Skip to main content

Mainframe Written test @ Accenture

1. What r the 2 function we can get by using INSPECT verb? (c)

A. file handling, error handling

B. opening a file, closing a file.

C. char counting, replacing.

D. none of the above

2. Indicate which of the following is not true about the formal parameters in a subroutine?(c)

A. every formal parameter must appear in the linkage section of the subroutine

B. every formal parameter must appear in the using phrase of the procedure division header of the subroutine

C. A formal parameter name can appear more than once in the using phrases of the procedure division header of the subroutine.

D. A formal parameter can not be declared with value clause in a subroutine

3. What is the value of A? (B)

01 A pic 9(3).

Move 100 to A.

Perform 1000-para thru 1000-exit.

Display the value of a=A

Stop run.


If A=100

Perform 1000-exit


Move 150 to A


Move 200 to A.






d. none of the above is correct.

4. What is the value of B? (A)

Move 1 to A

Evaluate true

When A>0

Move 20 to B

When A=1

Move 10 to B

When A<1

Move 30 to B

End - evaluate.

A. 20

B. 10

C. 30

D. none of the above is correct

5. In file handling what is the meaning of access mode DYNAMIC? (B)

a. Data can b accessed only sequence

b. Data can b accessed both sequence and rand

c. Data can b accessed only rand

d. This is not correct access method

6. Which of the following is not true about the block contains clause? (C)

a. It reduces the space required to store a file on tape or disk

b. It reduces the time required to process a sequence file

c. It reduces the number of logical records in a file

d. It reduces the number of physical records in a file

7. All the following statements are false about the merge verb except one. Identify this

a. Can merge a max of 3 files? (C)

b. Does not require that the i/p files to b merged b sorted on the merge keys.

c. Requires that all files mentioned in the statement must have records of same size

d. Does not require that the positions of the merge key with in the record descriptions of each of the files must b same.

8. to prevent DB2 from closing a cursor after a commit operation, which of the following DECLARES CURSOR statements is used? (B)

A. for update

B. with hold

C. where current of

D. with commit of

E. none of the above is correct

9.Wcich of the following delete rules will not allow a row to b deleted from the parent table if a row with corresponding key value still exists in the child table?(C)

A. delete

B. cascade

C. restrict

D. set null

E. all of the above is correct

10. Physically the DB2 data is stored in which data sets?(C)

A. sequential datastes

B. hierarchical


D. partitioned

11. How would you determine you are at the end of the result set? (C)

A. check the NULL indicator host variable after each fetch

B. check the SQLCA after closing the cursor

C. check the SQLCA after each fetch

D. checks the SQLDA after each fetch.

12. An update lock gets released by an application using the repeatable read isolation level during which of the following? (D)

a. If the cursor accessing the row is closed.

b. If the transaction issues a ROLLBACK statement.

c. If the cursor accessing the row is moved to the next row.

d. If the transaction changes are made via an UPDATE statement.

13. Which of the following options can b used to place the cursor on the screen thru the program? (C)

A. By setting IC position in the map set.

b. Moving -1 to field attribute

c. Moving -1 to field length

D. none of above

14. Which one of the following can b used to register a TDQ? (C)





15. Find out the correct option from the following? (C)

1. Physical map is a load module

2. Symbolic map is a load module

3. Physical map is a program name

4. Symbolic map is a map copybook




d.all of the above

16. How can a transaction b initiated from the program? (B)

A. by giving program name

B. by using START command in the program

C. by using LINK

D. by using CALL

17. Which one of the following is related to MDT?(D)

A. fset & feset

B. reset & frset

C. reset & modify

D. fset &frset

18. Which will override in steplib & joblib : StepLib

19. what will be the COND parameter for executing a step, even if any of the previous steps terminated abnormally?


20. which of the following options is true, for getting xclusive control of the dataset?


21. Select the wrong choice? (D)

A. IDCAMS is utility of access method services, used to define VSAM clusters

B. REPRO is used to copy records from VSAM file to non-VSAM file and vice versa

C.LISTCAT utility is used to use to find the details like NAME, HISTORY, VOLUME, and ALLOCATION of the any existing VSAM dataset.

D. records of VSAM files generally stored in blocks not in control intervals

22. for which of the following file type, will the control interval split occur? (A)

A. ksds

B. esds

C. rrds

D. All of the above.

23. Select the correct answer? (D)

A. records from KSDS can b deleted physically

B. records from ESDS can not b deleted physically

C. RRDS does not support spanned records.

D. all of the above is correct

24. When do we encounter the status code ‘GA’ for IMS database? (B)

A. At the end f the database.

B. The next higher level segment was retrieved during sequential retrieval.

C. A segment of different type has been retrieved.

D. The segment field has been changed in the program’s IO area.

25. Which of the following is true? (A)

A. A qualified call should have an SSA and an unqualified call doesn’t have any SSA

B. A qualified call should not have an SSA and an unqualified call should have an SSA

C. A qualified call and an unqualified call both should have an SSA.

D. none

For Technical Interview Questions : keep watching this blog.


sanjuu said…
i expect more ?s for ims....anyway thanks for ?s..
sanjuu said…
i expect more questions for ims....anyway thanks for questions..

Popular posts from this blog


In DB2, the columns defined as NULL needs to be handled carefully else it will throw null exception error, in order to over come this error data type can be handled by using null indicator.
NULL is stored using a special one-byte null indicator that is "attached" to every nullable column. If the column is set to NULL, then the indicator field is used to record this. Using NULL will never save space in a DB2 database design - in fact, it will always add an extra byte for every column that can be NULL. The byte is used whether or not the column is actually set to NULL. The indicator variable is transparent to an end userConsider below Table :
Note :: Unless you specify NOT NULL, the default is to allow for NULLIn above table SN and SNAME columns holds null values by default, in order to handle these null variables we need to have NULL-INDICATORS declares in the Program as

How to Solve SOC7 Abend - with screen shots

Below process helps to find out the statement, caused the SOC7 error.

Check the Sysout of RUNJCL. This shows the error statement and lists offset valueTake the Offset Value 000003C0Got to respective Compilation Job listing, check the sysprint Search for the offset value 0003C0 (delete +00 -- initial 3 letters of Offset value and search for it) check below 2 screen shotsThis Offset value is listed under line no 0045 – which refers to Move statement.
Take this no. 045 and find for it in same sysprint. This points to the exact statement, caused SOC7 This 045 pints to the Move statement 1526, this is the exact line in the programCheck for the above line no. In source program. This points to the statement highlighted below. Check the statement, variable check-4, which is added to check-6. These are having different Picture clause.check-4 is alfhanumaric, holding some junk data, when this data is moved to Chcek-6 variable(of comp-3) creates SOC7 error.This is just an example to explain one ca…

DB2 Utilities and Commands (helpful for DB2 Certification)

• Utilities
– Image Copy
– CDB SuperCopy
– Quiesce
– Load
– CDB SuperLoad
– Check
– CDB SuperUnload
– Recover
– CDB SuperRestore
– Reorg
– CDB SuperReorg
– Runstats
– Report Recovery
– Repair

• Commands
– Display/Stop/Start Database
– Display/Term Utility

DB2 Logging

• DB2 Logs
– A ‘journal’ of all activity for a subsystem
– Undo/redo records for table updates
– Each event in the log is identified by its RBA(relative byte address)
– RBA denotes a point in time: the greater the RBA, the later in time the event occurred
– Data Sharing - LRSNs along with RBAs

– Some events:
• Full image copy
• Quiesce
• Load

Data Sharing

• Benefits of Data Sharing
– High availability
– Workload balancing
– Sysplex parallelism
– Better use of resources

Backing Up Tables

• Image Copy
– Backup for DB2 table spaces
– Can also copy index spaces
– Can perform full (all data) or incremental (changed data) copies
– Can prevent or allow updates by others during copy

• CDB SuperCopy
– Faster method of creating stan…