Вы находитесь на странице: 1из 2

VSAM FAQ's

1. What is VSAM a. Virtual System Access Method b. Vertical System Access Method c. Virtual System Access Method d. Virtual System Architecture Method 2. Which Utility program is used to develop the AMS commands a. IDCAMS b. IEBCOPY c. IEHPROGM d. IEBPTPCH 3. How many extents are possible while creating a VSAM dataset a. 123 b. 16 c. 14 d. 15 4. Disadvantages of VSAM Cluster a. Faster Access b. Additional Storage c. Reorganisation d. Device Independent 5. In which dataset embedded free space is available between records a. ESDS b. KSDS c. RRDS d. LDS 6. KSDS base cluster is a combination of a. DATA & INDEX Compnent b. DATA & AIX Cluster c. INDEX & AIX Cluster d. All of the above 7. KSDS stands for a. Keyed Sequential Data Set b. Keyed Sequence Data Set c. Key Sequence Data Set d. Keyed Sequential Data Set 8. KSDS record will be retrieved randomly using a. Record Key b. RRN c. Sequence d. Numbering 9. What does the File Status 10 denote a. End of File b. Wrong values 10. Which command is used to read the contents of a dataset a. Print b. Value c. List Cat d. Repro 11. Which dataset is having Fixed Length slot a. KSDS b. RRDS c. LDS d. ESDS 12. Which Data is very similar to ESDS a. KSDS b. RRDS c. LDS d. ESDS 13. Which commands is used to load records in VSAM Dataset a. Verify b. Alter c. Jobcat d. Repro 14. A control Area should have a minimum of a. 5 C.I b. 4 C.I c. 2 C.I d. 3 C.I 15. What is the Maximum size of a Control Interval a. 512 Bytes b. 1024Bytes c. 32 kb d. 56 kb 16. Free Space can exist between a. Contorl Intervals b. Within a Control Area c. Entire Control Area d. All of the above 17. Control Area is a group of a. Records b.Blocks c. C.I d. Files 18. Auto - Reorganisation is possible in VSAM dataset [True / False] 19. Duplicate alternate key in Vsam is given thru which File Status a. 02 b. 04 c. 10 d. 22 20. Duplicate Record key in Vsam is given thru which File Status a. 02 b. 04 c. 10 d. 22 21. In which Data set can we have an AIX a. KSDS b. ESDS c. RRDS d. Both a & b 22. CI and CA Splits occurs in a. KSDS b. ESDS c. RRDS d. LDS 23. How many AIX will be there for a Base Cluster a. 253 b. 254 c. 255 d. 252

24. Minimum Size of a C.A a. 2 Track b. 3 Track c. 1 Track d. 7 Track 25. Maximum Size of a C.A a. 2 Cylinder b. 3 Cylinder c. 1 Cylinder d. 7 Cylinder 26. In ESDS which operation is not possible a. Read b. Write c. Rewrite d. Delete 27. IDCAMS utility is used for a. Define VSAM b. Load Records into Vsam c. Both a and b d. None of the above 28. A RDF is how many bytes long a. 4 Bytes b. 5 bytes c. 3 Bytes d. 7 Bytes 29. Minimum Size of a Control Interval a. 1024 Bytes b. 2 Tracks c. 512 Bytes d. 256 Bytes 30. A CIDF is how many bytes long a. 4 Bytes b. 5 bytes c. 3 Bytes d. 7 Bytes 31. Which function updates the AIX for all insertions on the Base Cluster a. Up Date b. Up Grade c. Define d. Alter 32. AIX is a special type of a. KSDS b. ESDS c. RRDS d. LDS 33. Which command is used to load records in AIX a. BLDINDEX b. REPRO c. ALTER d. PATH 34. Which command is used to change the attributes of the VSAM existing a. ALTER b. RENAME c. CHANGE d. MODIFY 35. Which parameter is used to Delete the entry of a GDG a. Delete with Force b. Delete c. Drop d. Erase 36. ESDS stands for a. Entry Sequence Data set b. Entry Sequential Data set c. Entry Sequenced Data set d. Entity Seqquenced Data set 37. Which command makes a Back up of Dataset a. Import b. Export c. Repro d. Transfer 38. Which one is a MODAL Command a. IF THEN ELSE b. WHEN c. WHILE d. DO WHILE 39. For which value of Max CC execution will be Abnormally terminated a. 0 b. 4 c. 8 d. 16 40. Which commands controls execution of statements a. MODAL b. EXPORT c. IMPORT d. ALTER 41. ALL VSAM datasets resides in the DASD [True / False] 42. An LDS consists of no C.I [True / False] 43. Records from a ESDS can be accessed either sequentially or by RBA [True / False] 44. The alternate record key is not unique for a. KSDS b. ESDS c. AIX d. LDS 45. Which parameter is used to specify RRDS a. Indexed b. Non-Indexed c. Numbered d. Linear 46. In which cluster type the records are added to the end of the position a. KSDS b. ESDS c. RRDS d. LDS 47. Which command is used to make a write protective dataset a. ALTER b. PRINT c. VERIFY d. ERASE 48. What is the default option for Shareoptions a. (2,3) b. (4,5) c. (3,4) d. (6,7) 49. Which mode will be helpful for appending records in ESDS a. Output b. Extend c. I-O Mode d. Input 50. What is the default character in which VSAM datasets will be printed a. Char b. Dump c. Hex d. None of the above