IT - 330 Mainframe
Concerning LPARs, channels, ESCON/FICON, switches and control units, which of the following statements is false? A. ESCON switches are used to attach a mainframe to a LAN. B. A channel may be assigned to one switch. C. Multiple switch ports may be connected to a Control Unit. D. Multiple channels may be connected to one switch.
A. ESCON switches are used to attach a mainframe to a LAN
The most popularly used VSAM data set is? A. Key Sequence Data Set (KSDS) B. Entry Sequence Data Set (ESDS) C. Relative Record Data Set (RRDS) D. Linear Data Sets (LDS) E. PDS and PDSE
A. Key Sequence Data Set (KSDS)
Which of the following is NOT a common characteristic of an OLTP workload? A. Large volumes of input data to be processed B. Immediate response is common. C. 24/7 availability is normal D. Transaction data are entered by users E. Increase need for security
A. Large volumes of input data to be processed
Concerning LPARs, channels and control units, which of the following statements is false? A. Many channels may be assigned to one LPAR. B. A channel may be shared by more than one LPAR. C. A channel may be assigned to only one Control Unit D. Multiple channels may be connected to one Control unit.
A. Many channels may be assigned to one LPAR.
Given the following data set name PPP.DDD.RRR, which of the following is classified as high-level qualifier (HLQ)? A. PPP B. PPP.DDD C. PPP.DDD.RRR D. RRR E. DDD.RRR
A. PPP
The concept that enables a CP is temporarily suspend one program waiting for an I/O to complete and start (switch) another program to improve CP utilization, normally used in batch processing, is called a(n) _______? A. multiprogramming B. multiprocessing C. multicore parallelism D. time sharing option E. interrupt capability
E. interrupt capability
All of the following are cited as advantages of a Parallel Sysplex Cluster, except? A. Support for different operating systems on a single mainframe B. Dynamic workload balancing C. Continuous availability and disaster recovery D. Cloning and symbolic E. Capacity and scaling
A. Support for different operating systems on a single mainframe
The mainframe role which most likely maintains security resource control lists, users and user profiles, network connectivity and monitors system performance is _______? A. System administrator B. System operator C. System programmer D. System engineer E. Application programmer
A. System administrator
When one submits a batch job to JES (Job Entry System), JES will schedule the necessary processing and data resources requirements, control the execution of the job, and terminate the job when completed. Which of the following types of z/OS control blocks are normally stored in system memory and then are used to control the flow and execution of jobs? A. Task-related control blocks B. Resource-related control blocks C. System-related control blocks D. Job-related control blocks E. Page-related control blocks
A. Task-related control blocks
Which of the following statements BEST describes the concept of Scalability? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
A. The ability to increase processing and storage capacity to meet the needs of the organization's workload.
An active virtual storage page residing currently in central storage (real memory) is called a _______? A. segment B. region C. frame D. slot
Frame
Before one can use a data set, one must ________? A. allocate the data set B. enter data into the data set C. code, compile and execute an application D. use ISPF
A. allocate the data set
While using variable length records may provide the advantage of using less storage, it does have which of the following disadvantages? A. extra processing time required to process the RDW and BDW B. unable to use extents C. not applicable to VSAM data sets D. unable to use blocking to improve performance
A. extra processing time required to process the RDW and BDW
In z/Archtecture, address space isolation (protection) is based on __________? A. private and common address spaces B. private and global address spaces C. real and auxiliary address spaces D. real and virtual spaces
A. private and common address spaces
Which of the following concepts BEST describes the process of transferring an entire address space between central storage and auxiliary storage? A. swapping B. dynamic loading C. page stealing D. memory management
A. swapping
In Unix the record format, block size and file organization is determined and accessed by A. the application B. the Unix operating system C. file type
A. the application
The master catalog is comparable to which of the following UNIX file system concepts? A. the root (/) directory B. a subdirectory C. file
A. the root (/) directory
IBM LPARs (logical partitions) is the MOST conceptually similar to which of the following concepts? A. virtualization technologies B. cluster technologies C. disk partitioning D. CTC rings
A. virtualization technologies
Channel subsystems signaling the completion of a process or a return of a printer to ready status are examples of which type of interrupt? A. I/O interrupts B. External interrupts C. Machine check interrupts D. Program interrupts E. SVC interrupts
I/O interrupts
Which of the following statements BEST describes the concept of Basic Shared DASD? A. Basic Shared DASD is a form of Parallel Sysplex technologies B. Two different channels assigned to two different LPARS are connected to the same control unit C. Two different control units assigned to two different LPARS are connected to the same channel D. One channel assigned to one LPAR is directly connected to one channel assigned to a different LPAR E. Two different LPARS are connected together by a coupling facility
B. Two different channels assigned to two different LPARS are connected to the same control unit
Sysplex and Parallel Sysplex technologies are examples of? A. virtualization technologies B. cluster technologies C. water-cooling technologies D. I/O connecting technologies
B. cluster technologies
Vital information about the z/OS component and an executing application's status that can help diagnose the cause of a failing component is stored in a ____________. A. virtual memory B. control block C. system registry D. macro
B. control block
In a zEnterprise file system, a collection of logically related data records, such as a library of macros or a source programs, is called a ________? A. catalog B. data set C. file D. subdirectories E. VTOC
B. data set
The z/OS address space where a user's program executes is called ____? A. process thread B. private area C. virtual address D. real address
B. private area
Virtual storage is dynamic representation of ________. A. real and physical storage B. real and auxiliary storage C. real, auxiliary and extended storage D. dynamic storage, slots and frames
B. real and auxiliary storage
In z/OS the record format, block size and file organization is determined and accessed by A. the application B. the z/OS operating system C. data set type
B. the z/OS operating system
Concerning the rules for naming a data set, which of the following statements if FALSE? A. A segment name is limited to 8 characters B. A data set name is limited to 22 characters C. A data set name may contain up to 22 segments D. A segment name must start with an alphabetic character or one of the following special characters, i.e., #, @, or $ E. A segment name may contain alphabetic, numeric, special characters or a hyphen.
B. A data set name is limited to 22 characters
Which of the following statements is TRUE concerning an "alias" used in master and user catalogs? A. An alias is special type of data set B. An alias defines a named pointer (short-cut) to another user catalog data set. C. An alias is an example of data set control block D. Aliases may only be created in master catalogs
B. An alias defines a named pointer (short-cut) to another user catalog data set.
Which of the following would be the BEST example of an appropriate used of variable length record format? A. An application which processes a record which stores one employee information B. An application which processes a student transcript record which stores information for the classes taken by a student C. An application which processes one inventory record which stores variable information about the inventory item D. An application which process a purchase order sent to a vendor with varying types of data
B. An application which processes a student transcript record which stores information for the classes taken by a student
Events such as a time interval expiring, the operator pressing the interrupt key, or receiving a signal from another processors are examples of which type of interrupt? A. I/O interrupts B. External interrupts C. Machine check interrupts D. Program interrupts E. SVC interrupts
B. External interrupts
Which of the following is NOT a common characteristic of a Batch Processing workload? A. Large volumes of input data to be processed B. Immediate output response is common. C. Pre-established sequence for transaction processing D. No user interaction required E. Maybe scheduled at off-peak hours
B. Immediate output response is common.
Which of the following concepts BEST describes a cluster of IBM mainframes acting together as a single system image? A. Distributed computing B. Parallel Sysplex C. Virtualization D. Clustering E. LPAR
B. Parallel Sysplex
Which of the following types of z/OS control blocks normally stores information in system memory concerning availability and status information for anything a program needs as it executes, e.g., processor time, a data set, another program, a table, or a hardware device? A. Task-related control blocks B. Resource-related control blocks C. System-related control blocks D. Job-related control blocks E. Page-related control blocks
B. Resource-related control blocks
Which of the following statements BEST describes the concept of Extensibility? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system
All of the following describes the process of responding to an interrupt, except? A. The hardware stores pertinent information about the program that was interrupted. B. The hardware erases the Program Status Word (PSW) to prevent contamination cause by the interrupt. C. The hardware attempts to disable the processor from further responding for further interrupts of the same type. D. The hardware routes execution control to the appropriate interrupt handler
B. The hardware erases the Program Status Word (PSW) to prevent contamination cause by the interrupt.
A logical segmentation of a mainframe's memory and other resources that allows it to run its own copy of the operating system and associated applications is called a _____? A. Sysplex B. Parallel Sysplex C. LPAR D. Cluster E. CPC book
C. LPAR
Concerning the concepts of a block and logical records, which of the following statements is TRUE? A. A block is logical subdivision of a volume B. One logical record contains one more blocks C. One block contains one or logical records D. A block is synonymous with the concept of an extent.
C. One block contains one or logical records
Which of the following statements BEST describes the concept of Compatibility? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems
A style of computing in which resources are made available over the internet, e.g., applications, servers, infrastructure, etc. to users is called a ________? A. LPAR B. cluster C. Sysplex D. Cloud
D. Cloud
Which of the following is not one of the processor types used by zEnterprise mainframes? A. CP (Central Processor) B. IFL (Integrated Facility for Linux) C. ICF ( Integrated Coupling Facility) D. MA4 ( Math Assist Quad Core Processor) E. zAAP (Application Assist Processor)
D. MA4 ( Math Assist Quad Core Processor)
A program performing an illegal operation, e.g., divide-by-zero, or referencing a page that is not in central storage (a page-fault) are examples of which type of interrupt? A. I/O interrupts B. External interrupts C. Machine check interrupts D. Program interrupts E. SVC interrupts
D. Program interrupts
Given the following data set name PPP.DDD.RRR,which of the following is classified as the lowest-level qualifier (LLQ)? A. PPP B. PPP.DDD C. PPP.DDD.RRR D. RRR E. DDD.RRR
D. RRR
To find a data set that you have requested, z/OS must know all of the following information, except? A. data set name B. volume name C. unit (the volume device type, such as a 3390 disk or 3590 tape) D. data set owner name
D. data set owner name
All if the following are types of z/OS storage, except? A. real storage B. virtual storage C. auxiliary storage D. dynamic storage
D. dynamic storage
Which of the following concepts BEST describes an inactive virtual storage page residing currently in auxiliary storage? A. segment B. region C. frame D. slot
D. slot
In z/OS, the user prefix (e.g., RMU0001) assigned to a z/OS data set points to A. the VOLSER B. the VTOC C. the master catalog D. the user catalog
D. the user catalog
Key Sequence Data Set (KSDS), Entry Sequence Data Set (ESDS), Relative Record Data Set (RRDS), and Linear Data Sets (LDS) are examples of? A. types of data set record formats B. types of data set access methods C. types of data set allocation methods D. types of VSAM data sets
D. types of VSAM data sets
Which of the following is (are) included in a 64-bit z/OS virtual address? A. region index (RX) - which region? - bits 0 -32 B. segment index (SX) - which segment within a region? - bits 33 - 43 C. page index (PX) - which page within a segment and within a region - bits 44 - 51 D. byte index (BX) - which byte with a page - bits 52 - 63 E. All of the above.
E. All of the above
Given the following statements concerning VSAM Control Intervals and Control Areas, which of the following statements is TRUE? A. A Control Interval is analogous to a block in QSAM (sequential) data sets. B. A Control Area is used during VSAM data set allocation and may contain one or more Control Intervals C. The size of a control interval may vary, with a maximum size of 32K D. A larger control interval increases performance for sequential processing E. All of the above are true
E. All of the above are true
All of the following are z/Architecture security features designed to preserve the integrity of address space during execution, except? A. Separation between private and common address spaces B. Page protection C. Low address protection D. Multiple storage protect keys E. Encryption of the address space
E. Encryption of the address space
Which of the following Parallel Sysplex concepts is MOST associated with Disaster Recovery? A. Single system image B. Automatic Restart Manager (ARM) C. Sysplex Failure Manager (SFM) D. Shared data access E. Geographically Dispersed Parallel Sysplex (GDPS)
E. Geographically Dispersed Parallel Sysplex (GDPS)
The IBM zAAP processor instruction set was designed and optimized for which of the following types of processes? A. Business Intelligence applications B. Legacy applications C. DB2 database applications D. Parallel Sysplex E. Java web applications
E. Java web applications
Predefined code used as callable within z/OS or application programs is called ________? A. component B. utility C. module D. panel E. macro
E. Macro
All Of the following are examples of types of z/OS control blocks, except? A. Task-related control blocks B. Resource-related control blocks C. System-related control blocks D. Job-related control blocks E. Page-related control blocks
E. Page-related control blocks
Common Criteria Evaluation Assurance Level 5 (EAL5) is a unique advantage of IBM mainframes. EAL5 BEST relates to which of the following categories used to compare computer systems? A. Reliability B. Availability C. Fault Tolerance D. Scalability E. Security
E. Security
Which of the following statements BEST describes the concept of Availability? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The ability of a system failed to allow the replacement of a hardware or software component while minimizing the impact on the operational system. C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
The mainframe role which most likely maintains security resource control lists, users and user profiles, network connectivity and monitors system performance is ______? A. System administrator B. System operator C. System programmer D. System engineer E. Application programmer
System administrator
The range of physical and virtual addresses reserved by a processor for the execution of a process of a task or user is called a(n) _______________? A. virtual page B. PSTOR C. address space D. task control block
C. address space
The range of physical and virtual addresses reserved by a processor for the execution of a process of task is called? A. virtual page B. PSTOR C. address space D. task control block
C. address space
A IBM file is stored as a _________? A. catalog B. VTOC C. dataset D. partition
C. dataset
The primary security function of a storage protection key is to _______. A. determine if a user is authorized to execute a program B. authenticate the identity of a user or group C. determine if an executing application is authorized to access a 4K virtual storage unit D. authorize a user to access a data set E. permit only administrative users to perform administrative tasks.
C. determine if an executing application is authorized to access a 4K virtual storage unit
IBM 3990 devices are popular types of which zEnterprise hardware component? A. I/O channels B. processors C. direct access storage devices (disk drives) D. fiber communication links used in CTC
C. direct access storage devices (disk drives)
A data set member is comparable to which of the following UNIX file system concepts? A. the root (/) directory B. a subdirectory C. file
C. file
The basic unit of stored information that contains a fixed number of bytes is called a _______? A. catalog B. data set C. record D. DASD E. VTOC
C. record
Sequential, Partitioned and VSAM are examples of? A. types data set record formats B. types of data set access methods C. types of data sets D. types of data set allocation methods E. types of VSAM data sets
C. types of data sets
The name of a volume is stored in the __________________ A. VTOC (Volume Table of Contents) B. VOLSER (Volume Serial Number) C. Master catalog D. Volume Label E. User catalog
D. Volume Label
All of following are TRUE concerning access methods, except? A. An access method is a type of file system used to store data in a z/FS volume. B. An access method defines the techniques to store and retrieve data C. An access method defines organization and other data structures used to store data. D. An access method must be known so that a user can edit or browse a data set.
A. An access method is a type of file system used to store data in a z/FS volume.
The design goal that ensures that no application changes are required to run in a Parallel Sysplex and compared to a single LPAR is called a(n)? A. Application compatibility B. Application consistency C. Application scaling D. Single application image E. Application migration
A. Application compatibility
The hardware component that independently controls communication with the I/O control unit without the assistance of the CP in a multiprogramming is called a(n) ____? A. channel B. multicore processor C. instruction parallelism D. virtualization E. I/O control unit
A. Channel
All of the following statement concerning the physical structure of a DASD are TRUE, except? A. A DASD contains cylinders B. A cylinder contains tracks C. A track contains blocks D. A track contains records
C. A track contains blocks
The IBM zIIP processor instruction set was designed and optimized for which of the following types of processes? A. Business Intelligence applications B. Legacy applications C. DB2 database applications D. Parallel Sysplex E. Java web applications
C. DB2 database applications
QSAM, BSAM, BDAM, BPAM, and VSAM are names of ____________? A. DASD labels B. data sets C. access methods D. disk types E. legal data set names
C. access methods
Which of the following concepts BEST describes the process of moving pages between auxiliary storage and real storage? A. segmenting B. paging C. virtual address translation D. transferring E. I/O fetching
Paging
The 64-bit z/OS operating system can manage up to 16-extabytes of storage. This means that up to 16- extabytes of executing programs and data can be under the z/OS 's control. To be more specific z/OS supports up to 16-extabytes of ________ storage. A. real B. virtual C. auxiliary D. extended
Virtual