5 avg. rating (100% score) - 5881 votes
Are you prepared in attending an interview? We’ve a right answer for your job interview preparation. If you are preparing for IBM Mainframe job interview and clueless regarding the kind of questions to be asked in job interviews then go through Wisdomjobs IBM Mainframe interview questions and answers page to easily go through the interview process. IBM Mainframe are the computer systems that is widely used in earlier years. Later it got changed to Mainframe. COBOL, Pascal, FORTRAN are few mainframe programming languages. These are used for development of the basic design of the IBM Systems. Below is the list of frequently asked IBM Mainframe interview questions and answers which gets you ready to face the interviews with lot of confidence:
Linkage section is used to accept data from outside the program.either it's parm part of Jcl or Call from any other programs,they pass data into called program thru linkage section only.
Move high values to the key of the VSAM file and the issue Readnext record command. Then give Readprev command. This will read the last record. In VSAM, there is one command HURBA, Using that we can read the last record, If you want to know more about go to IBM RED BOOKS. You will get the solution. by using the HURBA we can get the max records by using the CKD count key data we will get the last record
File-aid tool is online tool (application) used for processing files using online screens. File-aid utility is used in jcl for processing files in batch.
IN SORT, YOU CAN USE JOINKEYS AND CAN TAKE 50 COMMON RECORDS IN B/W 2 I/P FILES AND WRITE TO O/P FILE.
sysin dd * we cannot use in procedure,15 instream proc we can code.we can call instream to catalog.but we cannot call catalog to instream
If table is empty then we alter this column to any length, but if some data get inserted into the table then we can also decrease the column length up to largest data size available in that particular column.
One can use Inner Join to get data from two tables
CAN BE INCREMENT OR DECREMENT USING ARITHMETIC OPERATIONS
CAN BE INCREMENT OR DECREMENT USING SET VERB
we cannot write when disp is share.
Dead lock timeout error occurs in the following case: If two or more programs acquired exclusive lock on the data,which may be needed for other programs without that data which can not proceed further.
Solution: You can roll back current unit of work for one of the programs after preset time interval for deadlocks and terminate that program.
is there identity column in this table, for example, if there is a column indexnum int(supposed start from 1), you can use the Update Table Set XXX=XXX where indexnum < 101
We can increment the count for each reading of record in a file.
count = count + 1
Label record is standard means it will use disk files. But tape files can have standard label too. If the label record is omitted it should be a the tape file without any begin and end blocks on the tape.
Rewrite and Read
No go to's
Opened I/O mode
In the most significant bit. Bit is ON if -ve, OFF if +ve
The verb can be used to increment one or more identifiers by a positive integral value.
IN YYYYMMDD FORMAT
Can rewrite (record length must be same), but not delete.
The difference between Static and Dynamic Call is that the first has the invoking program name hard coded into the call statement while the second has it in storage in an identifier. Also in the case of Static the invoking program is link edited with the invoked subroutine and in the case of Dynamic Callwe will have a different module for each: the main program and the subroutine. IF we don’t use Initial or make a Cancel when we invoke the statically called subroutine then it will not be found in the default state; dynamically called routine will be forever in the default state.
Cataloged procedures are invoked through a specification of the name of the procedure over the Exec statement and cataloged on the library of the procedure. For verifying a procedure prior to becoming a catalog procedure we will use an in-stream procedure. Instream procedures are similar to catalog procedures but there is a small difference at their execution:for executing them there are required to be placed between the Job statement and the Exec statement and they must be finished with a Pend statement.
Start is used for the beginning of new transactions and then the XCTL takes the operations further , transferring the control to a different application but with an equal transaction ID.
Evaluate statement is a different way for the neste IF statements and it works by choosing from a processing actions list. To replace IF we can use When to find out if an action will be taken. Like IF , When control goes from evaluate to the following statement on the application. The types of evaluate statement are trues and variable-name.
NOTCAT 2 is a MVS message that shows if two or more entries of the same catalog exist. If an entry is already there the catalog would send us an error message. The issue can be repaired by uncataloging or deleting the primary data set and we must find that volume which contains the new data set and we must catalog it.
IS NUMERIC will be available for alphanumeric, packed decimal, unsigned numeric and signed numeric items. When an item is made of 0 to 9 the value returned by IS NUMERIC is True, if the item is signed then it can have 0 to 9 but also + and -.
The sorting order of SEARCH ALL will be Descending or Ascending, the initial value is Ascending. When we want to switch to Descending we have to provide the Descending Key clause in the time we define the array which will be sorted; the table has to be loaded in the order stated.
The right time is when the perform body is not used. If it is a type of code that has general means, being utilized in several locations in the program, the code should be met in a different para and not use in-line perform, but perform paraname instead.
The main thing to do is repairing the problematic data, usually the cause for problems with SOC-7 is a numeric item that is un-initialized, this is the primary concern. Some of the setups give us dumps for run-time abends, this can also be made by invoking OS services or subroutines via the assembly language. The dumps are useful as thei give us the ultimate instruction’s offset where the abend occurred. The output XREF listing of the compilation must be verifiedfor obtaining the line number and the verb of this offset’s source code. After that the bug can be found in the source code. For capturing the runtime dumps, we should define datasets like for instance Sysabout in JCL. When these methods are not working we must find the error source with judgement and Display. If the setup has debugging utilities, we should make use of them.
COMP SYNC aligns an item to the natural boundaries, it will be synchronized right and left. If we use binary items that are found at the boundaries of words in memory, these ones have a more rapid address resolution. The size of word from mainframe memory is four bytes. So every word has to begin from an address which is divisible by four. When the primary variable is x(3) and the next one is s9(4) comp if the Sync clause is not specified, the second variable will begin from byte 3. When Sync is specified the beginning address will be 4; this more rapid, even if we may notice a little waste of memory.
These two are options of the compiler for verifying the out of range state for the subscript. The default will be NOSSRANGE and it implies no flagging of run-time errors when the subscript or index is exceeding the permitted range.
A Control Area is a set of Control Intervals and it works during allocation. The size of the Control Area depends on the type of allocation (cyl, tracks, records) and ots maximum reaches 1 cylinder. The Control Interval is something like a block for QSAM files, its size is ranged between 512 bytes and 32 kilobytes, normally 2 or 4 kilobytes. If the Control Interval is bigger the performance will also increase when it comes to sequential processing.
The size of CI has to depend on the length of the record and the processing type. The normal value is 4 kilobytes but when the length of the record is bigger than 1 kilobyte we have to pick 6 kilobytes or 8 kilobytes. The normal values for FREESPACE are (20 20), when many insertions are made it should be bigger.
If the VSAM file didn’t have a record before it will be seen as unavailable and if we try to open it the operation will not succeed. Empty files can just be opened for output, case in which a dummy record will be written by COBOL and the file will be erased.
GDG means GenerationDataGroup, for defining it we will write the command DEFINE GENERATION DATA GROUP. In the IDCAMS step, a different data set has to be defined and its DCB parameters will be used at the time when new generations are made. This is what we call a model dataset, whose ds name has to be similar to the one of the GDG.
The meaning is that we have a fresh datasheet and it has to be allocated, the datasheet must be CTLG if all went right but to KEEP and not CTLG the datasheet when all is abended.
IBM Mainframe Related Tutorials
|IBM Lotus Notes Tutorial||IBM-CICS Tutorial|
|COBOL Tutorial||Linux Tutorial|
|IBM-JCL Tutorial||IBM Mainframe Tutorial|
IBM Mainframe Related Interview Questions
|IBM Lotus Notes Interview Questions||IBM-CICS Interview Questions|
|COBOL Interview Questions||Linux Interview Questions|
|IBM-JCL Interview Questions||IBM AIX Interview Questions|
|IBM WAS Administration Interview Questions||IBM Lotus Domino Interview Questions|
|IBM Integration Bus Interview Questions||Mainframe DB2 Interview Questions|
|Unix Production Support Interview Questions|
Introduction To Software Development
Introduction To Ibm Mainframes
Tso And Ispf
Introduction To Job Control Language (jcl)
The Job Statement
The Exec Statement
The Job And Exec Statements
Procedures And Symbolic Parameters
Generation Data Groups (gdg), Compile/link-edit And Run Jcls
Additional Vsam Commands
Introduction To Rexx
Overview Of Rexx
Introduction To Cics
Exception Handling In Cics
Developing A Cics Application
Cics Programming Techniques
Basic Mapping Support (bms)
Transient Data Control
Temporary Storage Control
Interval And Task Control
Cics Application Design
Recovery And Restart
System Security And Intersystem Communication
Cics Debugging Facilities And Techniques
Cics Response And Abend Codes
Data, Information And Information Processing
Introduction To Database Management Systems
Introduction To Relational Database Management Systems
Database Architecture And Data Modeling
Overview Of Db2
Structured Query Language (sql)
Data Security And Access
Db2 Application Development
Qmf And Db2i
Db2 Performance Monitoring, Utilities And Recovery/restart
Overview Of Information Management System (ims)
Introduction To Vs Cobol Ii
Overview Of Application Development In Vs Cobol Ii
Overview Of The Cobol Program
Sorting And Merging Files
Coding Cobol Programs That Run Under Cics. Ims, Db2 And Ispf
Compiling The Program
Link-editing The Program
Executing The Program
Improving Program Performance
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.