For protecting a transaction using the transaction security
function, the two things that must be done are?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CICS Interview Questions

Can you explain primary aspect of cics?

0 Answers  


what is psuedo conversation?

6 Answers   HCL,


What is the difference between a physical BMS mapset and a logical BMS mapset?

3 Answers   IBM,


What is the purpose of the Program List Table?

2 Answers   IBM,


How will you place cursor on a field called ?EMPNO?.

2 Answers  






What are the classifications of the cics program?

0 Answers  


plz give the syntax for receive map and receive text cmds in cics

1 Answers  


Mention the option (along with argument type) used in a CICS command to retrieve the response code

3 Answers  


how can you prevent more than one user from accessing the same transient data queue?

0 Answers   IBM,


How do you rollback data written to an ESDS file?

1 Answers   IBM, Infosys,


What are the advantage of Model Data Set Table: it will be help to which among this DCB; LRECL; DISP; SPACE?

1 Answers  


Explain the function of the load command?

0 Answers  


Categories