CICS Interview Questions
We know this may seem unsafeinitially, so we aim to make your experience smooth and stress-free as much as possible.
At Job Search Solutions, we focus on delivering accurate and helpful information that assists job hunters during the interview process and ultimately securing their dream jobs.
We aim to equip you with all of the resources required for success during interviews so you can land the ideal position!
We cover topics related to professional presentations, handling difficult questions and post-interview follow-up.
Interviewing can be daunting and time-consuming, but with proper preparation and mindset, one can overcome any obstacle encountered along the way.
Best of luck on your interview journey!
1. What are CICS control programs and tables?
CICS control programs and tables are crucial for beginners and those unfamiliar with CICS.
These programs and tables help manage data transfer between terminals and perform file actions like reading, updating, adding, and deleting records.
They also maintain data integrity and control task execution and related properties.
2. What are built-in IBM utilities in JCL?
Built-in IBM utilities in JCL eliminate the need for writing or developing programs. For example, copying a program from one file to another can be done using an IBM-supplied utility.
3. What are control programs and tables used for in CICS?
Control programs and tables in CICS manage data transfer between terminals and perform file actions like reading, updating, adding, and deleting records. They also maintain data integrity and control task execution and related properties.
4. What is the importance of understanding these details in CICS?
Understanding these details is essential for working with CSS maps programs or transactions.
It allows for effective data transfer management between terminals and the ability to perform various file actions like reading, updating, adding, and deleting records.
5. What are the different types of control programs and tables in CICS?
The control programs and tables in CICS include TCP, KCP, PCP, FCP, and SCP. They are used for the task, program, file, and storage control functions.
6. What is the role of the CICS region in managing data transfer between terminals?
The CICS region uses various control programs to manage data transfer between terminals.
Task control programs (KCP) control task execution and related properties, program control programs (PCP) locate load programs for execution and transfer control between programs, file control programs (FCP) perform various file actions, and storage control programs (SCB) allocate and deallocate storage.
7. What are task transaction transactions in CICS?
Task transaction transactions refer to a set of operations performed together as a single transaction in CICS.
These include input/output operations, data manipulation, and other related tasks.
8. What is multitasking in CICS?
Multitasking in CICS refers to running multiple programs simultaneously within the same process.
This allows various tasks to be executed concurrently, improving system efficiency and productivity.
9. What is multithreading in CICS?
Multithreading in CICS refers to the ability to run multiple threads of execution within a single program.
This allows for more fine-grained control over program execution and can help improve system performance.
10. What is re-entrance in CICS?
Re-entrance in CICS refers to the ability of a program to execute again after it has completed its current task.
This is useful for programs that must perform multiple tasks or wait for certain conditions before continuing.
11. What is quasi-re-entrance in CICS?
Quasi-re-entrance in CICS refers to the ability for a program to execute again within the same transaction but before a different program has completed its current task.
This can be useful for programs performing multiple functions within the transaction.
12. What are built-in IBM utilities in CICS?
Built-in IBM utilities in CICS are pre-written programs that eliminate the need for writing or developing programs.
These utilities can perform various tasks, such as copying a program from one file to another.
13. What are control programs in CICS?
Control programs in CICS (Customer Information Control System) manage the execution of other programs and perform various tasks related to program management.
These programs include task control programs, program control programs, file control programs, storage control programs, and transaction control programs.
14. What is the difference between a processing program table and a file control table in CICS?
A processing program table in CICS stores information about programs and their associated load modules. In contrast, a file control table is used to register or enter file names in a program.
These tables serve different purposes and are used for other tasks in CICS.
15. What is the transaction lifecycle in CICS?
The transaction lifecycle in CICS refers to the series of steps a transaction goes through, from initiation to completion.
This includes transaction registration, program loading, data processing, and transaction control.
16. What is Common Shared Services in CICS?
Common Shared Services in CICS is a set of control programs, tables, and transactions that IBM provides for use in CICS environments.
These programs and tables can perform various tasks, including program management, data transfer, and transaction control.
17. What is the role of built-in IBM utilities in CICS?
Built-in IBM utilities eliminate the need for writing or developing programs. For example, copying a program from one file to another can be done using an IBM-supplied utility.
18. What is CICS, and what control programs and tables do it apply to?
CICS applies various control programs and tables, such as TCP, KCP, PCP, FCP, and SCP, to the background for CICS operations.
19. What is the difference between task and program control programs?
Task control programs (KCP) control task execution and related properties, while program control programs (PCP) locate load programs for execution and transfer control between programs.
20. What is the role of file control programs in CICS?
File control programs (FCP) perform various file actions like reading, updating, adding, and deleting records and maintaining data integrity.
21. What is the role of storage control programs in CICS?
Storage control programs (SCB) allocate and deallocate storage within the CICS region.
22. What are control programs in CICS, and what do they store and manage?
Control programs like TCP-code (CKC) and Common Shared Services control tables (TCT) store and manage transactions.
Terminal control tables (TCT) register all registered terminals, while full gram control tables (PCT) store transaction IDs and corresponding program IDs.
When a transaction is initiated, it checks if it exists in a control table and if the program related to the transaction is present.
This is done through a processing program table, which matches if the program exists and has a load module. A file control table (FCT) is used to register or enter file names in a program.
These tables store data such as file data set names, record lengths, and maximum and minimum lengths.
23. What are Common Shared Services, and what control programs, tables, and transactions do they provide?
Common Shared Services provides its control programs, tables, and transactions for further discussion.
24. What are CICS resources?
CICS resources are essential for application developers to run their code in CICS, including the program definition, transaction triggers, and resources like files and queues.
To define CICS resources, one can use CICS or bundles.
25. What are CICS Flex and BAS services?
CICS Flex and BAS services are business application services used for resource definition. The most commonly used method is resource definition on light and short calls as audio.
26. What are the interfaces available for defining CICS resources?
The interfaces for defining CICS resources include CICS or bundles, system programming interfaces like CICSPlex SMcommands, DFHCSDUP, automatic installation in short calls, and macro definitions.
CICS Training
The CICS defile is the prime location for defining resources and the most common location for customers.
28. What is the CICS bundles interface?
The CICS bundles interface stores CICS resources in the Unix file system.
29. What is the purpose of defining a CICS resource?
The purpose of defining a CICS resource is to enable application developers to run their code in CICS.
30. What method was used in the early days of CICS for defining CICS resources?
In the early days of CICS, resources were defined using macros for non-SNN networks or non-VSAM files like BDAM.
31. How do I define CICS resources?
CICS resources can be defined using different interfaces, including CICS or bundles.
Bundles can group multiple resources but can be disabled in one shot. The most commonly used method is resource definition on light and short calls as audio.
Other interfaces include system programming interfaces like XCICS SPA commands, GFHCSDUP, and automatic short-call installation.
32. How do macros differ from other methodologies?
Macros require a sample source with the desired resources and attributes assembled and linked. Once the load library is created, it is placed in the DFH RBL of a region JCL.
When the CICS region is brought up, the load module is loaded into the CICS memory, ensuring resources are aware of the CICS region.
This process is tedious and can cause outages when changes are implemented.
33. What is the DevOps era approach in CICS?
IBM introduced the DevOps era approach in CICS, completely changing resource definition. Adios is an online resource definition method that simplifies resource management and reduces outages.
It allows for defining CICS resources using a V-case GSI file called DFHCSD. These resources can be limited for any category and managed using three transactions: be, set, and install.
Once defined, these resources become active in the CICS region, allowing developers to test and promote changes without bringing down the region.
34. What utility defines CICS resources even during downtime?
Another offline utility, DFHCSDUP, defines CICS resources even during downtime, allowing for efficient resource management.
35. What is the process for creating a load library with Macros?
Once the load library is created, it is placed in the DFHRPL of a region JCL.
36. What is the purpose of the Adios online resource definition method?
Adios simplifies resource management and reduces outages by allowing for defining CICS resources using a V-case GSI file called DFHCSD.
37. How does Adios manage resources?
Resources can be limited for any category and managed using three transactions: be, set, and install.
38. What happens to resources once they are defined in Adios?
Once defined, these resources become active in the CICS region, allowing developers to test and promote changes without bringing down the region.
39. What is the purpose of the DFHCSDUP offline utility?
DFHCSDUP defines CICS resources even during downtime, allowing for efficient resource management.
40. How has the DevOps era approach changed resource definition in CICS?
The DevOps era approach has fastened development, allowing developers to promote their changes online.
41. What is set-up?
Set-up is a transaction that allows users to read or write content within CSD, update existing resources, and install resources from DFHCSD into CSD transaction servers.
42. What is the three-level hierarchy for resource definitions?
The three-level hierarchy for resource definitions includes the resource itself, the transaction or program that supports the resource, and the group or logical form that groups the resource.
43. What is the purpose of the CICS region?
The CICS region allows only CSD files to be installed but cannot read or modify resources inside CICS memory using set-ups.
Resources can be managed using a different transaction called CMT.
44. What is the difference between defined and undefined resources?
A defined resource is tagged to a group, a logical form that groups resources, while an undefined resource is not.
45. How are resources available to CICS?
Resources are available to CICS only when installed and present in CICS memory.
46. What is the purpose of the DFHCSDUP utility?
To enable users to read the contents of DFHCSD but cannot write or update existing resources.
47. What does set-up enable users to do?
Read or write content within CSD, update existing resources, and install resources from DFHCSD into CSD transaction servers.
48. What is the difference between the CICS region and CMT?
CICS region allows only CSD files to be installed but cannot read or modify resources inside CICS memory using set-ups.
In contrast, CMT will enable resources to be managed using a different transaction called CMT.
49. What is the three-level hierarchy of resource definitions?
The hierarchy includes the resource itself, transactions, programs, and files supported by CICS, with the bottom level being the resource itself.
50. How does CICS store resources?
Resources are stored in different repositories based on the interface used to define them.
51. What does CICS search for when looking for resources?
CICS searches for resources tagged to a specific group, such as HR and payroll.
52. How does the dynamic process work in CICS?
The dynamic process in CICS ensures that resources are available for the current run but may not be installed once the system is recycled.
CICS Online Training
The group list is a palm parameter in CICS and checks for specific lists when a resource is encountered. It supports four lists and generates them using wildcards like asterisks or plus symbols.
54. What does IBM in CICS provide the default list?
The default list provided by IBM in CICS contains system resources, the DFH list.
55. How can attributes be displayed in CICS?
Attributes can be displayed in CICS using the set ad display command at the group level.
56. How can all groups be displayed in the CST file in CICS?
All groups can be displayed in the CST file in CICS by starting with the prod and followed by three characters.
57. How can the order of groups and definitions be jumbled in CICS?
The order of groups and definitions can be jumbled in CICS by using before and after commands to install groups and definitions in a specific order.
58. What is the CICS brain?
The CICS brain represents the virtual storage allocated to a region, which stores system-level details, system parameters, and application-related resources.
59. What happens when CMT fails?
In emergencies, CKL is used when CMT fails to push hung transactions.
60. What transaction is used to run something into the storage?
The transaction used to run something into the storage is CSN.
61. What is the CICS brain, and what does it represent?
The CICS brain represents the virtual storage allocated to a region, which stores system-level details, system parameters, and application-related resources.
62. What are the supply transactions in a CSSIM connection?
Some supply transactions in a CSSIM connection include CDB, CBR, CECA, SEDA, CEDF, CEDX, CKL, COT, CSF, CAN, CMAC, CLEAR, CMAC, and DSNC.
63. What is CDBC, and what does it do?
CDBC connects and disconnects CSS from the IMS subsystem.
64. How do you run something into the storage using CICS?
To run something into the storage using CICS, you mustlog in, supply your login ID and password, and use a CSN transaction.
65. What is the default user ID, and how can it prevent transactions from being executed?
The default user ID is a sit-bump that can prevent transactions from being executed if you don’t log in explicitly.
66. What is the COT transaction?
The COT transaction allows users to display or inquire about terminal properties, including changing values like upper case translation.
It can also change values, limiting upper-case translation to the terminal ID.
67. What is the message and code display transaction in the C Mac?
In the C Mac, the message and code display transaction displays CSS messages and codes.
68. What is the syntax for CSS messages in the C Mac?
The syntax for CSS messages can be typed in C Mac, followed by the new number, or CMAQ, followed by YY, representing the domain or component ID, followed by the message number.
69. What is the best way to read messages or codes related to CSS?
The best way to read messages or codes related to CSS is the knowledge centre online, which provides up-to-date details.
70. What is the resource definition online in CICS?
Resource definition online is an essential concept in CICS, where definitions are stored in a VSAM file and accessible through various transactions.
71. What is Seda?
Seda is a prime transaction allowing online resource definition and modification even when CSD runs.
72. What are Seda’s capabilities?
Seda provides a partial set of transaction capabilities.
73. What is the defined transaction in Seda?
Seda supports the defined transaction, establishing a resource with attributes defining its behaviour.
74. What is the descriptive attribute list in the knowledge centre?
Each resource has a descriptive attribute list in the knowledge centre, accessed through a phase-wise approach or a single syntax statement.
75. How does resource definition in Seda make it easier and more efficient?
Resource definition in Seda is easier and more efficient than macros because it provides a partial set of transaction capabilities and requires a descriptive attribute list in the knowledge centre, accessed through a phase-wise approach or a single syntax statement.
76. What is the “Alter” command used for in SEDA?
The “Alter” command defines and alters resources in SEDA.
77. What are the different options available in SEDA?
SEDA has several options, including acting upon a standard DD file (DFHCSD) and installing it into CICS storage.
Once installed, the resource is available to CICS. Define and leave resources undefined, and they will not be available to CICS.
78. What is the role of CMT in managing resources in the CICS region?
CMT, or CICS master terminal transaction, is a crucial tool for dynamically changing resource statuses and system parameters, terminating tasks, shutting down regions, and synchronising clocks.
It follows a phase-by-phase approach and offers four options: enquire, which lists available resources; and enquire, which displays a list of resources to enquire upon.
79. What is the “CMT enquire” command used for?
The “CMT enquire” command provides a list of resources to enquire about, allowing for a more efficient and effective use of CICS.
80. How does the CEMT identify programs, transactions, and programs?
The CEMT identifies programs, transactions, and programs using functions such as killing a transaction, inquiring about transactions and programs, and working with VSAM files.
Conclusion The CICS Interview Questions blog offers an exhaustive guide and PDF of essential interview questions candidates might face during a CICS exam.
Candidates should remember to prepare well, taking their time researching and practising their responses to these queries to increase the odds of their success in CICS interviews.
Overall, the Interview Questions ofCICSis an invaluable resource for both freshers and experienced anyone hoping to expand their IT capabilities or advance their career, whether beginners or veterans looking for direction, regardless oftheir level.
CICS Course Price
Sindhuja
Author