Sunteți pe pagina 1din 17

T

h
e

16:CICS translation will add COPY statement for DFHEIVAR Block. ( T / F ).


When will db2 not use the INDEXED column even if the column are INDEXED
.sms cannot manage ? a. pdsb.gdg c isam d vsam
12. Is it possible to trigger JCL program from REXX?
14. Diffrenece b/w FIND and SEEK keyword in REXX?
0. CICS provides itsown multiuser environment ?? T/F21. Program which use XCTL
will be removed from main storage?? T/F
25. Testing done for one application transaction at a time is called??
7. To restart program operator must authorize the RESTART?
13.

o
p
t
i
m
i
z
e

REXX reserved word


)
Access mode for a file when value is placed in record key?2)
JCL parameter that determines whether th
6)
For moving data string handling is slower than char to char move? T/F
2)
How much time loop will run:Perform 100-para varying x from 1 by 1 until x=10
14)
If JCL have 6 DD files and program is using only 4. What will happen?Ans:
5)
PARM used as override (unqualified) for a PROC.It will be applicable to the single PROCApplicable to all the PROCs
14) Which of the following is true?1.You can use static as well as dynamic call of the
same subprogram when you use a NODYANAM call2. You cannot use dynamic calls
when you use a NODYNAM option3. you can use only static call when you are using

NODYNAM optin4. You can never call a subprogram


35)A batch program adds new employees to arious table in the corporate
personaldatabase which of the following recovery after which any update can be
commited?1.Adding all new employee to all tables2.Adding a single new employee to
all relevant tables3.Adding a single new employee to tables4.Adding a single new
employee to any one of the tables
37)Materialized query tables are ______1)USER Created and SYSTEM
Maintained tables2)SYSTEM created and Maintained tables3) USER created and
SYSTEM/USER Maintained tables4) All of the above
38) What is the best reason for providing extra WHERE clause condition when youare
JCL1. Better documentation2. The more qualified your condition , the safer it is3.To
enable DB2 to decide on the best way to access the data4.All of the above
40) If there is qualified name DD name override and qualified dd name override for
a particular PROC.1.the Unqualified DD name will be applied on the
same procstep where the qualified ddname is applied2.The unqualified DD name will
applied to first step of the PROC3.The unqualified DD name will be applied to last step
of the PROC4. Will get JCl error as there is no qualifier for the second override
41) The subprogram will be in the initial step each time it is called if1. the initial
attribute is specified2.A program is dynamically called and cancelled3. either 1) or 2) is
done4. Neither 1) nor 2)
42) structured programming techniques n be used to improve optimization1 true2 false
4.Using the mapset name or map name depends on which of the following?The number
of maps defined in a mapsetThe number of mapsets defined in a programThe number of
fields defined in a mapAll of the above

27. Which of the following statement is true about out-of-sync condition during the

audit process in a SCM tool?

29. SQL needs COBOL/PL1's help to do ONE of the tasks listed below. From what

youknow of SQL, which task do you think is best done by embedding SQL in a

COBOL/PL1 program?

Create a tableProduce a one-time listing of all rows from one or more tables

Update a table based on values contained in a transaction fileGrant another user

authority to access a table you created

37.How can you enhance processing of large files?Split and concatenate the large files

into multiple smaller filesExecute multiple steps with smaller files of the main large

fileIncrease the number of buffers to the allocated file None of the Above

Consider the following code :WORKING-STORAGE SECTION.77 WS-X PIC

9(02).77 WS-Y PIC 9(02).PROCEDURE DIVISION.PERFORM PARA-A VARYING

WS-X FROM 1 BY 1 UNTIL WS-X > 4AFTER WS-Y FROM 1 BY 1 UNTIL WS-Y >

10.

10

11

For a SMS managed New datasets , KEEP implies CATLGTrueFals

If there is a qualified dd name override and unqualified dd name override for a

particularPROCThe unqualified DDname will be applied on the same procstep where

the qualified ddname is appliedThe unqualified DDname will be applied to first step of

the PROCThe unqualified DDname will be applied to last step of the PROCWill get JCL

error as there is no qualifier for the second override

What statements are true for Sort step?Allow three times the file size for sort work space

allocationsUse minimum three sort work DD'sAlways code sorted data sets to be

cataloged

All of the Above

What buffer sizes are not available in the LSR pool at CNS?4K6K8K10K

Given the transaction:"CREATE TABLE t1 (id INTEGER,CONSTRAINT chkid

CHECK (id<100))""INSERT INTO t1 VALUES (100)""COMMIT"Which of the

following results from the transaction?The row is inserted with a NULL valueThe row is

inserted with a value of 100The row insertion with a value of 100 is rejectedThe trigger

called chkid is fired to validate the data

REWRITE command automatically unlocks record after executionTRUEFALSE

Which of the following is true about Random Access and Alternate Keys?

Only the first record written of a series of records with duplicate keys can be

retrieved

All the records with duplicate keys will be retrieved one by one in any orderAll the

records with duplicate keys will be retrieved in the order stored in the file None of the

above

Which one of the following is true for a qualified override of KEYWORD

parametersstepname.KEYWORD=KEYWORD.stepname=KEYWORD=Both of the

above

Block Contains 0 results into?Significantly improve file processing time with respect to

CPU timeSignificantly improve file processing time with respect to elapsed time None

of the aboveBoth A & B

How do you compare data set lines between 50 and 80 lines in 3.13 option?CMPLINE

TOP 50 BTM 80LINECMP TOP 50 BTM 80CMPLINE TOP 50 BOTTOM

80LINECMP TOP 50 BOTTOM 80

Which of these cannot be done with SCLM?Change ownership of modulesCreates

Archdefs, Lecdefs, and Binds for new membersSearch for copybooks in programsSearch

for subroutines in programs

Which of the following statement is correct?

Stored procedure cannot access tables at other DB2 locationsStored procedure can

access tables at other Db2 locations using Connect Statement aloneStored procedure can

access tables at other DB2 locations using 3 part object namesaloneStored procedure can

access tables at other DB2 locations using Connect statement or 3 part object names or

private protocols

Which of the following is not true as far as external procedure is concerned?Store

procedure Definition Specifies the name of the stored procedure program.Define the

stored procedure to DB2 by preprocessing a CREATE PROCEDUREstatement, then

executing the CREATE PROCEDURE statement statically ordynamicallyDefine stored

procedure to DB2 by executing the CREATE PROCEDURE statement.none of the

above

93)Below is not a feature of TSQ


Definition not required in CICS control tables if data recovery not intended
Records written remain accessible until TSQ is explicitly deleted
TSQ defined with MAIN option is recoverable

EIB doesn't contain this info.


Trans id
Terminal Id

User Id

None

MAP compiler option is used to

Generate the physical map for the COBOL program


Generate a map of the COBOL verbs used
Produce a listing of the items defined in the data division.
None of the above

If there is a qualified dd name override and unqualified dd name override for a


particular PROC

The unqualified DDname will be applied on the same procstep where the qualified dd
name is applied
The unqualified DDname will be applied to first step of the PROC
The unqualified DDname will be applied to last step of the PROC

Will get JCL error as there is no qualifier for the second override
What statements are true for Sort step?
Allow three times the file size for sort work space allocations
Use minimum three sort work DD's
Always code sorted data sets to be cataloged
All of the above

Which of the following statement is true about out-of-sync condition during the
audit process in a SCM tool?

copybooks being modified after compiling the source component that calls them
load module being modified after the composite load component that calls them has
been
a package containing a load component that does not match its source component
All of the above

37.How can you enhance processing of large files?


Split and concatenate the large files into multiple smaller files
Execute multiple steps with smaller files of the main large file
Increase the number of buffers to the allocated file

None of the Above

27. Which of the following statement is true about out-of-sync condition during the audit process in a
SCM tool?
copybooks being modified after compiling the source component that calls them
load module being modified after the composite load component that calls them has been
a package containing a load component that does not match its source component

All of the above


IN CASE OF OVERRIDE (PROC DD STATEMENT) THE OVERRIDE OF AN
EXISTING DD STATEMENT SHOULD BE CODED BEFORE ANY NEW DD
STATEMENT ADDITIONS .IS THIS TRUE
TRUE /FALSE

What statements are true for Sort step?

Allow three times the file size for sort work space allocations
Use minimum three sort work DD's
Always code sorted data sets to be cataloged
All of the above
16. moderate ci size
a. 4029
b. 1029
c.
1)

For moving data string handling is slower than char to char move? T/F
2) Process of using a set of registry variable to configure system which has DB2
a. Tuning
b. Pre-fetching
c. Buffering
d. Correlation

152. List Sequential pre fetch prefers ________________.


Single index that has cluster ratio greater than 80%
Multiple index that has cluster ratio lower than 80%
Multiple index that has cluster ratio greater than 80%
Single index that has cluster ratio lower than 80%

204. If you want to move the file pointer to a particular record in a VSAM file, which keyword will you
use?
LOCATE
POINT
SET
GOTO
Ans:
205. FILE INFILE1
IF1-REC 1 80 A
FILE OUTFIL1
OF1-REC 1 80 A
OF1-A 1 4 N
WS-A W 10
10
30

60
Program Abends
206. REPORT COL-EX
LINE 1 COL 1 ABC SYSTEMS, INC. COL 60 SYSDATE
LINE 3 NAME-FIRST NAME-LAST
What is the output of this report?
Report will have details as mentioned in the report definition
LINE 3 without LINE 2 is an error
Usage of COL parameter is invalid
None of the above

ILE FILEA
NAMEA 1 10 A
JOB INPUT FILEA FINISH WRAP-UP
WRAP-UP PROC.
DISPLAY LAST RECORD WAS NAMEA
END-PROC
What is the output?
a) Displays the message with NAMEA value of last record
b) Displays the message only as NAMEA will be blank
c) Displays the message with JUNK values as we have reached EOF.

d) Invalid reference to FILEA.


8. Which of the following is not true?
a) Use the command BIND PACKAGE to bind the stored procedure
b) Pacakge for the stored procedure does need to be bound with the PLAN for the program that
calls is
c) Owner of the package that contains SQL statement CALL must have the EXECUTE
privilege on all the packages that a stored procedure can access

d) All of the above


53. In an on-line environment, how can you prevent more than one user from accessing the same Trans
same time:
a) Issuing an EXEC CICS DEQ against the TDQ
b) Issuing an EXEC CICS ENQ against the TDQ
c) Issuing an EXEC CICS SUSPEND against the TDQ

d) Issuing an EXEC CICS RETRIEVE against the TDQ


. consumption in Pseudo-conversational program is reduced by
a) Reduced Resource Contention
b) Shotened Exclusive control

c) Bboth a and b
d) None of the above

ans =data transmission


60. The mirror transaction can be defined as
a) A transaction initiated in a CICS system in response to a function shipping request from
another CICS system.
b) Returns the acquired data to the originating CICS system
c) Recreates the original request and the request is issued
d) All of the above

98. In Rex special value -20 indicates that the command was not recognized
Command was not recognized
Function was not recognized
Value was not recognized
None of them

99. Which command code is used to retrieve more than one segment along the hierarchal path to the lowest
level segment with one IMS call?
D
N
P
L

100. Which key field is not used in the SEGM macro?


NAME
PARENT
POINTER
BYTES

101. Which of the following PROCOPTallow the program to retry once when the retrieve fails?
GO
GON
GOT
G

Which is the most appropriate way to execute a program immediately after CICS start-up?
Specify a Post-Initialization entry in Program List Table
Specify a Journal entry in Journal Control Table
Define an entry in DCT and use Cold Start
Specify an entry in Execution Interface Program
Ans:

Which of these modifies summary line totals?


AFTER-BREAK
AFTER-LINE
BEFORE-BREAK

BEFORE-LINE
210. File Presence Condition can be checked using __________
IF FOUND <filename>
IF PRESENT <filename>
IF <filename>
IF TRUE <filename>

55. Resources consumption in Pseudo-conversational program is reduced by


e) Reduced Resource Contention
f) Shotened Exclusive control
g) Bboth a and b
h) None of the above
Which is the most appropriate way to execute a program immediately after CICS start-up?
Specify a Post-Initialization entry in Program List Table
Specify a Journal entry in Journal Control Table
Define an entry in DCT and use Cold Start
Specify an entry in Execution Interface Program
Ans:

1. Which of the following statement is not correct?


a) General is used when the calling program pass null values for the input parameters to the stored
procedure
b) General with null is used when the calling program pass null values to ay parameter passed to
the stored procedure
c) DB2 SQL lets you to supply null value to any parameters that is passed to the stored procedure
d) DB2 SQL is a valid linkage convention for REXX language stored procedure

43 When DB2 will not use the INDEX columns even it the columns are INDEXed?
The column definition does not exactly match the host variable definition in length and data type.
use an arithmetic expression in a condition
to update an indexed column
all of the above

S-ar putea să vă placă și