This section presents you various set of Mock Tests related to CICS Framework. You can download these sample mock tests at your local machine and solve offline at your convenience. Every mock test is supplied with a mock test key to let you verify the final score and grade yourself.
Q 1 - Which table contains File names, File type, record length?
FCT is known as File Control Table. FCT contains File names, File type, record length, etc. All the files used in a CICS program must be declared in FCT and they are opened and closed by CICS itself.
CESN is known as CICS Execute Sign On. CESN is used to Sign on to CICS region.
Q 3 - Which command is used for debugging the program step by step, which helps in finding the errors?
CEDF is known as CICS Execute Debug Facility. Type CEDF and press enter in CICS region. The terminal is in EDF mode message will be displayed. Now type the transaction id and press the enter key. After initiation, with each enter key, a line is executed. Before executing any CICS command, it shows the screen in which we can modify the values before proceeding further.
Q 4 - Which command is used by CICS System Administrators to define CICS table entries and other administration activities?
CEDA is known as CICS Execute Definition and Administration.
Q 5 - Which command is used to manage transactions, tasks, files, programs?
CEMT is known as CICS Execute Master Terminal. CEMT is used to inquire and update the status of CICS environments and also for other system operations.
CECI is known as CICS Execute Command Interpreter. Type the CECI option on the empty CICS screen after having logged in. It gives you the list of options available.
Q 7 - Which command is used to find the explanation and reasons for CICS Abend Codes?
CMAC is known as CICS Messages for Abend Codes.
CESF is known as CICS Execute Sign Off.
Q 9 - Which command is used to display contents of a temporary storage queue or TSQ?
CEBR is known as CICS Execute Temporary storage Browse. It is used while debugging to check if the items of the queue are being written and retrieved properly.
Q 10 - What is the length of map name?
Map is a single screen format which can be designed using BMS macros. It can have name from 1 to 7 chars.
Q 11 - Which macro is used to generate Mapset definition?
DFHMSD macro generates Mapset definition. It is macro identifier which shows that we are starting a mapset.
Q 12 - Which macro is used to generate map definition?
DFHMDI macro generates map definition. It shows that we are starting a new map.
Q 13 - Which macro is used to define field names?
DFHMDF macro is used to define field names. The field name is mentioned against which DFHMDF macro is coded. This field name is used inside the program.
Q 14 - What is the value of MODE parameter you will use for input & output map in DFHMSD macro?
This is self explanatory.
Q 15 - What is value of ATTRB parameter used in DFHMDF macro for a skipper field?
If we place a skipper field after the named unprotected field then while entering the value, once the specified length is reached the cursor will automatically position to the next unprotected field.
Q 16 - What is value of ATTRB parameter used in DFHMDF macro for a stopper field?
If we place a stopper field after the named unprotected field then while entering the value, once the specified length is reached the cursor will stop its positioning.
Q 17 - What is the position of Modified Data Tag in the attribute byte?
Modified Data Tag is the last bit in the attribute byte. MDT is a flag which holds single bit, it specifies whether the value is to be transferred to the system or not.
Q 18 - What does EIB stands for?
Execute Interface Block is a control block which is loaded automatically by CICS for every program.
Q 19 - Which field in EIB stores the value of Terminal Identifier?
EIBTRMID stores the value of Terminal Identifier.
Q 20 - Which field in EIB stores the value of Transaction Identifier?
EIBTRNID stores the value of Transaction Identifier.
Q 21 - Which field in EIB stores the value of length of DFHCOMMAREA?
EIBCALEN contains length of DFHCOMMAREA.
Q 22 - Which field in EIB stores the Return code of the last transaction?
EIBRCODE stores the Return code of the last transaction.
Q 23 - What type of programs have no human intervention and all the necessary inputs are provided when the program is started?
While executing Non conversion programs no human intervention is required. All the necessary inputs are provided when the program is started. They are similar to batch programs that runs in the batch mode. So in CICS they are rarely developed.
Q 24 - What type of program system sends a message to the screen and waits for the user's response?
In Conversion Programs, the system sends a message to the screen and waits for the user's response. The time taken by user to respond is known as Think Time. This time is considerably high, so this is a major drawback of conversion programs. The user provides the necessary input and presses a AID key
Q 25 - What type of program system sends a message to the screen and terminates the transaction, specifying the transaction to be started when the user input is received?
In Pseudo-conversion Programs system sends a message to the screen and terminates the transaction, specifying the transaction to be started when the user input is received.
|Question Number||Answer Key|