How to make protected field in BMS invisible through
application program?
Answer Posted / adarsh
using "DFHPROTN"
Is This Answer Correct ? | 9 Yes | 4 No |
Post New Answer View All Answers
Mention the option used in a cics command to retrieve the response code after execution of the command?
How to get the cursor position when we receive a map?
which cics service transaction is used to gain accessibility to cics control tables? Mention the one that has the highest priority.?
what is the cics command used to access current date and time?
Explain how pa key is different from pf key?
How many ways are there for initiating a transaction?
Define the term mro (multi region operation)?
Explain how and where is the twa size set?
Explain the difference between pseudo-conversational and conversational?
Explain how do you control cursor positioning?
What is the meaning of the eibaid field?
Differentiate between PCT and FCT.
What are the some important fields in the eib block?
what are the reserved words for cics?
What is a cics task?