Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - CLISTs Programming


distance-learning center

Computer-Device_Tethered-Distance-learning Distance-learning-Building

Professional Distance-learning

IT Training Services


CLISTs Programming
DURATION: 2 days

FEE: $1,190

Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

There is a surcharge associated with training two or fewer students.


  • Programmer
  • System Analyst
  • System Programmer
  • IT Professional


    1. CLIST Language and Functionality
      • Review a basic CLIST program.
      • Examine the allocated datasets with their associated DDNAMEs.
      • Determine the datasets associated with SYSPROC.
    2. Invoking CLISTs
      • Code a simple CLIST to display the system supplied information: user ID, TSO level, date and time.
      • Code a CLIST for deleting a dataset and allocating a new dataset.
      • EXECUTE Command: 1- Code and test a CLIST with keyword parameters. 2- Code and test a CLIST with positional parameters.
    3. CLIST Command Syntax
      • Create a data entry program where the results are placed into a QSAM dataset.
      • Write a CLIST program that allows the user to enter information and the CLIST will validate the data.
      • Utilize the user supplied key to search the supplied dataset for that key and display the data.
      • Create a CLIST library that can be invoked by the member name using ALTLIB.
      • Operators: Create skeleton JCL which allows the user to supply values, generate the JCL, and submit.
    4. CLIST Statements, Parameters, and Keywords
      • Pass a variable to another CLIST and pass information to the calling program.
      • Format dates and names for display purposes.
      • Format a number for display purposes.
      • Convert a comma delimited string into a fixed field length string.
    5. CLIST Control Variables and Functions
      • Given a CLIST, debug the error using the CLIST display errors and TRACE tools.
      • Capture members names from a LISTDS output using OUTTRAP.
      • Restructure the captured output.
    6. Controlling the Display Messages
      • Use a TSO command to clear the screen.
      • Position information on a screen.
    7. Structuring CLISTs
      • Given a CLIST, recode the program to make it maintainable.

    Web-based Training   Blended Learning    


Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.

SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.