C35T1

  1. How do you log onto CICS
    L C001 enter

    if one does not appear, or you need to signon to CICS during a session, type: CESN and press Enter.

    try again, by retyping CESN.
  2. CEMT
    • A service transaction called CEMT
    • allows you to perform supervisory CICS functions.
    • For now, we will use CEMT to inquire on files and programs in the CICS environment.
  3. How do you clear the screen?
    Pause
  4. Pause
    clears the screen
  5. How to you view all your CICS programs
    CEMT I PROG(*3C)
  6. How do you view just the INQPA7 program
    CEMT I PROG(INQPA7) enter
  7. How do you view all the trans-ids for A7?
    CEMT I TRAN(*A7)
  8. How do you view the files for A7?
    CEMT I FI(*A7) enter
  9. How do you sign off CICS?
    • Pause
    • CESF LOGOFF enter
  10. A task is
    • the execution of an application program for a specific user.
    • With CICS, two ore more tasks can execute at the same time using a CICS feature called multitasking.
  11. Multitasking means
    • that CICS allows more than one task to be executed at the same time.
    • CICS provides multitasking within a single address space.
  12. Multithreading
    • allows all the users in a CICS region to use the same copy of a program at the same time.
    • For multithreading to work, the program must be reentrant.
  13. A reentrant program
    • doesn't change itself in any way(cannot modify data in working storage)
    • CICS provides a separate copy of working storage for each user running a COBOL program.
  14. working storage for COBOL
    • CICS provides a separate copy of working storage for each user running a COBOL program.
    • When the program finishes executing, the working storage for that users is released and the virtual memory that was used is free to be allocated to another user.
  15. How do users invoke a program?
    Under CICS, a user cannot directly invoke a program. Instead, the user invokes a transaction, which in turn specifies the application program to be run. When a user invokes a transaction, CICS locates the application program associated with the transaction, loads it into storage(if it isn't in storage already), and starts a task.
  16. trans-id
    each transaction is identified by a unique, 4-char identifier called a transaction identifier or trans-id
  17. PCT
    • Program Control Table
    • Each trans-id in the PCT identifies the program CICS should execute when the transaction is invoked.
  18. PPT
    • Processing Program Table
    • keeps track of which programs are already loaded into storage. If a program has not been loaded into storage, it's loaded when its associated transaction is invoked
  19. Terminal control
    provides the interface between CICS and the operating system's telecommunication access method. It lets you send text or receive text from the terminal that initiated the task.
  20. BMS
    • Basic Mapping Support
    • is an interface between application programs and terminal control.
    • BMS lets you create a map that specifies the position of the individual display elements on the terminal screen.
  21. physical mapset vs symbolic mapset
    physical mapset: location, appearance, operation of data on screen

    symbolic mapset: copy member that can be copied into the cobol program that uses the mapset
  22. The 3 macros
    • DFHMSD: start the mapset
    • DFHMDI:  to start each map
    • DFHMDF to define each field with a map

  23. Code Type of gas row
    • DFHMDF POS=(5,1),                X
    •                      LENGTH=11,                X
    •                      ATTRB=(NORM,PROT),  X
    •                      COLOR=GREEN,           X
    •                      INITIAL='Type of gas'
    • TYPE DFHMDF POS=(5,13),              x
    •                     LENGTH=1,                 X
    •                     ATTRB=(NORM,UNPROT,IC),X
    •                     COLOR=TURQUOISE,   X
    •                     INITIAL='_'
    •         DFHMDF POS=(5,15),              X
    •                     LENGTH=0,                 X
    •                     ATTRB=ASKIP

  24. Code Number of Litres input, not caption
    • LITRES   DFHMDF POS=(7,18),             X
    •                          LENGTH=3,                X
    •                          ATTRB=(NORM,UNPROT),X
    •                         COLOR=TURQUOISE,       X
    •                          INITIAL='___'
    •             DFHMDF POS=(7,22),                 X
    •                         LENGTH=0,                    X
    •                         ATTRB=PROT

  25. Code Price row
    • DFHMDF POS=(9,1),              X
    •                         LENGTH=7,               X
    •                         ATTRB=(NORM,PROT), X
    •                         COLOR=GREEN,          X
    •                         INITIAL='Price :'
    • PRICE    DFHMDF POS=(9,8),             X
    •                          LENGTH=7,               X
    •                          ATTRB=(NORM,PROT),X
    •                          COLOR=TURQUOISE,  X
    •                          PICOUT='$ZZ9.99'
  26. Code the last byte on a CICS screen.
    • DUMMY DFHMDF POS=(24,79),                X
    •                        LENGTH=1,                     X
    •                        ATTRB=(FSET,DRK,PROT), X
    •                        INITIAL='X'
  27. How do you define a Map(what are the lines of code)?
    • MAP         DFHMDI SIZE=(24,80),     X
    •                            LINE=1,               X
    •                            COLUMN=1
  28. How do you close the JCL that defines a map?
    • DFHMSD TYPE=FINAL
    •      END
    • //

  29. Write a programmer defined symbolic map for TYPE
  30. 1. What do the following acronyms stand for?
    a) CICS    b) BMS    c) AID    d) MDT
    done
    • Customer Information Control System
    • Basic Mapping Support
    • Attention Identifier(Enter, Right Control, PF, PA, Clear or Pause)
    • Modified Data Tag
  31. 2. Distinguish between a task and a transaction.
    done
    • A task is the execution of an application program for a specific user.
    • Under CICS, a user cannot directly invoke a program. Instead, the suer invokes a transaction, which in turn specifies the application program to be run.
  32. 3a. Define: Multi-tasking   Multi-threading
    done
    • Multitasking means that CICS allows more than one task to be executed at the same time.
    • Multithreading allows all the users in a CICS region to use the same copy of the program as the same time.
  33. 3b. Define Quasi Reentrant and Reentrant
    • A reentrant program doesn't change itself in any way(don't change working storage)
    • CICS provide a separate copy of working storage for each user running a program.
  34. 4. Distinguish between a pseudoconversational and a conversational program.
    done
    • A conversational program is an online program that sits idle while it waits for user input.
    • (SOS- short on Storage)
    • With pseudo-conversational programming, a program ends after it sends data to a terminal. This releases some of the resources. The program restarts when a person hits an AID key
  35. 5. What is a transaction identifier?
    done
    Each transaction is identified by a unique 4 char code called a transaction identifier, or trans-id.
  36. 6. Explain the function of each of the following tables:      a) TCT
    done
    • TCT Terminal Control Table
    • used to define each terminal to the CICS system.
    • each terminal is given a unique 1-4 char terminal identifier(term-id)
    • these make it possible for CICS to direct program output ot the correct
    • terminal and input from the terminal to the correct program
  37. 6. Explain the function of each of the following tables:      b) PCT
    done
    • PCT (Program Control Table) is a list of valid trans-id's - paired with
    • the name of the program CICS loads and executes when the transaction is
    • invoked.
  38. 6. Explain the function of each of the following tables:     c) PPT          d) FCT
    PPT(Processing Program Table) - list of all valid programs, keeps track of which programs are located in storage, uses it to determine whether a new copy of a program needs to be loaded into storage.
  39. 6. Explain the function of each of the following tables:     d) FCT
    File Control Table - used to keep track of which files are available to application programs
  40. 7. What is the benefit of having pseudoconversational programs?
  41. 8. What is a physical map and a symbolic map?
    done
    • After you code a mapset, you assemble it to produce a physical mapset and a symbolic mapset.
    • The physical mapset is used by CICS to determine the location, appearance, and operation of data that’s displayed on a screen.
    • The symbolic mapset is a COBOL copy member that allows you to manipulate the screen data in your COBOL program.
  42. 9. What is the purpose of the following macros? a) DFHMSD b) DFHMDI c) DFHMDF
    • DFHMSD: start the mapset
    • DFHMDI:  to start each map
    • DFHMDF to define each field with a map
  43. 10. What is the purpose of the AID keys? What are the AID keys?
  44. 11. What are the suffixes added to symbolic map variables?
    L A C H D     F I O
  45. 12. What is an attribute byte?
    done
    • The attribute byte determines the location and characteristics of screen fields.
    • An attribute byte takes up one position on the screen, but it’s displayed as a space.
  46. 13. What is a stop field, a skip field?
    A skip field is skipped over and causes the cursor to automatically advance to the next unprotected field.
  47. 14. Why do input fields require 2 attribute bytes?
    done
    • The attribute byte determines the location and characteristics of screen fields.
    • An attribute byte takes up one position on the screen, but it’s displayed as a space.
    • A field starts immediately following its attribute byte and ends immediately before the next field’s attribute byte.
  48. 15. What is the purpose of the MDT bit?
    done
    The last bit in an attribute is called a Modified Data Tag(MDT). It indicates whether the user has keyed any data into the field.  Only those fields with MDT turned on, will be transmitted to the program.
  49. 16. How do you add a comment line to assembler code?
    Any line with an asterisk in column 1 and a blank in column 72 is treated as a comment line.

    • * in the first column
    • A comment line can NOT be placed between continuation lines and comment lines can NOT be continued.  You cannot have blank lines in the assembler program.

    careful: don’t let asterisks appear in column 72
  50. 17. How do you continue a literal field in BMS?
    • To continue a literal onto a 2nd line:
    • INITIAL=’THIS IS A LONG LINE AND NEEDS TO BE CONTINUED Ox
    • NTO THE NEXT LINE IN COL 16’
  51. 18. Which option do you include in the ATTRB parameter of the DFHMDF macro to position the cursor in the field?
    done
    IC
  52. 19 Which option do you include in the ATTRB parameter of a DFHMDF macro to create an auto-skip field?
    done
    ASKIP
  53. 20. Why does program size matter with CICS?
  54. 21. To position a field so the first byte of data is in column 27 of line 6, what do you code for the POS parameter?
    done
    POS=(6,26)
  55. 22. One field, called DUMMY in the text, should be coded on all your maps. Which attributes should it have?
    done
    ATTRB=(FSET,DRK,PROT)
  56. 23
  57. 24
  58. 25
  59. TIOAPFX=YES
    CTRL=FREEKB
    YES generates a 12-byte FILLER item at the beginning of the symbolic map that the system uses to maintain control information.

    FREEKB option of the CTRL parameter so the keyboard is unlocked when a map is sent to the terminal
Author
slc53
ID
338024
Card Set
C35T1
Description
C35T1
Updated