For protecting a transaction using the transaction security
function, the two things that must be done are?
No Answer is Posted For this Question
Be the First to Post Answer
What are different system tables used in CICS?
What is fset?
What are the 3 working storage fields used for every field on the map?
What is a two Phase commit in CICS?
Can you define bms?
What is the difference between the XCTL and LINK commands?
Mention the option used in the CICS READ command to gain accessibility directly to the file I/O area.
Can ESDS files be accessed from CICS?
The error code AEIV?
After execute the map, What will happen ? Give breif Description
Define task work area?
Mention one alternative aspect of CICS?