Sei sulla pagina 1di 173

2.

2
Tanmay:-

1>>If ON SIZE ERROR is coded for an arithmetic operation
a. degrade the performance
b. Improve the performance
c. Both of them will give equal performance speed
d. None of the above.
http://supportline.microfocus.com/documentation/books/sx20books/prwrit.htm

2>>A program can be called dynamically from a main program by
a. using a CALL literal statement in a program that is compiled using the DYNAM and
the NODLL compiler options.
b. use the CALL identifier statement in a program that is compiled using the NODLL
compiler option , a dynamic call
c. having the program name in the program-id same as the corresponding load module
name for the called program.
d. all of the above.
http://publib.boulder.ibm.com/infocenter/ratdevz/v7r1m1/index.jsp?topic=/com.ibm.ent.cbl.zos.doc/topics/t
psub04.htm

3>>Consider MOVE WS-VAR (2: 6) to WS-VAR1. Which one of the following is true?
a. This statement will move from 2nd position to the 6th position of WS-VAR data to
WS-VAR1
b. This statement will move from 2nd position to the 8th position of WS-VAR data to
WS-VAR1
c. This statement will move from 2nd position to the 7th position of WS-VAR data to
WS-VAR1
d. This type of movement is not allowed in cobol
Description:- 2- Starting position and 6 is total length to be move.

4>>Consider the following copybook definition of PAYLIB
01 TAG.
02 TAG-WEEK PIC S99.
02 TAG-GROSS-PAY PIC S9(5)V99.
02 TAG-HOURS PIC OCCURS 1 TO 52
TIMES DEPENDING ON TAG-WEEK OF TAG.
if the COPY statement contains
COPY PAYLIB REPLACING ==TAG== by PAYROLL====
What will be the copied text be?

a. copied text would be
01 PAYROLL
02 PAYROLL-WEEK PIC S99
02 PAYROLL-GROSS-PAY PIC S9(5)V99
02 PAYROLL-HOURS PIC S999 OCCURS 1 TO 52
TIMES DEPENDING ON PAYROLL-WEEK OF PAYROLL
b.copied text would be
01 PAYROLL.
02WEEK PIC S99
02 GROSS-PAY PIC S9(5)V99
02 HOURS PIC S999 OCCURS 1 TO 52 TIMES DEPENDING ON WEEK
OF PAYROLL
c. copied text would be
01 PAYROLL.
02 PAYROLL-WEEK PIC S99
02 GROSS-PAY PIC S9(5)V99
02 HOURS PIC S999 OCCURS 1 TO 52 TIMES DEPENDING ON WEEK
OF PAYROLL
d. it will result in a compile error and copybook would not be expanded.

5>>For the subscript out of range problem, checking in the program will be faster than
the compiler option SSRANGE
a.True
b.False

6>>Index can be used to reference another table
a. if the table has the same number of table elements.
b. if the table has the same number of table elements and of the same length
c. cannot be used for another space
d. if both table occupy the same space.

http://pic.dhe.ibm.com/infocenter/pdthelp/v1r1/index.jsp?topic=%2Fcom.ibm.entcobol.doc_3.4%2Ftptbl12
.htm

7>> Which is the Cobol division used for the check point for program restart
a. identification
b. environment
c. data Division
d. procedure
http://www.mvsforums.com/helpboards/viewtopic.php?t=1318&highlight=checkpoint

8>>if COND is coded as override for a proc
a. it will apply only for the first step
b. it will apply the same value of COND for the all the proc steps
c. both of the above
d. none of the above
http://www.allinterview.com/showanswers/83273.html

9>>DB2 allows specifying transaction level lock during DB2 process. What does
ACQUIRE(USE) parameters in a BIND process?
a.take locks at the time of first SQL statement execution
b.take all necessary locks at the start of the transaction.
c.take all necessary locks once program loads into memory.
d. None
http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z9.doc.perf%2Fsrc%2Ft
pc%2Fdb2z_alliedthreadallocation.htm

http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z9.doc.perf%2Fsrc%2Ft
pc%2Fdb2z_acquirereleaseoptions.htm

http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.comref%2Fsrc
%2Ftpc%2Fdb2z_bindoptacquire.htm

10>>Which of the following regarding Table spaces Scan is correct?
1.used when more number of rows are returned
2.used when no indexes are available
3. used when indexes are available and they have low cluster ratio
a.1 and 2
b. *1 and 3
c.2 and 3
d. all of the above
http://documents.bmc.com/products/documents/83/61/98361/98361.pdf

11>> In the stored Procedure connect statement uses
a.DRDA access to access tables
b.value specified in DEPROTOCOL when stored procedure package in bound
c.value in database protocol on installation panel
d. *none of the above

Tips:- Stored procedures can access tables at other DB2 locations using 3-part object names or CONNECT
statements. If you use CONNECT statements, you use DRDA access to access tables. If you use 3-part
object names or aliases for 3-part object names, the distributed access method depends on the value of
DBPROTOCOL you specified when you bound the stored procedure package. If you did not specify the
DBPROTOCOL bind parameter, the distributed access method depends on the value of field DATABASE
PROTOCOL on installation panel DSNTIP5. A value of PRIVATE tells DB2 to use DB2 private protocol
access to access remote data for the stored procedure. DRDA tells DB2 to use DRDA access.


12>>Stored procedure running in WLM established address space can have
a.explicit CAF
b.implicit CAF calls
c.RRSAF calls implicitly
d. *RRSAF calls explicitly

13>>In stored procedure runs locally
a. need not initialize the o/p parameter before procedure is called
b. need initialize the o/p parameter before procedure is called
c. There is no concept of output parameter when the stored procedure runs locally
d. *none of the above
http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.apsg%2Fsrc%2
Ftpc%2Fdb2z_callspfromapp.htm

14>> Which of the following statements is true?
a. Handlers can be used in a SQL procedures
b. *ther is no such concept of handlers in SQl procedure
c. handlers can be declared but they cannot be tailored specific SQL state
d. Usage of handlers will decrease the performance

15>> Hybrid join is
a. when clusterd index is avialble on the join column of the innner table
b.when non clustered index is available on join columns of the inner table
c.*when there are no duplicate rows in the outer table
d. none of the above
http://mainframe-tips-and-tricks.blogspot.in

16>>The _______________ instruction causes an immediate exit from a repetitive loop
and the control goes to the instruction following the END keyword
a.Nop
b.Leave
c.Iterate
d.*Exit
http://publib.boulder.ibm.com/infocenter/iadthelp/v6r0/index.jsp?topic=/com.ibm.etools.iseries.orxw.doc/o
rxw_prg35.htm
http://publib.boulder.ibm.com/infocenter/iadthelp/v6r0/index.jsp?topic=/com.ibm.etools.iseries.orxw.doc/o
rxw_prg35.htm

17>>What is a resident application program?
a.A program that is not normally released from storage during execution
b.a program that is lost in the computer
c. aprogram that is not in the RPL
d.*All of the application programs
http://www.allinterview.com/showanswers/5959.html
http://publib.boulder.ibm.com/infocenter/cicsts/v2r3/index.jsp?topic=/com.ibm.cics.ts23.doc/dfht3/dfht34h.
htm

18>> Before compiling CICS program it has to be
a. *link-edited
b.new copied
c.defined in CICS tables
d.Translated
tips:-An eightstep procedure for developing a CICS program
Analysis and design
1. Develop a complete set of program specifications.
2. Design the program using an event/response chart and a structure chart.
Implementation
3. Prepare the BMS mapset.
4. Code the program.
5. Prepare the program for execution.(translation, compilation and link-edited)
6. Create the necessary CICS table entries.
7. Test the program under CICS.
Documentation
8. Document the program.

19>>By using multiple check point method
a. *you can only restart a program from the last stored checkpoint
b. you can restart a program from any previously stored checkpoint
c. you can only restart a program from the first stored checkpoint
d. none of the above

http://pic.dhe.ibm.com/infocenter/ratdevz/v8r0/index.jsp?topic=%2Fcom.ibm.ent.cbl.zos.doc%2Ftopics%2
FPGandLR%2Ftasks%2Ftpchk04.htm

20>> the optimizer cannot eliminate duplicate computations
a.*True
b.False

21>>What will be the result of the following MOVE
01 NUM1 pic 999V99 value 00005
01 NUM2 pic $$$$.99
MOVE NUM1 TO NUM2

a.000$.05
b.*$$$$.05
c.$5.00
d.$0.05

22> multiple checkpoint method
a. Append succeeding checkpoint to the previous one
b.*Succeeding checkpoint overlays the previous one

23>> If A1,A2 and A3 are variable and B1,B2 and B3 are constants. Which of the below
statements is more correct?
a.B1+B2+B3+A1+A2+A3
b.A1+B1+A2+B2+A3+B3
c. *no performance difference for A and B as it involves only additions

24>> What is the maximum number of steps in a job?
a.*3273
b.255
c.256
d.3278

25>> BYTES= (100, DUMP) cancels the job and issue a dump?
A. *if output exceeds 100 bytes
B. if output exceeds 100000 bytes
C. if output exceeds 10000 bytes
D. if output exceeds 1000 bytes

http://jcl-online-training.blogspot.com/2012/07/controlling-job-process.html

26>> how many WHENEVER statements can you have in one application program?
a.one of each type of whenever for each EXEC SQL group
b.one of each type of whenever for each select statement
c.*one of each type of WHENEVER - 3 total
d.As many WHENEVR statement as you want

http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.apsg%2Fsrc%2
Ftpc%2Fdb2z_checkexecutionwhenever.htm

27>>How to make DB2 use the index instead of reading the table sequentially?
a.*reference indexed columns whenever possible in the WHERE clause
b.reference indexed columns whenever possible in the group by clause
c. reference indexed columns whenever possible in the order by clause
d.all of the above.

http://documents.bmc.com/products/documents/18/27/141827/141827.pdf
http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp?topic=%2Fcom.ibm.help.domino.admin.
doc%2FDOC%2FH_USING_INDEXING_TO_IMPROVE_DB2_PERFORMANCE_STEPS.html


28>>What is the purpose of the SQL communication Area?
a.it provides SQL with an area to put error codes
b.it provides an area passing parameters back and forth between your programs and SQL
c.*it provides an area for DB2 to pick up the SQl statements in your program
d.it provides an area for input between your terminal and SQL

http://documentation.microfocus.com/help/index.jsp?topic=%2FGUID-0E0191D8-C39A-44D1-BA4C-
D67107BAF784%2FBKDBDBDATAS002.html
http://documentation.microfocus.com/help/index.jsp?topic=%2FGUID-0E0191D8-C39A-44D1-BA4C-
D67107BAF784%2FGUID-F1B06471-A0D4-4509-8095-6669BEF09AF4.html
https://publib.boulder.ibm.com/infocenter/iseries/v5r4/index.jsp?topic=%2Fdb2%2Frbafzmstsqlcca.html

29>> Which of the following statements is true?
a. stored procedure cannot have DB2 private protocol to any DB2 sites already connected
to the calling program by DRDA access.
b. *stored procedure can have DB2 private protocol to any DB2 sites already connected
to the calling program by DRDA access.
c. stored procedure cannot have DB2 private protocol to any DB2 sites already connected
to the calling program by using the value specified.
d. stored procedure cannot have DB2 private protocol to any DB2 sites already connected
to the calling program *****
tips:- Stored procedures can access tables at other DB2 locations using 3-part object names or CONNECT
statements. If you use CONNECT statements, you use DRDA access to access tables. If you use 3-part
object names or aliases for 3-part object names, the distributed access method depends on the value of
DBPROTOCOL you specified when you bound the stored procedure package. If you did not specify the
DBPROTOCOL bind parameter, the distributed access method depends on the value of field DATABASE
PROTOCOL on installation panel DSNTIP5. A value of PRIVATE tells DB2 to use DB2 private protocol
access to access remote data for the stored procedure. DRDA tells DB2 to use DRDA access.

30>>What is the operand used in EXECIO statement to read from a dataset?
a.DISKR
b.READ
C.*DISKREAD
d.READALL

http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=%2Fcom.ibm.zos.r12.ikjc300%2Fikj4
c310103.htm

31>> _____ instruction stops execution from within loop and passes control to the DO
instruction at the top of the loop.
a.*Leave
b.Nop
c.Exit
d.Iterate

http://publib.boulder.ibm.com/infocenter/iadthelp/v6r0/index.jsp?topic=/com.ibm.etools.iseries.orxw.doc/o
rxw_prg35.htm
http://www.kyla.co.uk/other/rexx1.htm#leave

32>> Which items is a characteristic of a standard attribute
a.*Protection
b. intensity
c. Shift
d. All of the above
tips:- The three standard attributes
shown in this figure protection, shift, and intensity are available on any type of terminal

33>>RESETBR command is similar to an ENDBR followed by a STARTBR
a. TRUE
b.*FALSE

34>> What is XCTL command? to pass control a program at a____level and expecting to
___?
a. lower,return
b.next higher , no return
c.*same, return
d.same, not return

35>>how many master catalog in one mvs.
Ans:- One

Details:- Catalog contains the information (Record length, dataset type, directory blocks etc..) about the
datasets.
Master catalog is the one that gives information about System datasets.
User catalog is the one that gives information about user created datasets.
there are two types of catalogs.

1) Master catalog 2) User catalog

An MVS system has only one master catalog. But many no. of user
catalogs.

Master catalog contains master datasets that is datasets used by OS.
User catalog contains user datasets that is infn abt vsam and non-vsam datasets.
http://ibmmainframes.com/about793.html

36>>LIBDEF means??
Ans:- LIBDEFallocate application libraries
The LIBDEF service provides for the dynamic definition of application data sets, thus
allowing application data sets to be specified during an ISPF session. This eliminates the
need for allocate statements to define all application data sets before invoking an ISPF
session.
The LIBDEF service can be used to define these application-level libraries:
Panels
Messages
Tables
Skeletons
File tailoring output
User link libraries
Images
http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=%2Fcom.ibm.zos.r12.f54sg00%2Flibd
ef.htm
http://www.mainframesupport.dk/tips/tip0619.html
http://publibfp.boulder.ibm.com/cgi-
bin/bookmgr/BOOKS/ISPZSG20/2.21?SHELF=ispzpm20&DT=20031111033146


37>>Queue that can be read and update in cics?
Ans:- TSQ:- Temporary storage queues are typically used for shared reading, writing,
and updating of data by multiple transactions; for example, as a scratchpad for shared
data.
http://publib.boulder.ibm.com/infocenter/txformp/v5r1/index.jsp?topic=%2Fcom.ibm.txseries510.doc%2Fa
tshak0038.htm

38>>DSNTIAR subroutine for?
Ans:- Is used to check the formatted error.
If you use the SQLCA to check whether an SQL statement executed successfully, your
program needs to read the data in the appropriate SQLCA fields. One easy way to read
these fields is to use the assembler subroutine DSNTIAR.

http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z9.doc.apsg%2Fsrc%2F
tpc%2Fdb2z_displaysqlcadsntiar.htm
http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.apsg%2Fsrc%2
Ftpc%2Fdb2z_dsntiar.htm
39>> INCLUDE member contains instream data
a.true
b.false

http://www-01.ibm.com/support/docview.wss?uid=isg1OA40946

40>>WS-X pic 99 value 10
Add 40 to WS-X
compute WS-X = WS-X*3-40

Solution:- WS-X=WS-X*3-40=> 50*3-40=110
BUT PIC is 99 only so it will store 11 only not 110.
So Ans:- 11

41>>How can you list the job that has JCL error
a. MAX EQ JCK ERROR
b. THROUGHMAX JCL ERROR
c. FIL MAX JCL ERROR
d. SHOW MAX EQ JCL ERROR
I have some 50 jobs in my SPOOL. I want to list only the jobs that are ABENDED.
For such a kind of listing, use the primary command FILTER on the command line as given in
the examples below
FIL MAX AB* - shows jobs that has ABENDS
Other Examples are:
FIL MAX JCL ERROR - shows jobs that has JCL errors
FIL MAX NE RC 0000 - shows jobs with exceptional conditions
FIL MAX EQ RC 0000 - shows successfully completed jobs
If you want to switch off the filter, then issue FIL OFF

http://georgenet.net/oracle/files/Mainframe%20info/100%20Mainframe%20Tips.doc

42>>Length of queue in CICS
a.7
b.8
c.9
d.10
http://publib.boulder.ibm.com/infocenter/cicsts/v3r1/index.jsp?topic=%2Fcom.ibm.cics.ts31.doc%2Fdfhp4
%2Fcommands%2Fdfhp4_readqts.htm

43>>Special charecter used to define in CECI
a.#
b.%
c.&
d.all of the above
Details:- #, $ and @.
http://pic.dhe.ibm.com/infocenter/iseries/v6r1m0/index.jsp?topic=/cl/strcicsusr.htm

44>>If a PDS contains 2 job in a single PDS and we submitted that PDS member then
a.job1 will execute
b.job2 will execute
c.JCL error
d.Both will execute.

45>>Catalog info to backup data
a.Repro
b.export
c.both
d.none


Fiona

1: you can embed checkpoint one of the programs in a dataset .( t/F)
ANS: FALSE

2:TO use the central storage(real) by a job ,what would be the keyword coded in a JOB.
a)ADDRSPC=real b) ADDRSPC=virtual c) REGION=2M D)None

http://publib.boulder.ibm.com/infocenter/zos/v1r11/index.jsp?topic=/com.ibm.zos.r11.ieab600/xexaddrs.ht
m

3)What about special registers is true ?
a)Special registers cannot be used in stored procedures
b)stored procedures modify initial value of special registers ,before stored procedure
is over
c) stored procedures modify initial value of special registers ,after stored procedure is
over
d) stored procedure does not modify initial value in special register.

http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.apsg%2Fsrc%2
Ftpc%2Fdb2z_specialregisterssp.htm

4) a program now commits updates after each transaction .If your program fails ,where
will you start your procedure resume processing.
a)at the beginning of the step.
b)at transaction that was being processed when failure had occurred.
c)at the transaction prior to the one that was executed at the time of failure.
d)integrity of data in table is questionable .you should restore the table from backup and
resume appropriate step.

5) which among these is correct?
a) Stored procedures have SQL and Host language statement .
b) Only SQL
c) Only Host lang statement
d) None
http://publib.boulder.ibm.com/infocenter/iseries/v5r4/index.jsp?topic=%2Fsqlp%2Frbafysproeg.htm

6) If stored procedure runs locally
a) You need not initialize the o/p parameter before the stored procedure call
b) You need to initialize the o/p parameter before the stored procedure call
c) There is no concept of o/p parameter where the stored procedure runs locally
d) None

http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.apsg%2Fsrc%2
Ftpc%2Fdb2z_callspfromapp.htm

7) Command to get the length of a string in REXX?
A) LEN b) LENGTH c)STRING d)GETLEN
http://www.scoug.com/openhouse/rexxintro/RxBIStng1.3.html


8)Condition to write a line to the output stream in REXX ?
a) DISPLAY b) SAY c)WRITE d)PRINT
http://publib.boulder.ibm.com/infocenter/cicsts/v2r3/index.jsp?topic=/com.ibm.cics.rexx.doc/dfhrx/dfhrx00
015.htm

9) which service is used to display ISPF Panel in REXX
a)SHOW b) DISPLAY c)SEND d)SHOW_PANEL


10) Program that executes REXX compilation
a)COMPREXX b) COMREXX c) REXXCOMP d) REXXCOM


11)Return value of SYSDSN if dataset/member passes an argument is available?
a)0 b) -3 c) OK d)None

12) The instruction that causes an execution to unconditionally end and return to where
the exec was invoked
a) LEAVE b)EXIT c)both d)none
http://www.cs.ox.ac.uk/people/ian.collier/Docs/rexx_info/whole.html

13:When is PRINT NOGEN used
a) Does not include the source statements that exist in a mapset
b) Does not include the source statements that exist in a map.
c) Prevents printing statement generated by BMS
d) Prevents printing statement during translation of CICS Application program.

14:REXX begins with
/* REXX b) //*REXX c) / REXX d) none of the above

15: CICS controls time dependent services used
a) Interval control b) time control c)journal control d)none

16:CICS translation will add COPY statement for DFHEIVAR Block. ( T / F ).

17: To determine how the program was started ,transid obtained from ?
a)EIBFN b) EIBRESP c) EIBTRID c)EIBTRMID
http://mainframematerials.blogspot.in/2007/09/cics-about-tables.html

18:What is the program use count?
a) a counter of current program usage kept by CICS in PPT.
b) counter of program used to store in each individual program .
c) no of files access made by the program .
d)program can be refreshed ( NEWCOPY) when the count is greater than 0.

http://publib.boulder.ibm.com/infocenter/cicsts/v3r2/index.jsp?topic=%2Fcom.ibm.cics.ts.doc%2Fdfha7%
2Ftransactions%2Fcemt%2Fdfha71n.html

19: Attribute value for the stopper field.
a)APROT b)PROT c) SKIP d) IC
http://www.allinterview.com/showanswers/5845.html

20:When will db2 not use the INDEXED column even if the column are INDEXED?

21:which of the foll command retrieves the relative line no of the specified label ?
a)NUMLINE b)LINENUM c)LINE-NUMBER d)LINEN

22:Which item is a characteristic of extended attribute?
a) Validation b) shift c)protection d)all
tips:- The three standard attributes
shown in this figure protection, shift, and intensity are available on any type of terminal

23:In stored procedures ,general with null means,
a) Indicator variable for each parameter is a call statement .
b) Initializing each parameter in a call statement with nulls.
c) Initializing all parameter declared in a call procedures with nulls
d) All

24:stored procedures address spaces can be established by
a) DB2 alone b) WLM alone c)both a and b d)none
wwwangelfirecomelectronicmrkthenitechsprojectdb2spfaqpdf

25:max steps in a job
a)3273 b)255 c)256 d)3278

26: 01 SAMPLE_TABLE_TOUR
05 TABLE_DEPTH OCCURS 3 TIMES INDEXED BY INX_A
10 TABLE_ROW OCCURS 4 TIMES INDEXED BY INX_B
11 TABLE_COLUMN OCCURS 8 TIMES INDEXED BY INX_C
PIC X (8)
How many times will TABLE_ROW be displayed ?
a)8 b)64 c)256 may be question is wrong. d)192



Jaigovind
1. which comparison operator is faster = or != ?ans:- Equal to faster than not equal.

2. what does compiler directive does for a Cobol program ? a.Direct compilation of
Cobolprog
b. act as comment c.gives compiler instruction for compiling

3.sms cannot manage ? a. pdsb.gdg c isam d vsam

4. max no of DD statement ? 3273

5. can u use JOBCAT OR STEPCAT DD statement with SMS managed dataset ? T or F
False
Tips:-No STEPCATs or JOBCATs are permitted if system-managed data sets are referenced,
because SMS only supports data set locate using the standard order of search.
http://pic.dhe.ibm.com/infocenter/zos/v1r12/index.jsp?topic=%2Fcom.ibm.zos.r12.idai60
0%2Fuserjcl.htm

6.LISTsequencialprefetch read ________?
The optimizer chooses a list prefetch access path.
Fast log apply operations.
Incremental image copies.
Access to fragmented LOB data.
http://pic.dhe.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z9.doc
.perf%2Fsrc%2Ftpc%2Fdb2z_prefetchio.htm

7. EXPLAIN ( what does it stands for ) ?
The EXPLAIN statement obtains information about access path selection for an explainable
statement
The Explain command details the access path defined by DB2 and allows you to analyze how
the data will be accessed and how you can improve the commands performance.

8. Sequential prefetch is used for indexed space or Table space?? T or F?
Ans:-table space
http://publib.boulder.ibm.com/infocenter/db2luw/v8/index.jsp?topic=/com.ibm.db2.udb.d
oc/admin/c0005397.htm

9. DB2 commits used for ?
The COMMIT statement ends the unit of recovery in which it is executed and a new unit of
recovery is started for the process.

10. Store procedure contain static sql or DyanamicSql??Both but static is prefable.

11.Strored procedure are used in SYSIBM.SYSROUTNES??
yes

12. Is it possible to trigger JCL program from REXX?

13. REXX COMMENTS starts wth-
a. // b. //* c. /* d. ?

14. Diffrenece b/w FIND and SEEK keyword in REXX?

15. Compare (ab--, ab,-) ???
a. 0 b. 1 c. 3 d. 5
Ans:-d. 5

16. Operand used in EXECIO to write dataset????
Ans :-DISKW

17. maximum Limit on LENGTH of symbol in REXX? 64, 128,
Ans:- no limit you can have as many as you can (need to check

18. Default delimiter in REXX??
Ans:- SEMICOLON (;) { need to checked}

19. How records are released on which exclusive control is gained by DB2??
Ans:- I think its Rollback

20. CICS provides itsown multiuser environment ?? T/F

21. Program which use XCTL will be removed from main storage?? T/F

22. Can RESP be coded on option for all CICS command? T/F
Ans :-true

23. Is it possible to initiate same transaction by 2 different users?? T/F
Ans:-true.
Tips:-The difference between a task and a transaction is that while several users may
invoke the same transaction, each is given a separate task.

24. CICS command replaces with MOVE and call stmt??While compilation, CICS
translator do this.

25. Testing done for one application transaction at a time is called??

26. Stored procedure running in WLM established address space can have-
a. Explicit CAF. B. Implicit CAF C. RRSAF implicit D. RRSAF explicit

27. To restart program operator must authorize the RESTART?

28. RD=NR suppress the AUTO RESTART???
NR No automatic restart, checkpoints allowed. This option
suppresses automatic restarts but permits deferred
checkpoint restarts.

29. By using Single Checkpoint, you can restart latest checkpoint?
Yes
Tips: -Only one checkpoint record exists at any given time and after the first checkpoint record is
written,anysucceeding checkpoint record overlays the previous one.This method saves space on the
checkpoint data set and you can restart your program at the latest checkpoint. If the check point is to be
added during sort operation add a DD statement for SORTCKPT in job control procedure for execution

30. You can embed checkpoint to one of the program dataset??
Ans:- False

31. Which compiler option used to optimize COBOL code?
a. OPTIMIZE

32. ARITH (EXTEND) will improve performance of COBOL??
Ans: -ARITH (EXTEND) decreased the performance
33. USER Defined word contains how many words?
Ans: - 30

34. SEARCH ALL uses which searching technique??
a. Binary Search.

Jyotikiran

1. NUMPROC (PFD) compiler options: generates more efficient code for numeric
comparison.

2. Only one checkpoint record exists at any given time for a single checkpoint method
True or False
Single checkpoint method - Only one checkpoint record exists at any given time and after the first
checkpoint record is written,any succeeding checkpoint record overlays the previous one. This method
saves space on the checkpoint data set and you can restart your program at the latest checkpoint. If the
check point is to be added during sort operation add a DD statement for SORTCKPT in job control
procedure for execution

3. RERUN clauses are unnecessary when: a.) RD= R b.) RD = RNC

4. Avoiding backward branches will improve COBOL program performance.

True or False

5. ADDRSPC on Job statement as well as on Step also, Storage type will be
a.) Virtual Storage
b.) Default storage
Tips: - if nothing is coding on ADRSPC then Virtual storage is the default storage. This question is
refer below with more corrected way.
6. In stored procedure, General with NULLs mean :
Specify the GENERAL WITH NULLS linkage convention when you want to allow the calling
program to supply a null value for any parameter that is passed to the stored procedure. If you
specify GENERAL WITH NULLS, ensure that the stored procedure performs the following tasks:
Declares a variable for each parameter that is passed in the CALL statement.
Declares a null indicator structure that contains an indicator variable for each parameter.
On entry, examines all indicator variables that are associated with input parameters to
determine which parameters contain null values.
On exit, assigns values to all indicator variables that are associated with output variables.
If the output variable returns a null value to the caller, assign the associated indicator
variable a negative number. Otherwise, assign a value of 0 to the indicator variable.
In the CALL statement in the calling application, follow each parameter with its indicator variable.
Use one of the following forms:
host-variable :indicator-variable
host-variable INDICATOR :indicator-variable

7. Parameters to the stored procedures can be defined as
a.) IN
b.) OUT
c.) INOUT
d.) All
8. Sequential pre fetch is generally used for
a.) Table Space scan
b.) Index Space scan
c.) Both a and b
d.) None
9. Index only access is
a.) ACESSTYPE = R INDEXTYPE = Y
b.) ACESSTYPE = I INDEXTYPE = Y
c.) ACESSTYPE = I INDEXTYPE = N
10. REXX Compiler is
11. Instruction that stops execution in REXX
a.) LEAVE
b.) EXIT
c.) NOP
d.) ITERATE
12. Dummy instruction in REXX
a.) ITERATE
b.) LEAVE
c.) NOP
d.) EXIT

13. REXX reserved word

14. Which of the following is used as return code in REXX

Ans :-RC

15. Maximum no. of parameters that can be passed to MAX/MIN for
Ans:-20 (Else can nest calls to MAX/MIN if more arguments are needed).

16. EIB variable containing cursor position
Ans:-EIBCPOSN
17. BMS map entry table
Ans:- PPT


Xyz
UCF 2.2
REXX
1) Instruction to display line : SAY
2) Comment is first line in REXX : TRUE
3) Instruction to get relative line number of a specific label : SIGL (signal)_____
4) REXX sands for Restructured eXtendedeXecutor_____
5) Internal function within a prog can be called using ARG(argument)____
6) LEAVE instruction do what?
Ans:-immediate exit from one or more repitative DO loops
7) NOP instruction do what?Ans:-No operation used after THEN ELSE or OTHERWISE
construct.

JCL + COBOL
1) Access mode for a file when value is placed in record key?
2) JCL parameter that determines whether the
3) What TRUNC (opt) do?
Ans :- creates code that will truncate the receiving fields for arithmetic operations and
improves the performance of Cobol program.

4) What will be the effect of table with different length on progs performance?
Ans:- it will decrease the performance of Cobol program

5) Single check pointing only single check point allowed? T/F
Ans:- TRUE. Always overlay the previous with succeeding.

6) For moving data string handling is slower than char to char move? T/F

7) Multi check pointing method?

Ans:-Append succeeding checkpoint to the previous one.

8) COPY compiler directive: which compiler option to use? ANs:- COPY

9) Which faster comparison operator: (less than or not equals to)
Ans:- less than (need to check).

10) DIVISION used to set check point for program restart?
Ans:- Data division.

11) ARITH(EXTEND) compiler option will improve performance? T/F
Ans:- False

12) How much time loop will run:
Perform 100-para varying x from 1 by 1 until x=10

13) What will happen if we have two JOBs in a single PDS member and if we submit that PDS
via JCL?
Ans:- Both Jobs will be executed.

14) If JCL have 6 DD files and program is using only 4. What will happen?
Ans:-

15) PARM used as override (unqualified) for a PROC.
- It will be applicable to the single PROC
- Applicable to all the PROCs

16) Max. no. of steps in a JCL?
Ans:-255

17) Can we use JOBCAT or STEPCAT DD statements for SMS managed dataset?
Ans:-NO.


Veenali Damodar Gautam

1) Order of predicate evaluation is _____?
1.stage 1 predicate
2. Indexable non matching predicate
3. Indexable matching predicate
4. Stage 2 Predicate.
A.1,2,3,4
B.2,3,1,4
C. 3,2,1,4
D.4,1,2,3
2) If a data is mainly is used for computation using USAGE IS BINARY in declaration
will make
1.true
2.false
3)RENT compiler option will help to improve the performance of a Cobol program
1.true
2.false

4)Which of the following is about Random Access And Alternate Keys?
1.Only the 1st record weitten of a series of records and duplicate keys can be retrived.
2.All the record with duplicate keys will be retrived one by one in any order.
3.All the records with duplicate keyswill be retrieved in the order stored in the file.
4.None of the above.
5)How many bytes will TEST-RECORD occupy in the memory?
01 TEST-RECORD
05 WS-FIRST
10 WS-A PIC 9(4)
10 WS-B PIC X(2)
05 WS-SECOND REDEFINES WS-FIRST.
10 WS-C PIC 9(3)
10 WS-D PIC XX
10 WS-E PIC X
1.6
2.12
3.18
4.NONE

6)Index can be used to reference another table
1.If the table has the same number of table elements.
2. If the table has the same number of table elements and the elements are of the
3. cannot be used for another table
4. If both tables can occupy the same space
7)By putting constant and duplicate subscripts on the left
1. No change in the performance
2. Improve Performance
3. Decline performance
4. None of the above
8)RD=NR Suppress the Automatic restart
1.true
2.false
9)By using single checkpoint method you can restart your program at the latest
checkpoint
1.true
2.false
10)Moving constant to the right side of a computational expression of Cobol will reduce
the performance of the program
1.true
2. false
11) Compiler Directives
1.Act like comments of the COBOL program
2. Direct the compilation of the cobol program
3.They have no significant effect on the source to be compiled
4. None of the above
12) OPTIMIZE (STD)
1. optimize generated code for better performance
2. Result in more efficient runtime code
3. require longer compile time
4. ALL of the above
13) If you need to sort an input file of a program,Which one of the follow will give high
performance
1. sort it inside the program
2. sort it outside before supplying it to the program ( most probable this will be the
right answer)
3. both of them will give equal performance speed
14) Which of the following is true?
1.You can use static as well as dynamic call of the same subprogram when you use a
NODYANAM call
2. You cannot use dynamic calls when you use a NODYNAM option
3. you can use only static call when you are using NODYNAM optin
4. You can never call a subprogram
15) The DCT is used to determine the characteristic of
1.Population density
2. Transient data queue
3. Maximun no of terminal supported by region
4. Domain support
16) What is commarea?
1. A communication area for a terminal
2.An area for an individual program to store all temorory flags
3. An area used to pass information between the program
4. A communication area for processing data between CPUs.
17) Which SENDMAP option is used to clear the screen
1.FREEKB
2. ERASEUP
3. ERASE
4.None of the above
18) RESETBR command is similar to ENDBR followed by STARTBR.
1. true
2.false
19) Which data name store the actual data?
1.DATA1A
2. DATA1L
3. DATA1F
4.DATA1O
20) What is the maximum no of parameters that can be passed to MAX/MIN function
1.10
2.15
3.20
4.25
21) Which system file can contain Either CLISTs and REXX EXECS?
1.SYSPROC (please refer below for futher details)
2.SYSEXEC
3. Both A and B
4. Neither A nor B
Tips:- TSO/E provides a system file, SYSEXEC, that can contain REXX execs only. You can use the
SYSEXEC file to store execs in both TSO/E and non-TSO/E address spaces.
In TSO/E, the SYSPROC system file can contain REXX execs as well as TSO/E CLISTs. If you store a REXX
exec in a PDS that is allocated to SYSPROC, the exec must begin with a comment and the first line of the
comment must include the characters "REXX". This is required in order for the TSO/E EXEC command
processor, during implicit execution, to distinguish REXX execs from CLISTs, which are also stored in data
sets that are allocated to SYSPROC.

22) What is the subparameter of ALLOC used to reuse the DD name previously
1.FREE
2.FREEBEFORE
3. FREEAFTER
4. REUSE
23) Which command should be used to retrieve parameter passed to an internal routine
1.PARM
2.PARAM
3.ARG
4.PARSE
24) Which immediate command can be used to halt the interpretation of all the currently
running EXECs?
1.HE
2.HI
3.HT
4.Any of the above ( but it is advisable to use HIeverytime)
25) Which command is used to write a line to the output streme?
1.DISPLAY
2.SAY
3.WRITE
4.PRINT
26) In REXX special value-3 indicates
1.specified command was not found
2.specified function was not found
3.specified value was not found
4.none of the above
27) What is used to force terminate a program?
1.EXIT
2.RETURN CODE
3.STOP
4.None of the above
28) Which variable is populated by DSINFO to indicate the logical record lengthof a
database
1.LRECL ( most probable this is the answer)
2.ZDSLREC
3.ZDSLRECL
4.ZLREC
29) What will be the value of K after execution
K=10 , I=7 , J=3
K=I/J
1.10
2.1
3.2
4.2.3333333
30) Which of the following option will help release locks more quickly and contribute to
maximum
1.lock size of one page
2.Cursor stability
3.Repeatable read
4.Both A and B

31) In the stored procedure runs in WLM established address space you should use
1. DSNALI
2. DSNRLI
3. Both A and B
4.None of the above
32)Which of the following is correct
1.Stored procedure can be coded as reentrant and reusable program
2.Stored procedure can be coded as reusable pgm but not reentrant
3.stored procedure cannot be coded as reentrant
4.Stored procedure can be coded as reentrant and but not as re-usable
33) Which of the following is correct?
1.Stored procedure can have SQL and Host language statement
2.Stored procedure can have SQL statement only
3.Stored Procedure can have Host Language statements only
4.none of the above.
34)When language environment need to be refreshed for stored procedure
1.Load module is purged from the address space and reloaded when invoked again
2.Load module is overwritten
3.Load module is left undisturbed
4.None of the above
35)A batch program adds new employees to arious table in the corporate personal
database which of the following recovery after which any update can be commited?
1.Adding all new employee to all tables
2.Adding a single new employee to all relevant tables
3.Adding a single new employee to tables
4.Adding a single new employee to any one of the tables
36) Creating SQL procedure involves defining SQL procedure to DB2
1.true
2.false
37)Materialized query tables are ______
1)USER Created and SYSTEM Maintained tables
2)SYSTEM created and Maintained tables
3) USER created and SYSTEM/USER Maintained tables
4) All of the above
38) What is the best reason for providing extra WHERE clause condition when you
are JCL
1. Better documentation
2. The more qualified your condition , the safer it is
3.To enable DB2 to decide on the best way to access the data
4.All of the above
39)If coded ADDRSPC on job statement as well on the step , the storage type of the
step
1. the storage type coded on step
2. the storage type on the JOB statement
3.Default storage type
4.Virtual storage type
Tips:- The JOB statement ADDRSPC parameter applies to all steps of the job and overrides any EXEC
statement ADDRSPC parameters.
Code EXEC statement ADDRSPC parameters when each job step requires different types of storage. The
system uses an EXEC statement ADDRSPC parameter only when no ADDRSPC parameter is on the JOB
statement and only during the job step

40) If there is qualified name DD name override and qualified dd name override for a
particular PROC.
1.the Unqualified DD name will be applied on the same procstep where the qualified dd
name is applied
2.The unqualified DD name will applied to first step of the PROC
3.The unqualified DD name will be applied to last step of the PROC
4. Will get JCl error as there is no qualifier for the second override
41) The subprogram will be in the initial step each time it is called if
1. the initial attribute is specified
2.A program is dynamically called and cancelled
3. either 1) or 2) is done
4. Neither 1) nor 2)
42) structured programming techniques n be used to improve optimization
1 true
2 false







1.Which is a function of System Services?

Program control such as load and release of programs

Storage control such as acquiring and freeing of storage

Task control such as task scheduling based on task priority

All of the above



2.There are transactions that can be initiated during CICS startup

TRUE

FALSE

http://publib.boulder.ibm.com/infocenter/cicsts/v3r1/index.jsp?topic=%2Fcom.ibm.cics.ts31.doc%2Fdfha2
%2Fdfha24z.htm


3.Which data names store the actual data?

DATA1A (The attribute field (suffix A) contains a value that records a screen field's
standard attributes. If you set this field to a new value in your COBOL code, the
attributes you specify override the attributes defined in the physical map when the field is
sent to the screen)

DATA1L (The first data name, with the suffix L, is for a field that contains the length of
the data sent to the program. The value of this field is the actual number of characters
sent)

DATA1F (the flag field (suffix F) contains a flag byte that indicates whether the user
modified
the field without entering data into it)

DATA1O (Two data names are generated in the symbolic map for the actual data
field: one for the input that's sent from
the terminal to the program, and one for the output that's sent from the program to
the terminal.)


4.Using the mapset name or map name depends on which of the following?

The number of maps defined in a mapset

The number of mapsets defined in a program

The number of fields defined in a map

All of the above



5.The option used in CICS command to retrieve response code after command execution
is

REQID

RTERMID

RESP

RTRANID


6. Which of the following statement is true while selecting access path?
1. Predicates in the Having clause is not used
2. Predicates in the Where clause alone is used
3. Predicates in the On Clause alone is used


a) 1 and 2

b) 1 and 3

c) 2 and 3

all of the above

Tip:- Predicates in a HAVING clause are not used when selecting access paths hence, the term 'predicate
means a predicate after WHERE or ON.


7. Index only access is __________.

ACCESSTYPE =R AND INDEXONLY = Y

ACCESSTYPE =1 AND INDEXONLY = N

ACCESSTYPE=1 AND INDEXONLY = Y

ACCESSTYPE=R AND INDEXONLY = N

Tips: Index only access is When required data can be taken from index pages and no need to access data
page Much efficient
ACCESSTYPE = I AND INDEXONLY = Y


8. Merge Scan Join is more efficient when __________.

filtering for both the tables (outer and inner) are high

highly clustered index is available on join columns of the inner table

the tables (inner and outer) are large and does not provide much filtering

all of the above

tips:- Merge scan is used when : Qualifying rows of inner and outer tables are large and join predicates
also does not provide much filtering Tables are large and have no indexes with matching columns

9. Which of the following options will help release locks more quickly and contribute to
maximum concurrency?

Lock size of one page

Cursor stability

Repeatable read

both a and b


10. The rule for DECIMAL columns stated you should always use odd precision. A
column needs to handle a value up to 9999.99. How would you define it?


DECIMAL (4,2)

DECIMAL (5,2)

DECIMAL (6,2)

DECIMAL (7,2)


11.What is the purpose of the SQL Communications Area?

It provides SQL with an area to put error codes.

It provides an area for passing parameters back and forth between your program and
SQL.

It provides an area for DB2 to pick up the SQL statements in your program.

It provides an area for passing input between your terminal and SQL


12.In Db2, plans are stored in

SYSIBM.SYSPLAN

SYSIBM.PLANTABLE

SYSIBM.PLAN

SYSIBM.COPY


13.SQLCA is used as a

Communication area between DB2 and application program

Communication area between the system and DB2 DBRM

Change area / Stack area to store the intermediate data from DB2

TO store data from retrieved DB2 rows of a table



14. During precompilation process,DB2 does the following

Checks for DB2 syntax

Produces the dataset containing SQL statements

Produces modified source code with EXEC SQL replaced by CALLS to DB2 processor.

All of the above


15. Which of the following SQL data types should be used to store double byte character
data?

CLOB

CHAR

VARCHAR

GRAPHIC

http://dcx.sybase.com/1101/en/mlserver_en11/ml-datatypes-s-3777582.html

http://www.okstate.edu/sas/v8/sashtml/accdb/ztatypes.htm

according to above site most correct answer is GRAPHIC


16. If a fetch encounters an update or delete hole, what is the SQLCODE returned to the
program?

+100

222

+212

+112
http://www.toadworld.com/platforms/ibmdb2/w/wiki/6609.scrollable-
cursors.aspx


17. The DCT is used to determine the characteristics of

Population density

Transient data queue

Maximum number of terminals supported by the region

Domain support

http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=%2Fcom.ibm.zos.r12.ceea500%2Fcee
a51b029.htm


18. The DCT is used to determine the characteristics of

Population density

Transient data queue

Maximum number of terminals supported by the region

Domain support


19. In which table would you make an entry for a BMS map?

PCT

PPT

FCT

All of the above

http://publib.boulder.ibm.com/infocenter/iseries/v5r4/index.jsp?topic=%2Fcl%2Faddcicsppt.htm


20.What output(s) is(are) created as a result of generation of a map

Physical map

Symbolic Map

Physical & Symbolic Map

Map Copybook and Load module

http://www.mainframetutorials.com/cics.html

21.What is the CICS command that gives the length of TWA area?

LENGTH

SIZE

ASSIGN

VALUE

http://www.mainframestechhelp.com/iq/cics/page21.htm


22.CICS command are replaced with MOVE and CALL statements to execute interface
program by

Translator

Compiler

Pre-compiler

None of the above
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/c415454109.htm


23. What is the maximum length of the COMMAREA that can be passed?

8,192 bytes

16,384 bytes

65,536 bytes

None of the above

http://publib.boulder.ibm.com/infocenter/wmbhelp/v8r0m0/index.jsp?topic=%2Fcom.ibm.etools.mft.doc%
2Fbc16120_.htm


24. What is the primary function of the Processing Program Table (PPT)?

To register programs only

To register all programs and maps

To register maps only

None of the above

http://publib.boulder.ibm.com/infocenter/iseries/v5r4/index.jsp?topic=%2Fcl%2Faddcicsppt.html


25. Which command is used to transfer the mapped data output to a terminal

SEND MAP

RECEIVE MAP

Both

None


26. Can a BMS Map be made case sensitive?

Yes, use ASIS option

Cannot be done, needs to be handled programatically

Yes, use TIOAPFX option

Yes, use DATA option

http://www.mainframetutorials.com/cics.html



27. Which of the following statement is true about out-of-sync condition during the audit
process in a SCM tool?

copybooks being modified after compiling the source component that calls them

load module being modified after the composite load component that calls them has been

a package containing a load component that does not match its source component

All of the above



28 .Copybooks and Procs should be promoted before Programs and JCL.

TRUE

FALSE


29. SQL needs COBOL/PL1's help to do ONE of the tasks listed below. From what you
know of SQL, which task do you think is best done by embedding SQL in a COBOL/PL1
program?

Create a table

Produce a one-time listing of all rows from one or more tables

Update a table based on values contained in a transaction file

Grant another user authority to access a table you created


30.When language environment need to be refreshed for stored procedures?

Load module is purged from the address space and reloaded when invoked again

Load module is over written

Load module is left undisturbed

none of the above

tips:- Refreshing the stored procedures environment
Depending on what has changed in a stored procedures environment, you might need to perform one or
more of these tasks:
Refresh Language Environment.
Do this when someone has modified a load module for a stored procedure, and that load module is cached
in a stored procedures address space. When you refresh Language Environment, the cached load module is
purged. On the next invocation of the stored procedure, the new load module is loaded


31. Creating SQL procedure involves ___________.

Writing Source SQL statement

Creating SQL form of stored procedure

Defining SQL procedure to DB2

all of the above

tips:- Creating an SQL procedure involves writing the source statements for the SQL procedure,
creating the executable form of the SQL procedure, and defining the SQL procedure to DB2.


32. If you have 2 job submitted with same job name with same priority

The second one will be executed only after the first is completed

The second JOB will fail as the job with same name is currently executing

Both Job will go on "waiting for execution" state and you need to cancel one job to get
other executed

The first Job will go on hold and the second will start execution


33. What will be the result, if KEEP is specified for normal disposition of a temporary
dataset

Job step will abend

System will change KEEP to PASS

System will change KEEP to DELETE

System will change KEEP to CATLG

http://publib.boulder.ibm.com/infocenter/zos/v1r11/index.jsp?topic=/com.ibm.zos.r11.ieab500/iea2b55012
9.htm


34. JCL Guidelines require all SYSIN cards placed in?

LIBRARIES

CONTROL CARD

PROC STATEMENT

INSTREAM

https://sites.google.com/site/indusitfactory/jcl-interview-questions


35. As a standard, model DCB should not be defined for GDG creation.

TRUE

False


36. For better optimization in speed and storage, which statement is true?

Use Binary field for computation

Use Packed Decimal for Computation

Use Packed Decimal for Counters

None of the Above

in general comp ( binary) for counters, packed decimals ( comp 3 ) for computation for speed and storage
optimization


37.How can you enhance processing of large files?

Split and concatenate the large files into multiple smaller files

Execute multiple steps with smaller files of the main large file

Increase the number of buffers to the allocated file

None of the Above

38.State which of the statement is true?

For random insertion use more CA FREESPACE

For non-random insertion use more CI FREESPACE

Both A & B

None of the Above

Tips:- For random insertion use more CI freespace. For non random insertion use more CA freespace


39. Usually the PDS bears the ID of the creator or the ID of the person who modified it
recently. Is it possible to change these ID values without leaving trace of one's own ID?

It is not possible to change the creator ID.

Yes it's possible! In the command area type 'G' against the member name, Dialog
box will pop up allowing you to change the ID values.

Yes it's possible! In the command area type 'CHG' against the member name, Dialog box
will pop up allowing you to change the ID values.

Yes it's possible! In the command area type 'MOD' against the member name, Dialog box
will pop up allowing you to change the ID values.



40. If you are editing an existing dataset and if you want to see the changes only that you
made it since last SAVE.

COMP SESSION

COMP CHANGES

COMP LINES

COMP ADDITIONS



41. What is the ISPF command used to BROWSE a dataset 'WIPRO01.SEQ.DSET'
without going to ISPF 3.4 Option?[From the ISPF primary menu]

EPDF'WIPRO01.SEQ.DSET' VIEW

EPDF'WIPRO01.SEQ.DSET'

EPDF'WIPRO01.SEQ.DSET' BROWSE

none of the above

If you are using DFSORT and you need to add checkpoint, which is the JCL dd name
you need to specify for the checkpoint records?

SORTWRK
SORTCKPT
SORTIN
SORTOUT

To have a differed restart, the RD parm of JCL should be
RD=R
RD=RNC
RD=NR
None of the above

Tips:- For defered restart code RD parameter to NR
RD=R indicates restart is to occur at the latest check point
RD=RNC indicates that no check point is to be written and any restart is to occur at begging of the job step
and in this case rerun clause is unnecessary
If you ommit RD parameter the CHKPT macro instruction remains active and check points can be taken
during processing.
RD coded on job stmt overrides any RD parameters on the EXEC statement

Which of the below aspects need to be assessed before tuning a program?

Algorithms of the program
Data structures
Source code
All of the above

For a most efficient PACKED-DECIMAL data item, which of the below needs to be
ensured?

Sign clause in PIC
Less than 16 digits for the data item
Odd number digits
All of the above



By putting constant and duplicate index on the left

performance will decline
No change in the performance
performance will improve
None of the above


OPTIMIZE(STD) Compiler option will help improving the performance of a Cobol
program

TRUE
FALSE


Consider the following code :

WORKING-STORAGE SECTION.

77 WS-X PIC 9(02).

77 WS-Y PIC 9(02).

PROCEDURE DIVISION.

PERFORM PARA-A VARYING WS-X FROM 1 BY 1 UNTIL WS-X > 4

AFTER WS-Y FROM 1 BY 1 UNTIL WS-Y > 10.

10
5
11
6


Consider the following Copybook definition of PAYLIB,

01 TAG.

02 TAG-WEEK PIC S99.

02 TAG-GROSS-PAY PIC S9(5)V99.

02 TAG-HOURS PIC S999 OCCURS 1 TO 52

TIMES DEPENDING ON TAG-WEEK OF TAG.

If the COPY state



Copied Text would be 01 PAYROLL. 02 PAYROLL-WEEK PIC S99. 02
PAYROLL-GROSS-PAY PIC S9(5)V99. 02 PAYROLL-HOURS PIC S999
OCCURS 1 TO 52 TIMES DEPENDING ON PAYROLL-WEEK OF PAYROLL.
Copied Text would be 01 PAYROLL. 02 WEEK PIC S99. 02 GROSS-PAY PIC
S9(5)V99. 02 HOURS PIC S999 OCCURS 1 TO 52 TIMES DEPENDING ON WEEK
OF PAYROLL.
Copied Text would be 01 PAYROLL. 02 PAYROLL-WEEK PIC S99. 02 GROSS-PAY
PIC S9(5)V99. 02 HOURS PIC S999 OCCURS 1 TO 52 TIMES DEPENDING ON
WEEK OF PAYROLL.
It will result in a compile error and copybook would not be expanded.



Consider the following code.

WORKING-STORAGE SECTION.
01 A PIC S99V99 VALUE +50.34.
01 B PIC S99V99 VALUE +50.23.
01 C PIC S99V9 VALUE +12.3.

PROCEDURE DIVISION.

ADD A B GIVING C.
ADD C TO A.
ADD A B GIVING C ON SIZE ERROR
DISPLAY 'SIZE ERROR FOR C'.
DISPLAY 'C: ' C.
STOP RUN.

What will be the value of C?

+00.5
+01.0
10.1
None of the above


MAP compiler option is used to

Generate the physical map for the COBOL program
Generate a map of the COBOL verbs used
Produce a listing of the items defined in the data division.
None of the above



MAP compiler option is used to

Generate the physical map for the COBOL program
Generate a map of the COBOL verbs used
Produce a listing of the items defined in the data division.
None of the above


In a linear Search, if there is no matching value for the search argument what happens to
the program execution?


The code following the SEARCH statement is executed
The code after the AT END statement is executed
Abend occurs
a) or b)



To check the success of SORT

SORT-RETURN special register can be used
RETURN-CODE of COBOL program should be checked
OUTPUT-PROCEDURE should be used
RETURN statement should be used

TIPS:- 0 -successful completion 16 - unsuccessful completion

The Catalog entry of non-VSAM data set contains

Dataset name only
Dataset name, devise type and volume name
Only devise type and volume name
Dataset name and record length only,


For a SMS managed New datasets , KEEP implies CATLG

True
False


PASS disposition(DISP) parameter is coded only for



Normal disposition
Abnormal disposition
Status disposition
None of the above



The value of symbolic parm RO is AB.X1. It can be written as shown below

//PRSTP EXEC PROCA,RO='AB.

// X1'

TRUE
False



If there is a qualified dd name override and unqualified dd name override for a particular
PROC


The unqualified DDname will be applied on the same procstep where the qualified dd
name is applied
The unqualified DDname will be applied to first step of the PROC
The unqualified DDname will be applied to last step of the PROC
Will get JCL error as there is no qualifier for the second override


What is the order from Best to Least efficiency?

1. Sequential Access 2. Dynamic Access 3. Random Access
1. Random Access 2. Sequential Access 3. Dynamic Access
1. Dynamic Access 2. Random Access 3. Sequential Access
1. Random Access 2. Dynamic Access 3. Sequential Access

For efficient coding, what options are true?

In IF statement, conditions within combined conditions are evaluated in the order
they occur
Should use internal sort within a program for better performance
None of the above
Both A & B



What statements are true for Sort step?

Allow three times the file size for sort work space allocations
Use minimum three sort work DD's
Always code sorted data sets to be cataloged
All of the above

What buffer sizes are not available in the LSR pool at CNS?

4K
6K
8K
10K


For better speed and improved storage, Binary fields are used for computation

TRUE
False


How do you use the same command entered in the COMMAND LINE multiple times
without it being disappeared after the successful execution of its intended function or re-
typing it or using some PF key to retrieve the last command entered?

Precede commands with '#
Precede commands with '@
Precede commands with '&
Precede commands with '%


If you are in ISPF editor(editing a program) , you want to apply all your editor commands
only in a particular column range. How you can mark the boundary?

Use column command COLS
Use column command BNDS
Use column command MASK
Use column command TAB

TSO Command to display all active datasets
LIST
LISTALC
LISTCAT
LISTDS



Assume that you are working on a program and moved it to staging. Someone else is
bringing down that program to DEV. Your program will not be there in staging.

TRUE
FALSE


What is the correct procedure to do it?

Move the program directly
Create a package that will have the program to be moved
Both a) and b)
None of the above


You are trying to modify an existing production program thru SCM tools. In which order
you will be processing ?

Check Out->Build->Promote
Build->Promote->Checkout
Build->Checkout->Promote
Build->Promote


CHANGEMAN is mainly for____________.

To compile the program
To checkout the components
Version control of components
None of the above


Which of the following element cannot be staged in to CHANGEMAN?

PROGRAM
JCL
COPY BOOK
None of the above


Which of the following statement is correct?



WLM can start a stored procedure
WLM can stop a stored procedure
Both a and b
none of the above


Which of the following statement cannot have in Stored procedure?

COMMIT
SET CURRENT SQL ID
COMMIT and SET CURRENT SQL ID
none of the above


Db2 Performs _______________

Correlated sub query first and then non correlated sub query
Non Correlated Sub query first and then Correlated sub query
Only correlated sub query
Only non correlated sub query


Non Column expressions _________________.

Takes less time for the query to execute
Takes long time for the query to execute
Non Column expressions cannot be evaluated
More processor intensive


Order of predicate evaluation is ___________.

1. Stage 1 predicate

2. Indexable non matching predicate

3. Indexable matching predicate

4. Stage 2 predicate

a) 1, 2, 3, 4
b) 2, 3, 1, 4
c) 3, 2, 1, 4
d) 4, 1, 2, 3



Sequential pre fetch is generally used _____________.

For table space Scan
For Index Space Scan
Both a and b
none of the above


What is the most convenient way to get a DECLARE TABLE statement into your
program?

INCLUDE a member created by DCLGEN
Simply code it yourself
Use a text editor to copy an existing DECLARE TABLE statement into your program.
none of the above


Precompiler is a ___________.

Processor
Preprocessor
compiler
Interpreter

How do you retrieve the first 5 characters of FIRSTNAME column of EMP table?

SELECT (FIRSTNAME,1,5) FROM EMP;
SELECT (FIRSTNAME,5,1) FROM EMP;
SELECT SUBSTR (FIRSTNAME,5,1) FROM EMP;
SELECT SUBSTR (FIRSTNAME,1,5) FROM EMP;


Given the transaction:

"CREATE TABLE t1 (id INTEGER,CONSTRAINT chkid CHECK (id<100))"

"INSERT INTO t1 VALUES (100)"

"COMMIT"

Which of the following results from the transaction?

The row is inserted with a NULL value
The row is inserted with a value of 100
The row insertion with a value of 100 is rejected
The trigger called chkid is fired to validate the data

Which SQL command successfully removes uncommitted changes from a DB2 database?


ROLLBACK
DELETE
DROP
DECOMMIT

Which SQL command successfully removes uncommitted changes from a DB2 database?

ROLLBACK
DELETE
DROP
DECOMMIT


How many times should you assemble a mapset?

2
1
0
3


EIB doesn't contain this info.

Trans id
Terminal Id
User Id
None

The attribute which causes data field not to be entered or cleared

Unprotected
Normal
Initial Value
Autoskip

CICS maintains information for DB2 access in

DCT
FCT
RCT
PCT



XCTL command causes an implicit SYNCPOINT to be issued

True
FALSE



Once a HANDLE CONDITION command is issued for a specific condition, how long
does it remain in effect?

Until another HANDLE CONDITION executes for the same condition
Until an IGNORE CONDITION command executes for the same condition
Until the program terminates
All of the above


Which of the following CICS Tables utilizes trans IDs?

TCT
PCT
RCT
PPT


REWRITE command automatically unlocks record after execution

TRUE
FALSE


Which of the following is not a valid Cursor positioning technique in CICS

Static Cursor Positioning
Symbolic Positioning
Standard Positioning
Relative Positioning


Single checkpoint method

Append succeeding checkpoints to the previous one
Overlays previous checkpoints with succeeding checkpoints

Restart of an interrupted Cobol program can be done


Automatically at the time an interruption stopped the program
At a later time as a deferred restart
Both of the above
None of the above

Tips:- We can restart the routine in two ways
-> Automatically at the time an interruption stopped the program
->At a later time as a deferred restart

Which of the below is true?

contained program is found within the containing program
A contained program can also be a containing program
A contained program cannot also be a containing program
Both A and B


OPTIMIZE(STD)

optimize generated code for better performance
results in more efficient runtime code
Require Longer compile time
All of the above

Which one of the below comparison operator is faster than the other ?
Equal to
Not Equal to
Both of them will give equal performance speed


Usage of SYNCRONISED clause will help improving performance

TRUE
FALSE

Which is the COBTEST command to terminate the Debug session?
GO
SET
QUIT
OFF




OPTIMIZE(STD)

optimize generated code for better performance
results in more efficient runtime code
Require Longer compile time
All of the above

COBTEST can be used in

Batch mode
In-line mode
Full screen mode
All of the above



When the COBTEST tool run in batch mode

You can run the program step by step
You can't interact with the batch job
You can change the command sequence
you can check the values of a variable



HELP commands are used

Only in interactive mode
Only in batch mode
in both the modes


Consider the following COBOL statements.

PROCEDURE DIVISION.

MOVE 10 TO N

PERFORM PARA-X N TIMES

STOP RUN.

PARA-X

MOVE 5 TO N

How many times PARA-X will be executed?



10
5
infinite time
Execution error



Consider the following code :

WORKING-STORAGE SECTION.

77 WS-X PIC 9(02).

77 WS-Y PIC 9(02).

PROCEDURE DIVISION.

PERFORM PARA-A VARYING WS-X FROM 1 BY 1 UNTIL WS-X > 4

AFTER WS-Y FROM 1 BY 1 UNTIL WS-Y > 10.

S



10
5
11
6


Keyword parameters is always followed by =

TRUE
FALSE


Which of the following is true about Random Access and Alternate Keys?



Only the first record written of a series of records with duplicate keys can be retrieved
All the records with duplicate keys will be retrieved one by one in any order
All the records with duplicate keys will be retrieved in the order stored in the file
None of the above



If you omit the normal-termination parameter of DISP for an existing dataset, what will
be the default value?

OLD
DELETE
KEEP
CATLG

Which one of the following is true for a qualified override of KEYWORD parameters
stepname.KEYWORD=
KEYWORD.stepname=
KEYWORD=
Both of the above

Block Contains 0 results into?

Significantly improve file processing time with respect to CPU time
Significantly improve file processing time with respect to elapsed time
None of the above
Both A & B

Using RLSE parameter with dataset allocation would result into:

Maximum space allocation to dataset
Better utilization of space by allocating more number of cylinders
Frees used space
Frees unused space

To avoid exclusive control of the dataset, what should be coded?

NEW
OLD
SHR
None of the Above

State which of the statement is true?

LISTCAT analyzes file
REORG your files frequently
Both A & B
None of the Above


State which of the statement is true?

Binary search is used if the parameter of search operations are less
Binary search is used if the parameter of search operations are more
Linear search is fast, if the parameter of search operations are more
None of the Above


How do you compare data set lines between 50 and 80 lines in 3.13 option?

CMPLINE TOP 50 BTM 80
LINECMP TOP 50 BTM 80
CMPLINE TOP 50 BOTTOM 80
LINECMP TOP 50 BOTTOM 80

What command is used to move SPOOL data into a dataset?
XDC
XD
SE
SJ


Which of these cannot be done with SCLM?

Change ownership of modules
Creates Archdefs, Lecdefs, and Binds for new members
Search for copybooks in programs
Search for subroutines in programs


You are trying to modify an existing production program thru SCM tools. In which order
you will be processing ?

Check Out->Build->Promote
Build->Promote->Checkout
Build->Checkout->Promote
Build->Promote


In CHANGEMAN, the "parent" package for two or more change packages that have
interdependent changes to software and/or operational procedures is called__________.

Complex
Super
Multiple
Participating


Which of the following statement is correct?

Stored Procedure can have SQL and Host Language statements.
Stored Procedure can have SQL statements only.
Stored Procedure can have Host Language statements only.
none of the above



Which of the following statement cannot have in Stored procedure?

COMMIT
SET CURRENT SQL ID
COMMIT and SET CURRENT SQL ID
none of the above


Which of the following statement is correct?

Stored procedure cannot access tables at other DB2 locations
Stored procedure can access tables at other Db2 locations using Connect Statement alone
Stored procedure can access tables at other DB2 locations using 3 part object names
alone
Stored procedure can access tables at other DB2 locations using Connect statement or 3
part object names or private protocols



In the Stored Procedure Connect statement uses ______________.

DRDA access to access tables
Value specified in DBPROTOCOL when stored procedure Package is bound.
Value in Database Protocol on installation Panel
none of the above


Which of the following is not true as far as external procedure is concerned?

Store procedure Definition Specifies the name of the stored procedure program.
Define the stored procedure to DB2 by preprocessing a CREATE PROCEDURE
statement, then executing the CREATE PROCEDURE statement statically or
dynamically
Define stored procedure to DB2 by executing the CREATE PROCEDURE statement.
none of the above


Creating SQL procedure involves defining SQL procedure to DB2

TRUE
FALSE

Which of the following statement is true?

Handlers can be used in SQL procedures
There is no such concept of handlers in SQL procedures
Handlers can be declared but they cannot be tailored to specific SQL STATE
Usage of handlers will decrease the performance

Which of the following should be taken into consideration while coding an SQL?

1. Use of ORDER BY GROUP BY Clause

2. Fetching un used rows and columns

3. Minimizing Lock duration

4. Redundant Predicates

a) 2 & 3 alone
b) 1 & 4 alone
c) 2, 3, & 4 alone
d) all of the above


Aggregate functions performs best ____________.

1. When evaluated after data has been accessed

2. When evaluated during data access

3. When evaluated during DB2 sort

Order of performance (Best first) should be

a) 1, 2, 3
2, 3, 1
1, 3, 2
3, 2, 1
Tips:- If a query involves aggregate functions, make sure that they are coded as simply as possible;
this increases the chances that they will be evaluated when the data is retrieved,
rather than afterward. In general, a aggregate function performs best when evaluated during data access
and next best when evaluated during DB2 sort. Least preferable is to have a aggregate function evaluated
after the data has been retrieved.



How many JOIN conditions are needed in JOIN query to avoid a cartesian product?
No of tables + 1
No of columns 1
No of columns + 1
No of tables - 1


Which of the following SQL source code are stored in system catalog?
Views
Tables
Triggers
Constraints


What determines when checkpoints are taken for DB2 subsystem restart.

ARCHIVE LOG FREQ
LOGLOAD
UPDATE RATE
CHECKPOINT FREQ


What does HOLE occur in the result table?

Deleting or updating rows after a static cursor is open can result in holes in the
result table.
Deleting or updating rows after a dynamic cursor is open can result in holes in the result
table.
Deleting rows after a dynamic cursor is open can result in holes in the result table.
All of the above

Tip:- Deleting or updating rows after a static cursor is open can result in holes in the result table.
Please refer this link :-
http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.apsg%2
Fsrc%2Ftpc%2Fdb2z_holesresulttable.htm




2.1



*Note:-Green highlighted is accurate & Red marked is ambiguous .




1. Copy xyz replacing ==xyz== by ==abc== what will be replaced?
2. 01 :TAG:.
3. 02 :TAG:-WEEK PIC S99.
4. 02 :TAG:-GROSS-PAY PIC S9(5)V99.
5. 02 :TAG:-HOURS PIC S999 OCCURS 1 TO 52 TIMES
6. DEPENDING ON :TAG:-WEEK OF :TAG:.
COPY PAYLIB REPLACING ==:TAG:== BY ==Payroll==.
01 PAYROLL.
02 PAYROLL-WEEK PIC S99.
02 PAYROLL-GROSS-PAY PIC S9(5)V99.
02 PAYROLL-HOURS PIC S999 OCCURS 1 TO 52 TIMES
DEPENDING ON PAYROLL-WEEK OF PAYROLL.

2 ENQUIENG does what?- Enqueues are sophisticated locks for managing access to
shared resources.

3. Use of EJECT Ans- To print the dataset from new page by keeping the point to the
top of the new page.
a)To take source code to top of next page. B) to print report on top of next page.

4. Data defined as X(2) can be redefined as 9(2) .---------------------True
5. Command to return from called program-----------------------Ans- Exit program.
6. Quiestion on FCT in Db2
7. Declaring a scrollable cursor with the INSENSITIVE keyword has the following effects:
The size, the order of the rows, and the values for each row of the result table do not change
after the application opens the cursor.
The result table is read-only. Therefore, you cannot declare the cursor with the FOR UPDATE
clause, and you cannot use the cursor for positioned update or delete operations.
8. Maximum possible dimension of array in Cobol --------------7
9. Maximum number of table in DB2- ----------------------15
10. What should be the sorting order for Search all-------------------Ascending/Descending
both valid.
11. While sorting Do we have to OPEN the work file explicitly?------------ Ans:-No
12.Do we require END Perform ? Ans:-Yes
13.What will be size for PIC x(8) COMP.? Ans:-4 byte
14. Default AMODE for enterprise server---------------------AMODE(31).
15. We can apply lock on a)page b)Table c) Tablespace.d) All ------------ ans-d
16.Programm internally used variables are defined in-------------------ans- working storage
section
17. pointer PIC 999V99 value 00050.
Alpha PIC $$$$.99
Move pointer to alpha
18. Question on RESP. Ans:- after execution of CICS we get a RESP code.
19.What is used to go back in main menu?
a)Link b)XCTL c)LOAD d)Return
20.PUSHPOP -----------------ALL the conditions are ignored.
21. When deadlock occurs on a data? Ans:- Both user using DB2 undergo wait state.
22.For write operation files should be open in
a)INPUT b)EXTEND c) Output d) both b& c
23. If there ara JOBLIB & STEPLIB both then?\
Ans---Steplib will be used for that particular step only.
24. Which of the following is valid massage class
a) msgclass(1,3) b) msgclass(0,2) c) msgclass(0,1) d) all
25.Cobol program can exexute for.248days
26CICS-customer information control system.
27. how to remove program from que.
a)Halt b)Stop c)Stop run d)?????/
28. What is secure way for access--------------------------encrypted authorization
29. The physical storage of timestamp is = 10------------ (in Bytes)
30. Occurs subscript can have maximum value of = ----Array size--------------
31. A table has two indexes, A SEARCH verb will work on -------------
32. What is true about declaration of table
33. Use of 77 clause :
34. Phenomenon of Static call
35. Function to convert upper case to lower case.Ans:-LC
36. Meaning of Source compilation.
37. Meaning of list compilation.
38. Sign-In command in CICS. ANs:- CESN/CSSN
39. Which utility program is used by SORT. Ans:-DFSORT
40. Can we initialize Redefined clause
41. What is the function to limit & work on the columns in a program.
42. Difference between Union & Union All. Ans:- Union will eliminates the duplicate values
43. A step with COND=(4,LT) will be executed when----------------
44. Which mechanism is used to lock DB2.
45. Command for reestablish the browse operation A
46. Do CICS support BDAM files. Ans :-YES
47. STARTBR is used for browing of Queue
48. Grant provides which type of authority -----------------
(a. SYSADM b. SYSCTRL c. DBADM d. DBATRL)
49. A question on Inner & outer join
50. What is filter factor?
Ans:- One divide by the number of distinct values of column.
51. What is msg routing?
Ans:- The message routing facilities of BMS allow you to send messages to
terminals other than the principal facility of your task
52. program which are reusable to each other and can be restarted by the task?
Ans:- Quasi Re-entrant.
53. Which statement is used to specify the JCL DD name in cobol?
Ans:- Select
54. To split a string in different variable
Ans:- Unstring.
55. GETMAIN is used to?
Ans:- To aquired the resource freed by FREEMAIN in CICS.









Ques from Bangalore very Imp UCF2.1
*Note: - Red highlighted are ambiguity answers.
TSO TSPF 2.1
1. Compare line 50 and 80 in 3.13 option ans:- CMPLINE TOP 50 BTM 80
2. What is the use of Primary command F p when ps dataset opened in EDIT
mode? Ans:- This pic string is to find non display charecter
3. How do you use same command in command line multiple times without being
disappeared after successful execution of its intended function or retyping it using
PF key to retrieve previous com with the last command enterd
A. #
B. @
C. &
D. %
DB2 2.1
0.Relationship b/w DB2 instances and Database? Ans : The relationship between a
DB2 instance and a DB2 database is that one instance can have many databases,
but one database can only reside in one particular instance.
1. How many cluster indexes are allowed for 1 table? Ans : Only one.
2. How to delete all rows from a table? Ans : DELETE * FROM table_name
3. How many indexes can be stored in index space? Ans : Only one.
4. DBRM ? Ans : database request module
5. Column correlation in a table means? Ans : the values in column A do not vary
independently of the values in column B.
6. In what scenario Indexes would be more useful?
A. Indexed col declared as not null
B. Indexed col used in from clause
C. Indexed col contains a wide range of variables
D. All of the above
7. Are views updateable? Ans :-Yes but with certain condition.
8. Sql Command to retrieve first 5 char of FIRSTNAME column of employee table?
Ans : Scalar function char Name(1,5)
9. What is sql command which removes uncommitted change from DB2 table? Ans
:- Rollback
CICS 2.1 & SSCM 2.1
1. Minimum requirement to execute CICS application program? Ans : Transaction
2. How many DFHMSD macros loaded to define a mapset? Ans :-Only 2
3. Type of map when coded TYPE=MAP? Ans:- Physical map
4. TO determine how a program was started the transaction id can be obtained
from?
A. EIBFN
B. EIBRESP
C. EIBTRNID
D. EIBTRMID
5. CICS command typically used to invoke a program from menu pgm is? Ans:-
Load
6. True about mapset?
A. Collection of a map which are link edited separately is mapset
B. Collection of field grouped together in a map is called mapset
7. Pgms usecount? Ans:- To count how many times the program is used in
CICS region
8. Can BMS map be made case sensitive? Ans:- Yes, Use ASIS
9. Ensure two or more task does not use same TSQ? Ans:- Transaction Isolation
10. Create special user with all RACF access and use only these ids
A. TO cntrl RACF function
B. To remove all the inactive user id once they are not in use
C. Each command is used for better performance of searching big file in cobol
A. Search
B. Search all
C. Search outside program
D. None
11. The sensitive and critical data access point should not be given full permanent
administrative priviledge(the special attribute in RACF)that they do not need
conti. TRUE or FALSE
12. Secure way of accessing data thru SQL?
A. Static sql
B. Dynamic sql
C. Using data module
D. None
13. Which is not stored in system catalog table?
A. SQL stmt used to create tables
B. SQL stmt used to create triggers
C. SQL stmt used to create constraints
14. Cics can be executed from several environments? True or false
JCL 2.1 and COBOL
1. Like varaiables can declared as constant?
2. 66 level defined in
A. File section
B. Linkage section
C. Working storage section
D. Configuration section
3. ? handles iteration in Cobol (Got Qtn)
A. Evaluate
B. Perform
C. If
D. Goto
4. S9(8) comp how many bytes? Ans:- 4 bytes
5. Indexed file record can be accessed by? Ans:- Using Key/ Indexed sequential
dynamic method.
6. Rewrite and delete in ESDS? Ans:- Rewrite but cant delete
7. Determine size of physical record? Ans:-Depend on hardware(Tape=65535b &
Disc=65024seq/32234indx)
8. PIC clause P represent?
A. Assured decimal point
B. Period decimal point
9. Array in COBOL can have?
A. 7 dimension
B. 3 dimension
C. No limit
10. Call by content? Ans:- Do not share the same memory location for the data.
11. Occurs clause define tables of ?
A. Contiguous data items
B. Non contiguous data items
C. Discrete data items
12. Cause of SOCB? Ans:- Division exception, possible cause is division by a very small
number or zero. A possible reason might be a numeric variable that is not large
enough to store the variable.
13. COMP2 how many bytes? Ans:- 8 bytes
14. KSDS had index and data component? Ans:- True
15. Use a FASTSRT compile option? Ans:- Fast sorting using DFSORT.
16. Msglevel=0? Ans:- To print all job statements .
17. Null dataset for dd name filein represent ? Ans:- Dummy
18. If omit status field of disp of nonexisting dataset default values will be? Ans:-
(New, Delete, Delete)
19. The value of symbolic parm RO is AB.X1,can be written as
PRSTPEXEC PROCA RO=AB
X1
TRUE OR FALSE
20. MAX DD STMT? Ans:- 3273
21. Where instream procedure must be coded? Ans:- Exec statement



More questions on UCF 2.1

1. VSAM RRDS is a function equivalent of an _______
a. Indexed dataset
b. Sequential dataset
c. Direct Access dataset
d. None
2. EIB doesnt contain ______
a. Trans ID
b. Terminal ID
c. User ID
d. None

3. CICS sign on Transaction _____
a. CESN
b. CESF
c. CESQ
d. CEFN
4. Which of these are Compiler Direct statement
a. SUBT
b. MOVE
c. COPY
d. ADD
5. Subscript allowed in OCCURS clause
a. 6
b. 7
c. 8
d. 9
6. Which of these clause overrides standard positioning rules
a. Position
b. Align
c. Justified
d. Alter
7. In which division File Description is declared?
a. Identification Division
b. Environment Division
c. Data Division
d. Procedure Division
8. COBOL statement to reverse string________
a. Func Reverse
b. Func Change
c. Func Turn
d. None
9. Clause that allow same area of memory _______
a. Redefine
b. Rename
c. PIC
d. External
10. Compiler Program ________
a. IGYCRCTL
b. IEFBR14
c. IEBCOMP
d. IKJEFT1B
11. Use of SPUFI_________
a. Define SQL
b. Execute SQL
c. Define Stored
d. ALL
12. SQLCA area contains ______
13. Sort DB2 query returned_____
a. SORT
b. ORDER BY
c. GROUP BY
d. None
14. No. of tables can be stored in Partitioned table space________________
a. 1
b. 2
c. 3
d. 0
15. Base function in DFHMSD ______
16. CESF writes message on screen _______
a. TRUE
b. FALSE
http://publib.boulder.ibm.com/infocenter/cicsts/v3r2/index.jsp?topic=%2Fcom.ibm.
cics.ts.doc%2Fdfha7%2Ftransactions%2Fcesf%2Fdfha70s.html
17. Mapset definition MACRO
a. DFMAP
b. DFHMSD
c. DFHSDF
d. DFHMAPS
18. Checking data to ensure its validity_____________
a. Authentication
b. Authorization
c. Data Validation? check
d. Session Management
19. To track events with an application with an example of _____________________
a. Access Management
b. Authentication
c. Auditing and Logging
d. Authorization
20. COMP field is ____
a. Half word Binary? check
b. Full word Binary
c. Packed decimal
d. None
21. To convert upper to lower
a. Func Date-to-integer
b. Integer to Gregorian
c. Julian to integer
d. Integer to Julian
22. How many DD statements can be _______
a. 3273
b. 25
c. 255
d. 0
23. Call by reference related
24. Square format X square
a. X.X
b. X**2
c. X2
d. None


What determine the size of physical record (COBOL?) Data division
A) environment
b)

comp is
a) half word binary ?
b) Full word binary
c) Packed decimal
d) None of above


Dimension of array max in cob-85
7
When to use FASTSRT complie option? (COBOL)

Using the FASTSRT compiler option improves the performance of most sort operations. With
FASTSRT, the DFSORT product (instead of Enterprise COBOL) performs the I/O on the input
and output files you name in the SORT

Perform P 3 times
Perform p thrice which is not correct
Perform p thrice is not correct


How to exclude line that contains string xyz in 3.13?


ASM, COBOL, PL, and Fortain these tso commands are called as?


What is free command in DB2?
a) Drop plan or package
b) Drop only package
c) Drop only plan
d) ?



Which db2 objects lock explicitly obtained?
a). user defined data-type
b). columns
c). triggers
d). tables
http://pic.dhe.ibm.com/infocenter/db2luw/v9r7/index.jsp?topic=%2Fcom.ibm.db2.luw.admin.
perf.doc%2Fdoc%2Fc0005270.html
The only type of object that you can lock explicitly is a table

Cics can be executed from several environments T or false

SQL datatype used to store double byte character
a). CLOB
b). CHAR
C). VHARCHAR
d). Graphic

What happens if view is created?
a). Memory usage reduced ? Check
b). Data access time reduces
c). Data access control increased
d). Query completion time reduced

Can u rewrite and delete a record in ESDS file.
We can rewrite record but cant delete record.

Use of push n pop command in no handle condition in CICS


NMOS is batch device and format independent.

Q1 which command is not used to initialize table?
a) move
b) initialize
c) evaluate
d) perform
Ans:- C


Q2 how to calculate the length of TWA area?
a) Length
b) SIZE
c) Assign
d) value

Ans (B) The size of the TWA is determined by the TWASIZE option on the transaction resource
definition.

Q3 what is program 'use count'? (CICS)

Ans: - Use count (value)
Displays a 10-character string identifying the total number of times the program has been
executed since the start of the current CICS session. The use count is provided for all modules
including Java programs, with the exception of remote programs. No value is returned if the
program is remote.

Q4. SQL injection

Q5 EJECT statement is used for?

Ans:- This compiler-directing statement specifies that the next source
Statement is to be printed at the top of the next page.

Q6 what information is stored in system control table?

Q7 Group By & order by clause applies for
1) Rows
2) Columns Correct answer
3) Row (group by), columns (order By)
4) Column (Group by), row (order by)


Q8 how we define mapset?
Ans: - By using DFHMSD

Q9 group by , having by and order by clause is used for?

Q10 FD & Paragraph name should start in

1) area A
2) Area B
3) Area A and Area B either of them
4) anywhere
Ans: - area A

Q11 environment division contains FD clause

1) true
2) false
Ans: - False

Q12 Full form of isolation levels in DB2.

Q13 why explain is used?

Q14 Start Br
a) read first Record
b) Points to First record correct answer
c)both
d) none

Q15 what is best feature of CICS?
a) symbolic map
b) physical/ symbolic map
c)data and device independence correct answer
d) none

Q16 which is true?

a) Static call is faster than dynamic call
b) Dynamic call is faster than static call.
c) Static call takes lesser space than dynamic call.
d) Dynamic call takes lesser space than static call.

Q17 can we have comment line before job start? (Got Qn)
a) Yes
b) No correct answer

Q18 sensitive/ insensitive/ scrollable/ UN scrollable

Q19 how the space used by called program can be freed?
a) Cancel
b) Exit
c) using call by reference
d) by calling the program second time
Ans: - Exit

Q20 zeros and spaces are ____________ constants.
Ans:- figurative

Q21 union/ union All
a) Both retain duplicates
b) Eliminates
c) Union - retains
Union all - eliminates
d) Union - eliminates
union all - retains
Ans:- D


Q22 page free?


Q23 check pending?
Ans: - CHECK-pending status
The CHECK-pending (CHKP) restrictive status indicates that an object might be in an
inconsistent state and must be checked.

The following utilities set the CHECK-pending status on a table space if referential integrity
constraints are encountered:

* LOAD with ENFORCE NO
* RECOVER to a point in time
* CHECK LOB


Q24 NW__Thresh?

Q25 if we have 2 job statements in a single PDS member and we submit that member?
a) Job will throw an error.
b) Both jobs will be executed.
c) First will be executed and second will be ignored.
d) First will be executed and second will abend.
Ans: - B

Q26 which memory is assigned when we login to TSO

a) Virtual RAM correct ans
b) Main memory
c) RAM
d) None

Q27 for renaming. (Got Qn)
a) Ren
b) Rename
c) Both correct ans
d) None

Q28 which JCL stmts can be continued to next line?
a) all JCL stmt can be continued.
b) none can be continued.
c) except //*, all can be continued.
d) except //*, null & /* may be continued. ambiguous correct



Q29 To pass/store the data
a) Commarea
b) TSQ
c) TDQ
d) all of the above.


Q30 how SQL stmt can be injected?
a) Use host variables
b) Donot use host variables
c) DB admin
d) None

Q31 what is an ASRA ABEND?
CICS issues an ASRA abend code when it detects that a program check has occurred within a
transaction. Program checks can occur for a wide variety of reasons, but you can find the
nature of the error from the program interrupt code in the program status word (PSW). The
PSW is used by the machine hardware to record the address of the current instruction being
executed, the addressing mode, and other control information. The PSW gives you the
address at which the program check occurred, and so it represents a record of the
circumstances of the failure.
Any data exception problem SOC7, SOC4 etc.

Q32 what is an AEY9 ABEND?
The AEY9 ABEND can occur for the following reasons:
An EXEC CICS command has been issued that is not supported by the
EXEC interface program DFHEIP.
A transaction has issued an EXEC CICS command which is supported in
principle by the EXEC interface program DFHEIP, but for which the
prerequisite function has not been included in the current CICS start-
up.
A non-CICS command has been issued by an application stub
(expansion of a DFHRMCAL macro), and the program DFHERM has
detected that the required non-CICS support is not available. For
example, an attempt to access DB2 when a DB2CONN resource is not
enabled results in this abend.
An attempt has been made to use remote resources, but the local SYSID
has been specified in an EXEC CICS command, or vice versa.
An attempt has been made to use remote resources, but ISC is not
supported.
An EXEC CICS command contains an invalid AID or CONDITION
identifier. This abend indicates that the EXEC CICS command has
become corrupted.


DB2/IDMS not up.

******************************************************************************
*******************************************
******************************************************************************
*******************************************
******************************************************************************
*******************************************

(1) Maximum no. table used in outer join ?
ANs:- 2

(2) Maximum level of lock on table?
Ans: - Repeatable Read (RR)

(3) Minimum level of lock on table?
Ans: - Uncommitted Read (UR)

(4) Declaration of comp variable?
Ans: - 01 NUM PIC 9(8) USAGE IS COMP

(5) Area B starts with which position?
Ans: - from 12th position

(6) Question on Cursor with hold concept?

(7) Which is Minimum privilege to access table data?
Ans - SELECT privilege on the table

(8) What is the name of system service address space in db2?
Ans :- (DSN1MSTR)
System Services Address Space (DSN1MSTR): This address space handles system
functions such as logging and archiving. This address space is small compared to
the database services address space. The default Virtual storage is 2 - 5 MB
Depending on your environment.

(9) Question on 322 times ABEND?
S322 comes when a job exceeds its usual CPU time as it may goes to some infinite
loop .

(10) Which symbol is used for Symbolic parameter in JCL?
Ans: - By using &

(11) Which command is used to refresh page in TSO?
(a) REF (b) REFRESH (c) Both (d) None

(12) SAREA command is used for which purpose?

(13) Which command is used to obtain the name of region in which you are currently working
in TSO?
Ans: - SAREA

(14) Which tool is used to write and execute query in db2?
(a) QMF (b) SPUFI (c) Both (d) None

(15) Question on Redefine? (They asked about size after using redefine clause)

(16) Which is the correct sequence used for the concept of Cursor?
Ans: - Declare, Open, Fetch and Close

(17) Full form of SDSF?
Ans: - System (Spool) Display and Search Facility

(18) Question of EIBAID in CICS?
ANs:-

(19) In which table we declare DB2 resources in CICS?
Ans: - Resource Control Table (RCT)

(20) Question on Subscript & Index?

(21) In which table we declare terminal key entry in CICS?
TCT

(22) Question on Load utility in DB2?

(23) Question on TDQ?





Imp UCF 2.1 Questions

1. Instream procedure ends with? (Got qtn)
Ans: Pend
2. How long a job can be run continuously in mainframe
Ans:-248 .53 days
3. Cond (4, lt) , if the step want to execute then the return code from previous step will
be?
Ans:-greater than 4
4. Two jobs with same name and same priority submitted then? Opt are 1. Second will be
executed after 1st..2) First not execute 2nd will....3) both remain in Que....4) errors
Ans: - not getting..Exactly
5. Restart opt code at where? Ans:-job step
6. Which dataset cant be temporary opt:
1. Gdg 2. PDS 3.direct 4.squential
Ans:-1.GDG
7. Exclude line xyz from the programming? The command is...? Opt are
1. DPLINE XYZ
2.EXL xyz
3.BLANKLINE XYZ
4. NONE OF ABOVE
ANS: NONE OF ABOVE
8. FILE STATUS 92? ANS: - LOGICAL ERROR
9. FULLFORM OF JCL?
Job control language
10. Single checkpoint method?
1. Append succeeding checkpoints to the previous one
2. Overlays previous checkpoints with succeeding checkpoints
Ans: Overlays previous checkpoints with succeeding checkpoints ?

11. Somewhat programming was there like
Char name(3:7) in a code
Name WIPROTECHNOLOGIES
ans:- protech
12. Can a BMS Map be made case sensitive?
1. Yes, use ASIS option
2. Cannot be done, needs to be handled programmatically
3. Yes, use TIOAPFX option
4. Yes, use DATA option
ans : 1.yes using asis
13. If you are editing an existing dataset and if you want to see the changes only that you
made it since last SAVE.
COMP SESSION
COMP CHANGES
COMP LINES
COMP ADDITIONS
Ans: COMP SESSION
14. To list all the TSO commands what you need to type at READY promotes (or by
using ISPF/PDF command option -option 6)
LIST
HELP
LIST ALL
HELP ALL
Answer) HELP
15. temp dataset can be denoted as
:ans -&&
Next ques...........can complex be given on evaluate when????
16. can complex condition be given on evaluate when??
Ans: - yes
17. Uitility Reorg used for..?
18. What is cold start, when cics crash?? Ans: - all table initialized
19. CICS ensures that an application program associated with one transaction cannot
accidentally overwrite the data of another transaction by using
a.Storage protection
b.transaction isolation
c.Both A) &
d.None of the above
Answer B
20. Precompiler is a ___________.
Processor
Preprocessor
compiler
Interpreter
ans :-preprocessor
21. Disp=mod will gives you exclusive control over dataset
opt are a.true b. false ans:- true
22. whichvsam have fixed CI?
ans :-LDS
23. DDL consist of (DB2 ques)?
ans:- create , drop and alter
24. What recovery manager execute?
1. Rollback
2. Release lock
3. None
4. A&B
ans:- 4. A&B
25. Isolation level.RS locked the rows
a. true
b. false
ansa.true
26. dynamic sql generate access path in???
1. Compile time
2.link edit
3.runtime
4.none
ans .3 runtime



Additional UCF2.1
Q1. Can we declare Alphanumeric at 01 level?
Yes
Q.2. what initialize verb to with following Items?
a. set 0 to numeric
b. set filler to alphanumeric
c dont touch to Filler
d all of the above.

Q.3 Ques on JoinTwo tables are given and OP also given which they want in form of
Table.

Ans- Right Outer joins on Table 1.

Q4. What option we give for Dynamic Linking?
a. Dlink
b. Dynam
c. Link
d. List

Q5. What is File status 92.
Ans- Logical Error
Q6. SOURCE compiler option?
Q7. VSAM RRDS is equivalent to??
a. Indexed file organization
b. Direct access ?
c. Sequential access.
d. ???

Q8. If step lib and joblib both coded in JCL, Which will override??
Steplib override JOBLIB.
Q.9 IN table how you will Concate first Name and Last name?
a. By Concate option
B. ||
C |
D thru String

Q.10 What Single checkpoint method? Service addresses Space Do??

Q.11. What is the function of Declare Temporary Table??

Q.12 How Transaction Deadlock Occurs in CICS??

Q.13 Track events within application

Q.14What is the function of NEW Copy in CICS??

Q.14 what option will use to revert back the changes you done during Editing the
DB2/COBOL?
a. Split
B Resume
C Flip
D. None

Q.15 No. of DD statements in JCL?
3273.
Q16 Secure Coding Standard 4 ques Just go thru Document easily attemptable

Q.17 Ques on Syntax of Symbolic Parameter in DSN field.

Ans - DD DSN = &ABC..PQR.ALPHA (like ds) ?

Q.18 what option will you provide with Return Statement in Cics
Ans TRANSID
Q.19 For large Data file which option will you use
Ans Search ALL

Q.20 Source Computer is option of which Division?
Ans- Environment
Q.21 why we use COMMAREA?

Q.21 to find in which area you are working??
Ans- SAREA
Q.22 IS it Feasible to use Region = 0k/0M in Production Job??
Ans NO
Q. 23 Can we provide Instream data in Catalog Proc?
Ans- NO ?
Q.24 Is it feasible to use production Files and data directly for testing Purpose in DEV??
Ans- No, Take the backup and use backup file
Q25 Ques from SCS on Authorization
Which of the following is a correct COBOL specification of the square
root of X ?


X **.5
X*X
X**2
X*.5


What happens when the ACCESS MODE parameter is omitted in the
SELECT statement?


The program will throw an error.
ACCESS MODE is not mandatory.
ACCESS MODE IS SEQUENTIAL is assumed.(Default)
Will get SOC4 Abend

The array in COBOL can have up to


Seven Dimensions(Max Dimensions)
3 dimensions only
No limitation

In a linear Search, if there is no matching value for the search argument
what happens to the program execution?


The code following the SEARCH statement is executed
The code after the AT END statement is executed
Abend occurs
a) or b)


Storage occupied by a dynamically called subprogram is freed


by using CALL for the second time
BY using EXIT statement
By using CANCEL
By using CALL by reference
When you issue a CANCEL statement for a subprogram, the storage that is occupied
by the subprogram is freed


Host variables cannot be used to


Check the return code from the SQL Statements
As a null indicator variable
Insert / change data in the table

Retrieve data
Which one of the following statement will be used to move data to a
condition-name to make the condition true?


MOVE
ADD
SET
CHANGE


Be able to use the SET verb to set a Condition Name to true.
What is the maximum length for COMP-3?


18 bytes
10 bytes
15 bytes
24 bytes

What is the characteristic of the variable that specifies the length of the
parm that is being passed through a JCL?


PIC S9(4) COMP
PIC S9(7) COMP-3
PIC S9(7) COMP-1
PIC 9(4)
program has to define COMP PIC S9(4) for the length of the
PARM which has a range of 0-100.


PROCEDURE DIVISION [USING data-name-1 ... ]
The data-name1 is the__ levels defined in the linkage section


77? doubt
88

1
15






If the value of the name variable is 'WIPROTECHNOLOGIES'
MOVE name(3:7) TO first-name
What will be the value of first-name?


PROTECH
PROTE
PROT
ECH


What is the result of the following?
DIVIDE A BY B GIVING C.


C=A/B
the reminder of B/A is stored in C
C=B/A
the reminder of A/B is stored in C





Which provides a shorthand notation for a series of nested IF statements.


EVALUATE Statement
DISPLAY Statement
ACCEPT Statement

OPEN Statement
Can we Redefine a PIC X (2) variable to PIC 9(2) variable?


Yes
No

Which of the following statement is not correct?


01 level can have sublevels from 02 to 49
77 cannot have sublevel.
88 Level is used for Redefines
OCCURS clause can't be at the 01 level



How do you eliminate duplicate values in SELECT?


Use SELECT MAX
Use SELECT *
Use SELECT NODUPLICATE
Use SELECT DISTINCT




How do you select a row using indexes?


Specify the indexed rows in the WHERE clause.
Specify the indexed columns in the WHERE clause.
Specify the field with index in the WHERE clause.
All of the above





When do you specify the ISOLATION level parameters?


During PRE-COMPILATION

During BIND
During COMPILATION
During RUN time
In BIND, isolation level parameter specifies the duration of page lock and
ACQUIRE,


What is the relationship between DB2 instances and databases?


A single database can span instances.
You can have only one database for each instance.
The instance name and the database name must match.
The authentication for the database and its instance name must
match.

The relationship between a DB2 instance and a DB2 database is that one instance can have many
databases, but one database can only reside in one particular instance.

Which of the following can prevent a user from inserting a row with a
large salary into a table with a column holding employee salaries?


Defining a primary key constraint on the column ?
Defining a user defined scalar function
Defining a referential constraint
Defining a table check constraint

http://rick.jasperfamily.org/db2/db2_Sample_Test_509


Using REPRO to reorganize a KSDS, which of the following is true


Input must be ascending key sequence.
No duplicate keys are allowed
Both of the above
None of the above




In an RRDS, the position of a data record can be changed.


TRUE
False
http://mainframer.4.forumer.com/index.php?s=235826de61d1134d8a3cb2d79aec241d&act=Search&nav=au
&CODE=show&searchid=2e2a5b468322d2c3dc7d35a1f7259fee&search_in=posts&result_type=posts

In an RRDS, the position of a data record can be changed. (F)

There is a one-to-one correspondence between BCSs and VVDSs.


TRUE
False


There is a one-to-one correspondence between BCSs and VVDSs. (F)


The need for JOBCAT/STEPCAT statements has been replaced by the ALIAS.


TRUE
FALSE

The need for JOBCAT/STEPCAT statements has been replaced by the ALLAS (T)
Catalog password protection is required for data set password checking.


TRUE ?
FALSE

DFSORT cannot be used to sort a particular column range of input data.
It can be used only to sort the entire input record length


TRUE
False?

In which DD name the sort input file/dataset needs to be specified If you
use DFSORT in a JCL?


SYSIN DD
SORTIN DD
SYSOUT DD

SORTOUT DD

Which options of OUTREC control statement of DFSOFRT will
uppercase to convert lower case?


TRAN=UTOL
TRAN=LTOU
TRAN=ALTSEQ
None of the above

http://mainframes.techslam.net/2011/01/change-uppercase-characters-to-lowercase-
using-dfsort-control-statement/
IF you want remove all blank space between a string and move the string to
left, what is the DFSORT control statement option



OUTREC FIELDS=(1,40,SQZ=(SHIFT=LEFT))
OUTREC FIELDS=(1,40,(SHIFT=LEFT))
OUTREC FIELDS=(1,40,SQZ=LEFT)
None of the above
http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=%2Fcom.ibm.zos.r12.iceg200%2Flsars
d.htm


For an unsupported system, what is the Return Code SET by ICETOOL


4
16
20
24
unsupported operating system, ICETOOL passes back a return code of 24


The name of the library that contains any programs that are to be used
during CICS execution is.



CICS System Library (CSL). ?
The CICS Repository.

Sub directories.
Relocateable Program Library

What is the program 'use count'?


A counter of current program usage kept by CICS in the
PPT. ?
A counter of program use stored in each individual program.
The number of files access made by a program.
Programs can only be refreshed (NEWCOPY) when this count is
greater than zero.



When designing VSAM files, make sure to use as many indexes as
possible. This would allow all searches to be as fast as possible.


TRUE
False


CICS ensures multiple users can't update same record on file using


RCT
FCT
TCT

CICS starts a new task for each user input for


Conversational program
Non-Conversational program
Pseudo Conversational program



XCTL command can be used to start task in different terminal


TRUE
False





Symbolic map included 01 level items for


input
output
Both A & B
None of the above
A symbolic map includes two 01-level items: one for input and one for output.

Even if Data is not required to be saved, a one byte DFHCOMMAREA
is required in linkage section.


TRUE? check
FALSE


NOHANDLE option of any command specifies that no action will be
taken


TRUE
FALSE


For "Modification in skip Sequential Mode" choose the correct
sequence


READNEXT, ENDBR,READ WITH UPDATE
READ, ENDBR, READNEXT
START, READ, UPDATE
None of the above

http://www.coolinterview.com/interview/13640/
What is ASRA?


CICS interrupt code
CICS abend code
CICS interrupt code equal to MVS abend code
None of the above

The STARTBR command is used to


Read first record
Establish pointer to first record
Both A & B ? Check
None of the above

The period between start of a particular set of changes and the point at
which they are complete is called


Task
transaction
logical unit of work
None of the above
The period between the start of a particular set of changes and the point at which
they are complete is called a logical unit of work (LUW).

Which command is used to release a record on which exclusive control
is gained?


RLSE
UNLOCK
CLOSE
LOCK


Which CICS system program is responsible for handling automatic task
initialization?


PCP
TCP
FCP
TDP

http://mainframematerials.blogspot.in/2007/09/cics-faqs.html

Can you define multiple maps in a BMS mapset?



Yes
No


CICS task control command is


SUSPEND
ENQ? Check
DEQ
All the above

The CICS task control command EXEC CICS ENQ suspends the calling task if another
transaction already has the resource enqueued. The CICS task control command EXEC
CICS SUSPEND suspends the task for a short time only, allowing other running
transactions to use the CPU.
What is the maximum length of the COMMAREA that can be passed?


10,204 bytes
20,456 bytes
65,536 bytes
None of the above


What is the option of the write command which is used for inserting a
group of records whose keys are in the ascending order into a file?


INSERT
INTO
MASSINSERT
GROUPINSERT


Which screen is used to get on to CICS



CEMT
CMAC

CEOT
CESN
9(10) COMP uses


Half Word
Full word
Double word
None of the above


Which are the types of COBOL


Cobol 74
Cobol 85
vs-cobol II
All of the above


Which compiler option in COBOL is related to control characters
associated with printer files?


APOST
OFFSET
ADV
None of the Above
http://www.jatomes.com/Help/CobolII.php#ADV


Is the following COBOL declaration correct?
05 WS-VAR PIC S (05) COMP VALUE 100.


Yes
No

A typical declaration for a zoned decimal variable would be?



9(09)
9(04) COMP.
9(05) COMP-3. ? Check
9(08) COMP-2


DSN is a must for Temporary datasets


TRUE ? Check
False


If CLASS is coded on Job statement as well as on JES3 statement,
which will take priority?


CLASS on JOB statement
CLASS on JES3 statement
Default CLASS will be selected
Both CLASS s are ignored


You can use JOBCAT or STEPCAT DD statements with a SMS
managed dataset


TRUE
False

How many feet of tape is required to store 100000 records at 1600 BPI?
Record length is 80 bytes and block size is 400 bytes. Gap is 0.6 and
blocking factor is 5


1416.67ft? Check
1420ft
1410ft
1425ft


If a symbolic parameter is only a part of comment filed (comments on
the same line after the actual statement), is it required to pass/assign
the value of it before executing the JCL/JOB



NO
YES
I want to change the Return code to 0 for a JCL step which is using
IDCAMS


SET MAXCC = 0
SET CC = 0
SET RC=0
Both (a) and (c)


Which of the following might be a cause of SOC1 abend?


Reading a dataset opened in output mode
Bad subscript/index
Protection exception
Bad exit from a perform

http://mainframe230.blogspot.in/2010/10/important-cobol-abends-in-cobol.html
Index space can have more than one index


TRUE
False


JES3 control Statements cannot be part of the Proc


True? Check
FALSE

Which of these is part of Database Design


Entity Relationship ? Check
Application Function
Access paths
All of the above


Which of these is a responsibility of RACF


Authenticate Users
Restrict resource access
Both of the above ? Check
None of the above

RACF security Log can viewed by the following method


SMF data unload utility
RACF report writer
DFSORT ICETOOL ? check
All of the above


What does mean of the primary command F P'.' when a PS dataset opened in
EDIT mode?


Find any non-numeric character
Find any non-blank character
Find any character
Find any non-displayable (invalid) character? Check

What is the TSO command for Renaming a dataset


REN
RENAME
Both (a) and (b)
None of the above



How do you compare data set lines between 50 and 80 in 3.13


CMPLINE TOP 50 BTM 80
LINECMP TOP 50 BTM 80
CMPLINE TOP 50 BOTTOM 80

LINECMP TOP 50 BOTTOM 80

What is the error code in SCLM if you tried to build/view/promote a non
existing project?


10
24? check
15
02
http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=%
2Fcom.ibm.zos.r12.f54mc00%2Fmsgcode.htm

Do we need a build for JCL components like PROC/CONTROL cards etc?


Yes
No
Some times
None of these

Will SCLM allow you to build the program at any higher levels other than
DEV?


No, in SCLM build happens only in DEV
Yes
Yes, if you have the required access
None of these
You can check out members from any level of the SCLM hierarchy. The major
feature of this is that if a member, at a group higher than your development
group is checked out, it is copied down to your development group.

Change man is mainly for


To compile the program
To checkout the components
Version control of components
None of the above
Changeman is a version controller tool used keep track of the coding changes you

made.Whenever you want to make changes to particular program, you need to
Chechout the component from production into your package (this need to be
created in the changeman itself) and have to start modification.

If the Install Date is passed after Developer's approval a) Revert the package
-> Change Install Date - Audit - Freeze - Approval is necessary b)
Selectively unfreeze Remote Site information for the package and update
Install date and Refreeze remote site


Only a) will work
Only b) will work
Both a) and b) work
Neither a) nor b)

How many indexes can be stored in an index space?


One
More than one
Depends upon the index type
All of the above

How do you insert a record with a null able column?


To insert a NULL, move 1 to the null indicator To insert a valid
value, move -1 to the null indicator
To insert a NULL, move 0 to the null indicator To insert a valid
value, move -1 to the null indicator
To insert a NULL, move -1 to the null indicator To insert a valid
value, move 0 to the null indicator
To insert a NULL, move -1 to the null indicator To insert a valid
value, move 1 to the null indicator


Can we access the DB2 directory table using SQL statement?


Yes, we can access through SPUFI only.
Yes, we can access through QMF only
No, we cannot access DB2 directory table using SQL statement.

Not sure
You cannot access the directory by using SQL, although much of the same information is
contained in the DB2 catalog, for which you can submit queries.
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/c
om.ibm.db2z.doc.intro/db2z_directory.html
Where do Stored Procedure details stored?


SYSIBM.SYSROUTINES and SYSIBM.SYSPARMS
SYSIBM.SYSTABLE and SYSIBM.SYSSTORE
SYSIBM.SYSSTORE and SYSIBM.SYSPARMS
None


Which type of key is defined on the parent table to implement referential
constraints?


Composite Key
Foreign Key
Primary Key
Unique Key


What is the default isolation option for a Bind plan?


Isolation (RS)
Isolation (CS)
Isolation (UR)
Isolation (RR)

Bind will read the _____ for table columns definitions and authority


Directory
SPUFI
DCLGEN
CATALOG

Precompilation process



Checks for DB2 syntax
Produces the dataset containing SQL statements
Produces modified source code with EXEC SQL replaced by
CALLS to DB2 processor.
All of the above


What is the max. & min. no. of partitions allowed in a partition
tablespace?


Min-1 and Max-50
Min-0 and Max-32
Min-4 and Max-64 ? Check
Min-2 and Max-16

http://ihateinterview.com/index.php?topic=1648.0


How do u achieve record level locking in DB2 versions when record
level locking is not allowed?


Can not be achieved
By having the length of the record greater than that of a page
By having the length of the record as zero
Both (b) and (c) are correct

http://ihateinterview.com/index.php?topic=1569.0


Which SQL comment successfully removes uncommitted changes from
a DB2 database?


DELETE
DECOMMIT
DROP
ROLLBACK

http://www.allinterview.com/showanswers/6803.html


How does the defining of a stored procedure effect the size of a DB2
Data base


It increases the size of the DB
It decreases the size of the DB
It does not effect the size of the DB
It changes the table space structures


What is contained in the DB2 node lock file?


Database names
Users names
License keys ? Check
Server names
http://www.allinterview.com/showanswers/6801.html

What all does the AGGREGATE function support?


SUM & AVG
SUM, MIN & AVG
NONE
SUM, MAX, AVG , MIN &COUNT



What is an alias and how does it differ from a synonym?


Alias is a global object and synonym is a private object
Alias can be accessed by anyone, but Synonym can be accessed
only by the person who has created it.
When the base table is dropped, Alias is not dropped, but
Synonym is dropped automatically
All of the above











1) Which one of the below comparison operator is faster than the other ?

Equal to
Not Equal to
Both of them will give equal performance speed

Ans: Equal to

2)OPTIMIZE(STD)

optimize generated code for better performance
results in more efficient runtime code
Require Longer compile time
All of the above

Ans: All of the above


3)If coded COND=EVEN on a step

The step will be executed even if the previous steps abend
The step will be executed only if no previous steps abend
The step will be executed only if any of the previous step abends
None of the above

Ans: 1

4)To get all the Debug capabilities what will be the compiler option needed

TEST(ALL)
FASTSRT
OPTIMIZE(STD)
None of the above

Ans: TEST(ALL)

5)What needs to be coded in LABEL parameter to tell the system that you need to retain
the tape datastet for n number of days?

EXPDT
RETPD
BLP
SL

Ans:2

6)Usage of SYNCRONISED clause will help improving performance

TRUE
FALSE

Ans: true

Tip:- The SYNCHRONIZED clause is never required, but can improve performance on some systems for
binary items used in arithmetic

7) Which is the COBTEST command to terminate the Debug session?

GO
SET
QUIT
OFF

Ans: QUIT

Tip:- QUIT : The QUIT command terminates your debugging session in COBTEST

8) COBTEST can be used in

Batch mode
In-line mode
Full screen mode
All of the above

9) When the COBTEST tool run in batch mode

You can run the program step by step
You can't interact with the batch job
You can change the command sequence
you can check the values of a variable

10) HELP commands are used

Only in interactive mode
Only in batch mode
in both the mode

Ans: only in interactive mode

11) Consider the following COBOL statements.

PROCEDURE DIVISION.

MOVE 10 TO N

PERFORM PARA-X N TIMES

STOP RUN.

PARA-X

MOVE 5 TO N

How many times PARA-X will be executed?

10
5
infinite time
Execution error

Ans: 10 times

12) Keyword parameters is always followed by =


TRUE
FALSE

Ans: True

13) Which of the following is true about Random Access and Alternate Keys?

Only the first record written of a series of records with duplicate keys can be
retrieved
All the records with duplicate keys will be retrieved one by one in any order
All the records with duplicate keys will be retrieved in the order stored in the file
None of the above

Ans: 1

14) If you omit the normal-termination parameter of DISP for an existing dataset, what
will be the default value?


OLD
DELETE
KEEP
CATLG

Ans: keep

The default for status is OLD.

If you omit the normal termination disposition value, the default is CATLG for new data sets
or KEEP for existing data sets.

The default for abnormal termination is to take the action that is specified or implied by normal-
termination-disp.


15)Which one of the following is true for a qualified override of KEYWORD parameters
stepname.KEYWORD=
KEYWORD.stepname=
KEYWORD=
Both of the above

Ans:1

16)order of access

sequential is fastest
dynamic is next
random is least efficient

performance VSAM files
large BUFND - data buffers for sequential access
larger BUFNI - index buffers for random access

CISZ ( control interval size)
small CISZ - > faster retrevial for random processing at the cose of inserts
A lart CISZ is more efficient for sequentialprocessing
in general large CISZ and buffer space may improve performance


17) Block Contains 0 results into?

Significantly improve file processing time with respect to CPU time
Significantly improve file processing time with respect to elapsed time
None of the above
Both A & B

Ans: Both A & B



18)Using RLSE parameter with dataset allocation would result into:

Maximum space allocation to dataset
Better utilization of space by allocating more number of cylinders
Frees used space
Frees unused space

Ans: Frees unused space

19) To avoid exclusive control of the dataset, what should be coded?

NEW
OLD
SHR
None of the Above

Ans: disp= shr

20)State which of the statement is true?

LISTCAT analyzes file
REORG your files frequently
Both A & B
None of the Above

Ans: Both A & B



21) State which of the statement is true?

Binary search is used if the parameter of search operations are less
Binary search is used if the parameter of search operations are more
Linear search is fast, if the parameter of search operations are more
None of the Above

Ans:Binary search is used if the parameter of search operations are more

22)How do you compare data set lines between 50 and 80 lines in 3.13 option?

CMPLINE TOP 50 BTM 80
LINECMP TOP 50 BTM 80
CMPLINE TOP 50 BOTTOM 80
LINECMP TOP 50 BOTTOM 80

Ans: CMPLINE TOP 50 BTM 80



23) What command is used to move SPOOL data into a dataset?

XDC
XD
SE
SJ

Ans: XDC

24) Which of these can not be done with SCLM?

Change ownership of modules
Creates Archdefs, Lecdefs, and Binds for new members
Search for copybooks in programs
Search for subroutines in programs

Ans: Change ownership of modules -- need to check

25) You are trying to modify an existing production program thru SCM tools. In which
order you will be processing?

Check Out->Build->Promote
Build->Promote->Checkout
Build->Checkout->Promote
Build->Promote

Ans: Check Out->Build->Promote

26)In CHANGEMAN, the "parent" package for two or more change packages that have
interdependent changes to software and/or An operational procedure is
called__________.

Complex
Super
Multiple
Participating

Ans: Complex

Simple- no interdepend
Compelx- multiple packages have depende
Super - Parent for two or more contains major changes to several application
participating - change package is related to one or more other participating change
packagaes


27)Which of the following statement is correct?

Stored Procedure can have SQL and Host Language statements.
Stored Procedure can have SQL statements only.
Stored Procedure can have Host Language statements only.
none of the above

Ans: Stored Procedure can have SQL and Host Language statements.


28) Which of the following statement cannot have in Stored procedure?

COMMIT
SET CURRENT SQL ID
COMMIT and SET CURRENT SQL ID
none of the above

Ans:COMMIT and SET CURRENT SQL ID

Tip:- Do not include these SQL statements in your stored procedure:
COMMIT
SET CURRENT SQLID


29)Which of the following statement is correct?

Stored procedure cannot access tables at other DB2 locations
Stored procedure can access tables at other Db2 locations using Connect Statement alone
Stored procedure can access tables at other DB2 locations using 3 part object names
alone
Stored procedure can access tables at other DB2 locations using Connect statement
or 3 part object names or private protocols

Ans: 4

Stored procedures can access tables at other DB2 locations using 3-part object names or CONNECT
statements.
If you use CONNECT statements, you use DRDA access to access tables. If you use 3-part object names or
aliases
for 3-part object names, the distributed access method depends on the value of DBPROTOCOL you
specified when you bound the stored procedure package. If you did not specify the DBPROTOCOL bind
parameter,
the distributed access method depends on the value of field DATABASE PROTOCOL on installation
panel DSNTIP5. A value of PRIVATE tells DB2 to use DB2 private protocol access to access remote data
for the stored procedure. DRDA tells DB2 to use DRDA access.



30) In the Stored Procedure Connect statement uses ______________.

DRDA access to access tables
Value specified in DBPROTOCOL when stored procedure Package is bound.
Value in Database Protocol on installation Panel
none of the above

Ans: DRDA access to access tables


31) Which of the following is not true as far as external procedure is concerned?

Store procedure Definition Specifies the name of the stored procedure program.

Define the stored procedure to DB2 by preprocessing a CREATE PROCEDURE
statement,
then executing the CREATE PROCEDURE statement statically or dynamically

Define stored procedure to DB2 by executing the CREATE PROCEDURE statement.

none of the above

Ans:Define the stored procedure to DB2 by preprocessing a CREATE
PROCEDURE statement, then executing the CREATE PROCEDURE statement
statically or dynamically


An external stored procedure and an SQL procedure differ in the way that they specify the code for the
stored procedure.
An external stored procedure definition specifies the name of the stored procedure program.
An SQL procedure definition contains the source code for the stored procedure.
For an external stored procedure, you define the stored procedure to DB2 by executing the CREATE
PROCEDURE statement.
You change the definition of the stored procedure by executing the ALTER PROCEDURE statement.
For an SQL procedure, you define the stored procedure to DB2 by preprocessing a CREATE
PROCEDURE statement, then executing the CREATE PROCEDURE statement statically or dynamically.
As with an external stored procedure, you change the definition by executing the ALTER PROCEDURE
statement but cannot change the procedure body with the ALTER PROCEDURE statement.


32)Creating SQL procedure involves defining SQL procedure to DB2

TRUE
FALSE

Ans: True --

Creating an SQL procedure involves writing the source statements for the SQL procedure, creating the
executable form of the SQL procedure, and defining the SQL procedure to DB2.


33)Which of the following statement is true?

Handlers can be used in SQL procedures
There is no such concept of handlers in SQL procedures
Handlers can be declared but they cannot be tailored to specific SQL STATE
Usage of handlers will decrease the performance

Ans: Handlers can be used in SQL procedures



34)Which of the following should be taken into consideration while coding an SQL?

1. Use of ORDER BY GROUP BY Clause

2. Fetching used rows and columns

3. Minimizing Lock duration

4. Redundant Predicates


a) 2 & 3 alone
b) 1 & 4 alone
c) 2, 3, & 4 alone
d) all of the above

Ans :d

35)Aggregate functions performs best ____________.

1. When evaluated after data has been accessed

2. When evaluated during data access

3. When evaluated during DB2 sort

`Order of performance (Best first) should be


a) 1, 2, 3
2, 3, 1
1, 3, 2
3, 2, 1

Ans: 2, 3, 1

If a query involves aggregate functions, make sure that they are coded as simply as possible;
this increases the chances that they will be evaluated when the data is retrieved,
rather than afterward. In general, a aggregate function performs best when evaluated during data access
and next best when evaluated during DB2 sort. Least preferable is to have a aggregate function evaluated
after the data has been retrieved.



36) How many JOIN conditions are needed in JOIN query to avoid a cartesian product?

No of tables + 1
No of columns 1
No of columns + 1
No of tables - 1

Ans:No of tables 1

tip:- The number of join conditions is (n-1), if there are more than two tables joined in a query where 'n' is
the number of tables involved. The rule must be true to avoid Cartesian product.


37)Which of the following SQL source code are stored in system catalog?

Views
Tables
Triggers
Constraints

Ans: Triggers
Tip:- Check this link
http://books.google.co.in/books?id=e0vdxbY9ZocC&pg=PA235&lpg=PA235&dq=triggers+SQL
+source+code+are+stored+in+system+catalog&source=bl&ots=QUHyhtx9Yn&sig=JNCqNha2av
OpHahh7RuIcGxzx7k&hl=en#v=onepage&q&f=false



38)What determines when checkpoints are taken for DB2 subsystem restart.

ARCHIVE LOG FREQ
LOGLOAD
UPDATE RATE
CHECKPOINT FREQ

Ans:4

Tip :-CHECKPOINT FREQ
Acceptable values: 200 to 16 000 000 (log records) or 1 to 60 (minutes)
Default: |500 000
|Update: |option |21 on panel DSNTIPB
DSNZPxxx: DSN6SYSP CHKFREQ
Specify the system checkpoint frequency in minutes or in number of log records. If you have
widely variable logging rates, maximize system performance by specifying the checkpoint
frequency in time. DB2 starts a new checkpoint at the interval you specify, either in minutes, or in
the number of log records.
You can use the SET LOG command to dynamically change the number of log records between
checkpoints.

39) What does HOLE occur in the result table?

Deleting or updating rows after a static cursor is open can result in holes in the result
table.
Deleting or updating rows after a dynamic cursor is open can result in holes in the result
table.
Deleting rows after a dynamic cursor is open can result in holes in the result table.
All of the above

Ans:Deleting or updating rows after a static cursor is open can result in holes in the
result table.

Tip:- Deleting or updating rows after a static cursor is open can result in holes in the result table.
Please refer this link :-
http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=%2Fcom.ibm.db2z10.doc.apsg%2
Fsrc%2Ftpc%2Fdb2z_holesresulttable.htm

40)Usage of SYNCRONISED clause will help improving performance

TRUE
FALSE

Ans: True

41) Which is the COBTEST command to terminate the Debug session?

GO
SET
QUIT
OFF

Ans: QUIT

Running in batch mode the go command is used to

42) COBTEST can be used in

Batch mode
In-line mode
Full screen mode
All of the above

All of the above


43)When the COBTEST tool run in batch mode

You can run the program step by step
You can't interact with the batch job
You can change the command sequence
you can check the values of a variable

Ans:You can't interact with the batch job


44) Single checkpoint method

Append succeeding checkpoints to the previous one
Overlays previous checkpoints with succeeding checkpoints

Ans: Overlays previous checkpoints with succeeding checkpoints

Only one checkpoint record exists at any given time and after the first checkpoint record is written,any
succeding checkpoint record overlays the previous one.

This method saves space on the checkpoint data set and you can restart your program at the latest
checkpoint.

If the check point is to be added during sort operation add a DD statement for SORTCKPT in job control
procedure
for execution

45)Restart of an interrupted Cobol program can be done

Automatically at the time an interruption stopped the program
At a later time as a deferred restart
Both of the above
None of the above

Ans: both of the above

We can restart the routine in two ways
-> Automatically at the time an interruption stopped the program
->At a later time as a deferred restart




46) Which of the below is true?
contained program is found within the containing program
A contained program can also be a containing program
A contained program cannot also be a containing program
Both A and B



47) Which of the following statement is true while selecting access path?

1. Predicates in the Having clause is not used
2. Predicates in the Where clause alone is used
3. Predicates in the On Clause alone is used


a) 1 and 2

b) 1 and 3

c) 2 and 3

all of the above

Ans:- D. All of the above

Tip:- Predicates in a HAVING clause are not used when selecting access paths hence, the term 'predicate
means a predicate after WHERE or ON.


48)Index only access is __________.

ACCESSTYPE =R AND INDEXONLY = Y

ACCESSTYPE =1 AND INDEXONLY = N

ACCESSTYPE=1 AND INDEXONLY = Y

ACCESSTYPE=R AND INDEXONLY = N


Ans:- ACCESSTYPE = 1 AND INDEXONLY = Y


Indexonly access is When required data can be taken from index pages and no need to access data page
Much efficient
ACCESSTYPE = I AND INDEXONLY = Y


49)Merge Scan Join is more efficient when __________.

filtering for both the tables (outer and inner) are high

highly clustered index is available on join columns of the inner table

the tables (inner and outer) are large and does not provide much filtering

all of the above

Ans:the tables (inner and outer) are large and does not provide much filtering

Merge scan is used when :
Qualifying rows of inner and outer tables are large and join predicates also does not provide much filtering
Tables are large and have no indexes with matching columns

Nested loop join is efficient when
Outer table is small
The number of data pages accessed in inner table is also small.
Highly clustered index available on join columns of the inner table.
This join method is efficient when filtering for both the tables(Outer and inner) is high.


Hybrid join is used often when a non-clustered index available on join column of the
inner table and there are duplicate qualifying rows on outer table.
Hybrid join handles are duplicates in the outer table as inner table is
scanned only once for each set of duplicate values.



50) Which of the following options will help release locks more quickly and contribute to
maximum concurrency?

Lock size of one page

Cursor stability

Repeatable read

both a and b

Ans: both a and b


51)The rule for DECIMAL columns stated you should always use odd precision. A
column needs to handle a value up to 9999.99.
How would you define it?

DECIMAL (4,2)

DECIMAL (5,2)

DECIMAL (6,2)

DECIMAL (7,2)

Ans: DECIMAL(7,2)


52) What is the purpose of the SQL Communications Area?

It provides SQL with an area to put error codes.

It provides an area for passing parameters back and forth between your program and
SQL.

It provides an area for DB2 to pick up the SQL statements in your program.

It provides an area for passing input between your terminal and SQL


53) In Db2, plans are stored in

SYSIBM.SYSPLAN

SYSIBM.PLANTABLE

SYSIBM.PLAN

SYSIBM.COPY



54)SQLCA is used as a

Communication area between DB2 and application program

Communication area between the system and DB2 DBRM

Change area / Stack area to store the intermediate data from DB2

TO store data from retrieved DB2 rows of a table

Ans: Communication area between DB2 and application program


55) During precompilation process, DB2 does the following


Checks for DB2 syntax

Produces the dataset containing SQL statements

Produces modified source code with EXEC SQL replaced by CALLS to DB2 processor.

All of the above



56)Which of the following SQL data types should be used to store double byte character
data?

CLOB

CHAR

VARCHAR

GRAPHIC

Ans: graphic


57)If a fetch encounters an update or delete hole, what is the SQLCODE returned to the
program?


+100

-222

+212

+112


58)The DCT is used to determine the characteristics of

Population density

Transient data queue

Maximum number of terminals supported by the region

Domain support



59)Which is a function of System Services?


Program control such as load and release of programs

Storage control such as acquiring and freeing of storage

Task control such as task scheduling based on task priority

All of the above


60)Which data names store the actual data?

DATA1A

DATA1L

DATA1F

DATA1O

61)Using the mapset name or map name depends on which of the following?


The number of maps defined in a mapset

The number of mapsets defined in a program

The number of fields defined in a map

All of the above

62)The option used in CICS command to retrieve response code after command
execution is


REQID

RTERMID

RESP

RTRANID

63) In which table would you make an entry for a BMS map?


PCT

PPT

FCT

All of the above


64)What output(s) is(are) created as a result of generation of a map


Physical map

Symbolic Map

Physical & Symbolic Map

Map Copybook and Load module


65)What is the CICS command that gives the length of TWA area?


LENGTH

SIZE

ASSIGN

VALUE


66)CICS command are replaced with MOVE and CALL statements to execute interface
program by

Translator

Compiler

Pre-compiler

None of the above


67)What is the maximum length of the COMMAREA that can be passed?

8,192 bytes

16,384 bytes

65,536 bytes

None of the above

Ans:- 32763



68)What is the primary function of the Processing Program Table (PPT)?


To register programs only

To register all programs and maps

To register maps only

None of the above



69)Which command is used to transfer the mapped data output to a terminal

SEND MAP
RECEIVE MAP
Both
None


70)Can a BMS Map be made case sensitive?

Yes, use ASIS option

Cannot be done, needs to be handled programatically

Yes, use TIOAPFX option

Yes, use DATA option


71)Which of the following statement is true about out-of-sync condition during the audit
process in a SCM tool?

copybooks being modified after compiling the source component that calls them

load module being modified after the composite load component that calls them has been

a package containing a load component that does not match its source component

All of the above


72) Copybooks and Procs should be promoted before Programs and JCL.

TRUE

FALSE

Ans: True

73) SQL needs COBOL/PL1's help to do ONE of the tasks listed below.
From what you know of SQL, which task do you think is best done by embedding SQL in
a COBOL/PL1 program?

Create a table

Produce a one-time listing of all rows from one or more tables

Update a table based on values contained in a transaction file

Grant another user authority to access a table you created



74) When language environment need to be refreshed for stored procedures?


Load module is purged from the address space and reloaded when invoked again

Load module is over written

Load module is left undisturbed

none of the above

Ans: Load module is purged from the address space and reloaded when invoked
again

Refreshing the stored procedures environment
Depending on what has changed in a stored procedures environment, you might need to perform one or
more of these tasks:
Refresh Language Environment.
Do this when someone has modified a load module for a stored procedure, and that load module is cached
in a stored procedures address space. When you refresh Language Environment, the cached load module is
purged. On the next invocation of the stored procedure, the new load module is loaded.


75) Creating SQL procedure involves ___________.


Writing Source SQL statement

Creating SQL form of stored procedure

Defining SQL procedure to DB2

all of the above

Ans: all of the above

Creating an SQL procedure involves writing the source statements for the SQL procedure,
creating the executable form of the SQL procedure, and defining the SQL procedure to DB2.

76) If you have 2 job submitted with same job name with same priority


The second one will be executed only after the first is completed

The second JOB will fail as the job with same name is currently executing

Both Job will go on "waiting for execution" state and you need to cancel one job to get
other executed

The first Job will go on hold and the second will start execution


77) What will be the result, if KEEP is specified for normal disposition of a temporary
dataset


Job step will abend

System will change KEEP to PASS

System will change KEEP to DELETE

System will change KEEP to CATLG



JCL Guidelines require all SYSIN cards placed in?


LIBRARIES

CONTROL CARD

PROC STATEMENT

INSTREAM

Ans: Control card

All sysin in control card


78) As a standard, model DCB should not be defined for GDG creation.


TRUE

False

Ans: false

A standard model DCB should be used for GDG creation


79) For better optimization in speed and storage, which statement is true?


Use Binary field for computation

Use Packed Decimal for Computation

Use Packed Decimal for Counters

None of the Above

Ans: Use Packed Decimal for Computation

in general comp ( binary) for counters, packed decimals ( comp 3 ) for computation for speed and storage
optimization



80) How can you enhance processing of large files?


Split and concatenate the large files into multiple smaller files

Execute multiple steps with smaller files of the main large file

Increase the number of buffers to the allocated file

None of the Above

Ans: Increase the number of buffers to the allocated file


81) State which of the statement is true?

For random insertion use more CA FREESPACE

For non-random insertion use more CI FREESPACE

Both A & B

None of the Above

Ans: None of the above
For random insertion use more CI freespace
For non random insertion use more CA freespace


82) Usually the PDS bears the ID of the creator or the ID of the person who modified it
recently.
Is it possible to change these ID values without leaving trace of one's own ID?

It is not possible to change the creator ID.

Yes it's possible! In the command area type 'G' against the member name, Dialog box
will pop up allowing you to change the ID values.

Yes it's possible! In the command area type 'CHG' against the member name, Dialog box
will pop up allowing you to change the ID values.

Yes it's possible! In the command area type 'MOD' against the member name, Dialog box
will pop up allowing you to change the ID values.


Ans:Yes it's possible! In the command area type 'G' against the member name,
Dialog box will pop up allowing you to change the ID values.



83)
If you are editing an existing dataset and if you want to see the changes only that you
made it since last SAVE.


COMP SESSION

COMP CHANGES

COMP LINES

COMP ADDITIONS

Ans: COMP SESSION

84) What is the ISPF command used to
BROWSE a dataset 'WIPRO01.SEQ.DSET' without going to ISPF 3.4 Option?[From the
ISPF primary menu]


EPDF'WIPRO01.SEQ.DSET' VIEW

EPDF'WIPRO01.SEQ.DSET'

EPDF'WIPRO01.SEQ.DSET' BROWSE

none of the above



USE epDF ' ' PROFILE PROFILENAME



85)Temporary tables are used to return the result set from a stored procedure. These
tables are used to return


Relational data
Non Relational Data
Both a and b
None of the Above

Ans: Non relationaldata

Using a temporary table to return result sets: You can use a created temporary table or declared temporary
table to return result sets from a stored procedure. This capability can be used to return non relational data
to a DRDA client.


86) Parameters to the stored procedure can be defined as ____________.


IN
OUT
INOUT
all of the above

Ans: all the above

87)Local Predicates ______________.


Reference more than one table and restrict the number of rows returned
Reference only one table and restrict the number of rows returned
Reference more that one table but do not restrict the number of rows returned
Reference only one table and restrict the number of rows returned

Ans: Reference only one table and restrict the number of rows returned

Local predicates reference only one table. They are local to the table and restrict the number of rows
returned for that table. Join predicates involve more than one table or correlated reference. They determine
the way rows are joined from two or more tables.


88).In a SCM tool, _________ function inspects the staging libraries of a package for
out-of-sync conditions.


STAGING
AUDIT
CHECKOUT
All of the above

89)Copybooks and Procs should be promoted before Programs and JCL.



TRUE
FALSE


Ans: TRUE

90). In general, SCM tools allows us to build our programs first in DEV only.

TRUE
FALSE

Ans: True

91)What does SCLM stand for?

Software Configuration and Library Merger facility
Software Configuration and Library Management facility
Software Comparison and Library Management facility
None of the above

92)The number of VSAM files used for storing Intrapartition TDQs in a CICS region
equals

1
2
256
Depends on number of Intrapartition TDQs defined in region


93)Below is not a feature of TSQ

Definition not required in CICS control tables if data recovery not intended
Records written remain accessible until TSQ is explicitly deleted
TSQ defined with MAIN option is recoverable
Records can be read sequentially or directly


Ans:TSQ defined with MAIN option is recoverable

94)An INCLUDE member can contain instream data

TRUE
False

Ans:True

95) In a JOB stream if a blank line is there after //, what will happen to the execution of
the Job

The Job ignores the line and resume execution
The Job terminates execution at that line
the Job will give a syntax error
The job will consider this line as a commented line

The job terminates execution at that line

96) If coded PERFORM on JOB as well as on step, which one will be in effect for the
step

PERFORM coded on JOB
PERFORM coded on STEP
Default PERFORM
None of the above


Answer: Perform Coded on Step

97) REASON FOR SOC1

Reading a dataset opened in output mode
Bad subscript/index
Protection exception
Bad exit from a perform

Reading a dataset opened in output mode

Other reason

1 Input file record length is not equal to the length stated in the DD or
the FD.
2. IO error, damaged tape, device malfunction.
3. With disk, reading a dataset that was allocated but never written to.
i.e. The dataset is empty.
4. Writing to input file.
5. Concatenation of files with different record lengths or record formats.


98)Which TSO command releases a previously allocated dataset

UNALLOC
DEALLOC
RELEASE
DELETE

ANs : UNALLOC

99) How does DB2 determine what lock-size to use?

Based on the lock-size given while creating the tablespace
Programmer can direct the DB2 what lock-size to use
If lock-size ANY is specified, DB2 usually chooses a lock-size of PAGE
all of the above

Answer) all of the above

100)The precompiler searches __________ to resolve any SQL INCLUDE statements.

SYSLIB
SYSCOB
SYSSRC
all of the above

Answer) SYSLIB


101) What command is useful to cut multilpe times(for ex: 10 lines first and 10 lines
next) and paste them?

CUT 10 10 APPEND
CUT ADD
CUT APPEND
CUT '10' '10' ADD

CUT APPEND

102)If the LRECL specified in the JCL step is not same as the record length in the
respective program, what will be the error message

A file attribute mismatch was detected
A record length mismatch detected
Incorrect record length detected
Incorrect file length detected

Answer) A file attribute mismatch was detected *****


103) What will be the value of the parameter RO when the below proc PROCA is
executed?

//STNME SET RO=AB51

//PROCA PROC RO=AB52

--

--

//PSTEP1 EXEC PROCA,RO=AB63



AB51
AB52
AB63
None of the above

Ans: AB63

104)If REGION is coded as override (unqualified) for a proc


It will apply only for the first step
It will apply the same value of REGION for the all the proc steps
The region specified is equally divided and distributed to each step in the proc
None of the above

Answer ) It will apply only for the first step

105)What is EXEC CICS RETRIEVE ?


Used by Started tasks to get the parameters passed to them.


Used to retrieve CICS System Areas


Used to obtain main storage dynamically by application programs


All of the above


Answer: All the above

106)If a CICS region fails, locks are converted into ________ locks to ensure that data
integrity is
maintained while CICS is being restarted.


active


retained


released


None of the above


Answer: retained

107)When CICS performs a SHUTDOWN IMMEDIATE command,CICS does not close
files managed by file control


True

FALSE

Answer: True
CICS does not close files managed by file control. It is left to VSAM to close the files
when VSAM is notified by MVS that the address space is terminating. This form of closing files means
that a VSAM VERIFY is needed on the next open of the files closed in this way, but this is done
automatically

108)The storage allocated for CICS code and control blocks is known as


CICS-key storage


user-key storage


Both A) & B)


None of the above


Answer: CICS-Key Storage This is for CICS code and control blocks

User-Key storage is User application programs and data areas
The storage allocated for CICS code and control blocks is known as CICS-key storage, and the storage
allocated for your user application programs is known as user-key storage.

109)Whenever the message DFHSM0102 is sent to CICS console it indicates

CICS-detected Storage violations

Answer: the above statement is correct
Tip:- DFHSM0102
applid A storage violation (code X'code') has been detected by module modname.
Explanation
A storage violation has been detected by module modname. The code X'code' is the exception trace point
ID which uniquely identifies the type of storage violation.



110)For Transaction isolation to be enabled,storage protection should be enabled

True
FALSE

Answer: True


111) Keyword parameters is always followed by =

TRUE
FALSE

Answer: True


112)How to code apostrophe's as part of the value of a symbolic parameter?


Single apostrophe is enough
Two consecutive apostrophe is required
Apostrophe can't be coded in the value of a symbolic parameter
None of the above


Answer: Two consecutive apostrophe is required

113)The override of KEYWORDs need not be ordered by the same order as that of the
proc steps

False
TRUE

Answer: True

114)Stored procedure can contain ____________.

Static SQL
Dynamic SQL
Both a and b
none of the above

Answer: both a and b

115)How do you exclude the lines that contains string XYZ in 3.13 option

DPLINE 'XYZ'
EXLINE 'XYZ'
REMOVELINE 'XYZ'
None of the above


Answer: DPLINE XYZ

116)Audit process allows you to install the program into production which is not checked
out by you.
TRUE
FALSE


Answer: False

117) your record length is 80 and block size is 800 what will be the blocking factor

5
15
10
20


Answer ) 10 = Record Length * Factor is Block size


118)Consider the following code.

JOB INPUT NULL
DISPLAY 'HELLO'
STOP EXECUTE

JOB INPUT NULL
DISPLAY 'WORLD'
STOP

What will be the result ?


HELLO WORLD
HELLO
WORLD
Program Abends


Answer) Hello

119)To skip to the next page using DISPLAY we should use the parameter

NEWPAGE
NEXTPAGE
PAGE
None of these

Answer: Newpage

120)Which option of REPORT prints only totals ?


TALLY

SUMMARY

SUM

FINAL

Answer: Summary

121)How many TCB can have in each Stored Procedures address space?

One
More than one TCB
two only
three only


Answer) More than one TCB *****

122)In the Stored Procedure 3-part object names uses _________________.

1. DRDA access to access tables
2. Value specified in DBPROTOCOL when stored procedure Package is bound.
3. Value in Database Protocol on installation Panel

a) 1 alone

b) 2 or 3

c) 2 alone

d) all


Answer ) 2 0r 3
If you use 3-part object names or aliases for 3-part object names, the distributed access
method
depends on the value of DBPROTOCOL you specified when you bound the stored
procedure package.
If you did not specify the DBPROTOCOL bind parameter, the distributed access method
depends on the
value of field DATABASE PROTOCOL on installation panel DSNTIP5.


123)If the stored procedure runs in WLM established address space, your AMODE can
be ______.


24 bits

24 or 31 bits

31 bits

Any


Answer) 31 bits


124) To list all the TSO commands what you need to type at READY promote (or by
using ISPF/PDF command option -option 6)

LIST
HELP
LIST ALL
HELP ALL


Answer) HELP


125)What is the TSO command for Renaming a dataset?


REN
RENAME
Both (a) and (b)
None of the above


Answer) Both (a) and (b)

126)Using SCM tool we can control ________.

Program/component edits by keeping track of the development hierarchy version control)

Build (compile and link-edit) process

program/component promotions within the hierarchy.

All of the above


Answer) All the above

127) Emergency production fix changes can be directly moved to production.




TRUE

FALSE


Answer) True

128)Scratch Package option is used to_______________


Delete the Package

To delete baseline members

Both A) and B

None of the above


Answer: To delete base line members

129) What is the most common naming convention of TSQ queue-id?



Term-id + Transaction-id

Transaction-id + Program-id

Program-id + CICS region name

CICS region name + 'TSQ' suffix


Answer) Term-id + Transaction-id

130) failures that cause physical damage to a database or data set is recovered in CICS
using



forward recovery

backward recovery

Both A) & B)

None of the above


Answer: forward recovery

Some types of data set failure cannot be corrected by backward recovery; for example, failures that cause
physical damage to a database or data set. Recovery from failures of this type is usually based on the
following actions:

Take a backup copy of the data set at regular intervals.
Record an after-image of every change to the data set on the forward recovery log (a general log stream
managed by the MVS system logger)
After the failure, restore the most recent backup copy of the failed data set, and use the information
recorded on the forward recovery log to update the data set with all the changes that have occurred since
the backup copy was taken.
These operations are known as forward recovery.

Backward recovery, or backout, is a way of undoing changes made to resources such as files or databases.

Backout is one of the fundamental recovery mechanisms of CICS. It relies on recovery information
recorded while CICS and its transactions are running normally.

Before a change is made to a resource, the recovery information for backout, in the form of a before-image,
is recorded on the CICS system log. A before-image is a record of what the resource was like before the
change. These before-images are used by CICS to perform backout in two situations:

In the event of failure of an individual in-flight transaction, which CICS backs out dynamically at the time
of failure (dynamic transaction backout)
In the event of an emergency restart, when CICS backs out all those transactions that were in-flight at the
time of the CICS failure (emergency restart backout).
Note:

Although these occur in different situations, CICS uses the same backout process in each case--CICS does
not distinguish between dynamic backout and emergency restart backout. See CICS emergency restart for
an explanation of how CICS reattaches failed in-flight units of work in order to perform transaction
backout following an emergency restart.

Each CICS region has only one system log, which cannot be shared with any other CICS region. The
system log is written to a unique MVS system logger log stream. The CICS system log is intended for
use only for recovery purposes--for example, during dynamic transaction backout, or during emergency
restart. It is not meant to be used for any other purpose.


131)From restart point of view ,the resources required by CICS are

system log

global catalog data set

local catalog data set

All of the above


Answer) Sytem log

132) In CICS, recovery is managed at


Task Level

Transaction level

unit of work level

All of the above


Answer) Unit of work level



133)In CICS Storage violations problems can be due to



the result of loops

caused by poor performance

might be generated by the transaction getting the storage violation abend or by another
transaction which doesn't receive any message

All of the above


Answer ) The result of loops

134)Which of the following statement is correct?

Stored Procedure can be coded as re-entrant and re-usable program.
Stored Procedure can be coded as re-usable program but not as re-entrant program.
Stored Procedure can not be coded as re-entrant.

Stored Procedure can be coded as re-entrant and but not as re-usable program.

To prepare a stored procedure as reentrant, compile it as reentrant and link-edit it as
reentrant and reusable.

Ans:To prepare a stored procedure as reentrant, compile it as reentrant and link-
edit it as reentrant and reusable.


135)Which of the following statement regarding Encryption is correct?

Degrades the performance of the SQL

Requires extra processing time

Both a and b

none of the above


Answer: Both a and b


136)Which of the following statement regarding predicate is true for better performance?

1. Predicates should be on either leading or all index key columns

2. At least one predicates should be in the list of indexed columns

3. Predicates need not be indexed



a) 1 and 2
b) 1 and 3
c) 2 and 3
d) all of the above


Answer: 1 and 2

137)TSO Command to display dataset attributes

LIST

LISTALC

LISTCAT

LISTDS


Answer:LISTDS
===============================================================
===================

138)Assume that you are working on a CHANGEMAN package in DEV.
You want to promote one of the programs in that package to SYS. How do you do it?

You can individually promote that program

You need to do a full promote of the package for the first time in CHANGEMAN

You can promote it outside CHANGEMAN

None of these




Answer: You need to do a full promote of the package for the first time in
CHANGEMAN

Except for the first promote you can't selectivley promote a component to a promotion
level
higher than the package promotion level

===============================================================
========================


1. TSO Command to display dataset attributes

Ans: LISTDS


2. DB2 performs correlated subquery

Ans: True


3. What is a Hybrid Join?

Ans: Hybrid join is one of the methods that DB2 uses to join tables. This method has two
phases. During phase 1, DB2 scans the outer table and joins it with a suitable inner table
index based on the join columns. If the outer table does not have an index to provide the
join order, the outer table is sorted in the order of the join columns.


4. Local Predicate is

Ans: Local predicates reference only one table. They are local to the table and restrict the
number of rows returned for that table. Join predicates involve more than one table or
correlated reference. They determine the way rows are joined from two or more tables.


5. How does DB2 determine what lock size to use?

Ans: LOCKSIZE is defined with the CREATE TABLESPACE DDL.


7. Command to move a File pointer to a particular record in Vsam.

Ans: STARTBR


8. Represent a null dataset in JCL

Ans: DD DUMMY


9. What are the sub parameters in DCB?

Ans: LRECL, BLKSIZE, BUFNO, RECFM, KEYLEN, DSORG, OPTCD


10. When is the region parameter not specified in the Job?

Ans: If no REGION parameter is specified, the system uses an installation default
specified at JES initialization.
Default is 512K

32. What is TCB?

Ans: Originally CICS executed under a single operating system Task Control Block
(TCB).


33. What is CECI?

Ans: CICS Enhanced Command Interpreter


34. What is CICS ENQ?

Ans: ENQ - Schedule use of a resource by a task (enqueue).


21)Which is the most important table in a CICS-DB2 environment ?



File Control Table (FCT)

Resource Control Table (RCT)

Program List Table (PLT)

Journal Control Table (JCT)



Answer Resource Control Table

30) The Instream procedure


Must be coded after the last exec statement in the JCL

Must be coded after the first exec statement

Must be coded before the first exec statement and after the job statement

Can be coded anywhere in the JCL


Answer: Must be coded before first exec statement and after the job statement


The maximum number of instream procedure in a job is 15,
they begin with a PROC statement and end with a PEND statement, they can be invoked several times in a
job

33) If REGION is coded as override (unqualified) for a proc


It will apply only for the first step

It will apply the same value of REGION for the all the proc steps

The region specified is equally divided and distributed to each step in the proc

None of the above


Answer: if a region is unqualified it applies to first step only


Cond or Time unqualified applies to all steps

34)In a FILE statement _______________ parameter is mandatory



File-type

Record-type

Record Format

None of the above


Answer: Record format

35)The rule for DECIMAL columns stated you should always use odd precision. A
column needs to handle a value up to 9999.99. How would you define it?




DECIMAL (4,2)

DECIMAL (5,2)

DECIMAL (6,2)

DECIMAL (7,2)


Answer: DECIMAL (7,2)

36) New component in the base library need to be checked out before staging.




TRUE

FALSE


Answer: True

37) CICS SNT primary function is



Registers CICS storage areas

Registers storage area of application programs

Both (a) & (b)

Register security information of all CICS users


Answer : Register security information of all CICS USers (SNT is sign on table)

38)_______________ is not a SUB activity


PROC

JOB

SORT

None


Answer: JOB


41) Freeze panes in File - Aid


Answer: Hold (along with Row number)



42) Changes to design should be handles as per Configuration management procedure.




True

FALSE



Answer: True

54) Keyword parameters may be coded in any position of the JCL statement



True

FALSE


Answer: True

55) The following symbolic value assignment is correct (RO is the symbolic parm)


//PRSTP EXEC PROCA,RO=AB.X1




TRUE

False


Answer: False

57) Which one of the following is true for a qualified override of dd statement




stepname.ddname=

ddname.stepname=

Both of the above

None of the above


Answer: stepname.ddname

58) Which of these is symbol used for continuation?



-

+

Both of the above

None of the above



Answer: -


62) What is the maximum length that can be defined for data type Numeric?




19

18

17

16


Answer: 18

63) When we have a Static variable used in a print statement data is transferred to the
print line during _________




Spooling

Actual Printing

Static cannot be used in Report

None of the above


Answer: Actual Printing

64) Stored Procedure running in WLM established address space can have __________.




Explicit CAF

Implicit CAF calls

RRSAF calls implicitly

RRSAF calls explicitly


Answer: RRSAF calls implicitly

Recoverable Resource Manager Services attachment facility

65) Which of the following order is correct?


In the Stored Procedure, Order of statement in Compound Statement


1. SQL variable and condition Declaration


2. Cursor Declaration


3. Handler Declaration


4. Procedure body statements




a) 2,3,1,4

b) 2,1,4,3

c) 1,2,3,4

d) 1,3,2,4


Answer: 1,2,3,4 (C)

66) Which of the following statement regarding EXPLAIN is correct?


1. Gives information about Plan, Package


2. Design Database and indexes


3. Information about the access path chosen for the query




a) 1 and 2

b) 1 and 3

c) 2 and 3

all of the above


Answer: 1 & 3

67) Which of the following regarding Table spaces scan is correct?


1. Used when more number of rows are returned


2. Used when no indexes are available


3. Used when indexes are available and they have low cluster ratio




a) 1 and 2

b) 1 and 3

c) 2 and 3

all of the above

aNS: ALL THE ABOVE

68)If more than one index is used, DB2 ______________.



Will choose one with least filter factor

Will choose one with best filter factor

Will not consider the filter factor itself

Does not have any concept called filter factor


Answer: Will choose one with best filter factor

69)What does mean One Fetch access?


When a query returns needed row in one step of page access

When a query returns needed row in one step of data page access

When a query returns needed row in one step of index page access

none of the above


Answer: When a query returns needed row in one step of page access

oNE FETCH
When a query returns needed row in one step of page access
Only one table in the query
MIN or MAX column functions
No GROUP BY

70) What field in the SQLCA can you check to determine if your SQL statement
executed successfully?

SQLCODE field

SQLSTATE field

Both a and b

none of the above


Answer: SQLCODE field

71) The following TSO commands are generally called as ________.


ASM
COBOL
PLI
FORT



TSO Language Processing Commands

TSO Program Control Commands

TSO Data management Commands

TSO System Control commands


Answer: TSO Language processing commands

73) In a SCM tool, _________ function inspects the staging libraries of a package for
out-of-sync conditions.

STAGING

AUDIT

CHECKOUT

All of the above



Answer: All the above

================================
78) Overhead (Processor and Storage requirements) is highest with


XCTL

LINK

CALL

LOAD


Answer: Link


Overhead (but also flexibility) is highest with the XCTL and LINK commands.
Both processor and storage requirements are much greater for a LINK command than for
an XCTL command.
Therefore, if the invoking program does not need to have control returned to it after the
invoked program is processed,
it should use an XCTL command.

===============================================================

79)Can a SQL COMMIT be issued within a CICS program

Yes, but only if executed with CICS SYNCPOINT before the COMMIT
No
Yes
Yes, but only if executed with CICS SYNCPOINT after the COMMIT

Answer: Yes but only if executed with CICS SYNCPOINT before the commit


80) Which areas are normally dumped with DUMP command ?

TCA

Trace Table

General Registers

All of the above



Answer: All the above

81)the maximum amount of time CICS is to wait when there is no work to do, that is, no
ready task to dispatch within CICS is specified using


Interval Control Value (ICV)

Interval Control Value for Runaway Tasks (ICVR)

Interval Control Value for Terminal Scan Delay

None of the above


Answer: Interval Control Value

82) Information on all possible CICS tasks is stored in

TXT

PCT

PPT

FCT


Answer: PCT

83) For communication between CICS and non-CICS systems, or between CICS systems
that are not in the same operating system or MVS sysplex through SNA is called

multiregion operation (MRO)
intersystem communication (ISC).
Both A) & B)
None of the above

Answer: Intersystem communication



84)WLM is ___________

Component of OS/390
Manages the transaction through the use of dynamic transaction routing.
Manages number of address spaces in each environment
All of the above

Asnwer: All the above


WLM (Work Load Manager) is a component of OS/390. It is
responsible for managing the transaction workload through the use of dynamic transaction routing.
WLM can manage a number of address spaces for each environment.


85)Stored Procedures are stored in
SYSIBM.SYSROUTINES

87)List sequential prefetch reads ________________.

Set of data pages determined by list of RIDs
Set of pages
Set of Index pages
none of the above

Answer: Set of data pages determined by list of RIDs

88) Build for JCL components like PROC/CONTROL cards etc is mandatory


TRUE
FALSE

Answer: False (Not known)

89)An Extrapartition TDQ is a group of sequential records which


are produced and processed by same and/or different transactions within a CICS region

interfaces between the transactions of the CICS region and the systems (or batch jobs)
outside of the CICS region

are created and deleted dynamically by an application program without specifying
anything in CICS control tables

All of the above

Answer: interfaces between the transactions of the CICS region and the systems (or batch
jobs) outside of the CICS region

90)If a CICS region fails, locks are converted into ________ locks to ensure that data
integrity is maintained while CICS is being restarted.



active
retained
released
None of the above

Asnwer: retained

91)
The CICS task control command EXEC CICS SUSPEND will cause


task suspension for a short time only
allowing other running transactions to use the CPU
Both A) & B) None of the above



Asnwer Both A and B

92)the maximum amount of real CPU time that is allotted to a task before the task has to
return control to CICS is specified using


Interval Control Value (ICV)
Interval Control Value for Runaway Tasks (ICVR)
Interval Control Value for Terminal Scan Delay
None of the above

Answer ICV

93)CICS restarts in warm restart mode when


START=AUTO is specified in restart indicator of CICS recovery manager
CICS region is normally shut down
CICS catalogs & system log information is available
All of the above

Answer: All of the above


94)Dynamic File Open / Close (DFOC) can be accomplished with the following approach


DFOC by LINK command
DFOC by SET command
DFOC by batch job
All of the above


All of the above


95)How you can see the data on clipboard after the CUT statement


CUT LIST
CUT DISPLAY
CUT APPEND
CUT SHOW


Answer B

96)How do you compare the columns 1 to 10 and 40 to 50 in an input file with an output
file through 3.13 option?


Using the command CMPCOLN 1:10 40:50
Using the command COLNCMP 1:10 40:50
Using the command COLUMN 1:10 40:50
Using the command 1:10 40:50 COMPARE


Answer A


97)What is the most convenient way to get a DECLARE TABLE statement into your
program?


INCLUDE a member created by DCLGEN
Simply code it yourself Use a text editor to copy an existing DECLARE TABLE
statement into your program.
none of the above



Answer A

98)If more than one index is used, DB2 ______________.


Will choose one with least filter factor
Will choose one with best filter factor
Will not consider the filter factor itself
Does not have any concept called filter factor



Answer b


99)Handlers are used only when there is ______________.

When there is SQL error
When there is SQL warning
When more than one row are returned
all of the above



Answer: D


100)If the stored procedure runs in WLM established address space, you should use
_________.


DSNALI
DSNRLI
Both a and b
none of the above



Answer: A


DSNALI -The language interface module for the call attachment facility. Link-edit
or load this module if your
stored procedure runs in a DB2-established address space.

DSNRLI - The language interface module for the Recoverable Resource Manager
Services attachment facility.
Link-edit or load this module if your stored procedure runs in a WLM-established
address space.
If the stored procedure references LOBs or distinct types, you must link-edit or load
DSNRLI.


111)Which variable is populated by DSINFO to indicate the number of members of a
partitioned dataset?


#MEM Z#MEM ZD#MEM ZDS#MEM



Answer D

112)If you have 2 JOBs submitted with same job name and you want to cancel one of the
JOB

TSO CANCEL jobname
TSO CANCEL jobname(jobid)
Any of the above
None of the above



Answer B


113)CICS maintains _______ log to support transaction backout for recoverable
resources.


Forward recovery log
System log
journal
All of the above



Answer : D


114)CICS ensures that an application program associated with one transaction cannot
accidentally overwrite the data of another transaction by using


Storage protection
transaction isolation
Both A) & B)
None of the above



Answer B


115)The number of physical files used for storing Extrapartition TDQs in a CICS region
equals


1
2
256
Depends on number of ns defined in region




Answer

116)Whenever the message DFHSM0102 is sent to CICS console it indicates


CICS-detected Storage violations

Storage violation not detected by CICS

Either A) & B)

None of the above

Asnwer: CICS-detected Storage violations


117)Which of the following statement regarding Materialized Query tables is correct?


Used to store the results of query in advance in the case of dynamic queries

DB2 may not use the materialized query tables if they do not have any performance
advantage

They need special registers to be used by DB2

all of the above

Answer:Used to store the results of query in advance in the case of dynamic queries

Dynamic queries that operate on very large amounts of data and involve multiple joins
might take a long time to run.
One way to improve the performance of these queries is to generate the results of all or
parts of the queries in advance,
and store the results in materialized query tables.


118)Column Correlation is _______________.

Two columns in a table vary independently
Two columns in a table do not vary independently
Both a and b
none of the above

Asn:Two columns in a table do not vary independently

===============================================================
=======

Does a query have a problem with column correlation?
Two columns in a table are said to be correlated if the values in the columns do not
vary independently. DB2 might not determine the best access path when your
queries include correlated columns



119)Stored procedure can call Other _________________.



host language subprogram

host language subprogram and stored procedures

host language subprogram, stored procedures and User defined functions.

host language subprogram and User defined functions.


Ans: host language subprogram, stored procedures and User defined functions.

120)Stored procedures address spaces can be established by ____________.



DB2 alone

WLM alone

Both a and b

none of the above

Answer: both a and b

121)Which of the following is not a valid Cursor positioning technique in CICS



Static Cursor Positioning
Symbolic Positioning
Standard Positioning
Relative Positioning

Ans: c

122)Once a HANDLE CONDITION command is issued for a specific condition, how
long does it remain in effect?



Until another HANDLE CONDITION executes for the same condition
Until an IGNORE CONDITION command executes for the same condition
Until the program terminates
All of the above


Ans: All the above


EIB doesn't contain this info.

Trans id
Terminal Id
User Id
None



The attribute which causes data field not to be entered or cleared



Unprotected
Normal
Initial Value
Autoskip



CICS maintains information for DB2 access in



DCT
FCT
RCT
PCT



XCTL command causes an implicit SYNCPOINT to be issued



True
FALSE
===============================================================
How many times should you assemble a mapset?



2
1
0
3
Ans:- 2

Tip:- You usually have to assemble twice, to create the map set in two different forms.
The TYPE option in the DFHMSD macro tells the assembler the form to produce in any
particular assembly.
=============================================================

Which SQL command successfully removes uncommitted changes from a DB2 database?



ROLLBACK
DELETE
DROP
DECOMMIT

Ans: Roll back
========================

Given the transaction:

"CREATE TABLE t1 (id INTEGER,CONSTRAINT chkid CHECK (id<100))"

"INSERT INTO t1 VALUES (100)"

"COMMIT"

Which of the following results from the transaction?



The row is inserted with a NULL value
The row is inserted with a value of 100
The row insertion with a value of 100 is rejected
The trigger called chkid is fired to validate the data



======================================================
How do you retrieve the first 5 characters of FIRSTNAME column of EMP table?



SELECT (FIRSTNAME,1,5) FROM EMP;
SELECT (FIRSTNAME,5,1) FROM EMP;
SELECT SUBSTR (FIRSTNAME,5,1) FROM EMP;
SELECT SUBSTR (FIRSTNAME,1,5) FROM EMP;
===============================================================
============

Precompiler is a ___________.



Processor
Preprocessor
compiler
Interpreter

===============================================================
===============

Sequential pre fetch is generally used _____________.


For table space Scan
For Index Space Scan
Both a and b
none of the above

Ans:Sequential prefetch is generally used for a table space scan.


===============================================================
========


What is the most convenient way to get a DECLARE TABLE statement into your
program?

INCLUDE a member created by DCLGEN
Simply code it yourself
Use a text editor to copy an existing DECLARE TABLE statement into your program.
none of the above
===============================================================
=======


Non Column expressions _________________.


Takes less time for the query to execute
Takes long time for the query to execute
Non Column expressions cannot be evaluated
More processor intensive

Ans: Take less time for the query to execute

one side of the operator, and all the other values are on the other side of the
operator. The expression on the right is called a noncolumn expression. DB2 can
evaluate many predicates with noncolumn expressions at an earlier stage of
processing called stage 1, so the queries take less time to run.




=========================================

120) Db2 Performs _______________


Correlated sub query first and then non correlated sub query
Non Correlated Sub query first and then Correlated sub query
Only correlated sub query
Only non correlated sub query

Ans:Non Correlated Sub query first and then Correlated sub query

Regardless of coding order, DB2 performs noncorrelated subquery predicates before
correlated subquery predicates,
unless the subquery is transformed into a join.


============================================================
122)
Which of the following statement is correct?


WLM can start a stored procedure
WLM can stop a stored procedure
Both a and b
none of the above

Ans: both a & b
=======================================

123) CHANGEMAN is mainly for____________.



To compile the program
To checkout the components
Version control of components
None of the above


Ans:Version control of components

===============================================================
===============

Which of the following element cannot be staged in to CHANGEMAN?


PROGRAM
JCL
COPY BOOK
None of the above

Ans: None of the above
===============================================================
=========


What buffer sizes are not available in the LSR pool at CNS?



4K
6K
8K
10K

6k or 10k
===============================================================
============


For efficient coding, what options are true?

In IF statement, conditions within combined conditions are evaluated in the order they
occur
Should use internal sort within a program for better performance
None of the above
Both A & B s

In IF statement, conditions within combined conditions are evaluated in the order they
occur

===============================================================
==============
What is the order from Best to Least efficiency?

1. Sequential Access 2. Dynamic Access 3. Random Access
1. Random Access 2. Sequential Access 3. Dynamic Access
1. Dynamic Access 2. Random Access 3. Sequential Access
1. Random Access 2. Dynamic Access 3. Sequential Access

Ans: 1. Sequential Access 2. Dynamic Access 3. Random Access

===============================================================
=======
PASS disposition(DISP) parameter is coded only for



Normal disposition
Abnormal disposition
Status disposition
None of the above

Ans: Normal dispostion
===================================================

The Catalog entry of non-VSAM data set contains



Dataset name only
Dataset name, devise type and volume name
Only devise type and volume name
Dataset name and record length only,

Ans: Dataset name, devise type and volume name

===============================================================
=======
To check the success of SORT


SORT-RETURN special register can be used
RETURN-CODE of COBOL program should be checked
OUTPUT-PROCEDURE should be used
RETURN statement should be used

Sucess of sort: SORT-RETURN special register can be used

0 -successful completion
16 - unsuccessful completion

===============================================================
==
In a linear Search, if there is no matching value for the search argument what happens to
the program execution?



The code following the SEARCH statement is executed
The code after the AT END statement is executed
Abend occurs
a) or b)

ans: a and b

===============================================================
==========================================
MAP compiler option is used to



Generate the physical map for the COBOL program
Generate a map of the COBOL verbs used
Produce a listing of the items defined in the data division.
None of the above



===============================================================
==================
Which of the below aspects need to be assessed before tuning
a program?



Algorithms of the program
Data structures
Source code
All of the above

Ans: All of the above

===============================================================
==

To have a differed restart, the RD parm of JCL should be



RD=R
RD=RNC
RD=NR
None of the above

aNS: RD = NR

For defered restart code RD paramet to NR

RD=R indicates restart is to occur at the latest check point
RD=RNC indicates that no check point is to be written and any restart is to occur at
begging of the job step and in this case
rerun clause is unnecessary

If you ommit RD parameter the CHKPT macro instruction remains active and check
points can be taken during processing.

RD coded on job stmt overrides any RD parameters on the EXEC statement

==================================================

If you are using DFSORT and you need to add checkpoint,
which is the JCL dd name you need to specify for the checkpoint records?



SORTWRK
SORTCKPT
SORTIN
SORTOUT

aNS: SORTCKPT

=============================================================

By putting constant and duplicate index on the left


performance will decline
No change in the performance
performance will improve
None of the above

Ans: performance will improve

You can reduce the runtime by making constants and duplicate indexes or supscripts the
leftmost ones.

===============================================================
============



For a most efficient PACKED-DECIMAL data item, which of the below needs to be
ensured?

Sign clause in PIC
Less than 16 digits for the data item
Odd number digits
All of the above

Ans: All of the above


===============================================================
================

In a linear Search, if there is no matching value for the search argument what happens to
the program execution?



The code following the SEARCH statement is executed
The code after the AT END statement is executed
Abend occurs
a) or b)


Ans: a or b

If the entire table is searched and no condition is met then , the AT END imperative stmt
is executed if any
If we do not use at end control passes to the next stmt in your program


=======================================================


Which of the following statement is correct?



WLM can start a stored procedure
WLM can stop a stored procedure
Both a and b
none of the above

Ans: WLM starts and stops the stored procedures as required.
Both A and B
======================================

Which of the following statement cannot have in Stored procedure?



COMMIT
SET CURRENT SQL ID
COMMIT and SET CURRENT SQL ID
none of the above


Ans: commit and set current SQL ID
Do not include these SQL statements in your stored procedure:
COMMIT
SET CURRENT SQLID


=========================================

Potrebbero piacerti anche