For protecting a transaction using the transaction security
function, the two things that must be done are?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CICS Interview Questions

How do you rollback data written to an ESDS file?

1 Answers   IBM, Infosys,


What is the content of the PPT entry?

3 Answers   CTS, IBM,


how can we differentiate between conventional and pseudo-conventional coding just by seeing cobol code?

2 Answers   Patni,


What is the difference between EXEC CICS HANDLE CONDTION and an EXEC CICS IGNORE command?

2 Answers   IBM, TCS,


What is the EIB parameter and the CICS command used to implement Pseudo-Conversational technique using single PCT ? Single PPT entry?

1 Answers   IBM,






Name the cics command used to access current date and time?

0 Answers  


What are different ways of initiating transaction in CICS ?

3 Answers   Cap Gemini, IBM,


what is the difference between a package and a plan. How does one bind 2 versions of a cics transaction with the same module name in two different cics regions that share the same db2 subsystem?

0 Answers   IBM,


What is the comaera (communication area)?

0 Answers  


What does the 'cemt:cics' transactions do?

0 Answers  


what are the differences between temporary storage queue (tsq) and transient data quene (tdq)?

0 Answers   IBM,


Mention the option used in the CICS READ command to gain accessibility directly to the file I/O area.

2 Answers  


Categories