Virtual Storage Access Method (VSAM)

26) At OPEN, VSAM determines processing options in the following order (d)

a) JCL, program, catalog

b) program, JCL, catalog

c) JCL, catalog, program

d) catalog, program, JCL

e) None

27) VSAM request macros (e.g., GET, PUT) point to which other macros? (c)

a) OPEN

b) ACB

c) RPL

d) CLOSE

e) b and c

f) None

28) If a program uses direct processing exclusively, DIR is specified in which macros? (c)

a) OPEN

b) ACB

c) RPL

d) CLOSE

e) b and c

f) None

29) VSAM processing options could be specified in (e)

a) Catalog

b) Program control blocks

c) JCL

d) None

e) All the above

30) Which of the following is not a COBOL verb? (d)

a) START

b) READ

c) DELETE

d) UPDATE

e) REWRITE

31) Which of the following is/are not supported by COBOL? (d)

a) Skip-sequential processing

b) RBA addressing

c) Replacing existing record

d) a and b

e) a, b and c

f) a and c

32) Which is a valid SHAREOPTIONS specification? (b)

a) SHR(2 2)

b) SHR(2 3)

c) SHR(4 1)

d) SHR(1 2)

e) None

33) For a data set defined with SPEED, which of the following is true? (a)

a) SPEED is effective for the initial load only.

b) SPEED is effective for all additions to the data set after initial load.

c) If the load program ABENDS, VERIFY can determine the HIGH-USED-RBA of the data set.

d) If the load program ABENDS, only those records remaining in buffers need to be added to the data set.

e) None

34) VERIFY cannot be used for (c)

a) Empty data set

b) LDS

c) a and b

d) None

35) For a data set defined with NOERASE, which of the following is not true? (a)

a) Desirable for sensitive data

b) Removes catalog entries

c) All the above

d) None

36) Buffer space cannot be specified in which of the following? (d)

a) DD statement

b) Assembler program

c) AMS DEFINE

d) COBOL program

37) How many data buffers are required for sequential processing to overlap I/O processing? (c)

a) 2

b) 3

c) 4

d) 5

38) When defining a KSDS, the best place to specify CISZ is generally (b)

a) At the cluster level

b) At the data level only

c) At the index level only

d) At both data and index levels

39) For direct processing the recommended number of data buffers is (b)

a) STRNO

b) STRNO+1

c) STRNO+2

d) STRNO+3

e) None

40) For 3380 DASD, TRK(50 5) results in which CA size for a KSDS defined with NOIMBED? (b)

a) 1 TRK

b) 5 TRKS

c) 15 TRKS

d) 50 TRKS

e) None

41) Suppose you are defining a multi-volume data set with VOL(A B) and five key ranges specified. Which of the following correctly indicates where each key range will be located? (c)

a) First key range on VOL A; second on B; third on A; etc.

b) First key range on VOL B; second on A; third on B; etc.

c) First key range on VOL A; remaining key ranges on B.

d) All key ranges on VOL A; B is used for overflow only.

e) All key ranges on VOL B; A is used for overflow only.

42) An alternate index can be defined for which cluster type? (b)

a) KSDS and RRDS

b) KSDS and ESDS

c) KSDS and LDS

d) KSDS only

e) KSDS, ESDS and RRDS

43) If an application program accesses a base cluster in alternate key sequence, then DD statements are needed for which data sets? (f)

a) Base cluster

b) Alternate index

c) Path

d) a and b

e) a and c

f) a, b and c

44) An alternate index itself is which cluster type? (d)

a) LDS

b) RRDS

c) ESDS

d) KSDS

e) None

45) Which of the following backs up data in CI mode? (b)

a) REPRO only

b) EXPORT only

c) Both REPRO and EXPORT

d) Neither REPRO nor EXPORT

46) Which of the following writes catalog information into the backup data set? (b)

a) REPRO only

b) EXPORT only

c) Both REPRO and EXPORT

d) Neither REPRO nor EXPORT

47) Which of the following requires a DELETE/DEFINE before the command can be used to restore an

existing data set? (a)

a) REPRO only

b) IMPORT only

c) Both REPRO and IMPORT

d) Neither REPRO nor IMPORT

48) With HBACKDS the use of apostrophes to enclose the dsname is (b)

a) Required

b) Used to exclude the TSO id as the high level qualifier

c) Required only if one or more segments are specified generically

d) Not allowed if the data set is password protected

No comments:

Post a Comment