Sunteți pe pagina 1din 7

VSAM FAQ's

VSAM
1. What is VSAM
a. Virtual System Access Method
b. Vertical System Access Method
c. Virtual System Access Method
d. Virtual System Architecture Method
2. Which Utility program is used to develop the AMS commands
a. IDCAMS
b. IEBCOPY
c. IEHPROGM
d. IEBPTPCH
3. How many extents are possible while creating a VSAM dataset
a. 123
b. 16
c. 14
d. 15
4. Disadvantages of VSAM Cluster
a. Faster Access
b. Additional Storage
c. Reorganisation
d. Device Independent
5. In which dataset embedded free space is available between records
a. ESDS
b. KSDS
c. RRDS
d. LDS
6. KSDS base cluster is a combination of
a. DATA & INDEX Compnent
b. DATA & AIX Cluster
c. INDEX & AIX Cluster
d. All of the above
7. KSDS stands for
a. Keyed Sequential Data Set
b. Keyed Sequence Data Set
c. Key Sequence Data Set
d. Keyed Sequential Data Set
8. KSDS record will be retrieved randomly using
a. Record Key
b. RRN

c. Sequence
d. Numbering
9. What does the File Status 10 denote
a. End of File
b. Wrong values
c.
10. Which command is used to read the contents of a dataset
a. Print
b. Value
c. List Cat
d. Repro
11. Which dataset is having Fixed Length slot
a. KSDS
b. RRDS
c. LDS
d. ESDS
12. Which Data is very similar to ESDS
a. KSDS
b. RRDS
c. LDS
d. ESDS
13. Which commands is used to load records in VSAM Dataset
a. Verify
b. Alter
c. Jobcat
d. Repro
14. A control Area should have a minimum of
a. 5 C.I
b. 4 C.I
c. 2 C.I
d. 3 C.I
15. What is the Maximum size of a Control Interval
a. 512 Bytes
b. 1024Bytes
c. 32 kb
d. 56 kb
16. Free Space can exist between

a. Contorl Intervals
b. Within a Control Area
c. Entire Control Area
d. All of the above
17. Control Area is a group of
a. Records
b.Blocks
c. C.I
d. Files
18. Auto - Reorganisation is possible in VSAM dataset [True / False]
19. Duplicate alternate key in Vsam is given thru which File Status
a. 02
b. 04
c. 10
d. 22
20. Duplicate Record key in Vsam is given thru which File Status
a. 02
b. 04
c. 10
d. 22
21. In which Data set can we have an AIX
a. KSDS
b. ESDS
c. RRDS
d. Both a & b
22. CI and CA Splits occurs in
a. KSDS
b. ESDS
c. RRDS
d. LDS
23. How many AIX will be there for a Base Cluster
a. 253
b. 254
c. 255
d. 252
24. Minimum Size of a C.A
a. 2 Track
b. 3 Track
c. 1 Track

d. 7 Track
25. Maximum Size of a C.A
a. 2 Cylinder
b. 3 Cylinder
c. 1 Cylinder
d. 7 Cylinder
26. In ESDS which operation is not possible
a. Read
b. Write
c. Rewrite
d. Delete
27. IDCAMS utility is used for
a. Define VSAM
b. Load Records into Vsam
c. Both a and b
d. None of the above
28. A RDF is how many bytes long
a. 4 Bytes
b. 5 bytes
c. 3 Bytes
d. 7 Bytes
29. Minimum Size of a Control Interval
a. 1024 Bytes
b. 2 Tracks
c. 512 Bytes
d. 256 Bytes
30. A CIDF is how many bytes long
a. 4 Bytes
b. 5 bytes
c. 3 Bytes
d. 7 Bytes
31. Which function updates the AIX for all insertions on the Base Cluster
a. Up Date
b. Up Grade
c. Define
d. Alter
32. AIX is a special type of
a. KSDS
b. ESDS

c. RRDS
d. LDS
33. Which command is used to load records in AIX
a. BLDINDEX
b. REPRO
c. ALTER
d. PATH
34. Which command is used to change the attributes of the VSAM existing
a. ALTER
b. RENAME
c. CHANGE
d. MODIFY
35. Which parameter is used to Delete the entry of a GDG
a. Delete with Force
b. Delete
c. Drop
d. Erase
36. ESDS stands for
a. Entry Sequence Data set
b. Entry Sequential Data set
c. Entry Sequenced Data set
d. Entity Seqquenced Data set
37. Which command makes a Back up of Dataset
a. Import
b. Export
c. Repro
d. Transfer
38. Which one is a MODAL Command
a. IF THEN ELSE
b. WHEN
c. WHILE
d. DO WHILE
39. For which value of Max CC execution will be Abnormally terminated
a. 0
b. 4
c. 8
d. 16
40. Which commands controls execution of statements
a. MODAL

b. EXPORT
c. IMPORT
d. ALTER
41. ALL VSAM datasets resides in the DASD [True / False]
42. An LDS consists of no C.I [True / False]
43. Records from a ESDS can be accessed either sequentially or by RBA [True / False]
44. The alternate record key is not unique for
a. KSDS
b. ESDS
c. AIX
d. LDS
45. Which parameter is used to specify RRDS
a. Indexed
b. Non-Indexed
c. Numbered
d. Linear
46. In which cluster type the records are added to the end of the position
a. KSDS
b. ESDS
c. RRDS
d. LDS
47. Which command is used to make a write protective dataset
a. ALTER
b. PRINT
c. VERIFY
d. ERASE
48. What is the default option for Shareoptions
a. (2,3)
b. (4,5)
c. (3,4)
d. (6,7)
49. Which mode will be helpful for appending records in ESDS
a. Output
b. Extend
c. I-O Mode
d. Input
50. What is the default character in which VSAM datasets will be printed

a. Char
b. Dump
c. Hex
d. None of the above

S-ar putea să vă placă și