IMS DB MCQs (Multiple-Choice Questions)

IMS DB (IBM Information Management System) is a Database Management System that supports hierarchical databases and data manipulation language (DL/I calls).

IMS DB MCQs

IMS DB MCQs: This section contains multiple-choice questions and answers on the various topics of IMS DB. Practice these MCQs to test and enhance your skills on IMS DB.

List of IMS DB Multiple-choice Questions and Answers

1. IMS stands for ____.

  1. International message system
  2. Inter-management system
  3. Information management system

Answer: C) Information management system

Explanation:

IMS stands for Information Management System.

Discuss this Question


2. IMS was developed by which of the following company?

  1. Microsoft
  2. Google
  3. Apache
  4. IBM

Answer: D) IBM

Explanation:

IMS was developed by IBM in the year 1966.

Discuss this Question


3. IMS database is used by ____ programming languages?

  1. High-level
  2. Low-level

Answer: A) High-level

Explanation:

IMS database is used by high-level programming languages like COBOL.

Discuss this Question


4. The IMS database is a ____ database.

  1. Relational
  2. Non-relational
  3. Hierarchical
  4. Object-oriented

Answer: C) Hierarchical

Explanation:

The IMS database is a hierarchical database in which information is stored at various levels with each entity depending on entities at higher levels.

Discuss this Question


5. Does the IMS database management system maintain integrity?

  1. Yes
  2. No

Answer: A) Yes

Explanation:

IMS database management system protects data's integrity and enables quick recovery of it by structuring it in a way that makes it easy to find.

Discuss this Question


6. In IMS, the task of the ____ is to operate as a platform for communication between the application programs and the database.

  1. Segment manager
  2. Database manager
  3. Transaction manager
  4. Operation manager

Answer: C) Transaction manager

Explanation:

The task of the transaction manager is to operate as a platform for communication between the application programs and the database.

Discuss this Question


7. IMS can use ____ as its back-end database to store the data?

  1. IMS DB
  2. DB2
  3. Both

Answer: C) Both

Explanation:

IMS can use IMS DB or DB2 as its back-end database to store the data.

Discuss this Question


8. To save and retrieve data from the database, a ____ interacts with the end user.

  1. Segment manager
  2. Database manager
  3. Transaction manager
  4. Operation manager

Answer: C) Transaction manager

Explanation:

To save and retrieve data from the database, a transaction manager interacts with the end user.

Discuss this Question


9. Which of the following comprises application programs that grant access to the data stored in the database?

  1. Data Language Interface DL/I
  2. Segment
  3. Segment Type
  4. Transaction manager

Answer: A) Data Language Interface DL/I

Explanation:

Data Language Interface DL/I comprises of application programs that grant access to the data stored in the database.

Discuss this Question


10. Does IMS support applications from different languages such as Java and XML?

  1. Yes
  2. No

Answer: A) Yes

Explanation:

IMS can be utilized to run programs written in several languages, including Java and XML.

Discuss this Question


11. IMS applications and data can be accessed over any platform. True or False?

  1. True
  2. False

Answer: A) True

Explanation:

Any platform can be employed to access IMS apps and data.

Discuss this Question


12. Among DB2 and IMS DB whose processing is extremely quick?

  1. DB2
  2. IMS DB

Answer: B) IMS DB

Explanation:

When compared to DB2, IMS DB processing is extremely quick.

Discuss this Question


13. A ____ is generated by combining groups of related data.

  1. Section
  2. Relationship
  3. Segment
  4. All of the above

Answer: C) Segment

Explanation:

A segment is generated by combining groups of related data.

Discuss this Question


14. Each segment of data contains a ____.

  1. Variable
  2. Data
  3. Value
  4. Field

Answer: D) Field

Explanation:

Each segment of data contains a field. Roll Number, Name, and Course, for instance, are all separate fields in the student segment.

Discuss this Question


15. Hierarchical databases work on the relationships between ____.

  1. Two fields
  2. Two variables
  3. Two or more segments
  4. Two or more category

Answer: C) Two or more segments

Explanation:

Hierarchical databases work on the relationships between two or more segments.

Discuss this Question


16. Which of the following is the segment that sits at the top of the hierarchy?

  1. Core segment
  2. Main segment
  3. First segment
  4. Root segment

Answer: D) Root segment

Explanation:

The root segment is the segment that sits at the top of the hierarchy.

Discuss this Question


17. All dependent segments can only be accessed through the ____ segment.

  1. Child segment
  2. Main segment
  3. Parent segment
  4. Root segment

Answer: D) Root segment

Explanation:

All dependent segments can only be accessed through the root segment.

Discuss this Question


18. The IMS database structure can only have how many root segments?

  1. Only two
  2. Only 1
  3. As many as you want

Answer: B) Only 1

Explanation:

The IMS database structure can only have one root segment.

Discuss this Question


19. Any segments besides the root segment are referred to as dependent segments?

  1. True
  2. False

Answer: A) True

Explanation:

True, any segments besides the root segment are referred to as dependent segments.

Discuss this Question


20. A segment is considered a ____ segment if it has another segment right above it in the hierarchy.

  1. Left
  2. Parent
  3. Child
  4. Core

Answer: C) Child

Explanation:

A segment is considered a child segment if it has another segment right above it in the hierarchy.

Discuss this Question


21. Two or more segment occurrences of a particular segment type under a single parent segment are called ____ segments.

  1. Duo segment
  2. Clone segment
  3. Pair segment
  4. Twin segment

Answer: D) Twin segment

Explanation:

The term "twin segments" refers to two or more occurrences of a specific segment type within a single parent segment.

Discuss this Question


22. Sibling segments are the segments of the same types and the same parent.

  1. True
  2. False

Answer: B) False

Explanation:

Sibling segments are the segments of different types and the same parent.

Discuss this Question


23. Each occurrence of the root segment, plus all the subordinate segment occurrences makes one database record? True or False?

  1. True
  2. False

Answer: A) True

Explanation:

One database record is made up of all instances of the root segment together with all instances of all subordinate segments.

Discuss this Question


24. In how many ways data can be processed in IMS?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Data can be processed in the following two ways −

  • Sequential Processing
  • Random Processing

Discuss this Question


25. Which of the following processing is also known as Direct processing of data in IMS DB?

  1. Sequential Processing
  2. Random Processing

Answer: B) Random Processing

Explanation:

In IMS DB, random processing is also referred to as direct processing of data.

Discuss this Question


26. Which of the following specifies how the IMS database is organized and how an application may access it?

  1. IMS transaction manager
  2. IMS process manager
  3. IMS Control Blocks

Answer: C) IMS Control Blocks

Explanation:

IMS Control Blocks specify how the IMS database is organized and how an application may access it.

Discuss this Question


27. DL/I use how many types of Control Blocks?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

DL/I uses the following three types of Control Blocks −

  • Database Descriptor (DBD)
  • Program Specification Block (PSB)
  • Access Control Block (ACB)

Discuss this Question


28. Once all the segments have been established, ____ defines the whole physical structure of the database.

  1. Database Descriptor (DBD)
  2. Program Specification Block (PSB)
  3. Access Control Block (ACB)

Answer: A) Database Descriptor (DBD)

Explanation:

Once all the segments have been established, DBD defines the whole physical structure of the database.

Discuss this Question


29. DBDGEN is a ____.

  1. Database Descriptor Generator
  2. Database Descriptor Validator
  3. Database Descriptor Builder

Answer: A) Database Descriptor Generator

Explanation:

DBDGEN is a Database Descriptor Generator.

Discuss this Question


30. Which of the following is responsible for creating control blocks?

  1. Database Generator
  2. Database Validator
  3. Database Administrator

Answer: C) Database Administrator

Explanation:

The Database Administrator is responsible for creating control blocks.

Discuss this Question


31. PSB stands for ____.

  1. Program-Specific block
  2. Personal system block
  3. Program Storage block
  4. Program Specification block

Answer: D) Program Specification block

Explanation:

PSB stands for program Specification block.

Discuss this Question


32. A program can use ____ PSB in a single execution.

  1. Only 1
  2. More than 1
  3. Any number of PSB

Answer: A) Only 1

Explanation:

No program can use more than one PSB in a single execution.

Discuss this Question


33. What is PCB?

  1. Program center block
  2. Program creation block
  3. Program communication block
  4. Program common block

Answer: C) Program communication block

Explanation:

PCB stands for Program communication block.

Discuss this Question


34. PSB consists of one or more control blocks called ____.

  1. PCB
  2. DBGEN
  3. DBD
  4. ACB

Answer: A) PCB

Explanation:

PSB consists of one or more control blocks called Program Communication Blocks (PCBs).

Discuss this Question


35. The PSB contains how many PCB for each DL/I database the application program will access?

  1. Zero
  2. One
  3. More than one
  4. Any number

Answer: B) One

Explanation:

The PSB contains one PCB for each DL/I database the application program will access.

Discuss this Question


36. ACBGEN is known as ____.

  1. Access communication block generator
  2. Access common block generator
  3. Access Control Blocks Generator

Answer: C) Access Control Blocks Generator

Explanation:

ACBGEN is known as Access Control Blocks Generator.

Discuss this Question


37. Which of the following is used to generate ACBs?

  1. ACBGEN
  2. PCBGEN
  3. DBDGEN

Answer: A) ACBGEN

Explanation:

ACBGEN is used to generate ACBs.

Discuss this Question


38. Which of the following DL/I statements are used in the COBOL program to access the database?

  1. Entry Statement
  2. Goback Statement
  3. Call Statement
  4. All of the above

Answer: D) All of the above

Explanation:

We use the following DL/I statements in the COBOL program to access the database −

  • Entry Statement
  • Goback Statement
  • Call Statement

Discuss this Question


39. Which of the following is coded at the end of the application program?

  1. Entry Statement
  2. Goback Statement
  3. Call Statement

Answer: B) Goback Statement

Explanation:

GOBACK is coded at the end of the application program.

Discuss this Question


40. 'GU' code is used for the ____.

  1. Get unique function
  2. Get unusual function
  3. Get universal function

Answer: A) Get unique function

Explanation:

'GU' code is used for the Get Unique function.

Discuss this Question


41. Which of the following code is used to fetch a particular segment occurrence based on the field values?

  1. ISRT
  2. GN
  3. REPL
  4. GU

Answer: D) GU

Explanation:

GU code is used to fetch a particular segment occurrence based on the field values.

Discuss this Question


42. GN code is used for the ____.

  1. Get new function
  2. Get next function
  3. Get number function
  4. All of the above

Answer: B) Get next function

Explanation:

'GN' code is used for the Get Next function.

Discuss this Question


43. Which of the following Update functions are used in IMS DB?

  1. INSERT
  2. UPDATE
  3. DELETE
  4. All of the above

Answer: D) All of the above

Explanation:

The following Update functions are used in IMS DB −

  • Insert
  • Delete
  • Replace

Discuss this Question


44. Which of the following code is used for the Insert function?

  1. INSERT
  2. INS
  3. ISRT
  4. INSRT

Answer: C) ISRT

Explanation:

ISRT code is used for the Insert function.

Discuss this Question


45. Which of the following function is used to add a new segment to the database?

  1. ADD
  2. ISRT
  3. CREATE
  4. APPEND

Answer: B) ISRT

Explanation:

ISRT function is used to add a new segment to the database.

Discuss this Question


46. Which of the following code is used for the Delete function?

  1. DELETE
  2. DEL
  3. DLETE
  4. DLET

Answer: D) DLET

Explanation:

'DLET' code is used for the Delete function.

Discuss this Question


47. Which of the following is used to remove a segment from an IMS DL/I database?

  1. REMOVE
  2. ERASE
  3. DLET
  4. DEL

Answer: C) DLET

Explanation:

'DLET' code is used for the Delete function. It is used to remove a segment from an IMS DL/I database.

Discuss this Question


48. Which code is used to replace a segment in the IMS DL/I database?

  1. REPL
  2. REPLACE
  3. MOVE
  4. SHIFT

Answer: A) REPL

Explanation:

REPL is used to replace a segment in the IMS DL/I database.

Discuss this Question


49. Which of the following code is used for the Restart function?

  1. RESTART
  2. START
  3. SRTART
  4. XRST

Answer: D) XRST

Explanation:

XRST code is used for the Restart function

Discuss this Question


50. What is SSA?

  1. Segment System Arguments
  2. Segment Search Accounts
  3. Segment Search Arguments
  4. Segment System Accounts

Answer: C) Segment Search Arguments

Explanation:

SSA stands for Segment Search Arguments.

Discuss this Question


51. How many types of SSA are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

There are two types of SSAs −

  • Unqualified SSA
  • Qualified SSA

Discuss this Question


52. Which type of SSA provides the name of the segment being used inside the call?

  1. Unqualified SSA
  2. Qualified SSA

Answer: A) Unqualified SSA

Explanation:

The name of the segment being utilized inside the call is provided via an unqualified SSA.

Discuss this Question


53. What is the length of a standard unqualified SSA?

  1. 15 bytes
  2. 10 bytes
  3. 9 bytes
  4. 2 bytes

Answer: C) 9 bytes

Explanation:

The length of a standard, unqualified SSA is 9 bytes.

Discuss this Question


54. The first 8 bytes of unqualified SSA holds ____.

  1. The segment name which is being used for processing.
  2. White spaces
  3. The segment category which is being used for processing

Answer: A) The segment name which is being used for processing.

Explanation:

The first 8 bytes of unqualified SSA holds the segment name which is being used for processing.

Discuss this Question


55. The last byte of unqualified SSA always contains ____.

  1. Left parenthesis
  2. Right parenthesis
  3. Space

Answer: C) Space

Explanation:

The last byte of unqualified SSA always contains space.

Discuss this Question


56. The specific database occurrence of a segment is provided to the segment type via a ____ SSA.

  1. Qualified
  2. Unqualified

Answer: A) Qualified

Explanation:

The specific database occurrence of a segment is provided to the segment type via a Qualified SSA.

Discuss this Question


57. Which command code can be utilized to get multiple segment occurrences with only one call?

  1. A
  2. D
  3. X
  4. P

Answer: B) D

Explanation:

The D command code can be utilized to get multiple segment occurrences with only one call.

Discuss this Question


58. Concatenating keys is done using ____ command code.

  1. A
  2. K
  3. C
  4. P

Answer: C) C

Explanation:

Concatenating keys is done using C command code.

Discuss this Question


59. U command code is ignored if it is used with a ____ SSA.

  1. Qualified
  2. Unqualified

Answer: A) Qualified

Explanation:

U command code is ignored if it is used with a qualified SSA.

Discuss this Question


60. V command code is ignored when used with a ____ SSA.

  1. Qualified
  2. Unqualified

Answer: A) Qualified

Explanation:

V command code is ignored when used with a qualified SSA.

Discuss this Question


61. ____ is the term used to describe when a program occupies more than one position in the IMS database.

  1. Multiple processing
  2. Parallel processing
  3. Dual processing

Answer: A) Multiple processing

Explanation:

Multiple processing is the term used to describe when a program occupies more than one position in the IMS database.

Discuss this Question


62. Multiple processing can be done in how many ways?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Multiple processing can be done in two ways –

  • Multiple PCBs
  • Multiple Positioning

Discuss this Question


63. How many types of Get Hold calls do we specify in a DL/I call?

  1. 5
  2. 3
  3. 4
  4. 7

Answer: B) 3

Explanation:

There are three types of Get Hold call that we specify in a DL/I call:

  • Get Hold Unique (GHU)
  • Get Hold Next (GHN)
  • Get Hold Next within Parent (GHNP)

Discuss this Question


64. Can we change the length of a segment using a REPL call?

  1. Yes
  2. No

Answer: B) No

Explanation:

With a REPL call, we are unable to modify a segment's length.

Discuss this Question


65. Can we change the value of a key field using a REPL call?

  1. Yes
  2. No

Answer: B) No

Explanation:

Using a REPL call does not allow us to modify the value of a key field.

Discuss this Question


66. Which SSA cannot be used with a REPL call?

  1. Qualified
  2. Unqualified

Answer: A) Qualified

Explanation:

With a REPL call, we are unable to employ a qualified SSA.

Discuss this Question


67. Index pointer segment consists of how many parts?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

The index pointer segment consists of two parts −

  • Prefix Element
  • Data Element

Discuss this Question


68. A pointer to the Index Target Segment is present in the ____ of the index pointer segment.

  1. Prefix Element
  2. Data Element

Answer: A) Prefix Element

Explanation:

A pointer to the Index Target Segment is present in the prefix part of the index pointer segment.

Discuss this Question


69. Is it necessary that the index source segment and the target source segment should be the same?

  1. Yes
  2. No

Answer: B) No

Explanation:

The index source segment and the target source segment don't necessarily have to match.

Discuss this Question


70. The ____ holds the key value from the segment in the index-built database.

  1. Prefix Element
  2. Data Element

Answer: B) Data Element

Explanation:

The data element holds the key value from the segment in the index-built database.

Discuss this Question


71. Each segment type can have ____ parent, according to a rule in the IMS database.

  1. Only 1
  2. More than 1
  3. Any number

Answer: A) Only 1

Explanation:

Each segment type can only have one parent, according to a rule in the IMS database.

Discuss this Question


72. How many types of logical relationships are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

There are three different kinds of logical relationships: unidirectional, bidirectional, and virtual.

Discuss this Question


73. DPCK stands for ____.

  1. Destination Parent Concatenated Key
  2. Deprecated Parent Concatenated Key
  3. Destroyed Parent Concatenated Key
  4. Degenerated Parent Concatenated Key

Answer: A) Destination Parent Concatenated Key

Explanation:

DPCK stands for Destination Parent Concatenated Key.

Discuss this Question


74. A concatenated segment consists of how many parts?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

A concatenated segment consists of the following two parts −

  • Logical child segment
  • Destination parent segment

Discuss this Question


75. A logical child segment consists of how many parts?

  1. 3
  2. 4
  3. 2
  4. 6

Answer: C) 2

Explanation:

A logical child segment consists of the following two parts:

  • Destination Parent Concatenated Key (DPCK)
  • Logical child user data

Discuss this Question


76. How many approaches are there for database recovery?

  1. 5
  2. 3
  3. 2
  4. 4

Answer: C) 2

Explanation:

The two approaches to database recovery are −

  • Forward Recovery
  • Backward Recovery

Discuss this Question


77. Which of the following database recovery is also known as backout recovery?

  1. Forward Recovery
  2. Backward Recovery

Answer: B) Backward Recovery

Explanation:

Backward recovery is also known as backout recovery.

Discuss this Question


78. A ____ is a stage where the database changes done by the application program are considered complete and accurate.

  1. Milestone
  2. Snap shot
  3. Breakpoint
  4. Checkpoint

Answer: D) Checkpoint

Explanation:

A checkpoint is a stage where the database changes done by the application program are considered complete and accurate.

Discuss this Question


79. Which checkpoint call can be used to establish a checkpoint?

  1. CHKP
  2. CKP
  3. CP
  4. CHEPOI

Answer: A) CHKP

Explanation:

A checkpoint can be established using a checkpoint call (CHKP).

Discuss this Question


80. How many checkpoint methods are there?

  1. 5
  2. 3
  3. 2
  4. 1

Answer: C) 2

Explanation:

There are two checkpoint approaches:

  • Basic Checkpointing
  • Symbolic Checkpointing

Discuss this Question




Comments and Discussions!

Load comments ↻





Copyright © 2024 www.includehelp.com. All rights reserved.