q34) How is sign stored in a COMP field ? -GS
Q34)
In the most significant bit. Bit is ON if -ve, OFF if +ve.
Q35) What is the difference between COMP & COMP-3 ?
Q35)
COMP is a binary storage format while COMP-3 is packed decimal format.
Q36) What is COMP-1? COMP-2?
Q36)
COMP-1 -Single precision floating point. Uses 4 bytes.
COMP-2 -Double precision floating point. Uses 8 bytes.
Q37) How do you define a variable of COMP-1? COMP-2?
Q37)
No picture clause to be given. Example 01 WS-VAR USAGE COMP-1.
Q38) How many bytes does a S9(7) COMP-3 field occupy ?
Q38) Will take 4 bytes. Sign is stored as hex value in the last nibble. General
formula is INT((n/2) + 1)),
where n=7 in this
example.
Q39) How many bytes does a S9(7) SIGN TRAILING SEPARATE field occupy ?
Page 7 of 260
IBMMAINFRAMES.com
Q44)
Fixed Block File Use
ORGANISATION IS SEQUENTIAL. Use RECORDING MODE
IS F,
BLOCK CONTAINS 0 .
Fixed Unblocked Use
ORGANISATION IS SEQUENTIAL. Use RECORDING MODE
IS F,
do not use BLOCK CONTAINS
Variable Block File Use
ORGANISATION IS SEQUENTIAL. Use RECORDING MODE
IS V, BLOCK
CONTAINS 0. Do not code the 4 bytes for record length in FD ie JCL
rec length will be max rec length in pgm + 4
Variable Unblocked Use
ORGANISATION IS SEQUENTIAL. Use RECORDING MODE
IS V, do not use
BLOCK CONTAINS. Do not code 4 bytes for record length in FD ie
Q39) Will occupy 8 bytes (one extra byte for sign).
Q40) How many bytes will a S9(8) COMP field occupy ?
Q40) 4 bytes.
Q41) What is the maximum value that can be stored in S9(8) COMP?
Q41) 99999999
Q42) What is COMP SYNC?
Q42) Causes the item to be aligned on natural boundaries. Can be SYNCHRONIZED LE
FT or RIGHT.
For binary data
items, the address resolution is faster if they are located at word boundaries i
n the memory. For
example, on main
frame the memory word size is 4 bytes. This means that each word will start from
an address
divisible by 4. If my
first variable is x(3) and next one is s9(4) comp, then if you do not specify th
e SYNC clause, S9(4)
COMP will start
from byte 3 ( assuming that it starts from 0 ). If you specify SYNC, then the bi
nary data item will
start from address 4.
You might see some wastage of memory, but the access to this computational field
is faster.
Q43) What is the maximum size of a 01 level item in COBOL I? in COBOL II?
Q43) In COBOL II: 16777215
Q44) How do you reference the following file formats from COBOL programs:
JCL rec length will
be max rec length in pgm + 4.
ESDS VSAM file -Use ORGANISATION IS SEQUENTIAL.
KSDS VSAM file -Use ORGANISATION IS INDEXED, RECORD KEY IS, ALTERNATE
RECORD KEY IS RRDS File -Use ORGANISATION IS RELATIVE, RELATIVE KEY IS
Printer File -Use ORGANISATION IS SEQUENTIAL. Use RECORDING MODE
IS F, BLOCK
CONTAINS 0. (Use RECFM=FBA in JCL DCB).
Q45) What are different file OPEN modes available in COBOL?
Q45) Open for INPUT, OUTPUT, I-O, EXTEND.
Q46) What is the mode in which you will OPEN a file for writing? -GS
Q46) OUTPUT, EXTEND
Q47) In the JCL, how do you define the files referred to in a subroutine ?
Page 8 of 260 IBMMAINFRAMES.com
Q47) Supply the DD cards just as you would for files referred to in the main pro
gram.
Q48) Can you REWRITE a record in an ESDS file? Can you DELETE a record from it?
Q48) Can rewrite (record length must be same), but not delete.
Q49) What is file status 92? -GS
Q49) Logic error. e.g., a file is opened for input and an attempt is made to wri
te to it.
Q50) What is file status 39 ?
Q50) Mismatch in LRECL or BLOCKSIZE or RECFM between your COBOL pgm & the JCL (o
r the
dataset label). You
will get file status 39 on an OPEN.
Q51) What is Static and Dynamic linking ?
Q51) In static linking, the called subroutine is link-edited into the calling pr
ogram , while in dynamic
linking, the subroutine & the main program will exist as separate load modules.
You choose
static/dynamic linking by choosing either the DYNAM or NODYNAM link edit option.
(Even if you
choose NODYNAM, a CALL identifier (as opposed to a CALL literal), will translate
to a DYNAMIC
call).A statically called subroutine will not be in its initial state the next t
ime it is called unless you
explicitly use INITIAL or you do a CANCEL. A dynamically called routine will alw
ays be in its initial
state.
Q52) What is AMODE(24), AMODE(31), RMODE(24) and RMODE(ANY)? (applicable to only
MVS/ESA
Enterprise Server).
Q52) These are compile/link edit options. Basically AMODE stands for Addressing
mode and RMODE
for Residency
mode.
AMODE(24) -24 bit addressing;
AMODE(31) -31 bit addressing
AMODE(ANY) -Either 24 bit or 31 bit addressing depending on RMODE.
RMODE(24) -Resides in virtual storage below 16 Meg line. Use this for 31 bit pro
grams that call 24
bit programs.
(OS/VS Cobol pgms use 24 bit addresses only).
RMODE(ANY) -Can reside above or below 16 Meg line.

Q53) What compiler option would you use for dynamic linking?
Q53) DYNAM.
Q54) What is SSRANGE, NOSSRANGE ?
Q54) These are compiler options with respect to subscript out of range checking.
NOSSRANGE is the
default and if chosen,
no run time error will be flagged if your index or subscript goes out of the per
missible range.
Q55) How do you set a return code to the JCL from a COBOL program?
Q55) Move a value to RETURN-CODE register. RETURN-CODE should not be declared in
your
program.
Q56) How can you submit a job from COBOL programs?
Q56) Write JCL cards to a dataset with //xxxxxxx SYSOUT= (A,INTRDR) where 'A' is
output class, and
dataset should be
opened for output in the program. Define a 80 byte record layout for the file.
Q57) What are the differences between OS VS COBOL and VS COBOL II?
Page 9 of 260 IBMMAINFRAMES.com
Q57) OS/VS Cobol pgms can only run in 24 bit addressing mode, VS Cobol II pgms c
an run either in 24
bit or 31 bit
addressing modes.
I. Report writer is supported only in OS/VS Cobol.
II. USAGE IS POINTER is supported only in VS COBOL II.
III. Reference modification e.g.: WS-VAR(1:2) is supported only in VS COBOL II.
IV. EVALUATE is supported only in VS COBOL II.
V. Scope terminators are supported only in VS COBOL II.
VI. OS/VS Cobol follows ANSI 74 stds while VS COBOL II follows ANSI 85 stds.
VII. Under CICS Calls between VS COBOL II programs are supported.
Q58) What are the steps you go through while creating a COBOL program executable
?
Q58) DB2 precompiler (if embedded SQL used), CICS translator (if CICS pgm), Cobo
l compiler, Link
editor. If DB2
program, create plan by binding the DBRMs.
Q59) Can you call an OS VS COBOL pgm from a VS COBOL II pgm ?
Q59)
In non-CICS environment, it is possible. In CICS, this is not possible.
Q60) What are the differences between COBOL and COBOL II?
A60) There are at least five differences:
COBOL II supports structured programming by using in line Performs and explicit
scope
terminators, It introduces
new features (EVALUATE, SET. TO TRUE, CALL. BY CONTEXT, etc) It permits programs
to be
loaded and
addressed above the 16-megabyte line It does not support many old features (READ
Y TRACE,
REPORT-WRITER,
ISAM, Etc.), and It offers enhanced CICS support.
Q61) What is an explicit scope terminator?
A61)
A scope terminator brackets its preceding verb, e.g. IF .. END-IF, so that all s
tatements between the
verb and its scope terminator are grouped together. Other common COBOL II verbs
are READ,
PERFORM, EVALUATE, SEARCH and STRING.
Q62) What is an in line PERFORM? When would you use it? Anything else to say abo
ut it?
A62)
The PERFORM and END-PERFORM statements bracket all COBOL II statements between t
hem.
The COBOL equivalent is to PERFORM or PERFORM THRU a paragraph. In line PERFORMs
work as long as there are no internal GO TOs, not even to an exit. The in line P
ERFORM for
readability should not exceed a page length -often it will reference other PERFO
RM paragraphs.
Q63) What is the difference between NEXT SENTENCE and CONTINUE?
A63)
NEXT SENTENCE gives control to the verb following the next period. CONTINUE give
s control
to the next verb after the explicit scope terminator. (This is not one of COBOL
II's finer
implementations). It's safest to use CONTINUE rather than NEXT SENTENCE in COBOL
II.
Q64) What COBOL construct is the COBOL II EVALUATE meant to replace?
A64)
EVALUATE can be used in place of the nested IF THEN ELSE statements.
Q65) What is the significance of 'above the line' and 'below the line'?
A65)
Before IBM introduced MVS/XA architecture in the 1980's a program's virtual stor
age was limited to
16 megs. Programs compiled with a 24 bit mode can only address 16 Mb of space, a
s though they
were kept under an imaginary storage line. With COBOL II a program compiled with
a 31 bit mode
can be 'above the 16 Mb line. (This 'below the line', 'above the line' imagery c
onfuses most
mainframe programmers, who tend to be a literal minded group.)
Page 10 of 260
IBMMAINFRAMES.com
Q66) What was removed from COBOL in the COBOL II implementation?
A66)
Partial list: REMARKS, NOMINAL KEY, PAGE-COUNTER, CURRENT-DAY, TIME-OF-DAY,
STATE, FLOW, COUNT, EXAMINE, EXHIBIT, READY TRACE and RESET TRACE.
Q67) Explain call by context by comparing it to other calls.
A67)
The parameters passed in a call by context are protected from modification by th
e called program. In
a normal call they are able to be modified.
Q68) What is the linkage section?
A68)
The linkage section is part of a called program that 'links' or maps to data ite
ms in the calling
program's working storage. It is the part of the called program where these shar
e items are defined.
Q69) What is the difference between a subscript and an index in a table definiti
on?
A69)
A subscript is a working storage data definition item, typically a PIC (999) whe
re a value must be
moved to the subscript and then incremented or decrements by ADD TO and SUBTRACT
FROM
statements. An index is a register item that exists outside the program's workin
g storage. You SET
an index to a value and SET it UP BY value and DOWN BY value.
Q70) If you were passing a table via linkage, which is preferable -a subscript o
r an index?
A70)
Wake up -you haven't been paying attention! It's not possible to pass an index v
ia linkage. The
index is not part of the calling programs working storage. Those of us who've ma
de this mistake,
appreciate the lesson more than others.
Q71) Explain the difference between an internal and an external sort, the pros a
nd cons, internal
sort syntax etc.
A71)
An external sort is not COBOL; it is performed through JCL and PGM=SORT. It is u
nderstandable
without any code reference. An internal sort can use two different syntax s: 1.) U
SING, GIVING
sorts are comparable to external sorts with no extra file processing; 2) INPUT P
ROCEDURE,
OUTPUT PROCEDURE sorts allow for data manipulation before and/or after the sort.

Q72) What is the difference between comp and comp-3 usage? Explain other COBOL u
sage s.
A72)
Comp is a binary usage, while comp-3 indicates packed decimal. The other common
usage s are
binary and display. Display is the default.
Q73) When is a scope terminator mandatory?
A73)
Scope terminators are mandatory for in-line PERFORMS and EVALUATE statements. Fo
r
readability, it's recommended coding practice to always make scope terminators e
xplicit.
Q74) In a COBOL II PERFORM statement, when is the conditional tested, before or
after the
perform execution?
A74)
In COBOL II the optional clause WITH TEST BEFORE or WITH TEST AFTER can be added
to
all perform statements. By default the test is performed before the perform.
Q75) In an EVALUTE statement is the order of the WHEN clauses significant?
A75)
Absolutely. Evaluation of the WHEN clauses proceeds from top to bottom and their
sequence can
determine results.
Q76) What is the default value(s) for an INITIALIZE and what keyword allows for
an override of
the default.
A76)
INITIALIZE moves spaces to alphabetic fields and zeros to alphanumeric fields. T
he REPLACING
option can be used to override these defaults.
Q77) What is SET TO TRUE all about, anyway?
Page 11 of 260
IBMMAINFRAMES.com
A77)
In COBOL II the 88 levels can be set rather than moving their associated values
to the related data
item. (Web note: This change is not one of COBOL II's better specifications.)
Q78) What is LENGTH in COBOL II?
A78)
LENGTH acts like a special register to tell the length of a group or elementary
item.
Q79) What is the difference between a binary search and a sequential search? Wha
t are the
pertinent COBOL
commands?
A79)
In a binary search the table element key values must be in ascending or descendi
ng sequence. The
table is 'halved' to search for equal to, greater than or less than conditions u
ntil the element is found.
In a sequential search the table is searched from top to bottom, so (ironically)
the elements do not
have to be in a specific sequence. The binary search is much faster for larger t
ables, while sequential
works well with smaller ones. SEARCH ALL is used for binary searches; SEARCH for
sequential.
Q80) What is the point of the REPLACING option of a copy statement?
A80)
REPLACING allows for the same copy to be used more than once in the same code by
changing the
replace value.
Q81) What will happen if you code GO BACK instead of STOP RUN in a stand alone C
OBOL
program i.e. a
program which is not calling any other program.
A81)
The program will go in an infinite loop.
Q82) How can I tell if a module is being called DYNAMICALLY or STATICALLY?
A82)
The ONLY way is to look at the output of the linkage editor (IEWL)or the load mo
dule itself. If the
module is being called DYNAMICALLY then it will not exist in the main module, if
it is being
called STATICALLY then it will be seen in the load module. Calling a working sto
rage variable,
containing a program name, does not make a DYNAMIC call. This type of calling is
known as
IMPLICITE calling as the name of the module is implied by the contents of the wo
rking storage
variable. Calling a program name literal (CALL
Q83) What is the difference between a DYNAMIC and STATIC call in COBOL.
A83)
To correct an earlier answer: All called modules cannot run standalone if they r
equire program
variables passed to them via the LINKAGE section. DYNAMICally called modules are
those that are
not bound with the calling program at link edit time (IEWL for IBM) and so are l
oaded from the
program library (joblib or steplib) associated with the job. For DYNAMIC calling
of a module the
DYNAM compiler option must be chosen, else the linkage editor will not generate
an executable as
it will expect u address resolution of all called modules. A STATICally called m
odule is one that is
bound with the calling module at link edit, and therefore becomes part of the ex
ecutable load module.
Q84) How may divisions are there in JCL-COBOL?
A84)
SIX
Q85) What is the purpose of Identification Division?
A85)
Documentation.
Q86) What is the difference between PIC 9.99 and 9v99?
A86)
PIC 9.99 is a FOUR-POSITION field that actually contains a decimal point where a
s PIC 9v99 is
THREE-POSITION numeric field with implied or assumed decimal position.
Q87)
what is Pic 9v99 Indicates?
A87)
PICTURE 9v99 is a three position Numeric field with an implied or assumed decima
l point after the
first position; the v means an implied decimal point.
Page 12 of 260
IBMMAINFRAMES.com
Q88) What guidelines should be followed to write a structured Cobol prg'm?
A88)
1) use 'evaluate' stmt for constructing cases.
2) use scope terminators for nesting.
3) use in line perform stmt for writing 'do ' constructions.
4) use test before and test after in the perform stmt for writing do-while const
ructions.
Q89) Read the following code. 01 ws-n pic 9(2) value zero. a-para move 5 to ws-n
. perform b-para
ws-n times. b-para.
move 10 to ws-n. how many times will b-para be executed ?
A89)
5 times only. it will not take the value 10 that is initialized in the loop.
Q90) What is the difference between SEARCH and SEARCH ALL? What is more efficien
t?
A90)
SEARCH is a sequential search from the beginning of the table. SEARCH ALL is a b
inary search,
continually dividing the table in two halves until a match is found. SEARCH ALL
is more efficient
for tables larger than 70 items.
Q91) What are some examples of command terminators?
A91)
END-IF, END-EVALUATE
Q92) What care has to be taken to force program to execute above 16 Meg line?
A92)
Make sure that link option is AMODE=31 and RMODE=ANY. Compile option should neve
r have
SIZE(MAX). BUFSIZE can be 2K, efficient enough.
Q93) How do you submit JCL via a Cobol program?
A93)
Use a file //dd1 DD sysout=(*, intrdr)write your JCL to this file. Pl some on tr
y this out.
Q94) How to execute a set of JCL statements from a COBOL program
A94)
Using EXEC CICS SPOOL WRITE(var-name) END-EXEC command. var-name is a COBOL host
structure containing JCL statements.
Q95) Give some advantages of REDEFINES clause.
A95)
1.
You can REDEFINE a Variable from one PICTURE class to another PICTURE class by u
sing
the same memory
location.
2.
By REDEFINES we can INITIALISE the variable in WORKING-STORAGE Section itself.
3.
We can REDEFINE a Single Variable into so many sub variables. (This facility is
very useful in
solving Y2000
Problem.)
Q96) What is the difference between static call & Dynamic call
A96)
In the case of Static call, the called program is a stand-alone program, it is a
n executable program.
During run time we can call it in our called program. As about Dynamic call, the
called program is
not an executable program it can executed through the called program
Q97) What do you feel makes a good program?
A97)
A program that follows a top down approach. It is also one that other programmer
s or users can
follow logically and is easy to read and understand.
Q98) How do you code Cobol to access a parameter that has been defined in JCL? A
nd do you code
the PARM
parameter on the EXEC line in JCL?
A98)
1)
using JCL with sysin. //sysin dd *here u code the parameters(value) to pass in t
o cobol program
/* and in program
Page 13 of 260
IBMMAINFRAMES.com
Q100) The maximum number of dimensions that an array can have in COBOL-85 is ---
--------?
A100) SEVEN in COBOL -85 and THREE in COBOL -84
Q101) How do you declare a host variable (in COBOL) for an attribute named Emp-N
ame of type
you use accept variable name(one accept will read one row)/.another way.
2)
in jcl using parm statement ex: in exec statement parm='john','david' in cobol p
gm u have to code
linkage section in that for first value you code length variable and variable na
me say, abc pic
x(4).it will take john inside to read next value u have to code another variable
in the same way
above mentioned.
Q99) Why do we code S9(4) comp. Inspite of knowing comp-3 will occupy less space
.
A99)
Here s9(4)comp is small integer ,so two words equal to 1 byte so totally it will
occupy 2 bytes(4
words).here in s9(4) comp-3 as one word is equal to 1/2 byte.4 words equal to 2
bytes and sign will
occupy 1/2 byte so totally it will occupy 3 bytes.
VARCHAR(25) ?
A101)
01 EMP-GRP.
49 E-LEN PIC S9(4) COMP.
49 E-NAME PIC X(25).
Q102)
What is Comm?
A102)
COMM -HALF WORD BINARY
Q103) Differentiate COBOL and COBOL-II. (Most of our programs are written in COB
OLII, so,
it is good to know,
how, this is different from COBOL)
A103)
The following features are available with VS COBOL II:
1. MVS/XA and MVS/ESA support The compiler and the object programs it produces c
an be
run in either
24-or 31-bit addressing mode.
2. VM/XA and VM/ESA support The compiler and the object programs it produces can
be run
in either
24-or 31-bit addressing mode.
3. VSE/ESA support The compiler and the object programs it produces can be run u
nder
VSE/ESA.
Q104)
What is PERFORM ? What is VARYING ? (More details about these clauses)
A104)
The PERFORM statement is a PROCEDURE DIVISION statement which transfers control
to
one or more specified procedures and controls as specified the number of times t
he procedures are
executed. After execution of the specified procedures is completed (i.e., for th
e appropriate
number of times or until some specified condition is met), control is transferre
d to the next
executable statement following the PERFORM statement. There are 5 types of PERFO
RM
statements:
a) Basic PERFORM
b) PERFORM TIMES
c) PERFORM UNTIL
d) PERFORM VARYING
e) IN-LINE PERFORM
Q105)
How many sections are there in data division?.
A105)
SIX SECTIONS 1.FILE SECTION 2.WORKING-STORAGE SECTION 3. LOCAL-STORAGE
SECTION 4.SCREEN SECTION 5.REPORT SECTION 6. LINKAGE SECTION
Page 14 of 260
IBMMAINFRAMES.com
Q106)
What is Redefines clause?
A106) Redefines clause is used to allow the same storage allocation to be refere
nced by different data
names .
Q107)
A107)
How many bytes does a s9(4)comp-3 field occupy?
3Bytes (formula : n/2 + 1))
Q108)
A108)
What is the different between index and subscript?
Subscript refers to the array of occurrence , where as Index represents an occur
rence of a table
element. An index can only modified using perform, search & set. Need to have an
index for a
table in order to use SEARCH and SEARCH All.
Q109) What is the difference between Structured COBOL Programming and Object Ori
ented
COBOL
programming?
A109)
Structured programming is a Logical way of programming, you divide the functiona
lities into
modules and code logically. OOP is a Natural way of programming; you identify th
e objects first,
and then write functions, procedures around the objects. Sorry, this may not be
an adequate
answer, but they are two different programming paradigms, which is difficult to
put in a sentence
or two.
Q110)
What divisions, sections and paragraphs are mandatory for a COBOL program?
A110) IDENTIFICATION DIVISION and PROGRAM-ID paragraph are mandatory for a compi
lation
error free COBOL
program.
Q111)
Can JUSTIFIED be used for all the data types?
A111)
No, it can be used only with alphabetic and alphanumeric data types.
Q112)
What happens when we move a comp-3 field to an edited (say z (9). ZZ-)
A112)
the editing characters r to be used with data items with usage clause as display
which is the
default. When u tries displaying a data item with usage as computational it does
not give the
desired display format because the data item is stored as packed decimal. So if
u want this
particular data item to be edited u have to move it into a data item whose usage
is display and then
have that particular data item edited in the format desired.
Q113)
What will happen if you code GO BACK instead of STOP RUN in a stand-alone COBOL
program i.e. a program which is not calling any other program ?
A113)
Both give the same results when a program is not calling any other program. GO B
ACK will give
the control to the system even though it is a single program.
Q114)
what is the difference between external and global variables?
A114)
Global variables are accessible only to the batch program whereas external varia
bles can be
referenced from any batch program residing in the same system library.
Q115)
You are writing report program with 4 levels of totals: city, state, region and
country. The
codes being used can be the same over the different levels, meaning a city code
of 01 can be
in any number of states, and the same applies to state and region code so how do
you do your
checking for breaks and how do you do add to each level?
A115)
Always compare on the highest-level first, because if you have a break at a high
est level, each level
beneath it must also break. Add to the lowest level for each record but add to t
he higher level only
on a break.
Q116)
What is difference between COBOL and VS COBOL II?.
Page 15 of 260
IBMMAINFRAMES.com
A116)
In using COBOL on PC we have only flat files and the programs can access only li
mited storage,
whereas in VS COBOL II on M/F the programs can access up to 16MB or 2GB dependin
g on the
addressing and can use VSAM
files to make I/O operations faster.
Q117)
Why occurs can not be used in 01 level ?
A117)
Because, Occurs clause is there to repeat fields with same format, not the recor
ds.
Q118)
What is report-item?
A118)
A Report-Item Is A Field To Be Printed That Contains Edit Symbols
Q119)
Difference between next and continue clause
A119)
The difference between the next and continue verb is that in the continue verb i
t is used for a
situation where there in no EOF condition that is the records are to be accessed
again and again in
an file, whereas in the next verb the indexed file is accessed sequentially, rea
d next record
command is used.
Q120)
What is the Importance of GLOBAL clause According to new standards of COBOL
A120)
When any data name, file-name, Record-name, condition name or Index defined in a
n Including
Program can be referenced by a directly or indirectly in an included program, Pr
ovided the said
name has been declared to be a global name by GLOBAL Format of Global Clause is0
1 data-1 pic
9(5) IS GLOBAL.
Q121)
What is the Purpose of POINTER Phrase in STRING command
A121)
The Purpose of POINTER phrase is to specify the leftmost position within receivi
ng field where
the first transferred character will be stored
Q122)
How do we get current date from system with century?
A122)
By using Intrinsic function, FUNCTION CURRENT-DATE
Q123)
What is the maximum length of a field you can define using COMP-3?
A123)
10 Bytes (S9(18) COMP-3).
Q124)
Why do we code s9 (4) comp? In spite of knowing comp-3 will occupy less space?
A124)
Here s9(4)comp is small integer, so two words equal to 1 byte so totally it will
occupy 2 bytes(4
words).here in s9(4) comp-3 as one word is equal to 1/2 byte.4 words equal to 2
bytes and sign will
occupy 1/2 byte so totally it will occupy 3 bytes.
Q125)
What is the LINKAGE SECTION used for?
A125)
The linkage section is used to pass data from one program to another program or
to pass data from
a PROC to a program.
Q126)
Describe the difference between subscripting and indexing ?
A126)
Indexing uses binary displacement. Subscripts use the value of the occurrence.
1. What R 2 of the common forms of the EVALUATE STATEMENT ?
2. What does the initialize statement do ?
3. What is the reference modification.
4. Name some of the examples of COBOl 11?
5. What are VS COBOL 11 special features?
6. What are options have been removed in COBOL 11?
7. What is the file organization clause ?
8. What is a subscript ?
9. What is an index for tables?
10. What are the two search techniques ?
Page 16 of 260
IBMMAINFRAMES.com
11. What is an in-line perform ?
12. What is CALL statement in COBOL?
13. When can the USING phrase be included in the call statement ?
14. In EBCDIC, how would the number 1234 be stored?
15. How would the number +1234 be stored if a PIC clause of PICTUREs9(4) comp-3
were used?
16. What is Alternate Index ? How is it different from regular index ?
Page 17 of 260 IBMMAINFRAMES.com
Customer Information Control System(CICS)
IBM s Customer Information Control System (CICS) is an on-line teleprocessing syst
em developed by
IBM. By providing a sophisticated control and service database/data communicatio
n system, the application
developer can concentrate on fulfilling specific business needs rather than on c
ommunication and internal
system details. CICS allows data to be transmitted from the terminal to the host
computer, have the data
processed, access files/databases, and then have data to be transmitted from the
terminal to the host
computer, have the data processed, access files/databases, and then have data tr
ansmitted back to the
terminal. To accomplish that, CICS uses a telecommunication package such as VTAM
or TCAM and
various file access methods: VSAM, DL/1, DB2, etc.
The latest release CICS/ESA is Release 3.3.
Some of the new functionality includes:
1.
Expanded features for the system programmer
2.
Improved above the line storage utilization
3.
New options for many CICS commands
4. Improved cross-platform communication facilities
Functionality
CICS provides the following support:
Data Communications

An interface between the terminal and printers with CICS via a telecommunication
access method
(TCAM or VTAM).
Multi Region Operation(MRO), through which more than one CICS region of a system
can
communicate
Intersystem Communication (ISC), through which one CICS region of a system can c
ommunicate
with other CICS regions in other systems
Application Programming

Interfaces with programming languages such as COBOL and Assembler


Command level translator
An Execution Diagnostic Facility (EDF)
A Command Interpreter
Data Handling

An interface with database access methods such as DB2, DL/1, and VSAM
An interface with error checking and reporting facilities
Terminology:
CICS has its own language. Some of the language abbreviations of CICS are:
Page 18 of 260
IBMMAINFRAMES.com
SIT System Initialization Table
PCT Program Control Table
PPT Program Processing Table
TCT Terminal Control Table
FCT File Control Table
TCP Terminal Control Program
TCTUA Terminal Control Terminal User Area
DCT Destination Control Table
TDQ Transient Data Queue
EIP Execution Interface Program
FCP File Control Program
ICP Interval Control Program
KCT Task Control Program
PCP Program Control Program
SCP Storage Control Program
TCA Task Control Area
TCTTE Terminal Control Table Terminal Entry
TSQ Temporary Storage Queue
TWA Task Work Area
AID Attention Identifier
CWA Common Work Area
MRO Multi Region Operation
QID Queue Identifier
Q1) What are the six different types of argument values in COBOL that can be pla
ced in various
options of a CICS command?
A1)
·Data Value -EX (Literal 8 or 77 KEYLEN PIC S9(4) COMP VALUE 8.)
·Data Area -EX (01 RECORD-AREA.
05 FIELD1 PIC X(5). )
·Pointer-Ref -EX (05 POINTER-I PIC S9(8) COMP. )
·Name -EX (05 FILE-NAME PIC X(5) VALUE FILEA . )
·Label -Cobol paragraph name
·HHMMSS -EX (77 TIMEVAL PIC S9(7) COMP3. )
Q2) Kindly specify the PIC clause for the following
Any BLL Cell, Data type of Length Option field, HHMMSS type of data fields
A2) Any BLL Cell -S9(8) COMP
Data type of Length Option field -S9(4) COMP
HHMMSS type of data fields -S9(7) COMP3
Q3) Specify CICS transaction initiation process. (From the perspective of CICS c
ontrol programs
and control tables.)
A3) TCP places data in TIOA and corresponding entry into TCT.
KCP acquires the transaction identifier from TIOA and verifies if it is present
in PCT.
SCP acquires Storage in Task Control Area (TCA), in which KCP prepares control d
ata for the task.
KCP then loads the application programs mentioned in PCT by looking for it in PP
T.
If resident -real storage memory location is not present in the PPT the control
is passed to PCP that
loads the application programs from the physical storage location address given
in PPT. The control is
then passed to the application program (LOAD module).
Q4) List the sequence of steps used to achieve Modification in Skip Sequential Mo
de.
A4)
Page 19 of 260 IBMMAINFRAMES.com
I. READNEXT command
II. Issue the ENDBR command
III. Issue the READ command with UDTAE option.
IV. Manipulate the record (DELETE or REWRITE command)
V. Issue START command
VI. Issue two READNEXT commands (One for dummy skip)
VII. Go to step two.
Q5) Specify the requirements for Automatic Task Initiation. (Mention the control
table, it s entries
and the corresponding Procedure division CICS command).
A5) DFHDCT
TYPE=INTRA,
DESTID=MSGS,
TRANSID=MSW1,
TRIGLEV=1000
EXEC CICS WRITEQ TD
QUEUE( MSGS ),
FROM(DATA-AREA),
LENGTH(MSG_LEN)

END-EXEC.
Q6) What are the commands used to gain exclusive control over a resource (for Ex
a Temporary
storage queue.)?
A6) EXEC CICS ENQ EXEC CICS DEQ
RESOURCE(QID) RESOURCE(QID)
END-EXEC END-EXEC
Q7) What is the EIB parameter and the CICS command used to implement Pseudo-Conv
ersational
technique using single PCT -Single PPT entry?
A7) EIBCALEN -To check if COMMAREA has been passed in terurn command.
EXEC CICS RETURN
TRANSID(data-name)
COMMAREA(data-area)
LENGTH(data-value)

END-EXEC
Q8) Mention the 5 fields available in the symbolic map for every NAMED field in th
e DFHMDI
macro? Give a brief description of these fields (Not exceeding a line).
A8) FIELD+L -Return the length of text entered (or for dymanic cursor positioing
)
FIELD+F -Returns X(80) if data entered but erased.
FIELD+A -Used for attributes reading and setting
FIELD+I -Used for reading the text entered while receiving the map.
FIELD+O -Used for sending information on to the MAP.
Q9) What are the two ways of breaking a CPU bound process to allow other tasks t
o gain access to
CPU.
A9) EXEC CICS DELAY EXEC CICS DELAY
INTERVAL(hhmmss) TIME(hhmmss)
END-EXEC END-EXEC
POST and WAIT commands also achieve the same result.
Q10) How do you initiate another transaction? The transaction initiated should b
e in a position to
retrieve
Page 20 of 260
IBMMAINFRAMES.com
information pertaining to which transaction has initiated it and from which term
inal. (Code
the required CICS
commands)
A10) EXEC CICS START
INTERVAL(hhmmss)/TIME(hhmmss)
TRANSID( TRAN )
TERMID( TRM1)
FROM(data-area)
LENGTH(data-value)
RTRANSID(EIBTRNID)
RTERMID(EIBTRMID)
END-EXEC
EXEC CICS RETRIEVE
INTO(data-area)
LENGTH(data-value)
RTRANSID(data-name)
RTERMID(data-name)

END-EXEC
Q11) Mention the option (along with argument type) used in a CICS command to ret
rieve the
response code after
execution of the command.
A11) RESP( S9(8) COM.)
Q12) What s the CICS command used to access current date and time?
A12) ASKTIME.
Q13) Into what fields will the date and time values be moved after execution of
the above command?
A13) EIBDATE & EIBTIME.
Q14) How do you terminate an already issued DELAY command?
A14) EXEC CICS CANCEL
REQID(id)
END-EXEC
Q15) How do you dynamically set the CURSOR position to a specific field?
A15) MOVE -1 to FIELD+L field. Mention CURSOR option in the SEND command.
Q16) Which option of the PCT entry is used to specify the PF key to be pressed f
or initiating a
transaction?
A16) TASKREQ=PF1
Q17) Specify the CICS command used to read a VSAM record starting with prefix F . C
ode all the
relevant options.
A17) EXEC CICS READ
DATASET( FILENAME )
INTO(data-area)
RIDFLD(data-area)
KEYLENGTH(1)
GENERIC
LENGTH(WK-LEN)
END-EXEC.
Page 21 of 260 IBMMAINFRAMES.com
Q18) Mention the option used in the CICS READ command to gain accessibility dire
ctly to the file
I/O area. (Assume
COBOL-II).
A18) SET(ADDRESS OF LINKAGE-AREA).
Q19) Which command is used to release a record on which exclusive control is gai
ned?
A19) EXEC CICS UNLOCK END-EXEC.
Q20) How do you establish a starting position in a browse operation?
A20) EXEC CICS STARTBR----------END-EXEC.
Q21) What is the option specified in the read operation to gain multiple concurr
ent operations on
the same dataset?
A21) REQID(value).
Q22) What is the CICS command that gives the length of TWA area?
A22) EXEC CICS ASSIGN
TWALENG(data-value)
END-EXEC.
Q23) What are the attribute values of Skipper and Stopper fields?
A23) ASKIP, PROT.
Q24) How do you set the MDT option to ON status, even if data is not entered?
A24) Mention FSET option in DFHMDF or set it dynamically in the program using FI
ELD+A attribute
field.
Q25) What option is specified in the SEND command to send only the unnamed field
s on to the
screen?
A25) MAPONLY_______________.
Q26) Which CICS service transaction is used to gain accessibility to CICS contro
l tables? Mention
the one that has
the highest priority.
A26) CEDA
Q27) What is the most common way of building queue-id of a TSQ? (Name the consti
tuents of the
Queue ID).
A27) TERMID+TRANSACTION-ID.
Q28) Into which table is the terminal id registered?
A28) TCT.
Q29) How and where is the TWA size set? .
A29) TWASIZE=300 in PCT table.
Q30) Which transient data queue supports ATI?
A30) INTRA-PARTITION Data queue.
Q31) Code the related portions of CICS/COBOL-I programs to gain addressability t
o TWA area
assigned to a
particular task. Assume that the size of TWA area is 300 bytes. What are the adv
antages if
COBOL-II is used
in the place of COBOL? Code the above requirement in COBOL-II.
Page 22 of 260 IBMMAINFRAMES.com
A31)
COBOL-II PROGRAM
LINKAGE SECTION.
01 PARMLIST.
02 FILLER PIC S9(8) COMP.
02 TWA-PTR S(98) COMP.

01 TWA-DATA-LAYOUT.
02 DATA-AREA PIC X(300).

PROCEDURE DIVISION.
.
EXEC CICS ADDRESS

TWA(TWA-PTR)
END-EXEC
SERVISE RELOAD TWA-DATA-LAYOUT.

COBOL-II PROGRAM
LINKAGE SECTION.
01 TWA-DATA-LAYOUT.
05 DATA-AREA PIC X(300).

PROCEDURE DIVISION.
.
EXEC CICS ADDRESS
TWA(ADDRESS OF TWA-DATA-LAYOUT)
END-EXEC

Q32) Code a program meeting the following requirements.


EMPS is a transaction used to return information pertaining to an employee when th
e
EMPID is entered on the screen. The information pertaining to an employee is prese
nt in a
VSAM/KSDS dataset registered in FCT as EMPINFOR . The map and the working storage
section of the emp-info are given for reference. If the employee id is found the
information has
to be sent to the screen (Status field) with the message Emp Id: XXX found. . If th
e emp-id
key is not found then status field should array the message Key not found. and the
EMP
ID field should be set to bright. If the Exit option is set to Y then the task has
to terminated.
Use pseudo-conversation technique three (Single PCT and PPT).
EMPLOYEE INFORMATION FORM
EMP ID : XXX
EMP NAME :
EMP DESIG : SEX :
DEPARTMENT
SALARY :

STATUS :
EXIT : X

X -Input Field
Page 23 of 260 IBMMAINFRAMES.com
Mapname -EMPFORM
Mapsetname -EMPFORM

Label given to various named fields on the DFHMDF macro while defining the map sho
wn above. EMPID,
EMPNAME, EMPDESIG, DEPART, SEX, SALARY, STATUS and EXITINP.
Structure of the VSAM/KSDS file.
Working-Storage Section.
01 EMP-IOAREA.

05 EMP-REC.
10 EMP-KEY PIC XXX.
10 EMP-NAME PIC X(32).
10 EMP-SEX PIC X.
10 EMP-DEPT PIC X(10)
10 EMP-DESIG PIC X(5).
10 EMP-SAL PIC 9(7).

A32) COBOL-II PROGRAM.


WORKING-STORAGE SECTION.
77 LENGTH-OF-AREA PIC S9(4) COMP.
77 WS-RCODE PIC S9(8) COMP.

01 STATUS.
02 NORMAL.
05 FILLER PIC X(8) VALUE EMP ID: .
05 EMP-ID PIC X(3).
05 FILLER PIC X(6) VALUE FOUND .

02 ABNORMAL REDEFINES NORMAL.


05 ABMSG PIC X(17).

01 EMP-IOAREA.
05 EMP-REC.
10 EMP-KEY PIC XXX.
10 EMP-NAME PIC X(32).
10 EMP-SEX PIC X.
10 EMP-DEPT PIC X(10)
10 EMP-DESIG PIC X(5).
10 EMP-SAL PIC 9(7).

LINKAGE SECTION.
01 DFHCOMMAREA.
05 INPVAL PIC X(3).

PROCEDURE DIVISION.
..
IF EIBCALEN=0

EXEC CICS SEND


MAP( EMPFORM )
MAPSET( EMPFORM )
ERASE

END-EXEC.
Page 24 of 260 IBMMAINFRAMES.com
MOVE 3 TO LENGTH-OF-AREA
EXEC CICS RETURN
TRANSID( EMPS )
COMMAREA( SEC )
LENGTH(DATA-VALUE)
END-EXEC.
ELSE IFINPVAL = SEC
EXEC CICS RECEIVE
MAP( EMPFORM )
MAPSET( EMPFORM )
END-EXEC.
EXEC CICS READ
DATASET( EMPINFOR )
INTO(EMP-IOAREA)
RIDFLD(EMPIDI)
LENGTH(LENGTH-OF-AREA)
RESP(WS-RCODE)
END-EXEC.
IF WS-RCODE NOT = DFHRESP(NORMAL)
MOVE KEY NOT FOUND TO ABMSG
MOVE DFHBMBRY TO EMPIDA
ELSE
MOVE EMP-NAME TO EMPNAMEO
MOVE EMP-SEX TO SEXO
MOVE EMP-DESIG TO EMPDESIGO
MOVE EMP-SAL TO SALARY
MOVE EMP-DEPT TO DEPARTO
MOVE EMP-KEY TO EMP-ID
MOVE STATUS TO STATUSO.
EXEC CICS SEND
MAP( EMPFORM )
MAPSET( EMPFORM )
ERASE
END-EXEC.
MOVE 3 TO LENGTH-OF-AREA
EXEC CICS RETURN
TRANSID( EMPS )
COMMAREA( SEC )
LENGTH(LENGTH-OF-AREA)
END-EXEC.
EXEC CICS RETURN
END-EXEC.
ELSE IF (EXITINPI NOT = Y )
EXEC CICS RETURN
END-EXEC.
Page 25 of 260 IBMMAINFRAMES.com
Q33) What does Pseudo Conversational mean?
A33) The programming technique in which the task will not wait for the end-user
replies on the terminal.
Terminating the
task every time the application needs a response from the user and specifying th
e next transaction to
be started when
the end user press any attention key (Enter, PF1 through PF24, PA1,PA2 and Clear
) is pseudo-
conversational
processing.
Q34) Explain the means of supporting pseudo conversation programming. (E.g. Stor
ing and
restoring of states,
control flow, error handling)
A34) When we send a map using SEND MAP command. Immediately we release the progr
am by
using EXEC
CICS RETURN command. In this command we mention the TRANSACTION ID which is to
be executed
after receiving the map. In this command we also specify the data that should be
stored in
COMMUNICATION AREA for later use. When this command is executed the correspondin
g
program is
released from the memory. After receiving the response from the terminal the pro
gram is again
loaded and this
time the data which we stored in communication area will be copied into the work
ing storage
section. And
the map will be received with RECEIVE MAP command.
The variable EIBCALEN in EIB holds the length of communication area. In procedur
e
division we checks the value of EIBCALEN If it is zero, we first send the map fo
llowed by
RETURN command. Otherwise, that is if EIBCALEN is not zero, we know that this tr
ansaction
is not running first time and we receive the map by using RECEIVE MAP command.
Q35) What is the function of the CICS translator?
A35)
The CICS translator converts the EXEC CICS commands into call statements for a s
pecific
programming language. There are CICS translators for Assembler, COBOL, and PL/1.

Q36) How can you start a CICS transaction other than by keying the Transaction I
D at the
terminal?
A36)
By coding an EXEC CICS START in the application program
1. By coding the trans id and a trigger level on the DCT table
2. By coding the trans id in the EXEC CICS RETURN command
3. By associating an attention key with the Program Control Table
4. By embedding the TRANSID in the first four positions of a screen sent to the
terminal.
5. By using the Program List Table
Q37) What is the purpose of the Program List Table?
A37) The Program List Table records the set of applications programs that will b
e executed automatically
at CICS start-up
time.
Q38) What are the differences between and EXEC CICS XCTL and an EXEC CICS START
command?
A38)
The XCTL command transfer control to another application (having the same Transa
ction ID), while
the START command initiates a new transaction ID (therefore a new task number).
The XCTL
continues task on the same terminal. START can initiate a task on another termin
al.
Page 26 of 260
IBMMAINFRAMES.com
Q39) What are the differences between an EXEC CICS XCTL and an EXEC CICS LINK
command.
A39)
The XCTL command transfer control to an application program at the same logical
level (do not
expect to control back), while the LINK command passes control to an application
program at the
next logical level and expects control back.
Q40) What happens to resources supplied to a transaction when an XCTL command is
executed?
A40)
With an XCTL, the working storage and the procedure division of the program issu
ing the XCTL are
released. The I/O areas, the GETMAIN areas, and the chained Linkage Section area
s (Commarea
from a higher level) remain. All existing locks and queues also remain in effect
. With a LINK,
however, program storage is also saved, since the transaction expects to return
and use it again.
Q41) What CICS command do you need to obtain the user logon-id?
A41)
You must code EXEC CICS ASSIGN with the OPERID option.
Q42) What is a resident program?
A42)
A program or map loaded into the CICS nucleus so that it is kept permanently in
main storage and
not deleted when CICS goes Short On Storage .
Q43) What is EIB. How it can be used?
A43)
CICS automatically provides some system-related information to each task in a fo
rm of EXEC
Interface Block (EIB), which is unique to the CICS command level. We can use all
the fields of
EIB in our application programs right away.
Q44) What is some of the information available in the EIB area?
A44)
I. The cursor position in the map
II. Transaction ID
III. Terminal ID
IV. Task Number
V. Length of communication area
VI. Current date and time
VII. Attention identifier
Q45) What information can be obtained from the EIBRCODE?
A45)
The EIBRCODE tells the application program if the last CICS command was executed
successfully
and, if not, why not.
Q46) What is the effect of including the TRANSID in the EXEC CICS RETURN command
?
A46)
The next time the end user presses an attention key, CICS will start the transac
tion specified in the
TRANSID option.
Q47) Explain how to handle exceptional conditions in CICS.
A47) An abnormal situation during execution of a CICS command is called an excep
tional
condition".
There are various ways to handle these exception conditions:
1. Handle Condition Command: It is used to transfer control to the procedure lab
el specified if
the
exceptional condition specified occurs.

2. Ignore Condition Command: It causes no action to be taken if the condition sp


ecified
occurs in
the program. That is control will be returned to the next instruction following
the command
which
encountered the exceptional condition.
Page 27 of 260
IBMMAINFRAMES.com
3. No Handle Option: This option can be specified in any CICS command and it wil
l cause no
action to be taken for any exceptional condition occurring during execution of t
his
command.
4. RESP Option: This option can be specified in any CICS command. If the RESP op
tion
is
specified in a command, CICS places a response code at a completion of the comma
nd. The
application program can check this code, then proceed to the next processing.
Handle condition:
Invalid handling of CICS error condition within the program causing the looping.
Here is one
example, most program have EXEC CICS HANDLE CONDTION ERROR(label) or EXEC
CICS HANDLE ABEND LABEL(label) to trap any error condition or abend. This type o
f
coding is usually acceptable if they handle the error / abend correctly in their
handling
paragraph. However, the program often cause another error or abend within the ha
ndling
routine. In that case, looping or sos will occur. I strong recommend that the fo
llowing statement
should be included in their ERROR handling paragraph.
EXEC CICS HANDLE CONDTION ERROR END-EXEC. It means that from now on, CICS will
handle all the errors and will not go back to error handling routine .For HANDLE
ABEND, code
EXEC CICS HANDLE ABEND CANCEL instead. Please check the application program
reference manual for further explanation of these two commands. Besides, not onl
y these two
HANDLE will cause the program, other type of error handle might cause loop too.
So code the
HANDLE command carefully. It is a good program practice to deactivate the error
handling
by EXEC CICS HANDLE CONDITION condition END-EXEC. Once you know that the
program won't need it anymore.
Q48) What is the function of the EXEC CICS HANDLE CONDITION command?
A48) To specify the paragraph or program label to which control is to be passed
if the handle condition
occurs.
Q49) How many conditions can you include in a single HANDLE CONDITION command?
A49) No more than 16 in a single handle condition. If you need more, then you mu
st code another
HANDLE CONDITION
command.
Q50) What is the EXEC CICS HANDLE ABEND?
A50)
It allows the establishing of an exit so cleanup processing can be done in the e
vent of abnormal task
termination.
Q51) What is the difference between EXEC CICS HANDLE CONDTION and an EXEC CICS
IGNORE command?
A51)
A HANDLE CONDITION command creates a go-to environment. An IGNORE command does
not create a go-to environment; instead, it gives control back to the next seque
ntial instruction
following the command causing the condition. They are opposites.
Q52) What happens when a CICS command contains the NOHANDLE option?
A52)
No action is going to be taken for any exceptional conditional occurring during
the execution of this
command. The abnormal condition that occurred will be ignored even if an EXEC CI
CS HANDLE
condition exist. It has the same effect as the EXEC CICS IGNORE condition except
that it will not
cancel the previous HANDLE CONDITION for any other command.
Q53) When a task suspends all the handle conditions via the PUSH command, how do
es the task
reactivate all the
handle conditions?
Page 28 of 260
IBMMAINFRAMES.com
A53)
By coding an EXEC CICS POP HANDLE command.
Q54) Explain re-entrancy as applies to CICS.
A54)
Reentrant program is a program which does not modify itself so that it can reent
er to itself
and continue processing after an interruption by the operating system which, dur
ing the
interruption, executes other OS tasks including OS tasks of the same program. It
is
also called a "reenterable" program or"serially reusable" program.
A quasi-reentrant program is a reentrant program under the CICS environment. Tha
t is, the quasi-
reentrant program is a CICS program which does not modify itself. That way it ca
n reenter to itself
and continue processing after an interruption by CICS which, during the interrup
tion, executes
other tasks including CICS tasks of the same program. In order to maintain the q
uasireentrancy,
a CICS application program must follow the following convention:
Constants in Working Storage: The quasi-reentrant program defines only constants
in its ordinary
data area (e.g. working Storage Section ). These constants will never be modifie
d and shared by the
tasks.
Variable in Dynamic Working Storage: The quasi reentrant program acquires a uniq
ue storage
area (
called Dynamic Working Storage --DWS) dynamically for each task by issuing the C
ICS macro
equivalent GETMAIN. All variables will be placed in this DWS for each task. All
counters would
have to be initialized after the DWS has been acquired.
Restriction on Program Alteration: The program must not alter the program itself
. If it
alters a CICS macro or command, it must restore the alteration before the subseq
uent
CICS macro or command.
Q55) What are the CICS commands available for program control?
A55)
The following commands are available for the Program Control services:
1.
LINK: To pass control to another program at the lower level, expecting to be ret
urned.
2.
XCTL: To pass control to another program at the same level, not expecting to be
returned.
3.
RETURN: To return to the next higher-level program or CICS.
4.
LOAD: To load a program.
5.
RELEASE: To release a program.
Q56) How is addressability achieved to the data outside programs working-storage
.?
A56)
The Base Locator for Linkage ( BLL ) is an addressing convention used to address
storage
outside the Working Storage Section of an application program. If BLL is used fo
r the input
commands (e.g.: READ, RECEIVE), it will improve the performance, since the progr
am would
be accessing directly the input buffer outside of the program. In order to work
as intended,
the program must construct BLL based on the following convention:
1). The parameter list must be defined by means of a 01 level data definition in
the
Linkage Section as the first area definition to the Linkage Section, unless a
communication area is being passed to the program, in which case DFHCOMMAREA
must be defined first. The parameter list consists of a group of the address poi
nters, each
of which is defined as the full word binary field ( S9(8) COMP ). This is called
the BLL
cells.
2). The parameter list is followed by a group of 01 level data definitions, whic
h would be the
actual
data areas. The first address pointer of the parameter list is set up by CICS fo
r
addressing the parameter list itself. From the second address pointer onward, th
ere is a
Page 29 of 260
IBMMAINFRAMES.com
one-to-one correspondence between the address pointers of the parameter list and
01 level
data definitions.
3). VS COBOL II provides CICS application programs with a significant improvemen
ts in
the area of addressability through the special ADDRESS register. Therefore, if a
n application
program is written in VS COBOL II, the program is no longer requires building th
e BLL
cells in the Linkage Section.
Q57) Explain the various ways data can be passed between CICS programs.
A57) Data can be passed between CICS programs in three ways-COMMAREA, TRASIENT D
ATA
QUEUE &
TEMPORARY STORAGE QUEUE.
Data can be passed to a called program using the COMMAREA option of the LINK or
XCTL
command in a calling program. The called program may alter the data content of C
OMMAREA
and the changes will be available to the calling program after the RETURN comman
d is issued in
the called program. This implies that the called program does not have to specif
y the
COMMAREA option in the RETURN command.
If the COMMAREA is used in the calling program, the area must be defined in the
Working
Storage Section of the program (calling), whereas, in the called program, the ar
ea must be
defined as the first area in the Linkage Section, using reserved name
DFHCOMMAREA.
Q58) What is the difference between using the READ command with INTO option and
SET option?
A58)
When we use INTO option with the READ command the data content of the record
will be moved into the specified field defined in the Working Storage Section of
the
program. When we use SET option with the READ command , CICS sets the address
pointer to the address of the record in the file input / output area within CICS
, so that the
application program can directly refer to the record without moving the record c
ontent
into the Working Storage area defined in the program. Therefore, the SET option
provides a better performance than the INTO option.
Q59) Can we define an alternate index on VSAM/RRDS ?
A59)
No
Q60) What is the difference between the INTO and the SET option in the EXEC CICS
RECEIVE
MAP command?
A60)
The INTO option moves the information in the TIOA into the reserved specified ar
ea, while the SET
option simply returns the address of the TIOA to the specified BLL cell or addres
s-of a linkage-
section.
Q61) How to establish dynamic cursor position on a map? How to get the cursor po
sition when we
receive a map?
A61)
We dynamically position a cursor through an application program using a symbolic
name
of the symbolic map by placing -1 into the field length field ( i.e., fieldname
+ L) of the
field where you wish to place the cursor. The SEND MAP command to be issued must
have
the CURSOR option ( without value ). Also, the mapset must be coded with MODE =
INOUT in the DFHMSD macro. We get the cursor position when we receive a map
by checking EIBCPOSN, which is a halfword ( S9(4) COMP) binary field in EIB, and
contains offset position (relatively to zero ) of the cursor on the screen.
Q62) What is MDT?
A62)
MDT ( Modified Data Tag ) is one bit of the attribute character. If it is off (
0 ), it
indicates that this field has not been modified by the terminal operator. If it
is on ( 1 ), it
indicates that this field has been modified by the operator. Only when MDT is on
, will the
Page 30 of 260
IBMMAINFRAMES.com
data of the field be sent by the terminal hardware to the host computer ( i.e.,
to the
application program, in end ). An effective use of MDT drastically reduces the a
mount of
data traffic in the communication line, thereby improving performance significan
tly.
Therefore, BMS maps and CICS application programs should be developed based on c
areful
considerations for MDT.
Q63) What are the three ways available for a program to position the cursor on t
he screen?
A63)
I. Static positioning. Code the insert cursor (IC) in the DFHMDF BMS macro.
II. Relative positioning. Code the CURSOR option with a value relative to zero(p
osition 1,1 is
zero) .
III. Symbolic positioning. Move high values or -1 to the field length in the sym
bolic map(and code
CURSOR on the
SEND command).

Q64) Name three ways the Modified Data Tag can be set on?
A64)
The Modified Data Tag can be set on:
1. When the user enters data into the field.
2. When the application program moves DFHBMFSE to the attribute character.
3. By defining it in the BMS macro definition.
Q65) What is a mapset?
A65)
A mapset is a collection of BMS maps link-edited together.
Q66) What is the function of DFHMDF BMS macro?
A66)
The DFHMDF macro defines fields, literal, and characteristics of a field.
Q67) Why is a TERM ID recommended in naming a TSQ?
A67)
In order to avoid confusion and to maintain data security, a strict naming conve
ntion
for QID will be required in the installation. Moreover, for a terminal-dependent
task (e.g.,
pseudo-conversational task), the terminal id should be included in QID in order
to
ensure the uniqueness of TSQ to the task.
Q68) Explain the basic difference between Intra partition TDQ and Extra partitio
n TDQ.
A68)
INTRA PARTITION TD QUEUEs It is a group of sequential records which are produced
by the same
and / or different transactions within a CICS region. These Qs are stored in onl
y one physical
file ( VSAM ) in a CICS region, which is prepared by the system programmer. Once
a record
is read from a queue, the record will be logically removed from the queue; that
is the record
cannot be read again. EXTRA PARTITION TD QUEUEs It is a
group of sequential records which interfaces between the transactions of the CIC
S region
and the systems outside of CICS region. Each of these TDQs is a separate physica
l file, and it
may be on the disk, tape, printer or plotter.
Q69) What are the differences between Temporary Storage Queue (TSQ) and Transien
t Data Queue
(TDQ).?
A69)
Temporary Storage Queue names are dynamically defined in the application program
, while TDQs
must first be defined in the DCT (Destination Control Table). When a TDQ contain
s certain amount
of records (Trigger level), a CICS transaction can be started automatically. Thi
s does not happen
when using a TSQ. TDQ(extra partition) may be used by batch application; TSQ can
not be accessed
in batch. The Transient Data Queue is actually a QSAM file. You may update an ex
isting item in a
TSQ. A record in a TDQ cannot be updated. Records in TSQ can be read randomly. T
he TDQ can be
read only sequentially. Records in Temporary Storage can be read more than once,
while records
stored in Temporary Data Queues cannot. With TDQs it is one read only.
Page 31 of 260
IBMMAINFRAMES.com
Q70) What is the difference between getting the system time with EIBTIME and ASK
TIME
command?
A70)
The ASKTIME command is used to request the current date and time. Whereas, the
EIBTIME field have the value at the task initiation time.
Q71) What does the following transactions do?
A71) CEDF : CICS-supplied Execution Diagnostic Facility transaction. It provides
interactive
program
execution and debugging functions of a CICS programs.
CEMT : CICS-supplied Extended Master Terminal transaction. It displays or manipu
lates
CICS
control environment interactively.
CEBR : CICS-supplied Temporary Storage Browse transaction. It displays the conte
nt of
Temporary Storage Queue ( TSQ ).
CECI : CICS-supplied Command Interpreter transaction. It verifies the syntax of
a CICS
command
and executes the command.
Q72) Explain floating maps with illustration.
A72)
Maps which can position themselves relative to the previous maps on the screen o
r page are known
as
the floating maps. For this you have to use special positional operands to LINE
and COLUMN
parameters of the BMS macro definition. They are SAME, NEXT. Actually this float
ing map
concept is there only in Full BMS where as it is not available in Min. or Standa
rd BMS macros.
RECEIVE MAP is not recommended in the case of floating maps. Hence these maps ar
e normally
used to send information such as selected records from a database to screen but
not for data entry. A
mapset can contain more than one m ap in it, you may use all these maps to build
a screen. In that
case there are two ways to send these maps on to the screen
i ) Use separate SEND MAP commands one for each map involved. or
ii) Use ACCUM operand along with SEND MAP command and while sending really on
to the
screen use SEND PAGE to display them at one shot. The second one is called
cumulative mapping scheme where you also can use floating maps.
Let's take a situation where you have to build a screen like this
HEADER MAP (no. of A gr. employs)
DETAIL MAP (employee list )
TRAILER MAP (Press a key to continue...)
Under such situations whatever the detail map needed that is to be displayed aga
in and again to
display all the information one screenful at a time. In this floating map concep
t helps.
Code the map like this
M1 DFHMDI ...... HEADER=YES,JUSTIFY=FIRST..................
M2 DFHMDI ... ......................... LINE=NEXT....................
M3 DFHMDI ........TRAILER=YES,JUSTIFY=LAST...........................

Here M2 is detail map, which is coded as floating map. Procedure:


Every time using cumulative map technique send header (first) and followed by de
tail map next
into a page buffer once the page is full an overflow occurs by using CICS HANDLE
OVERFLOW
command send first trailer map then header map ( This will do two things a) it s
ends previous map
on to the screen b) starts fresh page buffer ). Repeated this until no more reco
rds to be retrieved.
Here M2 is the one which holds the record values read from the file.
Q73) What is the function of the Terminal Control Table(TCT)?
A73)
The TCT defines the characteristics of each terminal with which CICS can communi
cate.
Page 32 of 260
IBMMAINFRAMES.com
Q74) What does it mean when EIBCALEN is equal to zeros?
A74)
When the length of the communication area (EIBCALEN) is equal to zeros, it means
that no data
was passed to the application.
Q75) How can the fact that EIBCALEN is equal to zeros be of use to an applicatio
n programmer?
A75)
When working in a pseudo-conversational mode, EIBCALEN can be checked if it is e
qual to zero. A
programmer can use this condition as a way of determining first time usage(of th
e program).
Q76) Which CICS system program is responsible for handling automatic task initia
lization?
A76)
The Transient Data Program(TDP).
Q77) In an on-line environment, how can you prevent more than one user from acce
ssing the same
Transient Data
Queue at the same time?
A77)
By issuing an EXEC CICS ENQ against the resource. When processing is completed,
a DEQ should
be executed.
Q78) When an application is invoked via the EXEC CICS START command with the fro
m option,
how does the
application gain access to the common area?
A78)
An EXEC CICS RETRIEVE command will access the common area.
Q79) The DFHCOMMAREA is used to pass information from one application to another
. What are
some other ways
that this function can be accomplished?
A79) You can also pass information in the following ways.
-By using a temporary storage queue
-By using an intrapartition TDQ
-By using the Task Work Area
-By using TCTUA
-Through a file
Q80) How do you define Task Work Area?
A80)
By defining it on the PCT (the Program Control Table)
Q81) What information do you get when an EXEC CICS STARTCODE is issued?
A81)
You will be able to determine if the application was started by (1) a transient
data trigger level(QD),
(2) a START command (S,SD), (3) user (U) or terminal input (TD), or (4) Distribu
ted Program
Link(D,DS).
Q82) Which CICS command must be issued by the application program in order to ga
in access to
the Common
Work Area(CWA)?
A82)
EXEC CICS ADDRESS with CWA option.
Q83) In which CICS table would you specify the length of the TASK WORK AREA (TWA
)?
A83)
In the Program Control Table(PCT).
Q84) What is a deadlock?
A84)
Deadlock (also known as a deadly embrace ) occurs when a task is waiting for a reso
urce held by
another task which, in turn, is waiting for a resources held by the first task.
Q85) Explain the term Transaction routing?
Page 33 of 260
IBMMAINFRAMES.com
A85)
Transaction routing is a CICS mode of intercommunication which allows a terminal
connected to
local CICS to execute another transaction owned by a remote CICS.
Q86) Explain the term Function Request Shipping?
A86)
Function request shipping is one of the CICS modes of intercommunication which a
llows an
application program in a local CICS to access resources owned by a remote CICS.
Q87) Explain the term MRO (Multi Region Operation)?
A87)
MRO is the mechanism by which different CICS address spaces with in the same CPU
can
communicate and share resources.
Q88) What are different system tables used in CICS?
A88)
PCT, FCT, TCT, DCT, PPT
Q89) What is multitasking and multithreading?
A89)
Multitasking is the feature supported by the operating system to execute more th
an one task
simultaneously. Multithreading is the system environment where the tasks are sha
ring the same
programs load module under the multitasking environment. It is a subset of multi
tasking since it
concerns tasks which use the same program.
Q90) What is the difference between link xctl?
A90)
Link is temporary transfer of control. Xctl is permanent transfer of control
Q91) Name some of the common tables in CICS and their usage.
A91) PCT Program Control Table -defines each transaction, containing a list of v
alid
transaction
identifiers (transid) where each transaction is paired
with its matching
program;
PPT Program Processing Table -contains a list of valid program names and maps an
d
whether a
current version is in the CICS region or needs to be
brought in as a
new copy;
FCT File Control Table -contains a list of files known to CICS, the dataset
name and status
(closed/open, enabled/disabled);
TCT Terminal Control Table -a list of the terminals known to CICS.
Q92) Name some common CICS service programs and explain their usage?
A92) Terminal Control, File Control, Task Control, Storage Control, etc. Each CI
CS services program
controls the usage
and status for its resource (file, terminal, etc) within the CICS region.
Q93) What is meant by a CICS task?
A93) A CICS task exists from the time the operator presses the enter key until t
he application program
returns control to
CICS.
Q94) What is meant by program reentrance?
A94) A program is considered reentrant if more than one task can execute the cod
e without interfering with
the other tasks'
execution.
Q95) What is the common systems area (CSA)?
Page 34 of 260
IBMMAINFRAMES.com
Q100) What is the common work area (CWA)?
A100) The common work area is a storage area that can be accessed by any task in
a CICS system.
Q101) How do you access storage outside your CICS program?
A101) In COBOL storage was accessed via BLL cells using the SET option of ADDRES
S commands. In
A95) The common systems area is the major CICS control block that contains syste
m information,
including pointers to
most other CICS control blocks. The CSA points to all members of STATIC storage.

Q96) What is the COMMAREA(communications area)?


A96) This is the area of main storage designed to let programs or tasks communic
ate with one another,
used in programs via
RETURN, XCTL and LINK commands.
Q97) What is the EIB (execute interface block)?
A97) The execute interface block lets the program communicate with the execute i
nterface program, which
processes CICS
commands. It contains terminal id, time of day and response codes.
Q98) What is an MDT (Modified Data Tag) -it's meaning and use?
A98) The modified data tag is the last bit in the attribute byte for each screen
field. It indicates whether
the corresponding
field has been changed.
Q99) What is a transid and explain the system transid CEMT?
A99) Transid is a transaction identifier, a four character code used to invoke a
CICS task. CEMT is the
master terminal
transaction that lets you display and change the status of resources -it is the
primary CICS service
transaction.
COBOL II the
special register, ADDRESS OF lets you reference the address of any Linkage Secti
on field.
Q102) How does COBOL II and CICS release 1.7 provide for exceptional conditions
and how does
that differ from
VS COBOL and earlier CICS releases?
A102) VS COBOL used the HANDLE CONDITION command to name routines to pass progra
m control
when exceptional
conditions were encountered. COBOL II and CICS release 1.7 introduced the RESP o
ption on
many CICS
commands.
Q103) What is the meaning and use of the EIBAID field?
A103) EIBAID is a key field in the execute interface block; it indicates which a
ttention key the user
pressed to initiate the
task.
Q104) How do you control cursor positioning?
A104) It's controlled by the CURSOR option of the SEND MAP command using a direc
t (0 through
1919) or symbolic
value.
Q105) What are attribute bytes and how and why are they modified?
Page 35 of 260 IBMMAINFRAMES.com
A105) Attribute bytes define map field characteristics (brightness, protection,
etc); they are modified
prior to issuing a
SEND MAP command, eg. from normal to intense to highlight an error field.
Q106) How do you invoke other programs? What are the pros and cons of each metho
d?
A106) There are three ways:
1) Use a COBOL II CALL statement to invoke a subprogram. This method is transpar
ent to
CICS, which sees
only the one load module.
2) An EXEC LINK is similar to a call; it invokes a separate CICS program and end
s with a
RETURN to the
invoking program. or
3) An EXEC XCTL which transfers control to another CICS program and does not get
control
back.
Q107) What is BMS?
A107) BMS is Basic Map Support; it allows you to code assembler level programs t
o define screens.
Q108) What is the difference between FSET and FRSET?
A108) FSET specifies that the modified data tag should be turned on before the m
ap is sent to the screen.
FRSET turns off
the attribute byte; it's used to transmit only changed data from the terminal.
Q109) What is the difference between the enter key, the PF keys and the PA keys?

A109) The enter and PF keys transmit data from the screen; the PA keys tell CICS
that a terminal action
took place, but
data is not transmitted.
Q110) Explain the difference among the EXEC LINK, EXEC XCTL and Cobol II static
call
statements in CICS.
A110) COBOL II allows for static calls which are more efficient than the LINK in
struction which
establishes a new rununit.

Q111) Are sequential files supported by CICS?


A111) Yes, but not as part of the File Control Program. They are supported as ex
tra partition transient
data files.
Q112) What option can be coded on the RETURN command to associate a transaction
identifier
with the next
terminal input?
A112) The TRANSID option.
Q113) What is an ASRA?
A113) An ASRA is the CICS interrupt code, the equivalent of an MVS abend code.
Q114) What is temporary storage?
A114) Temporary storage is either main or auxiliary storage that allows the prog
ram to save data between
task invocations.
Q115) What is transient data?
A115) Transient data provides CICS programs with a simple method for sequential
processing, often used
to produce
output for 3270 printers.
Page 36 of 260 IBMMAINFRAMES.com
Q116) What are the two types of transient data queues?
A116) They are intrapartition, which can only be accessed from within CICS and e
xtrapartition, which are
typically used to
collect data online, but process it in a batch environment.
Q117) Where are transient data sets defined to CICS?
A117) They are defined in the destination control table (DCT).
Q118) Once a transient data queue is read, can it be reread?
A118) No, silly! That's why IBM calls it transient.
Q119) Name some commands used for CICS file browsing.
A119) STARTBR, READNEXT, READPREV, ENDBR and RESETBR.
Q120) What other file control processing commands are used for file updating?
A120) WRITE, REWRITE, DELETE and UNLOCK.
Q121) What is Journal Recovery and Dynamic Transaction Backout?
A121) Journal Recovery is recovery of changes made to a file during online proce
ssing. If a file has I/O
problems it is
restored from a backup taken before online processing began and the journalled c
hanges are
applied. Dynamic
transaction backout is the removal of partial changes made by a failed transacti
on.
Q122) What tables must be updated when adding a new transaction and program?
A122) At a bare minimum the Program Control Table ( PCT) and Program Processing
Table (PPT) must
be updated.
Q123) What is the meaning of the SYNCPOINT command?
A123) SYNCPOINT without the ROLLBACK option makes all updates to protected resou
rces
permanent, with the
ROLLBACK option it reverses all updates.
Q124) What do the terms locality of reference and working set mean?
A124) They refer to CICS efficiency techniques. Locality of reference requires t
hat the application
program should
consistently reference instructions and data within a relatively small number of
pages. The
working set is the
number of program pages needed by a task.
Q125) What do the keywords MAPONLY and DATAONLY mean?
A125) MAPONLY is a SEND MAP operand that sends only fields with initial values t
o the screen.
DATAONLY is the
SEND MAP operand that specifies only data from the map area should be displayed.

Q126) What is the MASSINSERT option?


A126) MASSINSERT is a WRITE option that modifies normal VSAM split processing, l
eaving free
space after the
inserted record, so subsequent records can be inserted without splits. It is end
ed by an UNLOCK
command.
Q127) What is a cursor in CICS sql processing?
A127) A cursor is a pointer that identifies one row in a sql results table as th
e current row.
Q128) What are the DB2 steps required to migrate a CICS DB2 program from source
code to load
module?
Page 37 of 260 IBMMAINFRAMES.com
A128) A DB2 precompiler processes some SQL statements and converts others. It cr
eates a data base
request module
(DBRM) for the binding step. The bind process uses the DBRM to create an applica
tion plan,
which specifies the
techniques DB2 will use to process the embedded SQL statements. The link/edit st
ep includes an
interface to the
CICS/DB2 attachment facility.
Q129) Name some translator and compile options and explain their meaning?
A129) For translator SOURCE option prints the program listing, DEBUG enables EDF
and COBOL2
alerts the system to
use the COBOL II compiler. For the compiler XREF prints a sorted data cross refe
rence and
FDUMP prints a
formatted dump if the program abends.
Q130) What is the significance of RDO?
A130) RDO is Resource Definition Online. Since release 1.6 RDO allows resources
(terminals, programs,
transactions and
files) to be defined interactively while CICS is running.
Q131) What is CECI?
A131) CECI is the command level interpreter transid that interactively executes
CICS commands. It is a
rudimentary CICS
command debugger which does not require coding an entire program.
Q132) What is CEDF?
A132) CEDF is the execute diagnostic facility that can be used for debugging CIC
S programs.
Q133) What is CEBR?
A133) CEBR lets you browse the contents of a specific temporary storage queue.
Q134) Name and explain some common CICS abend codes?
A134) Any AEI_ indicates an execute interface program problem -the abending prog
ram encountered an
exceptional
condition that was not anticipated by the coding. APCT -the program could not be
found or is
disabled. ASRA most
common CICS abend, indicating a program check, identified by a one-byte code in
the
Program Status Word
in the dump. AKCP -the task was cancelled; it was suspended for a period longer
than the
transaction's defined
deadlock timeout period. AKCT -The task was cancelled because it was waiting too
long for
terminal input.
Q135) What is a logical message in CICS?
A135) A logical message is a single unit of output created by SEND TEXT or SEND
MAP commands.
BMS collects the
separate output from each command and treats them as one entity. This technique
may be used to
build CICS
reports.
Q136) What are the CICS commands associated with temporary storage queue process
ing?
A136) WRITEQ TS, READQ TS, and DELETEQ, whose meanings should be self-explanator
y.
Q137) What are the CICS commands associated with transient data queue processing
?
A137) WRITEQ TD, READQ TD, DELETEQ TD, ENQ and DEQ.
Page 38 of 260 IBMMAINFRAMES.com
enqueued. DEQ removes the lock.
Q139)
A139)
How do you delete Item 3 in a five-item TSQ?
You can't--at least not directly. Options, none of them good, include:
I. adding a logical-delete flag to the contents of each item;
II. moving item 4 to 3 and 5 to 4 and initializing item 5, all thru rewrites; th
is is a variant
on 1;
III. creating a new 'copy' TSQ that excludes the unwanted item, killing the old
TSQ
(deleteq ts), writing the
new TSQ with the original name from the new TSQ, and then deleting the 'copy' TS
Q.
This way, you
will get an accurate report from NUMITEMS.
Q140) What CICS command would you use to read a VSAM KSDS sequentially in ascend
ing
Q138) What is the meaning of the ENQ and DEQ commands?
A138) Neither command is exclusively a transient data command. The ENQ command r
eserves any user
defined resource
for the specific task. For enqueued transient data no other task will be able to
write records to it
for as long as it is
order?
A140) READNEXT reads the next record from a browse operation for any of the thre
e VSAM files.
Q141) How do you get data from a task that began with a START command?
A141) The RETRIEVE command is used to get data from a task that began with a STA
RT command.
Q142) What is interval control and what are some of the CICS commands associated
with it?
A142) CICS interval control provides a variety of time-related features -common
commands are
ASKTIME,
FORMATTIME, START, RETRIEVE, and CANCEL.
Q143) What is task control and what are the CICS commands associated with it?
A143) Task control refers to the CICS functions that manage the execution of tas
ks. Task control
commands are
SUSPEND, ENQ, and DEQ.
Q144) What is the CICS LOAD command?
A144) The LOAD command retrieves an object program from disk and loads it into m
ain storage -it's
primarily used for a
constant table that will be available system-wide.
Q145) What is the ABEND command and when would you use it?
A145) The ABEND command forces a task to end abnormally. It creates a transactio
n dump and invokes
the dynamic
transaction backout.
Q146) DB2 What is the difference between a package and a plan. How does one bind
2 versions of a
CICS
transaction with the same module name in two different CICS regions that share t
he same
DB2 subsystem?
A146) Package and plan are usually used synonymously, as in this site. Both cont
ain optimized code for
SQL statements -a
package for a single program, module or subroutine contained in the database req
uest module
(DBRM) library. A
Page 39 of 260 IBMMAINFRAMES.com
A150) a) DFHMSD statements 1
a b) DFHMDI statements 3
b c) DFHMDF statements 30
plan may contain multiple packages and pointers to packages. The one CICS module
would then
exist in a package
that could be referenced in two different plans.
Q147) How to build up LU 6.2 communication?" and "what Pseudo-conversational and
real
conversational
transaction are and their differences."
A147) Pseudo-conversational transactions are almost always the preferred method.
In these mode CICS
releases resources
between responses to user input, i.e. the task is ended awaiting the user respon
se.
Q148)
Why is it important not to execute a STOP RUN in CICS ?
A148)
Stop run will come out from the CICS region.
Q149)
Why must all CICS programs have a Linkage Section ?
A149)
To pass parameters from appl. Program to CICS.
Q150) A mapset consists of three maps and 10 fields on each map . How many of th
e following will
be needed ?
Q151) How are programs reinitiated under CICS ?
A151) START COMMAND , RETURN COMMAND
Q152) Why doesn t CICS use the Cobol Open and Close statements ?
A152) CICS AUTOMATICALLY OPENS AND CLOSES THE FILES THOSE ARE PLASED IN FCT
Q153) What is the difference between a Symbolic map and Physical map ?
A153) SYMBOLIC MAP IS USED BY USER AND PHYSICAL MAP IS USED BY SYSTEM
Q154) Can a program change protected field ?
A154) NO
Q155) How is the stopper byte different from an auto skip byte ?
A155) STOPPER command will stop after completing its field , whereas AUTOSKIP co
mmand Will skip
to next
unprotected field after completing its field.
Q156) By which CICS defined field can you determine the position of the cursor o
n the map ?
A156) ATTRIB FIELD
Q157) How will you place cursor on a field called EMPNO . This field belongs to map
set
MAPEMPG
and map MAPEMPM and Symbolic map Empid-Rec ?
A157) BY INSERTING IC IN THE ATTRIB COMMAND
Q158)
How do you place the cursor on a particular position on the screen? -GS
A158)
Move -1 to the length attribute of the field and use the CURSOR option.
Define the field with IC in the BMS map.
Use CURSOR(n m)??
Q159)
What are the two outputs created as a result of generation of a map? -GS
A159) The map copybook and the load module.
Page 40 of 260
IBMMAINFRAMES.com
Q160) What is the difference between physical map and symbolic map? -GS
A160) The physical map is the load module and the symbolic map is the data struc
ture.
Q161) What is the attribute byte? -GS
A161) Defines the display/transmission of field. most cases is an output field f
rom the program.
Q162) How do you use extended attributes ?
A162) Define EXTATT=YES and the correct terminal type.
Q163) What are the 3 working storage fields used for every field on the map? -GS

A163) Length, attribute and input/output field.


Q164) What is MDT? What are FSET, FRSET ?
A164) MDT: Bit in the attribute byte indicating modification of field on screen.
Happens on an input

operation.
FSET: Sets MDT on to ensure field is transmitted. Happens on an output operation
.
FRSET: Resets MDT. Until this happens, field continues to be sent.

Q165) What is the use of DSECT parameter in BMS?


A165) Is the parameter to generate a symbolic map.
Q166) Do you receive the attribute byte in the symbolic map?
A166) On EOF yes.
Q167) How do you make your BMS maps case sensitive?
A167) Use ASIS???
Q168) What is effect on RECEIVE MAP when PF key is pressed? PA key is pressed?
A168) When PF key is pressed, Data transmission may happen. When PA key is press
ed, Data
transmission will not
happen.
Q169) What is the difference between a PF key & a PA key ?
A169) PF keys wake up the task and transmit modified data, PA keys only wake up
the task.
Q170) Name the macros used to define the following: MAP MAPSET FIELD
A170) DFHMSD DFHMDI DFHMDF
Q171) Can you use OCCURS in a BMS map? If you do, what are the issues related wi
th its use?
A171) Yes. cannot use group by clause???
Q172) Can you define multiple maps in a BMS mapset?
A172) Yes.
Q173) How is the storage determined in the symbolic map, if you have multiple ma
ps?
A173) Storage for maps redefine the first. This means largest map has to be the
first.
Q174) What is the meaning of BMS length of field = 0?
A174) Data was not entered in the field
Q175) Can you simply check if length = 0 for checking if a field was modified?
A175) No, not if ERASE EOF was used.
Q176) What do you do if you do not want characters entered by the user to be fol
ded to uppercase
?
Page 41 of 260 IBMMAINFRAMES.com
A180) PPT SIT
PCT JCT
FCT SNT
DCT SRT
RCT TCT
A176) Use ASIS option on RECEIVE.
Q177) What does the BUFFER option in RECEIVE mean ?
A177) Brings the entire datastream from the terminal buffer.
Q178) What are the steps you go through to a create a BMS executable?
A178) Assemble to create CSECT and Link
Q179) When you compile a CICS program, the (pre)compiler puts an extra chunk of
code. Where
does it get
included and that is it called? What is its length? -GS
A179) DFHEIBLK, DFHCOMMAREA.
Q180) List all the CICS tables and explain their contents. -GS
Q181) I have written a CICS program. What tables should I setup to run this prog
ram? -GS
A181) PPT, PCT, (FCT, DCT, RCT (if needed)).
Q182) In which table would you make an entry for a BMS map? -GS
A182) PPT
Q183) What is the content of the PPT entry? -GS
A183) Length, Source, Use count, Lang, Res count DFHRPL number
Q184) For a CICS-DB2 program, how is the plan referenced? -GS
A184) Uses a RCT table.
Q185) How is dynamic memory allocated within a CICS application program? -GS
A185) Use a GETMAIN
Q186) What is the use of a TDQ, TSQ? -GS
A186) Temporary data stores.
Q187) How do you read from a TSQ? -GS
A187) Temp storage read command
Q188) If I create a TSQ from one transaction, can I read it from another transac
tion? -GS
A188) Yes. As long as they run in the same region.
Q189) What are extra partition & intra partition TDQs?
A189) Extra partition TDQs are datasets used for communication b'n CICS and othe
r CICS/Batch
regions. Intrapartition
TDQs are queues for communication within regn.
Q190) What is trigger level in the context of TDQs?
A190) For intrapartition TDQs specify the # records at which ATI happens. not ap
plicable for extra
partition TDQs.
Q191) How do you fire a batch job from a CICS transaction ?
A191) Define an extrapartition TDQ as an internal reader and write the JCL to it
. Terminate the JCL with
/*EOF.
Page 42 of 260 IBMMAINFRAMES.com
Q192) What is ATI? What kind of TDQ can be used?
A192) Automatic Task Initiation. Intra partition TDQ.
Q193) Do you require a table entry for a TSQ?
A193) If recovery is needed.
Q194) Is there any entry for TSQs in CICS tables?
A194) Yes in the DFHTST.
Q195) What is the use of DCT?
A195) Destination Control Table used to define TDQs
Q196) What is ENQ, DEQ ?
A196) Task control commands to make resources serially reusable.
Q197) Can you issue SQL COMMIT from a CICS program? -GS
A197) Yes.
Q198) What is the other way of terminating a transaction? -GS
A198) EXEC CICS SYNCPOINT. Assuming it is a LUW. This will not end the Xn.
Q199) What is an ASRA abend ?
A199) Any data exception problem SOC7, SOC4 etc.
Q200) What is an AEY9 abend ?
A200) DB2/IDMS not up.
Q201) What are the situations under which NEWCOPY is required ?
A201) When a program has been used in CICS atleast once and then changed and rec
ompiled.
Q202) What is EXEC CICS RETRIEVE ?
A202) Used by STARTed tasks to get the parameters passed to them.
Q203) Name some important fields in the EIB block ?
A203) EIBRESP, EIBCALEN, EIBRRCDE, EIBTASK, EIBDATE, EIBTIME
Q204) Can you use DYNAMIC calls in CICS ?
A204) Yes, the called routine must be defined in PPT and the calling program mus
t use CALL identifier..
Q205) How do you handle errors in CICS pgms ?
A205) Check EIBRESP after the call or use the HANDLE condition.
Q206) Suppose pgm A passes 30 bytes to pgm B thru commarea and pgm B has defined
its
DFHCOMMAREA to be
50 bytes . Is there a problem ?
A206) Yes, if B tries to access bytes 31-50.
Q207) When an XCTL is done, does the tranid change ? Is a new task created ? Doe
s it cause an
implicit
SYNCPOINT to be issued ?
A207) No, No, Yes.
Q208) How do you execute a background CICS transaction ?
A208) With a START or ATI.
Page 43 of 260 IBMMAINFRAMES.com
Q209) What is the difference between START and XCTL ?
A209) START is used to start a new task. It is a interval control command. XCTL
is used to pass control
to a program
within the same task. It is a program control command.
Q210) What is the usage of language in the PPT entry?
A210) Language interface and call parameters???
Q211) Can you have CICS code in a copybook? If yes, what happens during compilat
ion?
A211) Yes. Needs to be preprocessed.
Q212) What is an AICA abend?
A212) Runaway Task.
Q213) How would you resolve an ASRA abend?
A213) In COBOL II start with CEBR, and get the offset/instruction.
Q214) I invoke a transaction from CICS. The program has a code: MOVE DFHCOMMAREA
TO
WS-AREA.
What happens to this transaction? What happens to the other transactions?
A214) Junk may get moved in. Will cause Storage violation. ????
Q215) When you do a START, what will the value of EIBCALEN?
A215) Zero.
Q216) How are VSAM files Read in CICS pgms? -GS
A216) File Control Commands. Random, Sequential, forward and backward.
Q217) How will you access a VSAM file using an alternate index?
A217) Thru the path. Define path as an FCT and use normal File control commands.

Q218) How do you rollback data written to an ESDS file?


A218) Define the file as recoverable. in cases where records have been inserted
into the file, you may
need to run a batch
program to logically delete the inserted records.
Q219) I have done a START BROWSE on a VSAM dataset. Can I do another START BROWS
E
without doing an
END BROWSE?
A219) No.
Q220) Can you access QSAM (seq ) files from CICS ?
A220) No.
Q221) Can you access ESDS files from CICS ?
A221) Yes.
Q222) In the CICS command level all the re-entrancy issues are handled by the Sy
stem(True or
False).
A222) True
Q223) What are the three BMS options ?
A223) Minimum, Standard, Full
Q224) What are the beginning and end points of an LUW called?
A224) Sync point
Page 44 of 260 IBMMAINFRAMES.com
Q225) The DL/I database is a hierarchical database and the DL/I access method is
the access
method of the
Information Management System (IMS)(True or False)
A225) True
Q226) Before you can use a Temporary Storage Queue you must first define the Que
ue name in the
CICS
Temporary Queue Table)( True or False).
A226) False
Q227) The process of writing its own type of journal records by the application
program, other
than the automatic
journalling provided by CICS is called
A227) Explicit Journalling
Q228) In order to display a formatted screen, a terminal must receive a series o
f data stream called
Native Mode
Data Stream(True or False).
A228) True
Q229) Which is the CICS control program which governs the flow of control among
the CICS
application
programs?
A229) Program Control Program
Q230) What is the option of the DFHDCT macro which makes it possible to recover
logically
deleted records from
an Intrapartition TDQ?
A230) REUSE=YES
Q231) CICS and DB2 can exist in the same region under the Operating system (True
or False)
A231) True
Q232) What is the name of the facility provided by CICS to free the application
program form the
problems caused
by NMDS (device and format dependence)?
A232) Terminal Paging
Q233) What is the command which will delete a program LOADed into the main stora
ge using
LOAD command?
A233) RELEASE
Q234) Which is the option of the HANDLE AID command that will pass control to th
e specified
label when any key
is pressed?
A234) ANYKEY
Q235) What is the name of the mapset definition macro?
A235) DFHMSD
Q236) What is the access method used by DB2?
A236) SQL
Q237) What is the command that is used to add a new record to the file?
Page 45 of 260 IBMMAINFRAMES.com
A237) READ with UPDATE followed by REWRITE
Q238) What will happen when the resource security check has failed on the progra
m which has
been specified in the
PROGRAM option of the LOAD command?
A238) INVREQ
Q239) What is the command used to send a map to a terminal?
A239) SEND MAP
Q240) What is the command used to request notification when the specified time h
as expired?
A240) POST
Q241) If DATAONLY option is specified in the SEND MAP command what will happen?
A241) Only the symbolic map will be send
Q242) What will happen if the TDQ that you want to delete is not in the DCT?
A242) QIDERR will occur
Q243) The read of a record from an Intrapartition TDQ is not destructive(True or
False).
A243) True
Q244) An XCTL uses more CPU time than LINK (True or False)
A244) False
Q245) What is the primary function of the Sign-on Table?
A245) Register security information of all programs
Q246) Native Mode Data Stream (NMDS) is a mixture of Buffer Control Characters(B
CC) and text
data (True or
False).
A246) True
Q247) When there are 2 records with the same key specified in a DELETE operation
what will
happen?
A247) DUPKEY condition will be set
Q248) The application programs that contain the SQL statements must be Pre-compi
led for
converting the SQL
statements into equivalent COBOL statements (True or False)
A248) True
Q249) What are the databases that CICS can access?
A249) DB2, DL/I, ORACLE
Q250) The first step in the development of an application system is the Requirem
ent Analysis(True
or False).
A250) True
Q251) CICS provides an interface through which the all the DL/I services can be
used under
CICS(True or False).
A251) True
Q252) How to get the sign-on user-id from an application program?
A252) ASSIGN command with USERID option
Page 46 of 260 IBMMAINFRAMES.com
Q253) What is a Logical Unit of Work (LUW)?
A253) A sequence of operations logically tied together
Q254) Translation Time is not reduced if the Pre-compilation is done first(True
or False).
A254) True
Q255) What is the general Command format of CICS ?
A255) EXEC CICS followed by the command
Q256) If you use the OPTIMIZE compiler option the size of the program can be red
uced by 5 to
10%(True or
False).
A256) True
Q257) For multithreading an application program need not be re-entrant(True or F
alse).
A257) True
Q258) Before issuing an ASKTIME command what will be the values in the EIBDATE a
nd
EIBTIME fields if the
EIB?
A258) The date and time at the task initiation
Q259) What is the error condition that is set when the file specified in the NAM
E option is not in
the FCT?
A259) PGMIDERR
Q260) For protecting a transaction using the transaction security function, the
two things that must
be done are:
1. in the SNT entry of the user who you which to allow to access a protected tra
nsaction,
specify SCTKEY=n
2. In the PCT entry of the transactions that you wish to protect specify the TRA
NSEC=n.
(True or False)
A260) True
Q261) What are the various types of accesses that can be allowed by the SERVREQ
option of the
DFHFCT?
A261) ADD,BROWSE,DELETE,READ,UPDATE
Q262) CICS' system services provides an interface between CICS and the operating
system and
carries out the
functions like loading and releasing of application programs, acquiring and free
ing of
storage , task
scheduling, etc (True or False).
A262) True
Q263) What are the parameters that you have to give when you are using the CSSN
transaction?
A263) None
Q264) What is the command that is used to delay the processing of a task for a s
pecified time
interval or until a
specified time?
A264) WAIT
Q265) NMDS is both device dependent and format dependent (True or False)
A265) True
Page 47 of 260 IBMMAINFRAMES.com
Q266) Which is the EIB field that gives the date when a task was started?
A266) EIBDATE
Q267) Which is the AID that will not be identified in the ANYKEY option of the H
ANDLE AID
command?
A267) CLEAR
Q268) Reading a record from a TSQ will logically delete the record from the Queu
e (True or
False).
A268) True
Q269) What is the option that is used to erase all unprotected fields during a S
END MAP
operation?
A269) ERASEAUP
Q270) What is the CICS command that is used to receive the un-formatted data fro
m the terminal
or logical unit of
a communication network?
A270) RECEIVE
Q271) What is the command for reading a record form a TSQ?
A271) READQ TS, READQ
Q272) What will happen, if an out-of-range or negative value is specified in the
LENGTH option of
the SEND
command?
A272) The OUTRAGE condition will be set
Q273) Which is the control table where you specify all the transaction that are
to be started by
CICS after CICS
start-up?
A273) Sign-on table
Q274) A HANDLE CONDITION remains active until the end of the program or until an
other
HANDLE
CONDITION command (True or False).
A274) True
Q275) In the conversational mode the system waits for the user to enter his resp
onse and then press
an attention
key, and while waiting the resources are held by the program or task. So convers
ational
mode of
programming is inefficient (True or False)
A275) True
Q276) Which is the macro used for making an entry in the PPT
A276) DFHPPT
Q277) The goal of a recovery process is to Maintain the integrity of the data pr
ocessed by the
system and to
minimize the impact of a task or system failure (True or False).
A277) True
Q278) What is the primary objective of CICS ?
Page 48 of 260 IBMMAINFRAMES.com
A278) To provide the control and services of the DB/DC system
Q279) If no exception handling is provided in the program, what will happen ?
A279) CICS will take the default action specified for the condition
Q280) What is the CICS supplied transaction which performs syntax checking of a
CICS
command?
A280) CEMT
Q281) What is the process of converting the CICS commands into the equivalent ho
st language
statements called?
A281) Translation
Q282) What is the function of the LOAD command?
A282) To fetch a program, table or map to the main storage.
Q283) What is the CICS Command that is used for reading a record from the TDQ?
A283) READQ
Q284) LENGERR, NOTAUTH and PGMIDERR are some of the common exception conditions
that
can occur with
LINK and XCTL (True or False).
A284) False
Q285) Which of the following are recoverable CICS resources?
A285) Data files and data bases, Intrapartition TDQs, Auxiliary TSQs
Q286) Which is the program which determines whether a transaction should be rest
arted ?
A286) DTB
Q287) What is the command used for receiving a map from a terminal?
A287) RECEIVE MAP
Q288) The mode of achieving conversation with the user, by sending him the messa
ge and while
waiting for his
response, freeing the system resources is called
A288) Pseudo-conversation
Q289) Which is the command used for terminating a browse operation?
A289) ENDBR
Q290) What is the primary function of the Processing Program Table (PPT)?
A290) To register all programs and maps
Q291) Sync points cannot be requested by the application programs(True or False)
.
A291) False
Q292) Which is the command that is used to dump the main storage areas related t
o a task?
A292) DUMP
Q293) What is the CICS command that is used to copy a screen image of a terminal
into another
terminal?
A293) ISSUE COPY
Page 49 of 260 IBMMAINFRAMES.com
Q294) What is the name of the log which contains the information needed to resta
rt the system,
including the task
sync point information and system activity key points, snapshots of key system t
ables, etc.
A294)
Dynamic Log
Q295)
The EIB field which gives the last CICS command executed is
A295)
EIBRCODE
Q296) The READ command with INTO option will read the record specified into the
data area
specified (True or
false).
A296)
False
Q297) The attribute character is an visible 1 byte character which precedes a sc
reen field and
determines the
characteristics of the field (True or False).
A297)
True
Q298)
What is the function of the Terminal Control table?
A298)
To register all CICS terminals
Q299) Which is the CICS control program that provides communication services bet
ween user
written application
programs and terminals?
A299)
Terminal Control Program
Q300)
CICS Command level is
A300)
Low level version of CICS macro level
Q301)
TSQs can be written in the Main storage or Auxiliary storage (True or False).
A301)
True
Q302)
what is difference between call and link ?
A302)
In case of call , whenever you do changes to the called program you need to comp
ile the calling
program also. In case of link , it is not needed .
Q303)
what are the differences between DFHCOMMAREA and TSQ ?
A303)
Both are used to save data among tasks. but 1. COMMAREA is private to that trans
action only .
like every transaction has its own COMMAREA created by CICS as soon as the trans
action is
initiated . however TSQ , if queue id is known can be accessed by other transact
ions also 2.
COMMAREA length is s9(4) comp i.e. 65k . but TSQ can have any length.3. COMMAREA
is
available only during the transaction is running. TSQ if created with auxiliary
option resides in aux
memory and available even if main memory crashes.4.normally COMMAREA is used to
transfer
data from one task to another while tsq is used widely within the task as a scra
tch pad.
Q304)
What is Communication Area?
A304)
Communication Area is used to pass data between the program or between the task.

Q305)
Which of the following statements correctly describe the syntax of CICS command
language?
A). If an EXEC CICS command must be continued onto a second line a hyphen (-) mu
st be
coded in column 7 of the continued line.
B). If an EXEC CICS command must be continued onto a second line an 'X' must be
coded
in column 72 of each line to be continued.
Page 50 of 260
IBMMAINFRAMES.com
A305)
Q306)
A306)
Q307)
A307)
Q308)
A308)
Q309)
A309)
Q310)
A310)
C). An EXEC CICS command CANNOT be coded within a COBOL IF statement, between
the IF command and the period (.) ending it.
D). The END-EXEC delimiter is optional and never needs to be placed at the end o
f a CICS
command.
E). The options specified within an EXEC CICS command can be in any order.
E. The options specified within an EXEC CICS command can be in any order. For ex
ample 'exec
CICS Send From(Msg1) Length(30) End-Exec' can also be coded 'exec Cics Send Leng
th(30)
From(Msg1) End-Exec'
A CICS program ABENDS with an ASRA ABEND code. What is its meaning?
A) A link was issued to a program whose name does not exist in the PPT (Program
Processing Table).
B) A program attempted to use a map that is not defined in the PCT (Program Cont
rol
Table).
C) A security violation has occurred. The operator is not defined with the prope
r authority in
the SNT (Sign

on Table) to use a particular file


D) A program interrupt (0C0 or 0C1 or 0C2 or ...) has occurred in a CICS program
.
E) An I/O error has occurred when attempting to use a VSAM file from a CICS prog
ram
A program interrupt (0C0 or 0C1 or 0C2 or ...) has occurred in a CICS program.
Which of the following commands, when issued by 2 different programs running at
the same
time, will prevent simultaneous use of resource 'SINGLE'?
B) EXEC CICS PROTECT RESOURCE('SINGLE') LENGTH(6) END-EXEC.
C) EXEC CICS HOLD RESOURCE('SINGLE') LENGTH(6) END-EXEC.
D) EXEC CICS TASK SINGLE('SINGLE') LENGTH(6) END-EXEC.
E) EXEC CICS EXCLUSIVE RESOURCE('SINGLE') LENGTH(6) END-EXEC.

EXEC CICS EXCLUSIVE RESOURCE('SINGLE') LENGTH(6) END-EXEC


The map shown below is displayed with:
EXEC CICS SEND MAP('MAP1') MAPSET('MAP1S') MAPONLY END-EXEC. After the
screen is displayed, the operator enters 1 character, the letter 'X'. Where will
the cursor now appear
on the screen?
MAP1S DFHMSD
TYPE=MAP,MODE=INOUT,CTRL=(FREEKB,FRSET),LANG=COBOL, X
TIOAPFX=YESMAP1
DFHMDI SIZE=(24,80) DFHMDF POS=(5,1),ATTRB=UNPROT,LENGTH=1FIELD2
DFHMDF
POS=(5,3),ATTRB=UNPROT,LENGTH=1FIELD3 DFHMDF
POS=(5,5),ATTRB=(UNPROT,IC),LENGTH=1FIELD4 DFHMDF
POS=(5,7),ATTRB=ASKIP,LENGTH=1FIELD5 DFHMDF
POS=(5,9),ATTRB=UNPROT,LENGTH=1,INITIAL='Z' DFHMDF
POS=(5,11),ATTRB=ASKIP,LENGTH=1 DFHMSD TYPE=FINAL
A) In the field with a POS=(5,1) B) In FIELD2. C) In FIELD3. D) In FIELD4. E) In
FIELD5.
In FIELD5
How can you accomplish breakpoint in intertest?
U-for unconditional breakpoint, C-for conditional breakpoint, and A-for automati
c breakpoint
How many ways are there for initiating a transaction? what are they?
There are six ways in initiating a transaction.they are as follows.
1. embedding four character transid on the top left most corner of the screen.
2. making use of EXEC CICS START TRANSID ( )
3. making use of EXEC CICS RETURN TRANSID ( )
Page 51 of 260 IBMMAINFRAMES.com
4. By defining the transid in DCT (destination control table) to enable ATI (AUT
OMATIC
TASK INITIATION)
5. Making use of PLT ( program list table)
6. By associating four character transid in PCT (program control table)
Q311)
Which type of TDQ is read destructive?
A311)
Intrapartition TDQ is read destructive. extra partition tdq is not read destruct
ive.
Q312)
The error code AEIV?
A312)
This is the error code for length, if length of the source data is more than the
receiving field, This
error will occur.
Q313)
What is the size of commarea
A313) The default commarea size is 65k.
Q314)
What is ASRAABEND in CICS?
A314) It occurs when program interruption takes place. e.g.: when alphanumeric s
tring moved to numeric
data item OR
when arithmetic calculations performed on nonnumeric data item OR when an attemp
t made to
read an occurrence
of a table beyond the defined occurrences.
Q315)
What is a two Phase commit in CICS?
A315) This occurs when a programmer Issues a Exec CICS Syncpoint command. this i
s called two phase
because CICS
will first commit changes to the resources under its control like VSAM files. an
d the DB2 changes
are
committed. Usually CICS signals Db2 to complete the next phase and release all t
he locks.
Q316)
Difference between TSQ & TDQ
A316) TDQ is read destructive, TSQ is not. TSQ can be created dynamically, TDQ c
annot be created
dynamically. TSQ is
temporary in nature (i.e. it will be deleted when the program finishes execution
, unless it is made
permanent by
making a entry in the Temporary Storage Table), TDQ is not.
Q317)
What is ENQ in CICS?
A317) If any one want to restrict Trans-Id to single user, enter trans-id with E
NQ. It won't allow any one
else to use the
same trans-id.
Q318)
In SYMBOLIC Cursor Positioning after moving -1 to the length field also the curs
or is not
positioned in that particular field. Give reasons?
A318) You have to explicitly specify the word CURSOR between your EXEC CICS and
END-EXEC in
the program.
Q319)
What does EIB mean?
A319) The EIB is the EXECUTIVE INTERFACE BLOCK. It is not the EXECUTE INTERFACE
BLOCK. All TP
monitors or transaction processors are know as EXECUTIVEs as they carry out proc
ess on behalf
of a program
module. CICS and DB2 are executives.
Q320)
How many exceptional condition can be given in a HANDLE CONDITION?
A320)
Max. of 12 exceptional conditions can be given in a single HANDLE CONDITION.
Page 52 of 260
IBMMAINFRAMES.com
Q321) How do you access the records randomly in TSQ ?
A321) By specifying the ITEM option
Q322) What command do you issue to delete a record in a transient data queue ?
A322) READQ TD, the read is destructive.
Q323) What are different ways of initiating transaction in CICS ?
A323) We can initiate cics transaction a) by giving transaction id b) by giving
cics start command c)
automatic task
initiation.
Q324)
What is the difference between LINK and XCTL ?
A324) The XCTL command passes control to another program, but the resources requ
ested by the first
program may still
be allocated. A task does not end until a RETURN statement is executed. While in
LINK
command, program control
resumes its instruction following the LINK parameter. The disadvantage of LINK i
s that it requires
that both the
calling program and the called program remain in main memory even though both ar
e no longer
needed.
Q325)
What is the difference between CICS Program Control Table (PCT) and CICS Process
ing
Program Table (PPT) ?
A325) PCT contains a list of valid transaction ID. Each transaction ID is paired
with the name of the
program ,CICS will
load and execute when the transaction is invoked. On the other hand, PPT indicat
es each program's
location which
pertains to a storage address if the program has already been loaded or a disk l
ocation if the
program hasn't been
loaded. PPT will also be used to determine whether it will load a new copy of th
e program when
the transaction is
invoked.
Q326)
What are the 3 common ways to create maps?
A326) The first way is to code a physical map and then code a matching symbolic
map in your COBOL
program. The
second way to create a physical map along with a matching symbolic map is to cod
e only the
physical map using the
&SYSPARM option, CICS will automatically create a member in a COPY library. And
the third
wayis to use a
map generator such as SDF (Screen Definition Facility)
Q327)
What is Quasi-reentrancy?
A327) There are times when many users are concurrently using the same program, t
his is what we call
MultiThreading. For
example, 50 users are using program A, CICS will provide 50 Working storage for
that program
but one Procedure
Division. And this technique is known as quasi-reentrancy
Q328)
What is the difference between a physical BMS mapset and a logical BMS mapset?
A328) The physical mapset is a load module used to map the data to the screen at
execution time. The
symbolic map is the
actual copybook member used in the program to reference the input and output fie
lds on the
screen.
Page 53 of 260
IBMMAINFRAMES.com
Q329)
How To Set MDT(Modified Data Tag) Thru Application Program?(Dynamically)?
A329) You have to move the following macro DFHBMFSE to the Attribute field of th
at particular
Variable.
Q330)
What CICS facilities can you use to save data between the transactions?
A330)
COMMONAREA, TSQ & TDQ.
Q331)
How would you release control of the record in a READ for UPDATE?
A331)
By issuing a REWRITE,DELETE, or UNLOCK command or by ending the task.
Q332)
What is the difference between a RETURN with TRANSID and XCTL ?For example prog.
A is issuing REUTRN with TRANSID to prog B. Prog A. is issuing XCTL to prog B?
A332) In RETURN with TRANSID the control goes to the CICS region and the user ha
ve to transfer the
control to prog. B
by pressing any of the AID KEYS.In XCTL the control is directly transfer to prog
. B.
Q333)
What will be the length of the eibcalen ,if the transaction is used to cics firs
t time?
A333)
The length will be 0(zero).
Q334)
What is DFHEIBLK?
A334) DFHEIBLK is Execute Interface Block. It is placed in the linkage section a
utomatically by CICS
translator program.
It must be the first entry in linkage section. CICS places values prior to givin
g control to the
program and we can
find almost any information about our transaction.
Q335)
What is the difference between the XCTL and LINK commands?
A335) The LINK command anticipates return of control to the calling program, the
XCTL command does
not. Return to
the calling program will be the result of the CICS RETURN command, specifying
TRANSID(name of the calling
program).
Q336)
What CICS command would you use to read a VSAM KSDS sequentially in ascending
order?
A336) First issue a STARTBR(start browse), which will position the browse at the
desired record.
Retrieve records by
using subsequent READNEXT commands. Indicate the end of sequential processing wi
th the
ENDBR command. If
the generic key is specified in the STARTBR command positioning in the file will
be before the
first record
satisfying the generic key.For reading in descending order use the READPREV inst
ead of
READNEXT.
Q337)
What is the difference between pseudo-conversational and conversational?
A337) Pseudo-conversational will start a new task for each input. By coding a CI
CS RETURN command
specifying
TRANSID(itself). Conversational will have an active task during the duration of
the data entry.
Q338)
What is the COMMAREA(communications area)?
A338) An area used to transfer data between different programs or between subseq
uent executions of the
same program.
Needs to be defined in the Linkage Section.
Page 54 of 260
IBMMAINFRAMES.com
1.
What are the pros and cons of Conversation Vs Pseudo conversation programming ?
2.
Explain IPC mechanisms and means in CICS?
3.
Can we use EXEC SQL COMMIT/ROLLBACK in CICS? If so how? if not what are the alte
rnatives?
4.
What are the advantages of TDQ?
. How do you implement locking in CICS?
6.
What is multithreading?
7.
Name 3 cobol commands that cannot be used with CICS
8.
Why is it important not to execute a STOP RUN in CICS ?
9.
How are programs reinitiated under CICS ?
. Why must all CICS programs have a Linkage Section ?
11.
Why doesn t CICS use the Cobol Open and Close statements ?
12.
What is the difference between a Symbolic map and Physical map ?
13.
If a physical map has six variable fields and nine constant fields, how many fie
lds must the symbolic
map has ?
14.
In which column must label begin ?
. Code the parameter that will assign a start value to the filed
16.
Can a program change protected field ?
17.
How many columns will be needed on a screen to display a protected field that ha
s 4 bytes of data
18.
How many columns will be needed to on a screen to display an unprotected field t
hat has 4 bytes of
data
19.
What are the 2 categories of extended attributes ?
.
When using extended attributes , how many attribute bytes will be needed for eac
h symbolic map field
?
21.
How is the stopper byte different from an autoskip byte ?
22.
By which command do you preserve working storage fields ?
23.
How do you restore working storage fields ?
24.
Which command will release all the resources used by the program ?
. What is the relationship between EIBCALEN and DFHCOMMAREA ?
26.
How will you place cursor on a field called EMPNO . This field belongs to mapset MAP
EMPG
and map MAPEMPM and Symbolic map Empid-Rec ?
27.
How will the program know which key has been pressed.
28.
By which CICS defined field can you determine the position of the cursor on the
map ?
29.
What is the function of a STARTBR ?
.
Assume that a file contains 100 records ,If one start browse and 99 read next co
mmands have been
executed , which record will currently be in memory ?
31.
True or False ? . In a browse program the program should remain active while a u
ser is viewing a
screen
32.
Which condition will be triggered if a user attempts to start a browse beyond en
d-of file ?
33.
Which condition will be triggered if a user attempts to continue reading backwar
d beyond the
beginning of file?
34.
What will happen if a user enters a record key that is lower than the lowest rec
ord key in a file ?
. How can this answer be affected by the Start-Browse option ?
36.
Describe a method for beginning a browse at the beginning of a file .
37.
When is the condition of NOTFND not an error ?
38.
What will happen if you code a send map command or a return statement with the s
ame transid
option if a MAPFAIL occurs ?
39.
Why is the Enter Key option explicitly coded in the Handle Aid command ?
. What happens if you omit labels on a HANDLE Condition command ?
41.
What is the difference between a NOHANDLE and an IGNORE condition ?
42.
What are the 3 broad ways that a program can give up control ?
43.
What is the difference between XCTL and RETURN.
44.
What happens if a DELETEQ TS command is executed ?
. Why is the terminal ID often used as a part of a TSQ ?
46.
What is the maximum length of a TSQ name ?
47.
What is the maximum length of a TDQ name ?
Page 55 of 260
IBMMAINFRAMES.com
48.
Is it necessary to define a TSQ in a CICS table ?
49.
Can you read the 5th item of a TDQ ?
50.
Where are TDQ s defined ?
51.
Can you delete an individual record from a TSQ or a TDQ ?
52.
Can you update a record in a TDQ ?
53.
Why is it necessary to update PPT ?
54.
In which CICS table do we define the transaction for a program?
55.
Distinguish between TSQ and TDQ.
56.
What is DFHBMSCA?
57.
What is Pseudo conversational programming?
58.
Name 3 cobol commands that cannot be used with CICS
59.
If a physical map has six variable fields and nine constant fields , how many fi
elds must the symbolic
map has ?
60.
In which column must label begin ?
61.
Code the parameter that will assign a start value to the filed
62.
How many columns will be needed on a screen to display a protected field that ha
s 4 bytes of data?
63.
How many columns will be needed to on a screen to display an unprotected field t
hat has 4 bytes of
data
64.
What are the 2 categories of extended attributes ?
65.
When using extended attributes , how many attribute bytes will be needed for eac
h symbolic map field
?
66.
By which command do you preserve working storage fields ?
67.
How do you restore working storage fields ?
68.
Which command will release all the resources used by the program ?
69.
What is the relationship between EIBCALEN and DFHCOMMAREA ?
70.
How will the program know which key has been pressed.
71.
What is the function of a STARTBR ?
72.
Assume that a file contains 100 records ,If one start browse and 99 read next co
mmands have been
executed , which record will currently be in memory ?
73.
True or False ? . In a browse program the program should remain active while a u
ser is viewing a
screen
74.
Which condition will be triggered if a user attempts to start a browse beyond en
d-of file ?
75.
Which condition will be triggered if a user attempts to continue reading backwar
d beyond the
beginning of file?
76.
What will happen if a user enters a record key that is lower than the lowest rec
ord key in a file ? How
can this answer be affected by the Start-Browse option ?
77.
Describe a method for beginning a browse at the beginning of a file .
78.
When is the condition of NOTFND not an error ?
79.
What will happen if you code a send map command or a return statement with the s
ame transid
option if a MAPFAIL occurs ?
80.
Why is the Enter Key option explicitly coded in the Handle Aid command ?
81.
What happens if you omit labels on a HANDLE Condition command ?
82.
What is the difference between a NOHANDLE and an IGNORE condition ?
83.
What are the 3 broad ways that a program can give up control ?
84.
What is the difference between XCTL and RETURN.
85.
What happens if a DELETEQ TS command is executed ?
86.
Why is the terminal ID often used as a part of a TSQ ?
87.
What is the maximum length of a TSQ name ?
88.
What is the maximum length of a TDQ name ?
89.
Is it necessary to define a TSQ in a CICS table ?
90.
Can you read the 5th item of a TDQ ?
91.
Where are TDQ s defined ?
92.
Can you delete an individual record from a TSQ or a TDQ ?
93.
Can you update a record in a TDQ ?
94.
Why is it necessary to update PPT ?
Page 56 of 260
IBMMAINFRAMES.com
95. In which CICS table do we define the transaction for a program ?
96. How do you do a browse Operation
97. If you have a new map, new program, and a newfile, which CICS tables do you
update?
98. How to read a TS Queue
99. Differentiate between XCTL and LINK
100.What is START ?
101.How do you update a file in CICS In JCL,
102.What is a temporary dataset?
103.What is a PROC, and how is it different from a JCL
104.Differentiate instream procedures versus Catalogued procedures
105.What is difference between TDQ and TSQ ?
106.How do interval control transactions invoke themselves
107.How do we read a VSAM file in CICS
108.What are some of imp. CICS commands and their parameters
109.How do you protect a field from being overlaid? -GS
110.What are SEND MAP MAPONLY & SEND MAP DATAONLY ?
111.What are the restrictions while using GETMAIN and FREEMAIN? -GS
112.I have TSQ with 15 items. I want to delete the 10th item. How do I do that?
113.How do I find the name of the CICS region inside my COBOL program?
114.Can a CICS region be attached to more than one DB2 subsystem ?
115.What determines the DB2 subsystem to which a particular CICS region is attac
hed ?
116.What is the DSNC transaction used for ?
SQL(Structured Query Language):
Structured Query Language (SQL) provides the ability to create and define relati
onal database objects.
After these objects are defined, the language permits one to add data to these o
bjects. Once data has been
added, one can modify, retrieve, or delete that data. The language provides the
capability of defining what
type of authority one might have when accessing the data.
Data Definition Language
As the name implies, there is a group of SQL statements that allows one to defin
e the relational structures
that will manage the data placed in them. The CREATE statements brings Relational
Database
Management System (RDMS) objects into existence. The types of objects one can cr
eate are STOGROUP,
Database, Table space, Table, Index, View, Synonym, and Alias. The definitions o
f these objects are as
follows:
STOGROUP: A storage group is a list of disk volume names to which one can assign
a name. One defines
the list of disk volumes and assigns the STOGROUP name with the Create STOGROUP
statement.
Database: A database is a logical structure in which tables and indexes are late
r created. The database is
defined and associated with a STOGROUP with a Create Database statement.
Tablespace: A tablespace is an area on disk that is allocated and formatted by t
he Create Table space
statement.
Table: A table is an organizational structure which is defined in a Create Table
statement. In this statement,
the data attributes are defined by column, giving each column its own unique nam
e within the table.
Page 57 of 260 IBMMAINFRAMES.com
Index: A index is used in conjuction with the Primary Key parameter of the Create
Table statement. It is
made with the Create Index statement and provides the duplicate record-checking
necessary for a unique
key.
View: A view is an alternative perspective of the data present in a database. It
is made with the Create View
statement and can represent a subset of the columns defined in a table. It can a
lso represents a set of
columns combined from more than one table.
Synonym: The Create Synonym statement defines an unqualified name for a table or
a view.
Alias: The Create Alias statement defines an alternate qualified name for a tabl
e or a view.
After a table is created, additional columns may be added with an Alter Table st
atement. Any RDMS object
that was made with a create statement can be removed with a drop statement.
In order to define RDMS objects, one needs various levels of authority. The foll
owing is a list of authority
levels that can be granted to a user ID to operate on a designated database.
DBADM Database administrator authority
DBCTRL Database control authority
DBMAINT Database maintenance authority
CREATETS Create Table space Authority
CREATETAB Create Table authority
DROP Drop authority on a database or subordinate objects
Data Manipulation Language
There are four SQL data manipulation statements(DML) available: Insert, Select,
Update,
and Delete. After tables are defined, they are ready to store data. Data is adde
d to tables through
the SQL Insert statement. Once data has been inserted into a table, it can be re
trieved by the use of
the Select statement. Data stored in a table can be modified by executing the SQ
L Update
statement. Data can be deleted from a table by using the SQL Delete statement.
The SQL statements perform RDMS operations that can affect only one row at a tim
e if
desired. The same statements can, if required, affect many or all of the rows in
a table. It is
possible to select one row and insert it into another with one statement. It is
also just as easy to
select all of the rows from one table and insert all of them into another with a
single statement. The
same scope of operation applied to the update and delete statements. The scope o
f operation is
controlled by the use of the WHERE clause. The operation will affect only the ro
ws that satisfy the
search condition. When no search condition specified, the entire table is affect
ed.
There are additional language elements available that provide the ability to pro
cess the
table data while it is being retrieved. In addition, there are a variety of func
tions that modify the
value of the data that is returned in a query. There are column functions that a
ct on all of the values
of the selected rows for a specified column and return a single answer. There ar
e also scalar
functions that return a specific answer for each row that satisfies the search c
ondition.
As mentioned previously, SQL provides the ability to filter what data is retriev
ed in a
select statement by including the WHERE clause. The WHERE clause specifies a var
iety of
comparisons between two values. The values could be column values or the result
of an operation
involving more than one column or a constant. The comparison operation are the s
ame as those
used in COBOL, with the exception of two additional operators. The first is the
IN operator that
compares a single value has a match in the specified list of values. The other i
s the LIKE operator,
in which you can specify a value string that includes wildcard characters in such
a manner that
you can select rows of a table where column values are similar to the extent you
require.
Page 58 of 260 IBMMAINFRAMES.com
STOGROUP A storage group
DATABASE A logical collection of tables
TABLESPACE An area that stores tables
TABLE A data structure organized by a specified columns
INDEX An alternate path to a table data
VIEW An alternate representation of one or more tables
SYNONYM An alternate name for local table or view
ALIAS An alternate name for a table definition which may be local
or remote, existence or nonexistent
SQL provides four arithmetic operations : addition, subtraction, multiplication,
and
division. An arithmetic expression may involve any combination of column name or
numbers. The
arithmetic expression may itself be used as a column name or in a Select, Insert
, Update, or Delete
statement.
SQL provides the ability to sort the data retrieved from a table via the ORDER B
Y
clause. In this clause, you can specify one or more sort column names as well as
if each sort key is
ascending or descending.
SQL also provides the ability to perform set manipulation operations. Using SQL,
one can
SELECT the intersection of two or more sets of data by coding a JOIN. A JOIN is
any SELECT
statement that has more than one DBMS object listed in its FROM clause. One can
combine
different sets of data by using the UNION operator. Other set manipulations can
be executed by
combining different operators and search conditions.
The Following are the most frequently asked questions....
Q1) What RDMS objects are created with the SQL CREATE statements?
A1) The SQL CREATE statements are used to create the following objects:
Q2) What RDMS objects are required before you can create a table?
A2) Before you can create a table, you need an existing database and tablespace.

Q3) In what RDMS object does one first list column names?
A3) One first uses the column name in the CREATE TABLE statement.
Q4) What is the syntax for a CREATE TABLE statement?
A4) CREATE TABLE table name
(column name list
primary key (column name))
in database-name, tablespace-name.
Q5) Can one add columns to a table after it has been defined?
A5) Yes, one can add column to a table after it has been defined by using the SQ
L ALTER TABLE
statement.
Q6) Where in a table are added columns located?
A6) The new columns are added to the end of the table.
Q7) After a table is defined, can columns be removed?
A7) The only way to remove columns from an existing table involves a migration p
rogram that extracts only
the desired
columns of data, redefining the table without the unwanted columns, then populat
ing the new table.
One have to handle
all the old table s dependents programmatically.
Page 59 of 260 IBMMAINFRAMES.com
Q8) Which RDMS objects can you change with the SQL ALTER statements?
A8) The SQL ALTER statement can change a table index, a table, a tablespace, or
a STOGROUP.
Q9) What authority is required to create a table?
A9) In order to create tables, one needs CREATETAB privileges.
Q10) What is minimum authority required for one to create a tablespace?
A10) In order to create tablespaces, one needs CREATETS privileges.
Q11) When is it necessary to create a table index?
A11) It is necessary to create a table index whenever you want to enforce the un
iqueness of the table s
primary key.
Q12) What is a synonym?
A12) A synonym is an unqualified alternative name for a table or view.
Q13) What is a foreign key?
A13) A foreign key is the key defined in one table to reference the primary key
of a reference table. This
foreign key must
have the same structure as the reference table s primary key.
Q14) What is referential integrity?
A14) Referential integrity is the automatic enforcement of referential constrain
ts that exist between a
reference table and a
referencing table. When referential integrity is enforced, the value of a foreig
n key exists as a
primary key value in the
reference table. In other words, when referential integrity is enforced, all of
the foreign key values in,
for example, the
department code column in an employee table exist as primary key values in a departme
nt
table.
Q15) What are the column name qualifiers?
A15) A column name qualifier are used as a table designator to avoid ambiguity w
hen the column names
referenced exists
in more than one table used in the SQL statement. Column name qualifiers are als
o used in correlated
references.
Q16) What is a correlation name?
A16) A correlation name is a special type of column designator that connects spe
cific columns in the
various levels of a
multilevel SQL query.
Q17) What is a results table?
A17) A result table is the product of a query against one or more tables or view
s (i.e., it is the place that
holds the results of a
query).
Q18) What is a cursor?
A18) A cursor is a named control structure used to make a set of rows available
to a program. DB2 is the
relational database
system that runs in an MVS environment. It was developed by IBM and interfaces w
ith SQL. With
the use of SQL
DB2, databases can be accessed by a wide range of host languages. SQL is the rel
ational database "
application
Page 60 of 260 IBMMAINFRAMES.com
language " that interfaces with DB2. Because of its capabilities, SQL and, in tu
rn, DB2 have gained
considerable
acceptance. Thus, a working knowledge of DB2 increases one's marketability.
Q19) What is the basic difference between a join and a union?
A19) A join selects columns from 2 or more tables. A union selects rows.
Q20) What is normalization and what are the five normal forms?
A20) Normalization is a design procedure for representing data in tabular format
. The five normal forms
are progressive
rules to represent the data with minimal redundancy.
Q21) What are foreign keys?
A21) These are attributes of one table that have matching values in a primary ke
y in another table,
allowing for relationships
between tables.
Q22) Describe the elements of the SELECT query syntax?
A22) SELECT element FROM table WHERE conditional statement.
Q23) Explain the use of the WHERE clause?
A23) WHERE is used with a relational statement to isolate the object element or
row.
Q24) What techniques are used to retrieve data from more than one table in a sin
gle SQL
statement?
A24) Joins, unions and nested selects are used to retrieve data.
Q25) What is a view? Why use it?
A25) A view is a virtual table made up of data from base tables and other views,
but not stored separately.
Q26) Explain an outer join?
A26) An outer join includes rows from tables when there are no matching values i
n the tables.
Q27) What is a subselect? Is it different from a nested select?
A27) A subselect is a select which works in conjunction with another select. A n
ested select is a kind of
subselect where the
inner select passes to the where criteria for the outer select.
Q28) What is the difference between group by and order by?
A28) Group by controls the presentation of the rows, order by controls the prese
ntation of the columns for
the results of the
SELECT statement.
Q29) What keyword does an SQL SELECT statement use for a string search?
A29) The LIKE keyword allows for string searches. The % sign is used as a wildca
rd.
Q30) What are some SQL aggregates and other built-in functions?
A30) The common aggregate, built-in functions are AVG, SUM, MIN, MAX, COUNT and
DISTINCT.
Q31) How is the SUBSTR keyword used in SQL?
A31) SUBSTR is used for string manipulation with column name, first position and
string length used as
arguments. E.g.
SUBSTR (NAME, 1 3) refers to the first three characters in the column NAME.
Q32) Explain the EXPLAIN statement?
A32) The explain statement provides information about the optimizer's choice of
access path of the SQL.
Page 61 of 260 IBMMAINFRAMES.com
Q33) What is referential integrity?
A33) Referential integrity refers to the consistency that must be maintained bet
ween primary and foreign
keys, i.e. every
foreign key value must have a corresponding primary key value.
Q34) What is a NULL value? What are the pros and cons of using NULLS?
A34) A NULL value takes up one byte of storage and indicates that a value is not
present as opposed to a
space or zero
value. It's the DB2 equivalent of TBD on an organizational chart and often corre
ctly portrays a
business situation.
Unfortunately, it requires extra coding for an application program to handle thi
s situation.
Q35) What is a synonym? How is it used?
A35) A synonym is used to reference a table or view by another name. The other n
ame can then be written
in the
application code pointing to test tables in the development stage and to product
ion entities when the
code is migrated.
The synonym is linked to the AUTHID that created it.
Q36) What is an alias and how does it differ from a synonym?
A36) An alias is an alternative to a synonym, designed for a distributed environ
ment to avoid having to use
the location
qualifier of a table or view. The alias is not dropped when the table is dropped
.
Q37) When can an insert of a new primary key value threaten referential integrit
y?
A37) Never. New primary key values are not a problem. However, the values of for
eign key inserts must
have
corresponding primary key values in their related tables. And updates of primary
key values may
require changes in
foreign key values to maintain referential integrity.
Q38) What is the difference between static and dynamic SQL?
A38) Static SQL is hard-coded in a program when the programmer knows the stateme
nts to be executed.
For dynamic SQL
the program must dynamically allocate memory to receive the query results.
Q39) Compare a subselect to a join?
A39) Any subselect can be rewritten as a join, but not vice versa. Joins are usu
ally more efficient as join
rows can be
returned immediately, subselects require a temporary work area for inner selects
results while
processing the outer
select.
Q40) What is the difference between IN subselects and EXISTS subselect?
A40) If there is an index on the attributes tested an IN is more efficient since
DB2 uses the index for the
IN. (IN for index is
the mnemonic).
Q41) What is a Cartesian product?
A41) A Cartesian product results from a faulty query. It is a row in the results
for every combination in the
join tables.
Q42) What is a tuple?
Page 62 of 260 IBMMAINFRAMES.com
A42) A tuple is an instance of data within a relational database.
Q43) What is the difference between static and dynamic SQL?
A43) Static SQL is compiled and optimized prior to its execution; dynamic is com
piled and optimized
during execution.
Q44) Any SQL implementation covers data types in couple of main categories. Whic
h of the
following are those data
types ? (Check all that apply)
A). NUMERIC
B). CHARACTER
C). DATE AND TIME
D). BLOBS E. BIT
A44) A,B,C. Not all SQL implementations have a BLOB or a BIT data types.
Q45) We have a table with a CHARACTER data type field. We apply a ">" row compar
ison
between this field and
another CHARACTER field in another table. What will be the results for records w
ith field
value of NULL?
(Check one that applies the best)
A.
TRUE
B.
B. FALSE
C.
C. UNKNOWN
D.
D. Error.
E. E. Those records will be ignored
A45) C. NULL in a row when compared will give an UNKNOWN result.
Q46) Any database needs to go through a normalization process to make sure that
data is
represented only once. This
will eliminate problems with creating or destroying data in the database. The no
rmalization
process is done
usually in three steps which results in first, second and third normal forms. Wh
ich best
describes the process to
obtain the third normal form? (Check one that applies the best)
A.
Each table should have related columns.
B.
Each separate table should have a primary key.
C.
We have a table with multi-valued key. All columns that are dependent on only on
e or on some
of the keys should be moved in a different table.
D.
If a table has columns not dependent on the primary keys, they need to be moved
in a separate
table.
E. E. Primary key is always UNIQUE and NOT NULL.
A46) D. All columns in a table should be dependent on the primary key. This will
eliminate transitive
dependencies in
which A depends on B, and B depends on C, but we're not sure how C depends on A.

Q47) SQL can be embedded in a host program that uses a relational database as a
persistent data
repository. Some of
the most important pre-defined structures for this mechanism are SQLDA ("SQL Des
criptor
Area") and
SQLCA ("SQL Communications Area") SQLCA contains two structures -SQLCODE and
SQLSTATE.
SQLSTATE is a standard set of error messages and warnings in which the first two
characters
defines the class
Page 63 of 260
IBMMAINFRAMES.com
and the last three defines the subclass of the error. Which of the following SQL
STATE codes is
interpreted as
"No data returned"?(Check one that applies the best)
A). 00xxx
B). 01xxx
C). 02xxx
D). 22xxx
E). 2Axxx

A47) C. 00 -is successful completion, 01 -warnings, 22 -is data exception and 2A


is syntax error. The
SQLSTATE code
format returned for "No data returned" is "02xxx".
Q48) What are common SQL abend codes? (e.g. : 0,100 etc.,)
A48)
-818 time stamp mismatch
-180 wrong data moved into date field
Q49) What is meant by dynamic SQL?
A49) Dynamic SQL are SQL statements that are prepared and executed within a prog
ram while the
program is executing.
The SQL source is contained in host variables rather than being hard coded into
the program. The
SQL statement may
change from execution to execution.
Q50) What is meant by embedded SQL?
A50) They are SQL statements that are embedded with in application program and a
re prepared during the
program
preparation process before the program is executed. After it is prepared, the st
atement itself does not
change(although
values of host variables specified within the statement might change).
Q51) What is meant by entity integrity?
A51)
Entity integrity is when the primary key is in fact unique and not null.
Q52) What will EXPLAIN do?
A52) EXPLAIN obtains information (which indexes are used, whether sorting is nec
essary, which level of
locking is
applied) about how SQL statements in the DBRM will be executed, inserting this i
nformation into
the
X .PLAN.TABLE where the X is the authorization ID of the owner of the plan.
Q53) What is the foreign key?
A53) A foreign key is a column (or combination of columns) in a table whose valu
es are required to match
those of the
primary key in some other table.
Q54) What will GRANT option do?
A54) It will grant privileges to a list of one or more users. If the GRANT optio
n is used in conjunction
with the PUBLIC
option, then all users will be granted privileges. Also you can grant privileges
by objects and types.
Q55) What does the term grant privileges mean?
A55)
Grant privileges means giving access/authority to DB2 users.
Q56) What is an image copy?
Page 64 of 260
IBMMAINFRAMES.com
A56) It is an exact reproduction of all or part of a tablespace. DB2 provides ut
ility programs to make fullimage
copies (to
copy the entire tablespace) or incremental image copies to copy only those pages
that have been
modified since the last
image copy.
Q57) What is meant by an index?
A57) An index is a set of row identifiers (RIDs) or pointers that are logically
ordered by the values of a
column that has
been specified as being an index. Indexes provide faster access to data and can
enforce uniqueness
on the rowin a
table.
Q58) What is an index key?
A58) It is a column or set of columns in a table used to determine the order of
index entries.
Q59) What is a join?
A59) A join is a relational operation that allows retrieval of data from two or
more tables based on
matching columns
values.
Q60) What is meant by locking?
A60) Locking is a process that is used to ensure data integrity. It also prevent
s concurrent users from
accessing inconsistent
data. The data (row) is locked until a commit is executed to release the updated
data.
Q61) What is meant by null?
A61) This is a special value that indicates the absence of data in a column. Thi
s value is indicated by a
negative value,
usually -1.
Q62) What is an object?
A62) An object is anything that is managed by DB2 (that is databases, table spac
es, tables, views, indexes
or synonyms), but
not the data itself.
Q63) Describe referential integrity?
A63) Referential integrity refers to a feature in DB2 that is used to ensure con
sistency of the data in the
database.
Q64) Describe a primary key?
A64) A primary key is a key that is unique, non-null, and is part of the definit
ion of a table. A table must
have a primary key
to be defined as a parent.
Q65) How would you find out the total number of rows in a table? -GS
A65) Use SELECT COUNT(*) ...
Q66) How do you eliminate duplicate values in SELECT? -GS
A66) Use SELECT DISTINCT ...
Q67) How do you select a row using indexes? -GS
A67) Specify the indexed columns in the WHERE clause.
Q68) What are aggregate functions?
Page 65 of 260 IBMMAINFRAMES.com
A68)
Bulit-in mathematical functions for use in SELECT clause.
Q69) How do you find the maximum value in a column? -GS
A69)
Use SELECT MAX(...
Q70) Can you use MAX on a CHAR column?
A70)
YES.
Q71) My SQL statement SELECT AVG(SALARY) FROM EMP-TABLE yields inaccurate result
s.
Why?
A71) Because SALARY is not declared to have Null s and the employees for whom the
salary is not
known are also
counted.
Q72) How do you retrieve the first 5 characters of FIRSTNAME column of EMP table
?
A72)
SELECT SUBSTR(FIRSTNAME,1,5) FROM EMP;
Q73) How do you concatenate the FIRSTNAME and LASTNAME from EMP table to give a
complete name?
A73)
SELECT FIRSTNAME || ' ' || LASTNAME FROM EMP;
Q74) What is the use of VALUE function?
A74)
Avoid negative SQLCODEs by handling nulls and zeroes in computations.
Substitute a numeric value for any nulls used in computation.
Q75) What is UNION,UNION ALL? -GS
A75)
UNION eliminates duplicates
UNION ALL: retains duplicates
Both these are used to combine the results of different SELECT statements.
Q76) Suppose I have five SQL SELECT statements connected by UNION/UNION ALL, how
many
times should I
specify UNION to eliminate the duplicate rows? -GS
A76) Once.
Q77) What is the restriction on using UNION in embedded SQL?
A77)
It has to be in a CURSOR.
Q78) In the WHERE clause what is BETWEEN and IN? -GS
A78)
BETWEEN supplies a range of values while IN supplies a list of values.
Q79) Is BETWEEN inclusive of the range values specified? -GS
A79)
Yes.
Q80) What is 'LIKE' used for in WHERE clause? What are the wildcard characters?
-GS
A80) LIKE is used for partial string matches. '%' ( for a string of any characte
r ) and '_' (for any single
character ) are the
two wild card characters.
Q81) When do you use a LIKE statement?
A81) To do partial search e.g. to search employee by name, you need not specify
the complete name; using
LIKE, you can
search for partial string matches.
Q82) What is the meaning of underscore ( '_' ) in the LIKE statement? -GS
Page 66 of 260
IBMMAINFRAMES.com
A82) Match for any single character.
Q83) What do you accomplish by GROUP BY ... HAVING clause? -GS
A83) GROUP BY partitions the selected rows on the distinct values of the column
on which you group by.
HAVING selects
GROUPs which match the criteria specified
Q84) Consider the employee table with column PROJECT nullable. How can you get a
list of
employees who are not
assigned to any project?
A84) SELECT EMPNO FROM EMP WHERE PROJECT IS NULL;
Q85) What is the result of this query if no rows are selected:
SELECT SUM(SALARY) FROM EMP WHERE QUAL='MSC';
A85) NULL
Q86) Why SELECT * is not preferred in embedded SQL programs?
For three reasons:
If the table structure is changed (a field is added), the program will have to b
e modified
Program might retrieve the columns which it might not use, leading on I/O over h
ead.
The chance of an index only scan is lost.

Q87) What are correlated subqueries? -GS


A subquery in which the inner ( nested ) query refers back to the table in the o
uter query. Correlated
subqueries must be evaluated for each qualified row of the outer query that is r
eferred to.
Q88) What is a cursor? Why should it be used? -GS
Cursor is a programming device that allows the SELECT to find a set of rows but
return them one at a time.
Cursor should be used because the host language can deal with only one row at a
time.
Q89) How would you retrieve rows from a DB2 table in embedded SQL? -GS
Either by using the single row SELECT statements,or by using the CURSOR.
Q90) Apart from cursor, what other ways are available to you to retrieve a row f
rom a table in
embedded SQL? -GS
Single row SELECTs.
Q91) How do you specify and use a cursor in a COBOL program? -GS
Use DECLARE CURSOR statement either in working storage or in procedure division
(before open
cursor),
to specify the SELECT statement. Then use OPEN, FETCH rows in a loop and finally
CLOSE.

Q92) What happens when you say OPEN CURSOR?


If there is an ORDER BY clause, rows are fetched, sorted and made available for
the FETCH statement.
Other wise simply the cursor is placed on the first row.
Q93) Is DECLARE CURSOR executable?
No.
Q94) Can you have more than one cursor open at any one time in a program ? -GS
Yes.
Q95) When you COMMIT, is the cursor closed?
Yes.
Page 67 of 260 IBMMAINFRAMES.com
1. What is SQLCA and SQLDA?
2. What is 2 phase commit?
Page 68 of 260 IBMMAINFRAMES.com
DATABASE 2(DB2)
The questions and answers that follow are intended for those with a working know
ledge of DB2 as a
self-test .
Q1) What is DB2 (IBM Database 2)?
A1) DB2 is a subsystem of the MVS operating system. It is a Database Management
System (DBMS) for
that operating system.
Q2) What is an access path?
A2) The path that is used to get to data specified in SQL statements.
Q3) What is an alias?
A3) It is an alternate name that can be used in SQL statements to refer to a tab
le or view in the same or
remote DB2 subsystem.
Q4) Explain what a plan is?
A4) Plan is a DB2 object (produced during the bind process) that associates one
or more database request
modules with a plan name.
Q5) What is a DB2 bind?
A5) Bind is a process that builds access paths to DB2 tables. A bind uses the Data
base Request
Modules(s) (DBRM(s)) from the DB2 pre-compile step as input and produces an appl
ication plan. It
also checks the user s authority and validates the SQL statements in the DBRM(s).
Q6) What information is used as input to the bind process?
A6) The database request module produced during the pre-compile. The SYSIBM.SYSS
TMT table of the
DB2 catalog.
Q7) What is meant by the attachment facility?
A7) The attachment facility is an interface between DB2 and TSO, IMS/VS, CICS, o
r batch address spaces.
It allows application programs to access DB2.
Q8) What is meant by AUTO COMMIT?
A8) AUTO COMMIT is a SPUFI option that commits the effects of SQL statements aut
omatically if they
are successfully executed.
Q9) What is a base table?
A9) A base table is a real table -a table that physically exists in that there a
re physical stored records.
Q10) What is the function of buffer manager?
A10)
The buffer manager is the DB2 component responsible for physically transferring
data between an
external medium and (virtual) storage (performs the actual I/O operations). It m
inimizes the
amount of physical I/O actually performed with sophisticated buffering technique
s(i.e., read-ahead
buffering and look-aside buffering).
Q11) What is a buffer pool?
A11)
A buffer pool is main storage that is reserved to satisfy the buffering requirem
ents for one or more
tablespaces or indexes, and is made up of either 4K or 32K pages.
Q12) How many buffer pools are there in DB2?
A12)
There are four buffer pools: BP0, BP1, BP2, and BP32.
Q13) On the create tablespace, what does the CLOSE parameter do?
Page 69 of 260
IBMMAINFRAMES.com
A13)
CLOSE physically closes the tablespace when no one is working on the object. DB2
(release 2.3)
will logically close tablespaces.
Q14) What is a clustering index?
A14)
It is a type of index that (1) locates table rows and (2) determines how rows ar
e grouped together
in the tablespace.
Q15) What will the COMMIT accomplish?
A15)
COMMIT will allow data changes to be permanent. This then permits the data to be
accessed by
other units of work. When a COMMIT occurs, locks are freed so other applications
can reference
the just committed data.
Q16) What is meant by concurrency?
A16)
Concurrency is what allows more than one DB2 application process to access the s
ame data at
essentially the same time. Problems may occur, such as lost updates, access to u
ncommitted data,
and un-repeatable reads.
Q17) What is cursor stability?
A17)
It is cursor stability that tells DB2 that database values read by this applicatio
n are protected
only while they are being used. (Changed values are protected until this applica
tion reaches the
commit point). As soon as a program moves from one row to another, other program
s may read or
the first row.
Q18) What is the function of the Data Manager?
A18)
The Data Manager is a DB2 component that manager the physical databases. It invo
kes other
system components, as necessary, to perform detailed functions such as locking,
logging, and
physical I/O operations (such as search, retrieval, update, and index maintenanc
e).
Q19) What is a Database Request Module(DBRM)?
A19)
A DBRM is a DB2 component created by the DB2 pre-compiler containing the SQL sou
rce
statements extracted from the application program. DBRMs are input to the bind p
rocess.
Q20) What is a data page?
A20)
A data page is a unit of retrievable data, either 4K or 32K (depending on how th
e table is defined),
containing user or catalog information.
Q21) What are data types?
A21)
They are attributes of columns, literals, and host variables. The data types are
SMALLINT,
INTEGER, FLOAT, DECIMAL, CHAR, VARCHAR, DATE and TIME.
Q22) What is Declaration Generator(DCLGEN)?
A22)
DCLGEN is a facility that is used to generate SQL statements that describe a tab
le or view. These
table or view descriptions are then used to check the validity of other SQL stat
ements at
precompile time. The table or view declares are used by the DB2I utility DCLGEN
to build a host
language structure, which is used by the DB2 precompiler to verify that correct
column names and
data types have been specified in the SQL statement.
Q23) What does DSNDB07 database do?
A23)
DSNDB07 is where DB2 does its sorting. It includes DB2 s sort work area and extern
al storage.
Q24) What will the FREE command do to a plan?
A24)
It will drop(delete) that existing plan.
Q25) What is a host variable?
Page 70 of 260
IBMMAINFRAMES.com
A25)
This is a data item that is used in an SQL statement to receive a value or to su
pply a value. It must
be preceded by a colon (:) to tell DB2 that the variable is not a column name.
Q26) What will the DB2 optimizer do?
A26)
The optimizer is a DB2 component that processes SQL statements and selects the a
ccess paths.
Q27) What is a page?
A27)
This is the unit of storage within a table space or indexspace that is accessed
by DB2.
Q28) What is pagespace?
A28)
Pagespace refers to either to an unpartitioned table, to an index space, or to a
single partition of a
partitioned table of index space.
Q29) What is a predicate?
A29)
A predicate is an element of a search condition that expresses or implies a comp
arison operation.
Q30) What is a recovery log?
A30)
A recovery log is a collection of records that describes the sequence of events
that occur in DB2.
The information is needed for recovery in the event of a failure during executio
n.
Q31) What is a Resource Control Table(RCT)? Describe its characteristics.
A31)
The RCT is a table that is defined to a DB2/CICS region. It contains control cha
racteristics which
are assembled via the DSNCRCT macros. The RCT matches the CICS transaction ID to
its
associated DB2 authorization ID and plan ID(CICS attachment facility).
Q32) Where are plans stored?
A32)
Each plan is defined uniquely in the SYSIBM.SYSPLANS table to correspond to the
transaction
(s) that are to execute that plan.
Q33) What is meant by repeatable read?
A33)
When an application program executes with repeatable read protection, rows refer
enced by the
program can t be changed by other programs until the program reaches a commit poin
t.
Q34) Describe what a storage group(STOGROUP) is?
A34)
A STOGROUP is a named collection of DASD volumes to be used by tablespaces and i
ndex
spaces of databases. The volumes of STOGROUP must be of the same device type.
Q35) How would you move a tablespace (using STOGROUP) to a different DASD volume
allocated
to that tablespace?
A35) If the tablespace used is only allocated to that STOGROUP:
-ALTER STOGROUP -add volume (new) delete volume(old)
-REORG TABLESPACE or RECOVER TABLESPACE
Create a new STOGROUP that points to the new volume. ALTER the tablespace and RE
ORG or
RECOVER the
tablespace.
Q36) What is the format (internal layout) of TIMESTAMP ?
A36)
This is a seven part value that consists of a date (yymmdd) and time(hhmmss and
microseconds).
Q37) What is meant by a unit of recovery?
A37)
This is a sequence of operations within a unit of work(i.e., work done between c
ommit points).
Q38) Can DASD types assigned to storage groups be intermixed(i.e., 3350s and 338
0s)?
A38)
No
Page 71 of 260
IBMMAINFRAMES.com
Q39) What are the three types of page locks that can be held?
A39)
Exclusive, update, and share.
Q40) Can DB2 be accessed by TSO users? If yes, which command is used to invoke D
B2?
A40)
DB2 can be invoked by TSO users by using the DSN RUN command.
Q41) How are write I/Os from the buffer pool executed?
A41)
Asynchronously.
Q42) What is a DB2 catalog?
A42)
The DB2 catalog is a set of tables that contain information about all of the DB2
objects(tables,
views, plans etc.).
Q43) In which column of which DB2 catalog would you find the length of the rows
for all tables?
A43)
In the RECLENGTH column of SYSIBM.SYSTABLES
Q44) What information is held in SYSIBM.SYSCOPY?
A44)
The SYSIBM.SYSCOPY table contains information about image copies made of the tab
lespaces.
Q45) What information is contained in a SYSCOPY entry?
A45)
Included is the name of the database, the table space name, and the image copy t
ype(full or
incremental etc.,) as well as the date and time each copy was made.
Q46) What information can you find in SYSIBM.SYSLINKS table?
A46)
The SYSIBM.SYSLINKS table contains information about the links between tables cr
eated by
referential constraints.
Q47) Where would you find information about the type of database authority held
by the user?
A47)
SYSIBM.SYSDBAUTH.
Q48) Where could you look if you had a question about whether a column has been
defined as an
index?
A48)
This information can be found in SYSIBM.SYSINDEXES.
Q49) Once you create a view, where would information about the view be stored?
A49)
When a view is created, system information about the view is stored in SYSIBM.SY
SVIEWS.
Q50) What is the SQL Communications Area and what are some of its key fields?
A50)
It is a data structure that must be included in any host-language program using
SQL. It is used to
pass feedback about the sql operations to the program. Fields are return codes,
error messages,
handling codes and warnings.
Q51) What is DCLGEN?
A51)
DCLGEN stands for declarations generator; it is a facility to generate DB2 sql d
ata structures in
COBOL or PL/I programs.
Q52) How do you leave the cursor open after issuing a COMMIT? (for DB2 2.3 or ab
ove only)
A52)
Use WITH HOLD option in DECLARE CURSOR statement. But, it has not effect in psue
doconversational
CICS programs.
Q53) Give the COBOL definition of a VARCHAR field.
A53) A VARCHAR column REMARKS would be defined as follows:
...
10 REMARKS.
49 REMARKS-LEN PIC S9(4) USAGE COMP.
Page 72 of 260
IBMMAINFRAMES.com
49 REMARKS-TEXT PIC X(1920).
Q54) What is the physical storage length of each of the following DB2 data types
: DATE, TIME,
TIMESTAMP?
A54) DATE: 4bytes
TIME: 3bytes
TIMESTAMP: 10bytes
Q55) What is the COBOL picture clause of the following DB2 data types: DATE, TIM
E,
TIMESTAMP?
A55) DATE: PIC X(10)
TIME : PIC X(08)
TIMESTAMP: PIC X(26)
Q56) What is the COBOL picture clause for a DB2 column defined as DECIMAL(11,2)?
-GS
A56) PIC S9(9)V99 COMP-3.
Note: In DECIMAL(11,2), 11 indicates the size of the data type and 2 indicates t
he precision.
Q57) What is DCLGEN ? -GS
A57)
DeCLarations GENerator: used to create the host language copy books for the tabl
e definitions.
Also creates the DECLARE table.
Q58) What are the contents of a DCLGEN? -GS
A58) EXEC SQL DECLARE TABLE statement which gives the layout of the table/view i
n terms of
DB2 datatypes.
A host language copy book that gives the host variable definitions for the colum
n names.
Q59) Is it mandatory to use DCLGEN? If not, why would you use it at all? -GS
A59)
It is not mandatory to use DCLGEN. Using DCLGEN, helps detect wrongly spelt colu
mn names
etc. during the pre-compile stage itself (because of the DECLARE TABLE ). DCLGEN
being a
tool, would generate accurate host variable definitions for the table reducing c
hances of error.
Q60) Is DECLARE TABLE in DCLGEN necessary? Why it used?
A60)
It not necessary to have DECLARE TABLE statement in DCLGEN. This is used by the
precompiler
to validate the table-name, view-name, column name etc., during pre-compile.
Q61) Will precompile of an DB2-COBOL program bomb, if DB2 is down?
A61)
No. Because the precompiler does not refer to the DB2 catalogue tables.
Q62) How is a typical DB2 batch program executed ?
A62)
There are two methods of executing a DB2-batch program
1. Use DSN utility to run a DB2 batch program from native TSO. An example is sho
wn:
DSN SYSTEM(DSP3)
RUN PROGRAM(EDD470BD) PLAN(EDD470BD) LIB('EDGS01T.OBJ.LOADLIB')
END
2. Use IKJEFT01 utility program to run the above DSN command in a JCL.
Q63) Assuming that a site's standard is that pgm name = plan name, what is the e
asiest way to find
out which
programs are affected by change in a table's structure?
A63)
Query the catalogue tables SYSPLANDEP and SYSPACKDEP.
Q64) Name some fields from SQLCA.
A64)
SQLCODE, SQLERRM, SQLERRD
Page 73 of 260
IBMMAINFRAMES.com
Q65) How can you quickly find out the number of rows updated after an update sta
tement?
A65)
Check the value stored in SQLERRD(3).
Q66) What is EXPLAIN? -GS
A66)
EXPLAIN is used to display the access path as determined by the optimizer for a
SQL statement.
It can be used in SPUFI (for single SQL statement) or in BIND step (for embedded
SQL). The
results of EXPLAIN is stored in U.PLAN_TABLE where U is the authorization id of
the user
Q67) What do you need to do before you do EXPLAIN?
A67)
Make sure that the PLAN_TABLE is created under the AUTHID.
Q68) Where is the output of EXPLAIN stored? -GS
A68)
In USERID.PLAN_TABLE
Q69) EXPLAIN has output with MATCHCOLS = 0. What does it mean? -GS
A69)
A nonmatching index scan if ACCESSTYPE = I.
Q70) How do you do the EXPLAIN of a dynamic SQL statement?
A70)
There are two methods to achieve this:
1. Use SPUFI or QMF to EXPLAIN the dynamic SQL statement
2. Include EXPLAIN command in the embedded dynamic SQL statements
Q71) How do you simulate the EXPLAIN of an embedded SQL statement in SPUFI/QMF?
Give an
example with a host variable in WHERE clause)
A71) Use a question mark in place of a host variable (or an unknown value). For
instance,
SELECT EMP_NAME FROM EMP WHERE EMP_SALARY > ?
Q72) What are the isolation levels possible ? -GS
A72) CS: Cursor Stability
RR: Repeatable Read
Q73) What is the difference between CS and RR isolation levels?
A73) CS: Releases the lock on a page after use
RR: Retains all locks acquired till end of transaction
Q74) When do you specify the isolation level? How?
A74)
During the BIND process(ISOLATION LEVEL is a parameter for the bind process).
ISOLATION ( CS/RR )...
Q75) I use CS and update a page. Will the lock be released after I am done with
that page?
A75)
No.
Q76) What are the various locking levels available?
A76)
PAGE, TABLE, TABLESPACE
Q77) How does DB2 determine what lock-size to use?
A77)
There are three methods to determine the lock-size. They are:
1. Based on the lock-size given while creating the tablespace
2. Programmer can direct the DB2 what lock-size to use
3. If lock-size ANY is specified, DB2 usually choses a lock-size of PAGE
Q78) What are the disadvantages of PAGE level lock?
A78)
High resource utilization if large updates are to be done
Q79) What is lock escalation?
Page 74 of 260
IBMMAINFRAMES.com
A79)
Promoting a PAGE lock-size to table or tablespace lock-size when a transaction h
as aquired more
locks than specified in NUMLKTS. Locks should be taken on objects in single tabl
espace for
escalation to occur.
Q80) What are the various locks available?
A80)
SHARE, EXCLUSIVE, UPDATE
Q81) Can I use LOCK TABLE on a view?
A81)
No. To lock a view, take lock on the underlying tables.
Q82) What is ALTER ? -GS
A82)
SQL command used to change the definition of DB2 objects.
Q83) What is a DBRM, PLAN ?
A83)
DBRM: Data Base Request Module, has the SQL statements extracted from the host l
anguage
program by the pre-compiler. PLAN: A result of the BIND process. It has the exec
utable code for
the SQL statements in the DBRM.
Q84) What is ACQUIRE/RELEASE in BIND?
A84)
Determine the point at which DB2 acquires or releases locks against table and ta
blespaces,
including intent locks.
Q85) What else is there in the PLAN apart from the access path? -GS
A85)
PLAN has the executable code for the SQL statements in the host program
Q86) What happens to the PLAN if index used by it is dropped?
A86)
Plan is marked as invalid. The next time the plan is accessed, it is rebound.
Q87) What are PACKAGES ? -GS
A87)
They contain executable code for SQL statements for one DBRM.
Q88) What are the advantages of using a PACKAGE?
A88)
The advantages of using PACKAGE are:
1. Avoid having to bind a large number of DBRM members into a plan
2. Avoid cost of a large bind
3. Avoid the entire transaction being unavailable during bind and automatic rebi
nd of a plan
4. Minimize fallback complexities if changes result in an error.
Q89) What is a collection?
A89)
A user defined name that is the anchor for packages. It has not physical existen
ce. Main usage is
to group packages.
Q90) In SPUFI suppose you want to select maximum of 1000 rows, but the select re
turns only 200
rows. What are the 2 SQLCODEs that are returned? -GS
A90)
+100 (for successful completion of the query), 0 (for successful COMMIT if AUTOC
OMMIT is
set to Yes).
Q91) How would you print the output of an SQL statement from SPUFI? -GS
A91)
Print the output dataset.
Q92) Lot of updates have been done on a table due to which indexes have gone hay
wire. What do
you do?
A92)
Looks like index page split has occurred. DO a REORG of the indexes.
Q93) What is dynamic SQL? -GS
Page 75 of 260
IBMMAINFRAMES.com
A93)
Dynamic SQL is a SQL statement created at program execution time.
Q94) When is the access path determined for dynamic SQL? -GS
A94)
At run time, when the PREPARE statement is issued.
Q95) Suppose I have a program which uses a dynamic SQL and it has been performin
g well till now.
Off late, I find that the performance has deteriorated. What happened? -GS
A95) There may be one of the following reasons:
Probably RUN STATS is not done and the program is using a wrong index due to inc
orrect stats.
Probably RUNSTATS is done and optimizer has chosen a wrong access path based on
the latest
statistics.
Q96) How does DB2 store NULL physically?
A96)
As an extra-byte prefix to the column value. Physically, the null prefix is Hex
'00' if the value is
present and Hex 'FF' if it is not.
Q97) How do you retrieve the data from a nullable column? -GS
A97)
Use null indicators. Syntax ... INTO :HOSTVAR:NULLIND
Q98) What is the picture clause of the null indicator variable? -GS
A98)
S9(4) COMP.
Q99) What does it mean if the null indicator has -1, 0, -2? -GS
A99)
-1 : the field is null; 0 : the field is not null; -2 : the field value is trunc
ated
Q100)
How do you insert a record with a nullable column?
A100)
To insert a NULL, move -1 to the null indicator, To insert a valid value, move 0
to the null
indicator
Q101)
What is RUNSTATS? -GS
A101)
A DB2 utility used to collect statistics about the data values in tables which c
an be used by the
optimizer to decide the access path. It also collects statistics used for space
management. These
statistics are stored in DB2 catalog tables.
Q102)
When will you chose to run RUNSTATS?
A102)
After a load, or after mass updates, inserts, deletes, or after REORG.
Q103)
Give some example of statistics collected during RUNSTATS?
A103)
Number of rows in the table, Percent of rows in clustering sequence, Number of d
istinct values of
indexed column, Number of rows moved to a nearby/fairway page due to row length
increase
Q104)
What is REORG? When is it used?
A104)
REORG reorganizes data on physical storage to reclutser rows, positioning overfl
owed rows in
their proper sequence, to reclaim space, to restore free space. It is used after
heavy updates, inserts
and delete activity and after segments of a segmented tablespace have become fra
gmented.
Q105)
What is IMAGECOPY ? -GS
A105)
It is full backup of a DB2 table which can be used in recovery.
Q106)
When do you use the IMAGECOPY? -GS
A106)
To take routine backup of tables, After a LOAD with LOG NO and After REORG with
LOG NO
Q107)
What is COPY PENDING status?
Page 76 of 260
IBMMAINFRAMES.com
A107)
A state in which, an image copy on a table needs to be taken, In this status, th
e table is available
only for queries. You cannot update this table. To remove the COPY PENDING statu
s, you take
an image copy or use REPAIR utility.
Q108)
What is CHECK PENDING ?
A108)
When a table is LOADed with ENFORCE NO option, then the table is left in CHECK P
ENDING
status. It means that the LOAD utility did not perform constraint checking.
Q109)
What is QUIESCE?
A109)
A QUIESCE flushes all DB2 buffers on to the disk. This gives a correct snapshot
of the database
and should be used before and after any IMAGECOPY to maintain consistency.
Q110)
What is a clustering index ? -GS
A110)
Causes the data rows to be stored in the order specified in the index. A mandato
ry index defined on
a partitioned table space.
Q111)
How many clustering indexes can be defined for a table?
A111)
Only one.
Q112)
What is the difference between primary key & unique index ?
A112)
Primary Key: a relational database constraint. Primary key consists of one or mo
re columns that
uniquely identify a row in the table. For a normalized relation, there is one de
signated primary
key.
Unique index: a physical object that stores only unique values. There can be one
or more unique
indexes on a table.
Q113)
What is sqlcode -922 ?
A113)
Authorization failure
Q114)
What is sqlcode -811?
A114)
SELECT statement has resulted in retrieval of more than one row.
Q115)
What does the sqlcode of -818 pertain to? -GS
A115)
This is generated when the consistency tokens in the DBRM and the load module ar
e different.
Q116)
Are views updatable ?
A116)
Not all of them. Some views are updatable e.g. single table view with all the fi
elds or mandatory
fields. Examples of non-updatable views are views which are joins, views that co
ntain aggregate
functions (such as MIN), and views that have GROUP BY clause.
Q117)
If I have a view which is a join of two or more tables, can this view be updatab
le? -GS
A117)
No.
Q118)
What are the 4 environments which can access DB2 ?
A118)
TSO, CICS, IMS and BATCH
Q119)
What is an inner join, and an outer join ?
A119)
Inner Join: combine information from two or more tables by comparing all values
that meet the
search criteria in the designated column or columns of one table with all the va
lues in
corresponding columns of the other table or tables. This kind of join which invo
lve a match in
both columns are called inner joins.
Outer join : Is one in which you want both matching and non matching rows to be
returned. DB2
has no specific operator for outer joins, it can be simulated by combining a joi
n and a correlated
sub query with a UNION.
Page 77 of 260
IBMMAINFRAMES.com
Q120)
What is FREEPAGE and PCTFREE in TABLESPACE creation?
A120)
PCTFREE: percentage of each page to be left free
FREEPAGE: Number of pages to be loaded with data between each free page
Q121)
What are simple, segmented and partitioned table spaces ?
A121)
Simple Tablespace: Can contain one or more tables. Rows from multiple tables can
be
interleaved on a page
under the DBA s control and maintenance
Segmented Tablespace: Can contain one or more tables. Tablespace is divided into
segments of
4 to 64 pages in
increments of 4 pages. Each segment is dedicated to single table. A
table can occupy
multiple segments
Partitioned Tablespace: Can contain one table. Tablespace is divided into parts
and each part is
put in a separate
VSAM dataset.
Q122)
What is filter factor?
A122)
One divided by the number of distinct values of a column.
Q123)
What is index cardinality? -GS
A123)
The number of distinct values a column or columns contain.
Q124)
What is a synonym ?
A124)
Synonym is an alternate name for a table or view used mainly to hide the leading
qualifier of a
table or view.. A synonym is accessible only by the creator.
Q125)
What is the difference between SYNONYM and ALIAS?
A125)
SYNONYM : is dropped when the table or tablespace is dropped. Synonym is availab
le only
to the creator.
ALIAS : is retained even if table or tablespace is dropped. ALIAS can be created
even
if the table does
not exist. It is used mainly in distributed environment to hide the location
information from
programs. Alias is a global object & is available to all.
Q126)
What do you mean by NOT NULL WITH DEFAULT? When will you use it?
A126)
This column cannot have nulls and while insertion, if no value is supplied then
it will have zeroes,
spaces or date/time depending on whether it is numeric, character or date/time.U
se it when you do
not want to have nulls but at the same time cannot give values all the time you
insert this row.
Q127)
What do you mean by NOT NULL? When will you use it?
A127)
The column cannot have nulls. Use it for key fields.
Q128)
When would you prefer to use VARCHAR?
A128)
When a column which contains long text, e.g. remarks, notes, may have in most ca
ses less than
50% of the maximum length.
Q129)
What are the disadvantages of using VARCHAR?
A129)
Can lead to high space utilization if most of the values are close to maximum.
Positioning of VARCHAR column has to be done carefully as it has performance imp
lications.
Relocation of rows to different pages can lead to more I/Os on retrieval.
Page 78 of 260
IBMMAINFRAMES.com
Q130)
How do I create a table MANAGER (EMP-NO, MANAGER) where MANAGER is a foreign
key which references to EMP-NO in the same table? Give the exact DDL.
A130)
First CREATE MANAGER table with EMP-NO as the primary key. Then ALTER it to defi
ne the
foreign key.
Q131)
When is the authorization check on DB2 objects done -at BIND time or run time?
A131)
At run time.
Q132)
What is auditing?
A132)
Recording SQL statements that access a table. Specified at table creation time o
r through alter.
Q133)
max number of columns in a db2 table
A133)
224
Q134)
I need to view the number of tables existing under one particular Owner. Is it p
ossible? If so,
pl give the SQL query for this?
A134)
The query SELECT * FROM SYSIBM.SYSTABLES WHERE CREATOR = 'owner id' This
displays the table names with that If you want only the number of tables give th
e following query.
SELECT COUNT(*) FROM SYSIBM.SYSTABLES WHERE CREATOR = 'owner id' Make sure
that you are in correct subsystem.
Q135)
I need to view the number of tables existing under one particular Owner. Is it p
ossible? If so,
pl give the SQL query for this?
A135)
The query SELECT * FROM SYSTABLES WHERE OWNER= should work.
Q136)
I need to view the number of tables existing under one particular Owner. Is it p
ossible? If so,
pl give the SQL query for this?
A136)
Db2 records information for its operation in a catalog which is actually a group
of tables. So we
can use the SYSTABLES to get answer to ur query.
Q137)
What is JOIN and different types of JOIN.
A137)
The ability to join rows and combine data from two or more tables is one of the
most powerful
features of relational system. Three type of joins:1. Equi-join 2.Non-equijoin 3
.self-join
Q138)
can I alter a table (e.g. adding a column) when other user is selecting some col
umns or
updating some columns from the same table?
A138)
yes possible. until the updation or selection is committed db2 table will not be
restructured. new
column definition will be there but it will not be included until all the tasks
on the table are
committed.
Q139)
How many sub queries can you combine together ?
A139)
Total 16 queries and sub queries are 15
Q140)
What are the different methods of accessing db2 from tso? How is the connection
established
between TSO & DB2?
A140)
There are three ways in establishing tso/db2 connection 1. SPUFI 2. QMF 3. CATAL
OG
VISIBILITY B. A thread between TSO & DB2 is established while attempting to make
connection
between tso & db2.
Q141)
How many buffer pools are available in db2?
A141)
Ten 32k size buffer pools and fifty 4k size buffer pools (bp0 to bp49)default bu
ffer pools are
bp0,bp1,bp2 & bp32
Q142)
B37 abend during SPUFI
Page 79 of 260
IBMMAINFRAMES.com
A142)
The b37 abend in the SPUFI is because of space requirements , the query has resu
lted in so many
rows that the SPUFI. out file is not large enough to handle it, increase the spa
ce allocation of
SPUFI out file.
Q143)
How many Buffer pools are there in DB2 and what are they?
A143)
There are 4 Buffer pools. They are BP0,BP1,BP2 and BP32.
Q144)
What is the command used by TSO users to invoke DB2?
A144)
DSN RUN
Q145)
What is the error code -803 ?
A145)
unique index violation
Q146)
How do you filter out the rows retrieved from a Db2 table ?
A146)
one way is to use The SQL WHERE clause.
Q147)
what is a collection?
A147)
collection is something that every programmer should assign/Specify for every pa
ckage. this about
1-18 characters long.
Q148)
What is Skeleton cursor table (SKCT)?
A148)
The Executable form of a Plan. This is stored in sysibm.sct02 table.
Q149)
what's the equivalent Cobol Data type for Decimal(x,y) in DB2? what does the cur
rent
SQLID register contain?
A149)
Pic s9(x-y)V9(Y) Comp-3; the current SQLID contains the current authorization ID
.
Q150)
Can we declare DB2 HOST variable in COBOL COPY book?
A150)
NO. If we declare DB2 host variable in COBOL COPY book, at the time of Pre-compi
lation we
get the host variable not defined, because pre-compiler will not expand COBOL CO
PY book. So
we declare it either in DCLGEN with EXEC SQL INCLUDE DCLGEN name END-EXEC or we
directly hardcode it in the working storage section.
Q151)
What should be specified along with a cursor in order to continue updating proce
ss after
commit?
A151)
With Hold option.
Q152)
what is the name of the default db2 catalog database?
A152)
DSNDB06
Q153)
When Can you be sure that a query will return only one row?
A153)
When you use the primary key and only the primary key in the where clause.
Q154)
what is the difference between join and union?
A154)
join is used to retrieve data from different tables using a single sql statement
. union is used to
combine the results of two or more sql queries.
Q155)
What is a correlated sub query?
A155)
In a sub query, if the outer query refers back to the outcome of inner query it
is called correlated
sub query. That's why the outer query is evaluated first unlike an ordinary sub
query
Q156)
What are the functions of Bind?
A156)
BIND mainly performs two things syntax checking and authorization checking.It bi
nds together all
packages into an application plan hence the name BIND.Apart from this bind has o
ptimiser as a
subcomponent.Its function is to determine the optimum access strategy.
Page 80 of 260
IBMMAINFRAMES.com
Q157) Max. No of rows per page
A157) 127
Q158) The only place of VSAM KSDS in DB2 is?
A158) BSDS is a VSAM KSDS.
Q159) Can All Users Have The Privilege To Use The SQL Statement Select * (DML)?
A159) No the user should be granted privilege to use it.
Q160) What is the size of a data page?
A160) 4K to 8K
Q161) what's the best lock size that you could use when you create a tablespace?
A161) The answer is Locksize = ANY. Unless you are Sure what's the Purpose of ta
blespace ie., Readonly
or R/W. If you use lock size =any, Db2 would automatically determine what type o
f locks it
should use.
Q162)
what's the error code for Unique Index Violation?
A162)
-803
Q163)
Can you define an Index if the table size less than 10 PAGES?
A163)
NO
Q164)
What's the Maximum Length of SQLCA and what's the content of SQLCABC?
A164)
The Max length is 136. and the SQLCABC has the Value of SQLCA.
Q165)
What's the maximum number of volumes that can be added to a STOGROUP?
A165)
The answer is 133.Usually it will be difficult monitor more than 3 or 4 volumes
to a Stogroup.
Q166)
What's the maximum number of characters that a tablename can have?
A166)
The answer is 18 characters.
Q167)
What is the meaning of -805 SQL return code?
A167)
Program name not in plan. Bind the plan and include the DBRM for the program nam
ed as part of
the plan.
Q168)
when does the SQL statement gets executed when you use cursor in the application
programming ?
A168)
SQL statement gets executed when we open cursor
Q169)
What does CURRENTDATA option in bind indicate
A169)
CURRENTDATA option ensures block fetch while selecting rows from a table. In DB2
V4 the
default has been changed to NO. Therefore it is necessary to change all the bind
cards with
CURRENTDATA(YES) which is default in DB2V3 & earlier to CURRENTDATA(NO).
Q170)
What is the difference between TYPE 1 index & TYPE 2 index
A170)
TYPE 1 & TYPE 2 are specified when an index is created on the table. TYPE 2 inde
x is the option
which comes with DB2V4. With TYPE 2 index data can be retrieved faster as only t
he data pages
are locked and not the index pages. Hence TYPE 2 index is recommended.
Q171)
What are the levels of isolation available with DB2V4
A171)
CS RR UR( added new for DB2V4 which stands for uncommitted read which allows to
retrieve
records from the space which has exclusive locks also but data integrity will be
affected if this
option is used )The best available option for data integrity & data concurrency
is CS.
Page 81 of 260
IBMMAINFRAMES.com
Q172)
How do u achieve record level locking in DB2 versions when record level locking
is not
allowed?
A172)
By having the length of the record greater than that of a page!
Q173)
In a DB2-CICS program which is acts as co-ordinator and which is participant?
A173)
DB2 -participant CICS-coordinator
Q174)
What does DML stand for and what are some examples of it?
A174)
Data Manipulation Language. Some examples are SELECT, INSERT, DELETE, REPLACE.
Q175)
How to define the data items to receive the fetch items for the SQL?
A175)
Using the DSECT, followed by lines of -'data items DS datatype'.
Q176)
How will you delete duplicate records from a table?
A176)
Delete From Table1Where Id In (Select Id From Table1 As Temp Group By Id Having
Count(*)
>1)
Q177)
What is the difference between Where and Having Clause
A177)
WHERE is for Rows and HAVING is for Groups
Q178)
How to see the structure of db2 table??
A178)
Using QMF.
Q179)
How do you declare a host variable (in COBOL) for an attribute named emp-name of
type
VARCHAR(25) ?
A179)
01 EMP-GRP. 49 E-LEN PIC S9(4) COMP. 49 E-NAME PIC X(25).
Q180)
What is the maximum number of tables that can be stored on a Partitioned Table S
pace ?
A180)
ONE
Q181)
Name the different types of Table spaces.
A181)
Simple Table Space, Segmented Table Space and Partitioned Table Space
Q182)
what are the max. & min. no. of partitions allowed in a partition tablespace?
A182)
minimum is 4. maximum is 64.
Q183)
what is the maximum number of tables that can be joined ?
A183)
fifteen
Q184)
What technique is used to retrieve data from more than one table in a single SQL
statement?
A184)
The Join statement combines data from more that two tables
Q185)
Explain the use of the WHERE clause.
A185)
It directs DB2 to extract data from rows where the value of the column is the sa
me as the current
value of the host variable.
Q186)
What is a DB2 bind?
A186)
DB2 bind is a process that build

You might also like