Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


For protecting a transaction using the transaction security
function, the two things that must be done are?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CICS Interview Questions

What are different system tables used in CICS?

1 Answers   IBM,


What is fset?

0 Answers  


What are the 3 working storage fields used for every field on the map?

1 Answers   IBM,


What is a two Phase commit in CICS?

2 Answers   IBM,


Can you define bms?

0 Answers  


What is the difference between the XCTL and LINK commands?

1 Answers   IBM,


Mention the option used in the CICS READ command to gain accessibility directly to the file I/O area.

2 Answers  


Can ESDS files be accessed from CICS?

0 Answers  


The error code AEIV?

1 Answers   IBM,


After execute the map, What will happen ? Give breif Description

4 Answers   HCL, IBM,


Define task work area?

0 Answers  


Mention one alternative aspect of CICS?

0 Answers  


Categories