CICS Mock Test


Advertisements

This section presents you various set of Mock Tests related to CICS Framework. You can download these sample mock tests at your local machine and solve offline at your convenience. Every mock test is supplied with a mock test key to let you verify the final score and grade yourself.

Questions and Answers

CICS Mock Test II

Q 1 - Which table contains File names, File type, record length?

A - Terminal Control Table

B - Program Control Table

C - Processing Program Table

D - File Control Table

Answer : D

Explanation

FCT is known as File Control Table. FCT contains File names, File type, record length, etc. All the files used in a CICS program must be declared in FCT and they are opened and closed by CICS itself.

Q 2 - Which command is used for Signing on to CICS region?

A - CESN

B - CEDA

C - CEMT

D - CECI

Answer : A

Explanation

CESN is known as CICS Execute Sign On. CESN is used to Sign on to CICS region.

Q 3 - Which command is used for debugging the program step by step, which helps in finding the errors?

A - CEDF

B - CMAC

C - CESF

D - CEBR

Answer : A

Explanation

CEDF is known as CICS Execute Debug Facility. Type CEDF and press enter in CICS region. The terminal is in EDF mode message will be displayed. Now type the transaction id and press the enter key. After initiation, with each enter key, a line is executed. Before executing any CICS command, it shows the screen in which we can modify the values before proceeding further.

Q 4 - Which command is used by CICS System Administrators to define CICS table entries and other administration activities?

A - CESN

B - CEDA

C - CEMT

D - CECI

Answer : B

Explanation

CEDA is known as CICS Execute Definition and Administration.

Q 5 - Which command is used to manage transactions, tasks, files, programs?

A - CESN

B - CEDA

C - CEMT

D - CECI

Answer : C

Explanation

CEMT is known as CICS Execute Master Terminal. CEMT is used to inquire and update the status of CICS environments and also for other system operations.

Q 6 - Which command is used to check the syntax?

A - CESN

B - CEDA

C - CEMT

D - CECI

Answer : D

Explanation

CECI is known as CICS Execute Command Interpreter. Type the CECI option on the empty CICS screen after having logged in. It gives you the list of options available.

Q 7 - Which command is used to find the explanation and reasons for CICS Abend Codes?

A - CEDF

B - CMAC

C - CESF

D - CEBR

Answer : B

Explanation

CMAC is known as CICS Messages for Abend Codes.

Q 8 - Which command is used to Sign Off from CICS region?

A - CEDF

B - CMAC

C - CESF

D - CEBR

Answer : C

Explanation

CESF is known as CICS Execute Sign Off.

Q 9 - Which command is used to display contents of a temporary storage queue or TSQ?

A - CEDF

B - CMAC

C - CESF

D - CEBR

Answer : D

Explanation

CEBR is known as CICS Execute Temporary storage Browse. It is used while debugging to check if the items of the queue are being written and retrieved properly.

Answer : B

Explanation

Map is a single screen format which can be designed using BMS macros. It can have name from 1 to 7 chars.

Q 11 - Which macro is used to generate Mapset definition?

A - DFHMSD

B - DFHMDI

C - DFHMDF

D - None of these

Answer : A

Explanation

DFHMSD macro generates Mapset definition. It is macro identifier which shows that we are starting a mapset.

Q 12 - Which macro is used to generate map definition?

A - DFHMSD

B - DFHMDI

C - DFHMDF

D - None of these

Answer : B

Explanation

DFHMDI macro generates map definition. It shows that we are starting a new map.

Q 13 - Which macro is used to define field names?

A - DFHMSD

B - DFHMDI

C - DFHMDF

D - None of these

Answer : C

Explanation

DFHMDF macro is used to define field names. The field name is mentioned against which DFHMDF macro is coded. This field name is used inside the program.

Q 14 - What is the value of MODE parameter you will use for input & output map in DFHMSD macro?

A - MODE = OUT

B - MODE = IN

C - MODE = INOUT

D - MODE = BOTH

Answer : C

Explanation

This is self explanatory.

Q 15 - What is value of ATTRB parameter used in DFHMDF macro for a skipper field?

A - ATTRB = (ASKIP)

B - ATTRB = (PROT)

C - ATTRB = (UNPROT)

D - None of these

Answer : A

Explanation

If we place a skipper field after the named unprotected field then while entering the value, once the specified length is reached the cursor will automatically position to the next unprotected field.

Q 16 - What is value of ATTRB parameter used in DFHMDF macro for a stopper field?

A - ATTRB = (ASKIP)

B - ATTRB = (PROT)

C - ATTRB = (UNPROT)

D - None of these

Answer : B

Explanation

If we place a stopper field after the named unprotected field then while entering the value, once the specified length is reached the cursor will stop its positioning.

Q 17 - What is the position of Modified Data Tag in the attribute byte?

A - First Bit

B - Last Bit

C - Sixth Bit

D - None of these

Answer : B

Explanation

Modified Data Tag is the last bit in the attribute byte. MDT is a flag which holds single bit, it specifies whether the value is to be transferred to the system or not.

Answer : A

Explanation

Execute Interface Block is a control block which is loaded automatically by CICS for every program.

Q 19 - Which field in EIB stores the value of Terminal Identifier?

A - EIBTRMID

B - EIBTRNID

C - EIBRCODE

D - EIBCALEN

Answer : A

Explanation

EIBTRMID stores the value of Terminal Identifier.

Q 20 - Which field in EIB stores the value of Transaction Identifier?

A - EIBTRMID

B - EIBTRNID

C - EIBRCODE

D - EIBCALEN

Answer : B

Explanation

EIBTRNID stores the value of Transaction Identifier.

Q 21 - Which field in EIB stores the value of length of DFHCOMMAREA?

A - EIBTRMID

B - EIBTRNID

C - EIBRCODE

D - EIBCALEN

Answer : D

Explanation

EIBCALEN contains length of DFHCOMMAREA.

Q 22 - Which field in EIB stores the Return code of the last transaction?

A - EIBTRMID

B - EIBTRNID

C - EIBRCODE

D - EIBCALEN

Answer : C

Explanation

EIBRCODE stores the Return code of the last transaction.

Q 23 - What type of programs have no human intervention and all the necessary inputs are provided when the program is started?

A - Non Conversion Programs

B - Conversion Programs

C - Pseudo-conversion Programs

D - None of these

Answer : A

Explanation

While executing Non conversion programs no human intervention is required. All the necessary inputs are provided when the program is started. They are similar to batch programs that runs in the batch mode. So in CICS they are rarely developed.

Q 24 - What type of program system sends a message to the screen and waits for the user's response?

A - Non Conversion Programs

B - Conversion Programs

C - Pseudo-conversion Programs

D - None of these

Answer : B

Explanation

In Conversion Programs, the system sends a message to the screen and waits for the user's response. The time taken by user to respond is known as Think Time. This time is considerably high, so this is a major drawback of conversion programs. The user provides the necessary input and presses a AID key

Q 25 - What type of program system sends a message to the screen and terminates the transaction, specifying the transaction to be started when the user input is received?

A - Non Conversion Programs

B - Conversion Programs

C - Pseudo-conversion Programs

D - None of these

Answer : C

Explanation

In Pseudo-conversion Programs system sends a message to the screen and terminates the transaction, specifying the transaction to be started when the user input is received.

Answer Sheet

Question Number Answer Key
1 D
2 A
3 A
4 B
5 C
6 D
7 B
8 C
9 D
10 B
11 A
12 B
13 C
14 C
15 A
16 B
17 B
18 A
19 A
20 B
21 D
22 C
23 A
24 B
25 C
cics_questions_answers.htm
Advertisements