Explain the differences between a Transaction and a Task.A.
Under CICS, a user can't directly invoke a program. Instead, the user invokes a transaction, which inturn specifies the program to be run. When a user invokes a transaction, CICS locates the associatedprogram with the transaction, loads it into storage (if it is not there), and starts a task. Where Task isa unit of work which is scheduled by CICS. The difference between transaction and task is that whileseveral users may invoke the same transaction, each initiates a separate task.2.
Describe the basic differences between batch and online systems.A.
In a Batch processing system, transactions are accumulated into groups, or batches, before they areprocessed. For example the processing of the Orders collected for the whole day. In an Onlineprocessing system the transactions are processed by the system as soon as the transaction is enteredon to the system. Ex. Airplane Reservation system. In a batch system the turnaround time ismeasured in hours and days, while for the On-line system it is measured in micro-seconds andseconds. On an Online system, if there is an error in data, the system indicates it immediately, andcan be corrected and reprocessed. Allstate Insurance Co., uses CICS V4.1. on their system.3.
What are the four major types of Online Programs?A.
The menu program. The inquiry program. The file maintenance program. The Data Entry program.4.
Describe the different considerations for the Online programs (CICS).A. Ease of use. IBM promotes a user interface standard called CUA (common user Access). CUA providesEntry model, Graphical model, and Intermediate model - the text subset of graphical model.Performance. Performance is a critical consideration for online programs. Performance for online systems ismeasured in terms of response time. Many factors affect response time. The most critical factors are the totalnumber of programs running within the CICS system, the Disk I/O, the terminal and host computers andnetwork.File Integrity. A batch program typically has complete control of the files it uses, so there's no chance of anotherinterfering with its processing. In an online system however many terminal users use the system simultaneously,and all must have access to the files they require at the same time.Security. On batch systems Security implementation is simple as the access to the computer system can becontrolled. However in an online system terminals are located at several locations. Logon procedure being usedcan ensure security to a great extent. Using of multi-level security to allow only certain users to access files andprograms based on the logon id helps to secure the system.5.
Describe the most common way a task is started under CICS.A. By entering the Transaction Identifier on the terminal and pressing Enter Key. When the Trans-id is enteredon the CICS screen, it locates the program associated with the trans-id from the PCT. Then the location of theprogram is determined by CICS by reading the entries in PPT. After the load module is located, it loads it ontothe CICS main memory, then task workspace is assigned for CICS own use to execute the task.