For protecting a transaction using the transaction security
function, the two things that must be done are?
No Answer is Posted For this Question
Be the First to Post Answer
mention the option used in the cics read command to gain accessibility directly to the file i/o area. (Assume cobol-ii).?
Explain the difference between a physical bms mapset and a logical bms mapset?
how to make the entire screen protected. i.e., for example when we design a delete screen before deleting the details we need to popup a screen saying do u wish to delete(Y/N). When this screen appears i want to make the previous screen fields as protected.Please help me with the anser. i need the entire screen to be protected. Thanks in advance
What are the six different types of argument values in COBOL that can be placed in various options of a CICS command?
Do you require a table entry for a TSQ?
Sync points cannot be requested by the application programs? State true or false
What is meant by MDT? Furthermore, comment on FRSET and FSET ?
What is meant by PPT and what are its uses?
how do u see the output of cics program?
Explain how do you access storage outside your cics program?
whar is the difference bwn LINK() and XCTL()?
7 Answers Cap Gemini, CGI, IBM,
What is the meaning of the eibaid field?