PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Programmer
System Analyst
System Programmer
IT Professional
DATES:
CONTENT AND OBJECTIVES:
CLIST Language and Functionality
Review a basic CLIST program.
Examine the allocated datasets with their associated DDNAMEs.
Determine the datasets associated with SYSPROC.
Invoking CLISTs
Code a simple CLIST to display the system supplied information: user ID, TSO level, date and time.
Code a CLIST for deleting a dataset and allocating a new dataset.
EXECUTE Command: 1- Code and test a CLIST with keyword parameters. 2- Code and test a CLIST with positional parameters.
CLIST Command Syntax
Create a data entry program where the results are placed into a QSAM dataset.
Write a CLIST program that allows the user to enter information and the CLIST will validate the data.
Utilize the user supplied key to search the supplied dataset for that key and display the data.
Create a CLIST library that can be invoked by the member name using ALTLIB.
Operators: Create skeleton JCL which allows the user to supply values, generate the JCL, and submit.
CLIST Statements, Parameters, and Keywords
Pass a variable to another CLIST and pass information to the calling program.
Format dates and names for display purposes.
Format a number for display purposes.
Convert a comma delimited string into a fixed field length string.
CLIST Control Variables and Functions
Given a CLIST, debug the error using the CLIST display errors and TRACE tools.
Capture members names from a LISTDS output using OUTTRAP.
Restructure the captured output.
Controlling the Display Messages
Use a TSO command to clear the screen.
Position information on a screen.
Structuring CLISTs
Given a CLIST, recode the program to make it maintainable.
Virtual Classroom
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.
CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.
Certain courses only should be taught by the source software company training company and open source purveyor.