When creating a DASD data set, you specify the amount of space needed explicitly through the _____ parameter, or implicitly by using the information available in a data class.
Besides JCL, other common methods for allocating data sets include the ______ utility program, or using _____ to automate the allocation of data sets.
Answer: Besides JCL, other common methods for allocating data sets include the IDCAMS utility program, or using DFSMS to automate the allocation of data sets.
You can allocate data sets through a multifunction services program called ______ ______ ________; Include commonly used commands for working with data sets, such as ALLOCATE, ALTER, DELETe, and PRINT.
The number of ______ and their capacity vary with the device. Each device has an access mechanism that contains read/write heads to transfer data as the recording surface rotates past them.
To enable the system to locate a specific data set quickly, z/OS includes a data set known as the ______ _______ that permits access to any of the data sets in the computer system or to other catalogs of data sets.
Use ____ volumes for storing data and executable programs, including the operating system itself, and for temporary working storage; Can use one of these volume for many different data sets, and reallocate or re use space on the volume.
Generally, the operating system loads the members of a PDS into storage ____________, but it can access members directly when selecting a program for execution.
Answer: Generally, the operating system loads the members of a PDS into storage sequentially, but it can access members directly when selecting a program for execution.
In a mainframe system, the channel subsystem manages the use of ___ _______, such as disks, tapes, and printers, while z/OS associates the data for a given task with a ______.
Answer: In a mainframe system, the channel subsystem manages the use of I/O devices, such as disks, tapes, and printers, while z/OS associates the data for a given task with a device.
If you use TSO/E, a command called ____ creates a shell for you. You can work in the shell environment until exiting or temporarily switching back to the TSO/E environment.
The ________ provide a command interface to the z/OS UNIX environment. You can access the shell either by logging on to TSO/E or by using the remote login facilities of TCP/IP (rlogin).
____ provides utilities, an editor and ____ applications to the user. To the extent permitted by various security controls, an ____ user has full access to most z/OS system functions.
Answer: ISPF provides utilities, an editor and ISPF applications to the user. To the extent permitted by various security controls, an ISPF user has full access to most z/OS system functions.
You can rlogin (remote log in) o the shell from a system that has ______ client support. To log in, use the ______ command syntax supported at your site supported at your site.
Answer: You can rlogin (remote log in) to the shell from a system that has rlogin client support. To log in, use the rlogin command syntax
The _______ primary command hides lines that contain a search string from view and replaces them with a dashed line. To see the lines again, you enter either the ____, ______or _____ ________ command.
Answer: The EXCLUDE primary command hides lines that contain a search string from view and replaces them with a dashed line. To see the lines again, you enter either the FLIP, RESET or RESET EXCLUDED command.
______ placed on the ____ _______, and ____ ________ are three different ways in which you can modify the contents of the data set.
Answer: Primary command line, line commands placed on the line numbers, and text overtype are three different ways in which you can modify the contents of the data set.
To sell all of the possible actions you might take for a given data set, specify _______ _____ ___ in the command column to the left of the data set name.
Answer: To sell all of the possible actions you might take for a given data set, specify Forward Slash (/) in the command column to the left of the data set name
Customers can use ___ to add temporary processing capacity to a backup machine in the event of an unforeseen loss of server capability because of an emergency.
This feature is available through CIU, and uses ____ for temporary increases in processor capacity. With temporary processor capacity, customers manage both predictable and unpredictable surges in capacity demands.
A __ is a processor that has not been characterized for use: Each of the processors begin as a ___ and is characterized by IBM during installation or at a later time.
Also known as main storage: cannot be shared among LPARS: Provides the system with directly addressable, fast-access electronic storage of data: Both data and programs must be loaded into central storage before they can be processed by this: Maximum ___ is restricted by hardware and system architecture.
A Type 1 (or native) _____ is software that runs directly on a given hardware platform (as an operating system control program). A Type 2 (or hosted) _____ is software that runs within an operating system environment such as VMWare.
What feature allows multiple I/Os to execute concurrently against the same disk device without queuing. This functionality allows a device to contain more than one access path using a base address along with aliases. It is implemented through the Enterprise Storage System (ESS) using ____
Each disk device unit is represented by ____ in each z/OS image: Small piece of virtual storage describing the characteristics of a device to the operating system and contains the device address to denote status as well as tracking the progress of the I/O to the device.
In the DISP field, what status: Indicates that the data set already exists and the current job must have exclusive access while it is running. If the current job opens the data set for output, the output will be appended to the current end of the data set.
In the DISP field, what status: Indicates that the data set already exists and that several concurrent jobs can share access while they are running. All the concurrent jobs must specify SHR.
In the DISP field, what status: Indicates that a new data set will be created. This job has exclusive access to the data set while it is running. The data set must not already exist on the same volume as the new data set or be in a system or user catalog.
In the DD statement, Everything following this statement is data input (even //) until the two alphanumeric or special characters specified are encountered in column 1.
In the DD statement, The tape label expected (No Label or Standard Label followed by data set location). A tape can store multiple data sets; each data set on the tape is in a file position. The first data set on tape is file 1.
In the DD statement, data set disposition, such as whether the data set needs to be created or already exists, and whether the data set can be shared by more than one job
What EXEC parameter is boolean logic for controlling execution of other EXEC steps in this job. If, THEN, ELSE JCL statements exist that are superior to using ____; however, lots of old JCL may exist in production environments using this statement.
When it comes to allocation, the difference in method of execution is that TSO executes the sort in the __________ while JCL is used to execute the sort in the __________.
Answer: When it comes to allocation, the difference in method of execution is that TSO executes the sort in the foreground while JCL is used to execute the sort in the background.
This provides inputs and outputs to the execution program on the EXEC statement. This statement links a data set or other I/O device or function to a ddname coded in the program. __ statements are associated with a particular job step.
Active the other logical screen in split-screen mode
PF9/21
Move the screen window left
PF10/22
Move the screen window right
PF11/23
Redisplay the last ISPF command issued
PF12/24
Single Wildcard Character
%
Terminate ISPF
=x
Command that brings you to a specific line (for example, 1000)
LOCATE 1000
5 Different Options of the Find String
(1) Next (How to 2) Prev (3) First (4) Last (5) All
How to display Hexadecimal codes
HEX ON
Button to terminate the browse operation
End Key
The match condition for the FIND command
(1) CHARS (2) PREFIX (3) SUFFIX (4) WORD
Character placed in the line command area that inserts a blank line
I
Character placed in the line command area that inserts multiple blank lines (represent by n)
In
Delete a single line from the command area line
D
Delete n lines starting with this line from the command area line
Dn
Delete block of lines beginning with the this command and ending with this command from the command area line
DD
Repeat this line from the command area line
R
Repeat this line n times from the command area line
Rn
Repeat a block of lines from the command area line
RR
Repeat a block of lines n times from the command area line
RRn
Copy this line from the command area line
C
Copy n lines startging with this line from the command area line
Cn
Copy a block of lines from the command area line
CC
Move this line from the command area line
M
Move n lines starting with this line from the command area line
Mn
Move a block of lines from the command area line
MM
Copy or move lines after this line from the command area line
A
Repeat the copy or move n times after this line from the command area line
An
Copy or move lines before this line from the command area line
B
Repeat the copy or move n times before this line from the command area line
Bn
Command to lock a profile
PROFILE LOCK
Command to activate the TABS command
TABS [{ON/OFF}] [tab-character] [{STD/ALL}]
Command that defines how line numbers are stored in the member
NUMBER [{ON/OFF}] [{STD/COBOL/STD COBOL}] [DISPLAY]
Commands that turns number mode off
NONUMBER
Command that says whether or not line numbers should be resequenced whenever the member is saved
AUTONUM [{ON/OFF}]
Command that resequences the line numbers unless OFF is specified. OFF turns number mode off. You can specify standard or COBOL numbers if you want
RENUM [{ON/OFF}] [{STD/COBOL/STD COBOL}] [DISPLAY]
Command that replaces line numbers with blanks and turns off NUMBER mode
UNNUM
Exclude this line from from the command area line
x
Exclude n lines from the command area line
xn
Eclude this line and all lines between the two __ commands from the command area line
xx
Show the first line of the excluded text from the command area line
f
Show the first n lines from the command area line
fn
Show the last line of the ecluded text
L
Show the last n lines from the command area line
Ln
Show one line of the excluded text from the command area line
S
Show n lines from the command area line
Sn
Copy the named member to the postion marked by an A or B line command or the specified label
COPY [member] [{AFTER/BEFORE}] label]
Copy the named member to the position marked by an A or B line command or the specified lael, then delete the member from its original location
MOVE [member] [{AFTER/BEFORE} label]
Create a new member with the rnage of lines marked by C or M commands or the specified label
CREATE [member] [range]
Create a new member or replace an existing member with the rnage of lines marked by C or M commands or the specified labels
REPLACE [member] [range]
Rename a column
R
Command used to find information on a particular error code
QW #####
Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?
Answer: The no shutdown command was not issued for VLAN 1.
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration.
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
1.displaying a list of all available commands within the current mode
2.determining which option, keyword, or argument is available for the entered command
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)
1.What models of routers and switches require upgrades
2.Do the routers and switches have enough RAM and flash memory for the proposed IOS versions
3.What features are required for the devices