Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - CLISTs Programming

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


MFPRS05

CLISTs Programming
DURATION: 2 days

FEE: $1,190

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Programmer
  • System Analyst
  • System Programmer
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. CLIST Language and Functionality
      • Review a basic CLIST program.
      • Examine the allocated datasets with their associated DDNAMEs.
      • Determine the datasets associated with SYSPROC.
    2. Invoking CLISTs
      • Code a simple CLIST to display the system supplied information: user ID, TSO level, date and time.
      • Code a CLIST for deleting a dataset and allocating a new dataset.
      • EXECUTE Command: 1- Code and test a CLIST with keyword parameters. 2- Code and test a CLIST with positional parameters.
    3. CLIST Command Syntax
      • Create a data entry program where the results are placed into a QSAM dataset.
      • Write a CLIST program that allows the user to enter information and the CLIST will validate the data.
      • Utilize the user supplied key to search the supplied dataset for that key and display the data.
      • Create a CLIST library that can be invoked by the member name using ALTLIB.
      • Operators: Create skeleton JCL which allows the user to supply values, generate the JCL, and submit.
    4. CLIST Statements, Parameters, and Keywords
      • Pass a variable to another CLIST and pass information to the calling program.
      • Format dates and names for display purposes.
      • Format a number for display purposes.
      • Convert a comma delimited string into a fixed field length string.
    5. CLIST Control Variables and Functions
      • Given a CLIST, debug the error using the CLIST display errors and TRACE tools.
      • Capture members names from a LISTDS output using OUTTRAP.
      • Restructure the captured output.
    6. Controlling the Display Messages
      • Use a TSO command to clear the screen.
      • Position information on a screen.
    7. Structuring CLISTs
      • Given a CLIST, recode the program to make it maintainable.

    Virtual Classroom   Blended Learning    

Synchronous
Instruction
Asynchronous
Instruction

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.