YouTube Icon

Interview Questions.

Ibm - Vsam Placement Papers - Ibm - Vsam Interview Questions and Answers - Jul 28, 2022

fluid

Ibm - Vsam Placement Papers - Ibm - Vsam Interview Questions and Answers

Q1. Would You Specify Freespace For An Esds?

No. Because you can not insert records in an ESDS, additionally when you rewrite a record, it ought to be of the same duration. Thus placing any fee for freespace does no longer make any feel.

Q2. Syntax Of Ams Modal Commands ?

Note: these can be used handiest underneath IDCAMS and not from the TSO activate.

  IF LASTCC(or MAXCC) >(or <,= etc..) value -  THEN -  DO -

command set (such as DELETE, DEFINE etc..)

  ELSE -  DO -

command set

LASTCC - Condition code from the last function(such as delete) executed

MAXCC - Max condition code that was returned by any of the prev functions

SET is also a valid AMS command. SET LASTCC (or MAXCC) = value

The maximum condition code is @A cond code of 4 indicates a warning. A cond code of 8 is usually encountered on a DELETE of a dataset that is not present.

Q3. What How Do You Initialize A Vsam File Before Any Operation? A Vsam With Alternate Index?

Can write a dummy program that just opens the file for output & then closes it.

Q4. Do All Versions Of The Gdg Have To Be Of The Same Record Length ?

No, the DCB of the model dataset can be overridden when you allocate new versions.

Q5. How Do You Define An Altindx ? How Do You Use Altindxs In Batch, Cics Programs?

Issue the command DEFINE ALTERNATEINDEX. Important parameters are RELATE where the database cluster name is specified. KEYS, RECORDSIZE,SHAREOPTIONS,UNIQUEKEY(or NONUNIQUEKEY) DATA(data source name for the data component), INDEX(data source name for the index component).

Then issue the command DEFINE PATH. Important parameters are NAME (data source name for the path), PATHENTRY (data source name of the alternate index name), UPDATE or NOUPDATE, that specifies the determination of alt index is updated when an update to the database cluster occurs

Then issue the command BLDINDEX. Important parameters are INDATASET (data source name of base cluster), OUTDATASET(data source name of AIX).

Using alternate indexes in batch programs:

JCL, has DD statements for cluster and for paths.

For the COBOL program :

The command SELECT ASSIGN TO ddname For the base cluster RECORD KEY IS...... ALTERNATE RECORD KEY IS… used

Using alternate indexes in CICS programs:

The creation of FCT entries are mandatory for both cluster and the path

Utilize the dd name of the path in CICS file control commands, by using the alternate index

Q6. What Is File Status In Vsam?

The File STATUS clause of the FILE-CONTROL paragraph allows for each file to be associated with a file status key (i.E., the 2-character data item specified in the FILE STATUS clause). If the FILE STATUS clause is specified for a given file, a value indicating the status of each I/O operation against that file is placed in the associated file status key. This value is stored in the file status key as soon as the I/O operation is completed (and before execution of any EXCEPTION/ERROR declarative or INVALID KEY/AT END phrase associated with the I/O request).

Note: This element may behave differently when the CMPR2 compiler option is used. The file status key is divided into two status keys: the first character is known as file status key1; the second character is file status key 2.

Q7. How Do You Define A Ksds ?

DEFINE CLUSTER(cluster name) with the INDEXED parameter. Also specify the ds name for the DATA component & the ds INDEX component. Other important parms are RECORDSIZE, KEYS, SHARE OPTIONS.

Q8. How Do You Initialize A Vsam File Before Any Operation? A Vsam With Alternate Index?

Can write a dummy program that just opens the file for output & then closes it.

Q9. How Do You Define A Gdg ?

Use the DEFINE GENERATIONDATAGROUP command. In the same IDCAMS step, another dataset must be defined whose DCB parameters are used when new generations of the GDG are created. This dataset is known as the model dataset. The ds name of this model dataset must be the same as that of the GDG, so use a disp of keep rather than catlg and also specify space=(trk,0)

Q10. How Are Different Versions Of Gdg Named ?

Base-file-name.GnnnnnV00 where nnnn= generation number (upto 255).

Nnnn will be 0000 for the 1st generation.

Q11. Under Idcams , Multiple Functions Can Be Executed, Each Of Which Returns A Cond Code. What Will Be The Condition Code Returned To The Operating System ?

The maximum condition code generated is returned as the condition code of the IDCAMS step.

Q12. What Happens When You Open An Empty Vsam File In A Cobol Program For Input?

A VSAM file that has never contained a record is treated as unavailable. Attempting to open for input will fail. An empty file can be opened for output only. When you open for output, COBOL will write a dummy record to the file & then delete it out.

Q13. What Is Buffering And How Does It Apply To Vsam Files ?

When large blocks of data are used, more main storage is required than when smaller blocks are used, but large blocks save CPU time and disk space. Additionally, extra buffers may save elapsed time since the program does not have to wait for an I/O to complete for it to continue processing.

In the JCL, you specify BUFNI (number of index buffers) and BUFND (number of data buffers) as sub parameters of the AMP parameter.

For random access, the BUFNI is one more than the number of index levels and a BUFND of 2 is fine.

For sequential access, a BUFNI of 1 and a minimum of 5 for BUFND is fine.

For dynamic access, the values of each is the higher of the numbers for either random or sequential.

Q14. Under Idcams , Multiple Functions Can Be Executed, Each Of Which Returns A Cond Code. What Will Be The Condition Code Returned To The Operating System?

The maximum condition code generated is returned as the condition code of the IDCAMS step.

Q15. What Is Idcams?

IDCAMS is the Access Method Services program. You run the IDCAMS program and supply AMS commands thru SYSIN. (examples of AMS commands are DELETE, DEFINE, REPRO etc..).

Q16. How Do You Define A Ksds?

DEFINE CLUSTER(cluster name) with the INDEXED parameter. Also specify the ds name for the DATA component & the ds INDEX component. Other important parms are RECORD SIZE, KEYS, SHARE OPTIONS.

Q17. What Is The Meaning Of Each Of The Values In Shareopts(2 3)?

Value of 2 for cross region me that the file can be processed simultaneously by multiple users provided only one of them is an updater. Value of 3 for cross system me that any number of jobs can process the file for input or output (VSAM does nothing to ensure integrity).

Q18. Suppose 3 Generations Of A Gdg Exist. How Would You Reference The 1 St Generation In The Jcl?

Use GDG name(-2).

Q19. Syntax Of Ams Modal Commands?

Note: these can be used only under IDCAMS and not from the TSO prompt.

  IF LASTCC(or MAXCC) >(or <,= etc..) value -  THEN -  DO -

command set (such as DELETE, DEFINE etc..)

  ELSE -  DO -

command set

LASTCC - Condition code from the last function(such as delete) executed

MAXCC - Max condition code that was returned by any of the prev functions

SET is also a valid AMS command. SET LASTCC (or MAXCC) = value

The maximum condition code is @A cond code of 4 indicates a warning. A cond code of 8 is usually encountered on a DELETE of a dataset that is not present.

Q20. Can Ams Commands Be Run From The Tso Prompt?

Yes

Q21. How Do You Decide On Optimum Values For Ci, Freespace Etc..?

CI size should be based on record length, type of processing. Usually CI is 4K. If record length is larger(>1K), pick 6K or 8K.

FREE SPACE need to be large if greater wide variety of insertions are envisaged. Usual values are (20 20) whilst heavy updates are predicted. CI size may be calculated.

Q22. How Did You Refresh A Vsam File And How Frequently You Do It ?

Refresh can be done on every day or weekly or month-to-month basis

Refreshing refers to DELETE / DEFINE the VSAM file

Step 1: Deleting the prevailing VSAM record:

IF LASTCC =eight ; SET MAXCC=0

Step 2: DEFINE VSAM-FILE(COND=(zero,LT,STEP1)

Return-code = 8 when the report that is trying to delete does not exist.

Utilize the command VERIFY in TSO

Q23. What Is The Purpose Of The Verify Function Of Idcams?

To re-sync the cease of the document statistics with the catalog statistics, the VERIFY function is used.

Q24. Name A Few Common Vsam Status Codes?

00-OK

02-READ a reproduction exchange key

10-end of file reached even as doing a READ

22-trying to WRITE a replica number one key

23-file now not found even as doing a READ

ninety seven-document integrity verified, do an IDCAMS VERIFY

Q25. We Can Define The Ksds Cluster By Two Ways By Using The File-useful resource Or By Using The Idcams Utility. Explain Them.

KSDS cluster may be described through

-Using the record-resource

-or via the use of IDCAMS application:

The record can be described with common period of 100 and maximum length of 150, in IDCAMS, with key duration 10 starting at 0.

The following instance illustrates :

  //step01 EXEC pgm=IDCAMS

//SYSIN DD *

DEFINE CLUSTER(NAME(userid.Name.Sample) -

VOLUMES(MVS801) -

RECORDSIZE(one hundred 150) -

TRACKS(10 20)

KEYS(10 zero) -

INDEXED ) -

DATA ( NAME(userid.Call.Pattern.Facts)) -

INDEX( NAME(userid.Call.Pattern.Index)) - 

/*

//

Q26. What Is Freespace ?

Coded inside the DEFINE as FREESPACE(ci ca) wherein ci is the percentage of every manage c language to be left unfastened for insertions, ca is the percentage of control durations in each manipulate place to be left empty.

Q27. What Is The Syntax Of Ams Modal Commands?

The following is the syntax of AMS modal commands:

  IF LASTCC(or MAXCC) >(or <,= etc..) value -  THEN -  DO -

command set (like DELETE, DEFINE etc..)

  ELSE -  DO -

command set

where

LASTCC - Condition code from the last function(such as delete) executed

MAXCC - Max condition code that was returned by any of the prev functions

SET is also a valid AMS command. SET LASTCC (or MAXCC) = value

PS: These can be used only under IDCAMS and not from the TSO prompt.

Q28. What Is Control Interval, Control Area ?

Control Interval is analogous to a physical block for QSAM files. It is the unit of i/o. Must be between 512 bytes to 32 k. Usually either 2K or 4K. A larger control interval increases performance for sequential processing while the reverse is true for random access. Under CICS when a record is locked, the entire CI gets locked.

Control area is a group of control intervals. CA is used during allocation. CA size is calculated based on the allocation type (cyl, tracks or records) and can be max of 1 cylinder

Q29. Can Ams Commands Be Run From The Tso Prompt ?

Yes

Q30. How Do You Calculate Record Size Of An Alternate Cluster? Give Your Values For Both Unique And Non-unique.

Unique Case: 5 + ( alt-key-length + primary-key )

Nonunique Case: 5 + ( alt-key-length + n * primary-key )

where n = # of duplicate records for the alternate key

????Any one who knows - can you explain ?

Q31. How Do You Load A Vsam Data Set With Records ?

Using the REPRO command.

Q32. Explain The Differences Between Vsam And Non-vsam Files

The AMS program is used for creation of VSAM files - ISPF panel or a standard JCL is used for creation of a NON-VSAM dataset.

The VSAM information is stored in catalogs - The NON-VSAM information is stored in VTOC as dataset labels

The data set organization in VSAM files are Key sequenced, Entry sequenced and Relative record data sets

A data set is a physical records that are stored on a disk or tape , is a collection with a unique name

The data set is normally identified by the MVS with labels

The label information need to be supplied in JCL

The data set organization in NON-VSAM files are sequenced, Indexed Sequential, Direct and partitioned

Q33. What Is Shareopts ?

SHAREOPTS is a parameter in the DEFINE and specifies how an object can be shared among users. It is coded as SHAREOPTS(a b), where a is the cross region share option ie how two or more jobs on a single system can share the file, while b is the cross system share option ie how two or more jobs on different MVSes can share the file. Usual value is (2 3).

Q34. What Does A File Status Of 02 On A Vsam Indicate?

Duplicate alternate key . Happens on both input and output operation

Q35. What Is Idcams ?

IDCAMS is the Access Method Services program. You run the IDCAMS program and supply AMS commands thru SYSIN. (examples of AMS commands are DELETE, DEFINE, REPRO etc..).

Q36. Difference Between Vsam And Database Tables

VSAM file can not run SQL queries. -VSAM lacks any kind of relation -VIEWS and SYNONYMS can not be defined on VSAM files -RDBMS concepts can not be applied in VSAM files.

SQL queries can be run in database table - Data fetching is more efficient than VSAM files - RDBMS concepts are applicable in DB2 database - ALIAS VIEWS can be defined on tables for sharing customized data.

Q37. What Is Shareopts?

SHAREOPTS is a parameter in the DEFINE and specifies how an object can be shared among users. It is coded as SHAREOPTS(a b), where a is the cross region share option ie how two or more jobs on a single system can share the file, while b is the cross system share option ie how two or more jobs on different MVSes can share the file. Usual value is (2 3).

Q38. What Is Freespace?

Coded in the DEFINE as FREESPACE(ci ca) where ci is the percentage of each control interval to be left free for insertions, ca is the percentage of control intervals in each control area to be left empty.

Q39. Explain The Information Contained In Ci

Control information consists of Record Descriptor Field and Control Interval Descriptor Field.

Each CI contains one CIDF that consists of the last 4 bytes

CIDF consists of information about the offset and length of free space in the CI

In case of fixed size records, each CI contains 2 RDFs each RDF is of 3 bytes length

In case of variable length size records, there will be a separate RDF for each record in the CI.

The data portion of the CI should be in the multiples of 512 bytes / 2048 bytes.

The maximum size of the CI is 32 KB. - The size of index portion of CI could be any of these

512, 1024,2048,4096

Q40. If You Wish To Use The Rewrite Command How Must The Vsam File Be Opened?

It must be opened as I/O.

Q41. What Are The Different Types Of Vsam Files Available?

ESDS: Entry Sequence Data Set

KSDS: Key Sequence Data Set

RRDS: Relative Data Set

Q42. During Processing Of A Vsam File, Some System Error Occurs And It Is Subsequently Unusable . What Do You Do ?

Run VERIFY.

Q43. What Are The Different Types Of Vsam Files Available? Explain Them

Virtual Storage Access Method(VSAM) is a disk storage system.

It was implemented in OS/VS2 operating system.

Subsequently, it was used through out the MVS architecture.

VSAM comprises of the following access methods:

ESDS: Entry Sequence Data Set

KSDS: Key Sequence Data Set

RRDS: Relative Data Set

VSAM records can be of fixed or variable length.

These are organized in fixed size blocks, known as Control Intervals, and later into larger divisions known as Control Areas.

CI sizes are measured in terms of bytes, while CA sizes are measured in terms of disk tracks or cylinders.

ESDS : It contains the files which are interface specific and

accessed through Relative Byte Address

KSDS : It contains the files which are interface specific and accessed through a secondary index

RRDS : It contains the files which are interface specific and accessed through Relative Record Number

Each file has two objects.

File object - represents the file itself. The methods of the file are used to perform

  DELETE,READ,REWRITE,UNLOCK,WRITE,STARTBR operations.

FileBrowse object - represents a browse operations on the file and the methods are used to perform

  ENDBR,READNEXT,READPREV,RESETBR

Q44. What Is Meant By Dirty Read In Vsam?

High degree of concurrent access to VSAM files is achieved by dirty read - It is done by avoiding the complications associated with CI and CA splits - The dirty read protocol is summarized as:

The VSAM file mandatorily be defined with cross-region SHARE POINTS @- The file allocation must be with DISP=SHR - ENQ must be followed for all operations of the files, for data set - Data set name is specified for ENQ name - Any string can be used for the ENQ gname - The user’s buffer must be refreshed with GET request, after obtaining a lock - No lock is held during a wait - DEQ function should be called at the end of all the file operations of enqueue.

Q45. What More Info You Should Give In The Dd Statement While Defining The Next Generation Of A Gdg?

Give (+1) as the generation number, give (new,catlg) for disp, give space parameter, can give the dcb parameter if you want to override the dcb of the model dataset.

Q46. What Is Control Interval, Control Area?

Control Interval is analogous to a physical block for QSAM files. It is the unit of i/o. Must be between 512 bytes to 32 k. Usually either 2K or 4K. A larger control interval increases performance for sequential processing while the reverse is true for random access. Under CICS when a record is locked, the entire CI gets locked.

Control area is a group of control intervals. CA is used during allocation. CA size is calculated based on the allocation type (cyl, tracks or records) and can be max of 1 cylinder

Q47. What Are The Idcams Commands That Can Be Used For Vsam And Explain Each Of Them.

To modify the information for a catalog, alternate index, cluster or a path, ALTER command is used

DEFINE command is used for ALTERNATE INDEX, CLUSTER or PATH

DELETE command is used for removing the catalog for a catalog, cluster, alternate index or path

LISTCAT command lists the information about the dataset.

PRINT command prints the contents of dataset - REPRO command is used to copy the records from one file to another.

Q48. What Is The Difference Between Sequential Files And Esds Files?

Sequential(QSAM) files can be created on tape while ESDS files cannot.

Also, you can have ALTINDEX for an ESDS while no such facility exists for QSAM files.

Q49. How Do You Decide On Optimum Values For Ci, Freespace Etc?

CI size should be based on record length, type of processing. Usually CI is 4K. If record length is larger(>1K), select 6K or 8K.

FREESPACE have to be huge if extra wide variety of insertions are envisaged. Usual values are (20 20) while heavy updates are predicted. CI length can be calculated.

Q50. Suppose A Generation Of Gdg Gets Created In A Particular Step Of A Proc. How Would You Refer The Current Generation In A Subsequent Step? What Would Be The Disposition Of This Generation Now?

Relative technology numbers are up to date handiest at the quit of the task, now not at the quit of a step. To allocate a new generation, we'd be using (+1) with a DISP of (NEW,CATLG,DELETE). To confer with this in a next step inside the equal job, we might again use (+1) but with a DISP of SHR or OLD.




CFG