Mainframe Interview Questions and Answers
Mainframe Interview Questions and Answers for beginners and experts. List of frequently asked Mainframe Questions with answers by Besant Technologies. We hope these Mainframe interview questions and answers are useful and will help you to get the best job in the networking industry. These Mainframe interview questions and answers are prepared by Mainframe Professionals based on MNC Company’s expectations. Stay tuned we will update New Mainframe Interview questions with Answers Frequently. Besant Technologies supports the students by providing Mainframe interview questions and answers for the job placements and job purposes. The mainframe is the leading important course in the present situation because more job openings and the high salary pay for this Mainframe and more related jobs. If you want to learn Practical Mainframe Training then please go through this Mainframe Training in Chennai.
Best Mainframe Interview Questions and Answers
Here is the list of most frequently asked Mainframe Interview Questions and Answers in technical interviews. These Mainframe questions and answers are suitable for both freshers and experienced professionals at any level. The Mainframe questions are for intermediate to somewhat advanced Mainframe professionals, but even if you are just a beginner or fresher you should be able to understand the Mainframe answers and explanations here we give.
In this post, you will get the most important and top Mainframe Interview Questions and Answers, which will be very helpful and useful to those who are preparing for jobs.
Q1. What is the full form of DRDA?
The full form of DRDA is distributed relational database architecture.
Q2. What do you understand by DRDA?
A relational protocol that helps in database processing that is used by IBM and several other vendor databases is known as DRDA. It encompasses its own guidelines for communication
Q3. What is WHERE used for?
HWhen an element or row needs to be isolated especially if used in conjunction with a relational statement, that is when WHERE is used.
Q4. How does one create a LIKE table?
The LIKE parameter needs to be utilized. This is found in the statement CREATE. In order to test the production environment, these tables are utilized.
Q5. Why are run stats needed in the test environment?
When the default values need to be cleared from the catalog columns, run stats are needed. If the default values are allowed to continue as is, the final result may potentially be erroneous.
Q6. Why is a secondary index needed in IMS?
A secondary index is needed as it is a substitute path into any IMS database. It has a secondary function as a file to procure any reQuired data.
Q7. What do you understand by foreign keys?
The properties of a certain table that have identical entries to a primary key in another table are known as foreign keys. This gives rise to a connection between the two tables.
Q8. What do you understand by the term deadlock in DB2?
A deadlock is a term used to denote the action when two independent processes struggle for the same resource or resources that are kept in reserve by each other.
Q9. What is the code for a deadlock?
The code used for a deadlock is 911 and 913. These are the SQL code for a deadlock.
Q10. Describe how the TYPE 2 index is superior.
In the TYPE 2 index, eve if the data pages get locked, the index pages are still unlocked and accessible. Thus TYPE 2 index is also faster and more superior.
Q11. State the different types of tablespaces.
The different types of tablespaces are as follows… partitioned, segmented and simple
Q12. What do you understand by referential integrity?
Referential integrity is the principle that encompasses consistency between the foreign and primary keys. This also states that each foreign key entry must have a corresponding primary key entry.
Q13. State the difference between multiple and composite indexes
A composite index is a singular index which encompasses combined values of only two columns in a table. Multiple indexes is the more complex ones which consist of one each for each respective column of the same table.
Q14. State the advantage in denormalizing tables in DB2.
The advantage in denormalizing tables in DB2 is that it lessens the reQuirements for executing intensive relational joints. Also the number of foreign keys used are is lessened as well.
Q15. What is the database descriptor used for?
The database descriptor is used for restricting access when objects are changed, modified, created or dropped completely.
Q16. What is the maximum number of volumes which can be inserted in a STOGROUP?
The maximum number of volumes which can be inserted in a STOGROUP is one hundred and thirty-three.
Q17. What do you understand by lock contention?
As the DBD allows access to only one object at a given time, the concept of lock contention is said to come into the picture when more than one object tries to get access for simultaneous execution.
Q18. What is the full form of SPUFI?
The full form of SPUFI is SQL Processing Using File Input. This is a tool used by developers to create objects in the existing database. This is a menu-oriented tool.
Q19. What do you understand by the term Alias?
The term Alias has the same meaning as the word synonym. To avoid the use of location Qualifier of a table or view for distributed environments, aliases are created.
Q20. Which is the place for VSAM KSDS?
The place for the aforementioned is the BSDS
Q21. State the various types of locks.
The various types of locks are as follows… shared, exclusive and update
Q22. Describe how the shared lock functions.
The shared lock allows two or more programs to be read from the locked space. However, no changes or editing is permitted.
Q23. Describe how the exclusive lock functions.
The exclusive lock prevents all users from accessing the locked space.
Q24. Describe how the update lock functions.
The update lock is more flexible. It permits the program to read and edit any changes in the locked space.
Q25. What do you understand by the isolation level?
The degree or extent to which an activation group is isolated for, the other activation groups that are currently functioning simultaneously, is known as isolation level.
Q26. Which are all the file OPEN modes?
The file OPEN modes are as follows… INPUT, OUTPUT, I-O and EXTEND
Q27. What is the maximum number of tables which can be joined?
Fifteen is the number of tables that can be joined.
Q28. What method needs to be deployed to achieve record locking in the DB2 versions which currently do not support it?
The method to achieving the aforementioned record locking is by setting the size of the record length to more than half of the size of the page.
Q29. State the lockable units in DB2.
The lockable units of DB2 are as follows… tablespace, indexes subpage, tables, and pages.
Q30. Is it possible to access records randomly in ESDS?
Yes, it is possible to access records randomly in ESDS.
Q31. What do you understand by path?
A path is a file that ensures access to another file by a different index as well. A path is also what determines and defines the relationship between the base cluster and the AIX.
Q32. State the two parameters used to control the free space in DB2
The two parameters which control the free space in DB2 are as follows… PCTFREE and FREE PAGE.