Академический Документы
Профессиональный Документы
Культура Документы
If the records are larger than the CI size, for ex. if a record extend CI boundary and
extends unto 3 CI, and there is still some space left in last i.e. third CI, will that be
used by other CI Datasets ?
NO. Some records are larger than the CI size, the records extend across CI boundaries (only for
ESDS and KSDS). A spanned record begins on a CI boundary and it occupies two or more CIs in
a CA. The unused space in the last CI can only be used to extend the record, it cannot
contain any other record i.e. a new record has to be added in a new CI.
What is a cluster?
A cluster is the combination of the index, sequence set and data portions of the Dataset. The
operating system gives program access to the cluster, i.e. to all parts of the Dataset
simultaneously.
What is a Catalog?
The catalog contains the names of all Datasets, VSAM and non-VSAM. It is used to access these
Datasets.
What could be the maximum number of the AIXs per base cluster?
There can be a maximum of 253 AIXs per base cluster. It is not advisable to have more than 5
AIXs per base cluster because of additional overhead during updates and retrievals.
Can AIX be defined over an ESDS, which does not have any Key?
Although an ESDS does not have a primary Key, an AIX can be defined over an ESDS. In the
case of an ESDS it is the relative byte address of the corresponding record in the base cluster
that is stored.
Can we access records in VSAM only by a single Key, i.e. primary Key?
It is also possible to access the records in a sequence other than that of the primary Key. Such
Keys are called alternate Keys and they can be non-unique.
For Example, in a pay-roll system where employee number is the unique primary Key and the
Employee name as alternate Key.
What is the purpose of the FILE STATUS clause in the SELECT statement?
The FILE STATUS field identifies the field that VSAM uses to provide information about each I/O
Operation for the file.
If you wish to use the REWRITE command how must the VSAM file be opened?
It must be opened I/O mode.
There are at least seven IDCAMS commands; name and explain each of them?
ALTER modifies information for a catalog, alternate index, cluster or path.
BLDINDEX builds the alternate index, of course.
DEFINE is used for ALTERNATEINDEX, CLUSTER or PATH.
DELETE removes the catalog entry for a catalog, cluster, alternate index or path. LISTCAT lists
Information about the Dataset.
PRINT prints the Dataset contents.
REPRO copies records from one file to another.
What are the three levels of definition for the VSAM DEFINE?
They are DEFINE CLUSTER, DATA and INDEX.
How do you fix the problem associated with VSAM out of space condition?
1. Define new VSAM Dataset allocated with more space.
2. Use IDCAMS to REPRO the old VSAM file to new VSAM Dataset.
3. Use IDCAMS to ALTER / rename the old VSAM Dataset or set IDCAMS to DELETE the
old VSAM Dataset.
4. Use IDCAMS to ALTER / rename the new VSAM Dataset to the name of the original
VSAM Dataset.
In how many ways can you load the data in a VSAM cluster?
1. Using the REPRO command.
2. Using COBOL program
What are the optional parameters to the input DataSet While loading the empty cluster
with the data records?
i) Skip and Count
Syntax:
SKIP(2)
COUNT(4)
In this case, the first two records are skipped and the next four records are printed. The
default for SKIP is 0, and for COUNT will be printing records from beginning to end.
ii) FromKey and ToKey
PRINT -
INDATASET (CUSTOMER.KSDS.CLUSTER) -
FROMKEY (111111) -
TOKEY (444444)
Will print all records with Key value ranging from 111111 to 444444.
iii) FROMADDRESS and TOADDRESS
iv) FROMNUMBER and TONUMBER
Can VSAM files be deleted with the DELETE option of the DISPOSITION parameter of
JCL?
No, you have to give a separate DELETE command in the VSAM cluster.
What are the codes returned by the AMS (Access Method Services) command during
the execution?
Every AMS command issues a condition code. If multiple commands are being executed
Successively, there might be a requirement to execute or bypass certain commands on the
Success or failure of a previous command.
The normal condition codes returned by AMS commands are :
0 - The function was executed successfully
4 - A problem was encountered while executing the function, WARNING
8 - The requested function was executed, but major specifies were unavoidably bypassed,
ERROR
12 - The requested command could not be performed because of a logical error, SEVERE
16 - A severe error occurred causing the remainder of the command stream to be
bypassed., FATAL.
What parameter in the DEFINE AIX option is used to determine the maximum number of
duplicate keys allowable ?
The RECORDSIZE parameter. There are 2 numbers that follow this: the 1st is the
average and the 2nd is the maximum. The values are equal to 5 + (cluster key length) +
N*(alternate key length), where N is the allowable number of duplicates.