Besides JCL, other common methods for allocating data sets include the ______ utility program, or using _____ to automate the allocation of data sets.

Besides JCL, other common methods for allocating data sets include the ______ utility program, or using _____ to automate the allocation of data sets.



Answer: Besides JCL, other common methods for allocating data sets include the IDCAMS utility program, or using DFSMS to automate the allocation of data sets.

What are the rules of naming segments or qualifiers?

What are the rules of naming segments or qualifiers?



(1) Limited to eight characters

(2) First must be alphabetic (A to Z) or special (#, @, $)

(3) Remaining seven characters must be alphabetic, numeric, special, or a hyphen (-)

(4) Segments/Qualifiers separated by period (.)

(5) 44 Character Limit

What are 5 commonly used Access methods?

What are 5 commonly used Access methods?



(1) QSAM (Queued Sequential Acces Method) (heavy used)

(2) BSAM (Basic Sequential Access Method (for special cases)

(3) Basic Direct Acces Method (becoming obsoluete)

(4) BPAM (Basic Partitioned Acces Method) (for libraries)

(5) VSAM (Virtual Storage Access Method (used for more complex applications)

Use ____ volumes for storing data and executable programs, including the operating system itself, and for temporary working storage; Can use one of these volume for many different data sets, and reallocate or re use space on the volume.

Use ____ volumes for storing data and executable programs, including the operating system itself, and for temporary working storage; Can use one of these volume for many different data sets, and reallocate or re use space on the volume.



Answer: DASD

Generally, the operating system loads the members of a PDS into storage ____________, but it can access members directly when selecting a program for execution.

Generally, the operating system loads the members of a PDS into storage ____________, but it can access members directly when selecting a program for execution.



Answer: Generally, the operating system loads the members of a PDS into storage sequentially, but it can access members directly when selecting a program for execution.

In a mainframe system, the channel subsystem manages the use of ___ _______, such as disks, tapes, and printers, while z/OS associates the data for a given task with a ______.

In a mainframe system, the channel subsystem manages the use of ___ _______, such as disks, tapes, and printers, while z/OS associates the data for a given task with a ______.



Answer: In a mainframe system, the channel subsystem manages the use of I/O devices, such as disks, tapes, and printers, while z/OS associates the data for a given task with a device.

____ provides utilities, an editor and ____ applications to the user. To the extent permitted by various security controls, an ____ user has full access to most z/OS system functions.

____ provides utilities, an editor and ____ applications to the user. To the extent permitted by various security controls, an ____ user has full access to most z/OS system functions.



Answer: ISPF provides utilities, an editor and ISPF applications to the user. To the extent permitted by various security controls, an ISPF user has full access to most z/OS system functions.

Differences between direct shell login and 3270 terminal support.

Differences between direct shell login and 3270 terminal support.



(1) You cannot switch to SO/E. However, you can use the TSO SHELL command to run a TSO/E command from your shell session.

(2) You cannot use the ISPF editor (this includes the oedit command, which invokes ISPF edit).

(3) You can use the UNIX vi editor, and other interactive utilities that depend on receiving each key stroke, without hitting the Enter key.

(4) You can use UNIX-style command-line editing.

You can rlogin (remote log in) o the shell from a system that has ______ client support. To log in, use the ______ command syntax supported at your site supported at your site.

You can rlogin (remote log in) o the shell from a system that has ______ client support. To log in, use the ______ command syntax supported at your site supported at your site.



Answer: You can rlogin (remote log in) to the shell from a system that has rlogin client support. To log in, use the rlogin command syntax

Shell is a command processor that allows you to use what three 3 things?

Shell is a command processor that allows you to use what three 3 things?



(1) Invoke shell commands or utilities that request services from the system


(2) Write shell scripts using the shell programming language

(3) Run shell scripts and C-language programs interactively (in the foreground) in the background, or in batch

What are the three ways a user can invoke the z/OS UNIX shell?

What are the three ways a user can invoke the z/OS UNIX shell?



(1) From a 3270 display or a workstation running a 3270 emulator

(2) From a TCP/IP-attached terminal, using the rlogin and telnet commands

(3) From a TSO session, using the OMVS command

What are the three functions that the z/OS UNIX Shell be used for?

What are the three functions that the z/OS UNIX Shell be used for?



Answer:

(1) Invoke shell scripts and utilities

(2) Write Shell scripts (a named list of shell commands, using the shell programming language).


(3) Run shell scripts and C language programs interactively, in the TSO background or in back

The _______ primary command hides lines that contain a search string from view and replaces them with a dashed line. To see the lines again, you enter either the ____, ______or _____ ________ command.

The _______ primary command hides lines that contain a search string from view and replaces them with a dashed line. To see the lines again, you enter either the ____, ______or _____ ________ command.



Answer: The EXCLUDE primary command hides lines that contain a search string from view and replaces them with a dashed line. To see the lines again, you enter either the FLIP, RESET or RESET EXCLUDED command.

To sell all of the possible actions you might take for a given data set, specify _______ _____ ___ in the command column to the left of the data set name.

To sell all of the possible actions you might take for a given data set, specify _______ _____ ___ in the command column to the left of the data set name.



Answer: To sell all of the possible actions you might take for a given data set, specify Forward Slash (/) in the command column to the left of the data set name

What 3 areas does ARM reduce operator intervention?

What 3 areas does ARM reduce operator intervention?



(1) Detection of the failure of a critical job or started task


(2) Automatic restart after a started task or job failure


(3) Automatic redistribution of work to an appropriate system following a system failure

This feature is available through CIU, and uses ____ for temporary increases in processor capacity. With temporary processor capacity, customers manage both predictable and unpredictable surges in capacity demands.

This feature is available through CIU, and uses ____ for temporary increases in processor capacity. With temporary processor capacity, customers manage both predictable and unpredictable surges in capacity demands.




Answer: On/Off Capacity on Demand (ON/Off CoD)

Also known as main storage: cannot be shared among LPARS: Provides the system with directly addressable, fast-access electronic storage of data: Both data and programs must be loaded into central storage before they can be processed by this: Maximum ___ is restricted by hardware and system architecture.

Also known as main storage: cannot be shared among LPARS: Provides the system with directly addressable, fast-access electronic storage of data: Both data and programs must be loaded into central storage before they can be processed by this: Maximum ___ is restricted by hardware and system architecture.



Answer: Central Storage (CSTOR)

A Type 1 (or native) _____ is software that runs directly on a given hardware platform (as an operating system control program). A Type 2 (or hosted) _____ is software that runs within an operating system environment such as VMWare.

A Type 1 (or native) _____ is software that runs directly on a given hardware platform (as an operating system control program). A Type 2 (or hosted) _____ is software that runs within an operating system environment such as VMWare.



Answer: Hypervisor

What feature allows multiple I/Os to execute concurrently against the same disk device without queuing. This functionality allows a device to contain more than one access path using a base address along with aliases. It is implemented through the Enterprise Storage System (ESS) using ____

What feature allows multiple I/Os to execute concurrently against the same disk device without queuing. This functionality allows a device to contain more than one access path using a base address along with aliases. It is implemented through the Enterprise Storage System (ESS) using ____



Answer: Parrallel Access Volumes (PAVs)

Each disk device unit is represented by ____ in each z/OS image: Small piece of virtual storage describing the characteristics of a device to the operating system and contains the device address to denote status as well as tracking the progress of the I/O to the device.

Each disk device unit is represented by ____ in each z/OS image: Small piece of virtual storage describing the characteristics of a device to the operating system and contains the device address to denote status as well as tracking the progress of the I/O to the device.




Answer: Unit Control Block (UCB)

Parallel channels have been replaced with what two types of channels?

Parallel channels have been replaced with what two types of channels?



(1) Enterprise Systems Connection (ESCON)


(2) FIber CONnection (FICON) (note) channels are usually connect to only one control unit or director (switch) and are optical fibers

What must you provide if you set the DISP parameter to new?

What must you provide if you set the DISP parameter to new?



(1) Data set name

(2) Type of device for the data set

(3) volser if it is a disk or labeled tape

(4) Amount of space to be allocated for the primary extent

(5) If partitioned data set, the size of the directory must be specified

(6) Optional: DCB parameters can be specified - Alternatively, program that will write the data set can provide these parameters

In the DISP field, what status: Indicates that the data set already exists and the current job must have exclusive access while it is running. If the current job opens the data set for output, the output will be appended to the current end of the data set.

In the DISP field, what status: Indicates that the data set already exists and the current job must have exclusive access while it is running. If the current job opens the data set for output, the output will be appended to the current end of the data set.



Answer: MOD

In the DISP field, what status: Indicates that a new data set will be created. This job has exclusive access to the data set while it is running. The data set must not already exist on the same volume as the new data set or be in a system or user catalog.

In the DISP field, what status: Indicates that a new data set will be created. This job has exclusive access to the data set while it is running. The data set must not already exist on the same volume as the new data set or be in a system or user catalog.




Answer: NEW

In the DD statement, The tape label expected (No Label or Standard Label followed by data set location). A tape can store multiple data sets; each data set on the tape is in a file position. The first data set on tape is file 1.

In the DD statement, The tape label expected (No Label or Standard Label followed by data set location). A tape can store multiple data sets; each data set on the tape is in a file position. The first data set on tape is file 1.



Answer: LABEL=

What EXEC parameter is boolean logic for controlling execution of other EXEC steps in this job. If, THEN, ELSE JCL statements exist that are superior to using ____; however, lots of old JCL may exist in production environments using this statement.

What EXEC parameter is boolean logic for controlling execution of other EXEC steps in this job. If, THEN, ELSE JCL statements exist that are superior to using ____; however, lots of old JCL may exist in production environments using this statement.



Answer: COND=

When it comes to allocation, the difference in method of execution is that TSO executes the sort in the __________ while JCL is used to execute the sort in the __________.

When it comes to allocation, the difference in method of execution is that TSO executes the sort in the __________ while JCL is used to execute the sort in the __________.



Answer: When it comes to allocation, the difference in method of execution is that TSO executes the sort in the foreground while JCL is used to execute the sort in the background.

This provides inputs and outputs to the execution program on the EXEC statement. This statement links a data set or other I/O device or function to a ddname coded in the program. __ statements are associated with a particular job step.

This provides inputs and outputs to the execution program on the EXEC statement. This statement links a data set or other I/O device or function to a ddname coded in the program. __ statements are associated with a particular job step.



Answer: DD

TSO ISPF Commands

Interrupt the current operation
PA1

Redisplay the current screen
PA2

Enter the Tutorial
PF1/13

Enter split-screen mode
PF2/14

Terminate the current operation
PF3/15

Return to the primary option menu
PF4/16


Move the screen window up
PF7/19

Move the screen window down
PF8/20

Active the other logical screen in split-screen mode
PF9/21

Move the screen window left
PF10/22

Move the screen window right
PF11/23

Redisplay the last ISPF command issued
PF12/24

Single Wildcard Character
%

Terminate ISPF
=x

Command that brings you to a specific line (for example, 1000)
LOCATE 1000

5 Different Options of the Find String
(1) Next (How to 2) Prev (3) First (4) Last (5) All

How to display Hexadecimal codes
HEX ON

Button to terminate the browse operation
End Key

The match condition for the FIND command
(1) CHARS (2) PREFIX (3) SUFFIX (4) WORD

Character placed in the line command area that inserts a blank line
I

Character placed in the line command area that inserts multiple blank lines (represent by n)
In

Delete a single line from the command area line
D

Delete n lines starting with this line from the command area line
Dn

Delete block of lines beginning with the this command and ending with this command from the command area line
DD

Repeat this line from the command area line
R

Repeat this line n times from the command area line
Rn

Repeat a block of lines from the command area line
RR

Repeat a block of lines n times from the command area line
RRn

Copy this line from the command area line
C

Copy n lines startging with this line from the command area line
Cn

Copy a block of lines from the command area line
CC

Move this line from the command area line
M

Move n lines starting with this line from the command area line
Mn

Move a block of lines from the command area line
MM

Copy or move lines after this line from the command area line
A

Repeat the copy or move n times after this line from the command area line
An

Copy or move lines before this line from the command area line
B

Repeat the copy or move n times before this line from the command area line
Bn

Command to lock a profile
PROFILE LOCK

Command to activate the TABS command
TABS [{ON/OFF}] [tab-character] [{STD/ALL}]

Command that defines how line numbers are stored in the member
NUMBER [{ON/OFF}] [{STD/COBOL/STD COBOL}] [DISPLAY]

Commands that turns number mode off
NONUMBER

Command that says whether or not line numbers should be resequenced whenever the member is saved
AUTONUM [{ON/OFF}]

Command that resequences the line numbers unless OFF is specified. OFF turns number mode off. You can specify standard or COBOL numbers if you want
RENUM [{ON/OFF}] [{STD/COBOL/STD COBOL}] [DISPLAY]

Command that replaces line numbers with blanks and turns off NUMBER mode
UNNUM

Exclude this line from from the command area line
x

Exclude n lines from the command area line
xn

Eclude this line and all lines between the two __ commands from the command area line
xx

Show the first line of the excluded text from the command area line
f

Show the first n lines from the command area line
fn

Show the last line of the ecluded text
L

Show the last n lines from the command area line
Ln

Show one line of the excluded text from the command area line
S

Show n lines from the command area line
Sn

Copy the named member to the postion marked by an A or B line command or the specified label
COPY [member] [{AFTER/BEFORE}] label]

Copy the named member to the position marked by an A or B line command or the specified lael, then delete the member from its original location
MOVE [member] [{AFTER/BEFORE} label]

Create a new member with the rnage of lines marked by C or M commands or the specified label
CREATE [member] [range]

Create a new member or replace an existing member with the rnage of lines marked by C or M commands or the specified labels
REPLACE [member] [range]

Rename a column
R

Command used to find information on a particular error code
QW #####

Which describes Virtual Interface?

Which describes Virtual Interface?



1. It uses Telnet or SSH protocols for access.
2. It requires an active network connection.

Which describes a console port?

Which describes a console port?



1.It displays startup, debugging, and error messages by default.
2.It can be used to restore an out-of-box configuration on a switch or router.

Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?

Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?



Answer: The no shutdown command was not issued for VLAN 1.

What benefit does DHCP provide to a network?

What benefit does DHCP provide to a network?



Answer: Hosts can connect to the network and get an IP address without manual configuration.

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?



Issue the reload command without saving the running configuration.

A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)

A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)



1.What models of routers and switches require upgrades
2.Do the routers and switches have enough RAM and flash memory for the proposed IOS versions
3.What features are required for the devices