IT 330 - Exam 1
Concerning LPARs, channels, ESCON/FICON, switches and control units, which of the following statements is false? A. ESCON switches are used to attach a mainframe to a LAN. B. A channel may be assigned to one switch. C. Multiple switch ports may be connected to a Control Unit. D. Multiple channels may be connected to one switch.
A. ESCON switches are used to attach a mainframe to a LAN.
The concepts of channel, control unit and device number are related to which of the following hardware technologies? A. I/O connectivity B. DASD C. types of main storage D. types of IBM processors
A. I/O connectivity
Channel subsystems signaling the completion of a process or a return of a printer to ready status are examples of which type of interrupt? A. I/O interrupts B. External interrupts C. Machine check interrupts D. Program interrupts E. SVC interrupts
A. I/O interrupts
The most popularly used VSAM data set is? A. Key Sequence Data Set (KSDS) B. Entry Sequence Data Set (ESDS) C. Relative Record Data Set (RRDS) D. Linear Data Sets (LDS) E. PDS and PDSE
A. Key Sequence Data Set (KSDS)
Which of the following is NOT a common characteristic of an OLTP workload? A. Large volumes of input data to be processed B. Immediate response is common. C. 24/7 availability is normal D. Transaction data are entered by users E. Increase need for security
A. Large volumes of input data to be processed
All of the following are advantages of a PDS, except? A. May store an unlimited number of members within the constraint of the space allocated to the PDS B. Grouping of related dataset under a single name to make z/OS management easier C. Because the space allocated for z/OS data sets always start on a track boundary, multiple members sets may be stored on a single track. D. Easy to create (allocate) and manipulate using TSO, ISPF or JCL
A. May store an unlimited number of members within the constraint of the space allocated to the PDS
Given the following data set name PPP.DDD.RRR, which of the following is classified as high-level qualifier (HLQ)? A. PPP B. PPP.DDD C. PPP.DDD.RRR D. RRR E. DDD.RRR
A. PPP
The mainframe role which most likely ensures that batch workloads run to completion without error and delay is _______? A. Production control analyst B. System operator C. System programmer D. System engineer E. Application programmer
A. Production control analyst
Which of the following statements BEST describes the concept of Availability? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The ability of a system failed to allow the replacement of a hardware or software component while minimizing the impact on the operational system. C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
The concept that enables a CP is temporarily suspend one program waiting for an I/O to complete and start (switch) another program to improve CP utilization, normally used in batch processing, is called a(n) _______? A. multiprogramming B. multiprocessing C. multicore parallelism D. time sharing option E. interrupt capability
E. interrupt capability
All of the following are cited as advantages of a Parallel Sysplex Cluster, except? A. Support for different operating systems on a single mainframe B. Dynamic workload balancing C. Continuous availability and disaster recovery D. Cloning and symbolic E. Capacity and scaling
A. Support for different operating systems on a single mainframe
The mainframe role which most likely maintains security resource control lists, users and user profiles, network connectivity and monitors system performance is ______? A. System administrator B. System operator C. System programmer D. System engineer E. Application programmer
A. System administrator
When one submits a batch job to JES (Job Entry System), JES will schedule the necessary processing and data resources requirements, control the execution of the job, and terminate the job when completed. Which of the following types of z/OS control blocks are normally stored in system memory and then are used to control the flow and execution of jobs? A. Task-related control blocks B. Resource-related control blocks C. System-related control blocks D. Job-related control blocks E. Page-related control blocks
A. Task-related control blocks
Which of the following statements BEST describes the concept of Scalability? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
A. The ability to increase processing and storage capacity to meet the needs of the organization's workload.
The list of data sets that is stored in a given volume, along with information concerning the location (pointers) and size of each data set is stored in the __________________ ? A. VTOC (Volume Table of Contents) B. VOLSER (Volume Serial Number) C. Master catalog D. Volume Label E. User catalog
A. VTOC (Volume Table of Contents)
Before one can use a data set, one must ________? A. allocate the data set B. enter data into the data set C. code, compile and execute an application D. use ISPF
A. allocate the data set
Data sets always start ______________? A. at the beginning of a track or cylinder B. at the beginning of a volume C. at the beginning of a VTOC D. at the beginning of a control interval
A. at the beginning of a track or cylinder
The physical unit of data retrieved by a disk and returned to z/OS for processing by an application is called a(n) ___________? A. block B. logical record C. allocation D. extent
A. block
The hardware component that independently controls communication with the I/O control unit without the assistance of the CP in a multiprogramming is called a(n) ____? A. channel B. multicore processor C. instruction parallelism D. virtualization E. I/O control unit
A. channel
An event that alters the sequence in which the processor executes instructions is called? A. interrupt processing B. jump instruction C. conditional PSW D. dispatching E. serialization
A. interrupt processing
The primary advantage of using virtual addressing is? A. permits an address range that is greater than central memory storage (physical memory) B. enables address space isolation C. enables 64-bit addressing D. encourages cross-memory addressing.
A. permits an address range that is greater than central memory storage (physical memory)
In z/Archtecture, address space isolation (protection) is based on __________? A. private and common address spaces B. private and global address spaces C. real and auxiliary address spaces D. real and virtual spaces
A. private and common address spaces
In Unix the record format, block size and file organization is determined and accessed by A. the application B. the Unix operating system C. file type
A. the application
The master catalog is comparable to which of the following UNIX file system concepts? A. the root (/) directory B. a subdirectory C. file
A. the root (/) directory
F (Fixed), FB (Fixed Blocked), V (Variable), VB (Variable Blocked), and U (Undefined) are examples of? A. types of data set record formats B. types of data set access methods C. types of data set allocation methods D. types of VSAM data sets
A. types of data set record formats
IBM LPARs (logical partitions) is the MOST conceptually similar to which of the following concepts? A. virtualization technologies B. cluster technologies C. disk partitioning D. CTC rings
A. virtualization technologies
A DASD may be subdivided into A. volumes B. VTOCs C. data sets D. extents E. catalogs
A. volumes
Which of the following statements BEST describes the concept of Basic Shared DASD? A. Basic Shared DASD is a form of Parallel Sysplex technologies B. Two different channels assigned to two different LPARS are connected to the same control unit C. Two different control units assigned to two different LPARS are connected to the same channel D. One channel assigned to one LPAR is directly connected to one channel assigned to a different LPAR E. Two different LPARS are connected together by a coupling facility
B. Two different channels assigned to two different LPARS are connected to the same control unit
Sysplex and Parallel Sysplex technologies are examples of? A. virtualization technologies B. cluster technologies C. water-cooling technologies D. I/O connecting technologies
B. cluster technologies
Vital information about the z/OS component and an executing application's status that can help diagnose the cause of a failing component is stored in a ____________. A. virtual memory B. control block C. system registry D. macro
B. control block
In a zEnterprise file system, a collection of logically related data records, such as a library of macros or a source programs, is called a ________? A. catalog B. data set C. file D. subdirectories E. VTOC
B. data set
DASD is another name for a __________? A. data set B. disk drive C. label D. VTOC E. HBA
B. disk drive
The simultaneous operation of two or more processors that share various hardware resources, e.g., system and disk storage, is called ______? A. multiprogramming B. multiprocessing C. multicore parallelism D. time sharing option E. interrupt capability
B. multiprocessing
Which of the following concepts BEST describes the process of moving pages between auxiliary storage and real storage? A. segmenting B. paging C. virtual address translation D. transferring E. I/O fetching
B. paging
The z/OS address space where a user's program executes is called ____? A. process thread B. private area C. virtual address D. real address
B. private area
Virtual storage is dynamic representation of ________. A. real and physical storage B. real and auxiliary storage C. real, auxiliary and extended storage D. dynamic storage, slots and frames
B. real and auxiliary storage
In z/OS the record format, block size and file organization is determined and accessed by A. the application B. the z/OS operating system C. data set type
B. the z/OS operating system
The 64-bit z/OS operating system can manage up to 16-extabytes of storage. This means that up to 16- extabytes of executing programs and data can be under the z/OS 's control. To be more specific z/OS supports up to 16-extabytes of ________ storage. A. real B. virtual C. auxiliary D. extended
B. virtual
When a program is selected for execution, it is first stored in __________. A. real storage B. virtual storage C. auxiliary storage D. extended storage
B. virtual storage
Concerning the rules for naming a data set, which of the following statements if FALSE? A. A segment name is limited to 8 characters B. A data set name is limited to 22 characters C. A data set name may contain up to 22 segments D. A segment name must start with an alphabetic character or one of the following special characters, i.e., #, @, or $ E. A segment name may contain alphabetic, numeric, special characters or a hyphen.
B. A data set name is limited to 22 characters
Concerning catalogs, which of the following statements is FALSE? A. A z/OS always has at least one master catalog. B. A master catalog normally contains entries that point to the VTOC table C. A master catalog normally contains entries to point to numerous user catalogs D. An alias is entry in the master catalog based on the HLQ which points an individual user catalog E. A catalog is a special type of data set
B. A master catalog normally contains entries that point to the VTOC table
What is a "page fault"? A. A storage protection key violation has occurred during the swapping process. B. A virtual address is not in real memory and z/OS must bring in the page from auxiliary storage. C. The z/OS system has run out of virtual address space. D. The z/OS system has run out of physical address space. E. The auxiliary storage device has failed during the swapping process.
B. A virtual address is not in real memory and z/OS must bring in the page from auxiliary storage.
Which of the following statements is TRUE concerning an "alias" used in master and user catalogs? A. An alias is special type of data set B. An alias defines a named pointer (short-cut) to another user catalog data set. C. An alias is an example of data set control block D. Aliases may only be created in master catalogs
B. An alias defines a named pointer (short-cut) to another user catalog data set.
Which of the following would be the BEST example of an appropriate used of variable length record format? A. An application which processes a record which stores one employee information B. An application which processes a student transcript record which stores information for the classes taken by a student C. An application which processes one inventory record which stores variable information about the inventory item D. An application which process a purchase order sent to a vendor with varying types of data
B. An application which processes a student transcript record which stores information for the classes taken by a student
The process of translating a virtual address during storage reference into a real address is called? A. Page address translation (PAT) B. Dynamic address translation (DAT) C. Virtual address translation (VAT) D. Dynamic paging translation (DPT)
B. Dynamic address translation (DAT)
Events such as a time interval expiring, the operator pressing the interrupt key, or receiving a signal from another processors are examples of which type of interrupt? A. I/O interrupts B. External interrupts C. Machine check interrupts D. Program interrupts E. SVC interrupts
B. External interrupts
All of the following statements concerning Partitioned Data Sets (PDS) are TRUE, except? A. When space is allocated to a PDS, it specifies the data set organization parameter as DSORG=PO B. May be used to contain data to be processed by different applications C. A PDS loses space whenever a member is updated or deleted. D. Contains a directory block which is used to find the location of a member within the data set. E. Similar to a subdirectory in Windows or Linux, but a PDS cannot contain another PDS (not hierarchical).
B. May be used to contain data to be processed by different applications
Which of the following concepts BEST describes a cluster of IBM mainframes acting together as a single system image? A. Distributed computing B. Parallel Sysplex C. Virtualization D. Clustering E. LPAR
B. Parallel Sysplex
Which of the following types of z/OS control blocks normally stores information in system memory concerning availability and status information for anything a program needs as it executes, e.g., processor time, a data set, another program, a table, or a hardware device? A. Task-related control blocks B. Resource-related control blocks C. System-related control blocks D. Job-related control blocks E. Page-related control blocks
B. Resource-related control blocks
Which of the following statements BEST describes the concept of Serviceability? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The ability of a system failed to allow the replacement of a hardware or software component while minimizing the impact on the operational system. C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
B. The ability of a system failed to allow the replacement of a hardware or software component while minimizing the impact on the operational system.
Which of the following statements BEST describes the concept of Extensibility? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system
All of the following describes the process of responding to an interrupt, except? A. The hardware stores pertinent information about the program that was interrupted. B. The hardware erases the Program Status Word (PSW) to prevent contamination cause by the interrupt. C. The hardware attempts to disable the processor from further responding for further interrupts of the same type. D. The hardware routes execution control to the appropriate interrupt handler
B. The hardware erases the Program Status Word (PSW) to prevent contamination cause by the interrupt.
A logical segmentation of a mainframe's memory and other resources that allows it to run its own copy of the operating system and associated applications is called a _____? A. Sysplex B. Parallel Sysplex C. LPAR D. Cluster E. CPC book
C. LPAR
Concerning the concepts of a block and logical records, which of the following statements is TRUE? A. A block is logical subdivision of a volume B. One logical record contains one more blocks C. One block contains one or logical records D. A block is synonymous with the concept of an extent.
C. One block contains one or logical records
Which of the following is NOT a common characteristic of a Batch Processing workload? A. Large volumes of input data to be processed B. Immediate output response is common. C. Pre-established sequence for transaction processing D. No user interaction required E. Maybe scheduled at off-peak hours
C. Pre-established sequence for transaction processing
The security concept(s) designed to prevent anyone person from having unlimited access to resources, any appearance of conflict of interest, wrongful acts, fraud, abuse and errors is called? A. Authentication and Authorization B. Principle of Least Privilege C. Separation of Duties D. Confidentiality E. Non-repudiation
C. Separation of Duties
All of the following are types (classes) of z/OS interrupts, except A. I/O interrupts B. External interrupts C. Status interrupts D. Program interrupts E. SVC interrupts
C. Status interrupts
Concerning the features of z/Architecture storage protection, which of the following are FALSE? A. Storage protection imposes limits on what a task can access (for read or write) within storage locations within its own data and programs. B. Storage protection imposes limits of other tasks can access (for read or write) within storage locations within another task's data and programs. C. Storage protection keys are used to encrypt logon user's authentication token. D. A storage protection key is a 7-bit control field assigned to each 4K storage unit of a given task E. During execution the storage protection key assigned to an executing task is compared to the storage protection key assign to a 4K storage unit.
C. Storage protection keys are used to encrypt logon user's authentication token.
The mainframe role which most likely installs, customizes and maintains the operating system is _____? A. Production control analyst B. System operator C. System programmer D. System engineer E. Application programmer
C. System programmer
Which of the following statements BEST describes the concept of Compatibility? A. The ability to increase processing and storage capacity to meet the needs of the organization's workload. B. The design of existing computer hardware, operating systems and applications to take into consideration the future changes in the system C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems. D. The ability to conduct automated extensive tests to identify potential problems that will impact the availability of the system. E. The ability to recover from minor or extensive hardware failures without impacting the rest of the running system.
C. The design of new computer hardware, operating systems and applications to be integrated with older computer systems.
A style of computing in which resources are made available over the internet, e.g., applications, servers, infrastructure, etc. to users is called a ________? A. LPAR B. cluster C. Sysplex D. Cloud
D. Cloud
Which of the following is not one of the processor types used by zEnterprise mainframes? A. CP (Central Processor) B. IFL (Integrated Facility for Linux) C. ICF ( Integrated Coupling Facility) D. MA4 ( Math Assist Quad Core Processor) E. zAAP (Application Assist Processor)
D. MA4 ( Math Assist Quad Core Processor)
All of the following are true concerning channels, except A. A channel provides an independent connection between control unit, the CPU and main storage. B. A channel can transmit data between a control unit and main storage without requiring the service of the CPU C. The use of channels has alleviated many of the problems of input/output bounded systems, e.g., the CPU is excessively waiting for data I/O D. Most large scale mainframes have 16 or less channels
D. Most large scale mainframes have 16 or less channels
A program performing an illegal operation, e.g., divide-by-zero, or referencing a page that is not in central storage (a page-fault) are examples of which type of interrupt? A. I/O interrupts B. External interrupts C. Machine check interrupts D. Program interrupts E. SVC interrupts
D. Program interrupts
Given the following data set name PPP.DDD.RRR,which of the following is classified as the lowest-level qualifier (LLQ)? A. PPP B. PPP.DDD C. PPP.DDD.RRR D. RRR E. DDD.RRR
D. RRR
To find a data set that you have requested, z/OS must know all of the following information, except? A. data set name B. volume name C. unit (the volume device type, such as a 3390 disk or 3590 tape) D. data set owner name
D. data set owner name
All if the following are types of z/OS storage, except? A. real storage B. virtual storage C. auxiliary storage D. dynamic storage
D. dynamic storage
A ______ is anything a program needs to execute. A. program requirement B. dependency C. call list D. resource
D. resource
Which of the following concepts BEST describes an inactive virtual storage page residing currently in auxiliary storage? A. segment B. region C. frame D. slot
D. slot
In z/OS, the user prefix (e.g., RMU0001) assigned to a z/OS data set points to A. the VOLSER B. the VTOC C. the master catalog D. the user catalog
D. the user catalog
Key Sequence Data Set (KSDS), Entry Sequence Data Set (ESDS), Relative Record Data Set (RRDS), and Linear Data Sets (LDS) are examples of? A. types of data set record formats B. types of data set access methods C. types of data set allocation methods D. types of VSAM data sets
D. types of VSAM data sets
Given the following statements concerning VSAM Control Intervals and Control Areas, which of the following statements is TRUE? A. A Control Interval is analogous to a block in QSAM (sequential) data sets. B. A Control Area is used during VSAM data set allocation and may contain one or more Control Intervals C. The size of a control interval may vary, with a maximum size of 32K D. A larger control interval increases performance for sequential processing E. All of the above are true
E. All of the above are true
Given the following statements concerning VSAM data sets, which of the following statements is TRUE? A. VSAM data is always variable-length and records are automatically blocked into a control interval. B. A VSAM data set contains control areas and indexes C. A control interval is frequently allocated with FREESPACE, which permits records to be inserted into a control interval in the future. D. IDCAMS or AMS are utilizes used to allocate VSAM data sets E. All of the above or true.
E. All of the above or true.
Which of the following is (are) included in a 64-bit z/OS virtual address? A. region index (RX) - which region? - bits 0 -32 B. segment index (SX) - which segment within a region? - bits 33 - 43 C. page index (PX) - which page within a segment and within a region - bits 44 - 51 D. byte index (BX) - which byte with a page - bits 52 - 63 E. All of the above.
E. All of the above.
All of the following are z/Architecture security features designed to preserve the integrity of address space during execution, except? A. Separation between private and common address spaces B. Page protection C. Low address protection D. Multiple storage protect keys E. Encryption of the address space
E. Encryption of the address space
The IBM zAAP processor instruction set was designed and optimized for which of the following types of processes? A. Business Intelligence applications B. Legacy applications C. DB2 database applications D. Parallel Sysplex E. Java web applications
E. Java web applications
All Of the following are examples of types of z/OS control blocks, except? A. Task-related control blocks B. Resource-related control blocks C. System-related control blocks D. Job-related control blocks E. Page-related control blocks
E. Page-related control blocks
Common Criteria Evaluation Assurance Level 5 (EAL5) is a unique advantage of IBM mainframes. EAL5 BEST relates to which of the following categories used to compare computer systems? A. Reliability B. Availability C. Fault Tolerance D. Scalability E. Security
E. Security
QSAM, BSAM, BDAM, BPAM, and VSAM are names of ____________? A. DASD labels B. data sets C. access methods D. disk types E. legal data set names
C. access methods
The range of physical and virtual addresses reserved by a processor for the execution of a process of a task or user is called a(n) _______________? A. virtual page B. PSTOR C. address space D. task control block
C. address space
The range of physical and virtual addresses reserved by a processor for the execution of a process of task is called? A. virtual page B. PSTOR C. address space D. task control block
C. address space
A IBM file is stored as a _________? A. catalog B. VTOC C. dataset D. partition
C. dataset
The primary security function of a storage protection key is to _______. A. determine if a user is authorized to execute a program B. authenticate the identity of a user or group C. determine if an executing application is authorized to access a 4K virtual storage unit D. authorize a user to access a data set E. permit only administrative users to perform administrative tasks.
C. determine if an executing application is authorized to access a 4K virtual storage unit
IBM 3390 devices are popular types of which zEnterprise hardware component? A. I/O channels B. processors C. direct access storage devices (disk drives) D. fiber communication links used in CTC
C. direct access storage devices (disk drives)
An active virtual storage page residing currently in central storage (real memory) is called a _______? A. segment B. region C. frame D. slot
C. frame
A group of z/OS related instructions are called a ________? A. component B. utility C. module D. panel E. macro
C. module
Which of the following concepts BEST describes the process of using an inactive frame of other work processes and assigning this storage space to the current active user or application is called? A. swapping B. dynamic loading C. page stealing D. memory management
C. page stealing
The basic unit of stored information that contains a fixed number of bytes is called a _______? A. catalog B. data set C. record D. DASD E. VTOC
C. record
Workload Management (WLM), Recovery Termination Manager ( RTM), Unified Resource Manager (URM), and RACF are examples of A. system macros B. system modules C. system components D. system applications
C. system components
Sequential, Partitioned and VSAM are examples of? A. types data set record formats B. types of data set access methods C. types of data sets D. types of data set allocation methods E. types of VSAM data sets
C. types of data sets
The name of a volume is stored in the __________________ A. VTOC (Volume Table of Contents) B. VOLSER (Volume Serial Number) C. Master catalog D. Volume Label E. User catalog
D. Volume Label
All of following are TRUE concerning access methods, except? A. An access method is a type of file system used to store data in a z/FS volume. B. An access method defines the techniques to store and retrieve data C. An access method defines organization and other data structures used to store data. D. An access method must be known so that a user can edit or browse a data set.
A. An access method is a type of file system used to store data in a z/FS volume.
The design goal that ensures that no application changes are required to run in a Parallel Sysplex and compared to a single LPAR is called a(n)? A. Application compatibility B. Application consistency C. Application scaling D. Single application image E. Application migration
A. Application compatibility
The maximum number of severs that Parallel Sysplex can link together as one Sysplex is A. 16 B. 32 C. 64 D. 128
B. 32
Concerning the rules for naming a data set, which of the following statements is FALSE? A. A data set name must be unique. B. A data set name may contain one or more name segment names. C. A data set name many not contain more than four segments. D. Named segments are separated by a period. E. Another name for a segment is "qualifier".
C. A data set name many not contain more than four segments.
All of the following statement concerning the physical structure of a DASD are TRUE, except? A. A DASD contains cylinders B. A cylinder contains tracks C. A track contains blocks D. A track contains records
C. A track contains blocks
Which of the following is NOT an example of a typical Batch Processing workload? A. Report generation of business statistics required by managers B. Backup of critical files and databases C. Customer balance inquiries of bank tellers and ATM machines D. Validation of submitted IRS Form 1020 (Federal Income Taxes) E. Extracting data from transactional database, transforming and storing the results in a data warehouse
C. Customer balance inquiries of bank tellers and ATM machines
The IBM zIIP processor instruction set was designed and optimized for which of the following types of processes? A. Business Intelligence applications B. Legacy applications C. DB2 database applications D. Parallel Sysplex E. Java web applications
C. DB2 database applications
All of the following statements concerning Partitioned Data Set Extended (PDSE) are TRUE, except? A. Can only be allocated on DASD, not other devices like tape. B. No requirement to remove wasted space (compress) when members are moved, updated or deleted. C. Reduced directory search time and automatically expanded as needed. D. Similar to a PDS, PDSE cannot store executable modules as a member E. Grouping of related dataset under a single name to make z/OS management easier
D. Similar to a PDS, PDSE cannot store executable modules as a member
Concerning the concepts of addressability, line and bar which of the following statements is false? A. Addressability is the ability of a program to reference all of the storage associated with its address space. B. "Below-the-line storage" or addressability, a program must be loaded in an address space located below 16Megabytes of the address space. C. Older program which relied on 24-bit addressing generally used a program attribute called a residence mode (RMODE). D. The "Bar" is an area of storage that may extend up to 16 extabytes (EB). E. Programs use 31-bit or 64-bit addresses may be loaded and reference storage above 16 megabytes.
D. The "Bar" is an area of storage that may extend up to 16 extabytes (EB).