Saturday, 25 January 2020

35 Top Hyperion Multiple Choice Questions and Answers

Hyperion Multiple Choice Questions and Answers

1. After creating a new Hyperion Planning application, what are two steps that must be taken for it to appear as a valid Web application at the Web LogOn page?
A. Restart the Essbase server
B. Run the HspSetupSupport utility
C. Restart the Web application server
D. Within Hyperion Planning, select Enable Web LogOn
Ans:  B, C

2. Which three options are supported authentication providers for CSS?
A. NTLM
B. Microsoft Active Directory
C. Sun Open Net Environment (Sun ONE)
D. Novell NDS
E. BEA's LDAP Provider
Ans:  A, B, C

3. What is the correct order Hyperion Planning will follow to generate a Web Form with Suppress Missing data enabled?
A. Hyperion Planning Web Application suppresses missing data;sends the query to Hyperion Essbase;checks Metadata security for the user; displays Web Form to Client
B. Checks Metadata Security for the User; sends the query to Hyperion Essbase; Hyperion Planning Web Application suppresses missing data; displays Web Form to Client
C. Sends the query to Hyperion Essbase; checks Metadata Security for the User; Hyperion Planning Web Application suppresses missing data; displays Web Form to Client
D. Checks Metadata Security for the User; Hyperion Planning Web Application suppresses missing data; sends the query to Hyperion Essbase; displays Web Form to Client
Ans:  B

4. What three properties can be defined for User-defined custom dimensions?
A. Name
B. Security
C. Data type
D. Source plan type
E. Custom attributes
Ans:  A, B, E

5 Which three statements are true about the Cut function in the Hyperion Planning Dimension Editor?
A. It is not available for root dimension members.
B. It remembers a cut member if the administrator expands, collapses, sorts, searches, or changes pages in a dimension hierarchy.
C. It remembers a cut member if the administrator adds a child or sibling member, edits or deletes a member, assigns access to a member or clicks the View link.
D. It remembers a cut member if the administrator adds or edits a dimension, navigates to a page other than the Dimensions tab, deletes a member, or logs off Hyperion Planning.
E. It allows for mulitple cut selections at the same level.
Ans:  A, B, C

6 Which three tasks can be performed by a Planner?
A. Modify Web forms
B. Input, submit, and view data
C. View data through Hyperion Reports
D. Use Hyperion Planning Spreadsheet Add-in
E. Create and update rules in Hyperion Business Rules (HBR)
Ans:  B, C, D

7 After the calendar is created through the application setup, which statement is true?
A. You can change the rollup structure.
B. You can change the base time periods.
C. You can change the weekly distribution setting.
D. You can reduce the number of years in the calendar.
Ans:  A

8 In a multi-currency application, a calc script was created using Hyperion Planning Desktop. The following selections were made: "USD", "CAD", Budget, "1st Draft" and"Bottom-Up." What will be converted after the Currency Conversion Calc Script is run?
A. Parent members
B. Level zero members
C. Forecast Scenario for the USD Currency
D. Saved Assumption account with Percentage Data Type
E. Saved Assumption account with Non-Currency Data Type
Ans:  B

9 What is the ideal data block size?
A. Between eight and 100 kilobytes
B. Between 101 and 250 kilobytes
C. Between 251 and 500 kilobytes
D. Greater than 500 kilobytes
Ans:  A

10 Which five tasks are performed when setting up a Hyperion Planning application? (Choose five.)
A. Setting up plan types
B. Creating the calendar
C. Setting up exchange rates
D. Defining the calendar range
E. Setting up multiple currencies
F. Defining base time period and weekly distribution.
Ans:  A, B, D, E, F

11 When refreshing the database in a multi-currency application, what can be selected to create a Currency Conversion Calc Script?
A. Currencies, Scenarios, Version Type, and Versions
B. Currencies, Scenarios, Years, and Exchange Rate Type
C. Currencies, Scenarios, Years, Version Type, and Versions
D. Currencies, Scenarios, Years, Exchange Rate Type, and Versions
Ans:  A

12 Which two statements about account level annotations are true?
A. Account level annotations can have 1500 characters.
B. Only parent level members can have account level annotations.
C. To enable the account level annotations, the Web form design does not matter.
D. A specific option must be selected in the display options page to enable the account level annotations.
Ans:  A, D

13 Which three are valid properties of Scenarios with the Hyperion Planning Web Dimension Editor?
A. Access Rights
B. Time Periods
C. Data Storage
D. Exchange Rate Table
Ans:  A, B, D

14 Which two Hyperion Application Link Adapters can be used together to load data?
A. Essbase Adapter
B. Flat File Adapter
C. Web Form Adapter
D. Hyperion Planning Adapter
Ans:  A, B

15 When using the Hyperion Planning ADM driver within Hyperion Reports, which function is used to select Attribute members?
A. Property
B. Member
C. Relative Member
D. Range
Ans:  A

16 Supporting Detail can have which two properties?
A. Detail cannot be deleted once created.
B. Data can be filled across a series of columns.
C. Detail can be retrieved in the Spreadsheet Add-in.
D. It can only be text information, no data can be input.
E. Data can be in hierarchical form and include aggregation of values.
Ans:  B, E

17 Which two are valid Account member names that can be used in Hyperion Planning?
A. 4200
B. Net-Profit
C. _Gross Sales
D. 'Cost of Sales'
E. (Total Expenses)
Ans:  A, B

18 The Create Blocks component within Hyperion Business Rules (HBR) is used for the purpose of _____.
A. Creating blocks for dense member combinations
B. Creating blocks for sparse member combinations
C. Creating blocks for attribute member combinations
D. Creating blocks for dynamically calculated and stored member combinations
Ans:  B

19 What are three valid variables to consider about Hyperion Planning application Web performance?
A. Network bandwidth
B. Design of existing web forms
C. Server hardware specifications
D. Number of users that exist within the application
Ans:  A, B, C

20 When designing a report in Hyperion Reports, where do you set the Expansion Option?
A. On the Cell Properties
B. On the Row Properties
C. On the Grid Properties
D. On the Report Properties
Ans:  B

21 Hyperion Planning connects to Essbase using the non-underscore username to establish a connection for which two products?
A. Hyperion Reports
B. Essbase Spreadsheet Add-in
C. Hyperion Planning Web Application
D. Hyperion Planning Spreadsheet Add-in
Ans:  A, B

22 Which list of data storage settings represents all of the available settings for the Entities dimension in the Hyperion Planning Dimension Editor?
A. Dynamic Calc, Never Share, Shared, Store
B. Dynamic Calc, Label Only, Never Share, Store
C. Dynamic Calc, Dynamic Calc and Store, Never Share, Shared, Store
D. Dynamic Calc, Dynamic Calc and Store, Label Only, Never Share, Shared, Store
Ans:  D

23 In a multi-currency application using a Target Version, what calculation options should be used with the Aggregate Data component?
A. Aggregate Data up to Local Currency, Aggregate Missing Values, and Use Calculator Cache
B. Aggregate Missing Values, Optimize the Calculation of Formulas on Sparse Dimensions, and Use Calculator Cache
C. Aggregate Data up to Local Currency, Optimize the Calculation of Formulas on Sparse Dimensions, and Use Calculator Cache
D. Aggregate Missing Values, Aggregate Data up to Local Currency, and Optimize the Calculation of Formulas on Sparse Dimensions
Ans:  C

24 Which three predefined types of base time periods can be established when creating the calendar?
A. Weekly
B. Monthly
C. Quarterly
D. Yearly
E. Custom
Ans:  B, C, E

25 Which three options are Maintain User tasks in Hyperion Reports?
A. Assign user to a Role
B. Import Essbase Users
C. Import Windows NT users
D. Import LDAP Users
E. Import Users from a text file
Ans:  A, B, E

26 What are two reasons for creating or re-creating a Currency Conversion calc script?
A. A currency is no longer a reporting currency.
B. Data in the Essbase database were modified.
C. Another year has been added to the application.
D. A new entity member was added to the application.
E. A foreign currency exchange rate value was modified.
Ans:  A, C

27 A user receives "You do not have access to view this form" when trying to open a Web form. What causes this message?
A. The user does not have Write access to the form.
B. The user does not have Read access to the form.
C. The user does not have access to every member in the form.
D. The user does not have access to at least one member in every dimension in the form.
Ans:  D

28 When would account annotations be available?
A. when the option is turned on in the application setup
B. Only when the Web form is designed by an administrator
C. When the Web form is designed to using the proper layout
D. When the user has write access to all dimension selections on the Web form
Ans:  C

29 In a multiple plan type application, which statement is true?
A. Security Refreshing can be limited to a Plan Type.
B. A descendant member within the Custom dimension can be made valid for a Plan Type.
C. The Accounts dimension can be dense for one Plan Type and sparse for another Plan Type.
D. After the application has been set up but the Create has not been run, the Plan Type names can be changed.
Ans:  C

30 The client wants to load actual data from the general ledger but the file generated requires fields to be ignored and the order of the fields to be changed. What is a possible method for completing this task?
A. Use an Essbase data load rule
B. Use the Web Form import utility
C. Use SQL statement to load into Hyperion Planning Relational Database
D. Use Hyperion Application Link flow diagram utilizing the Hyperion Planning Adapter
Ans:  A

31.  Items opened in Explore display as these at the bottom of Workspace.
A.  Buttons
B.  Tabs
C.  Icons
D.  Pages
Ans: B

32.  Data is typically entered into which member of a dimension hierarchy?
A.  Descendants
B.  Parents
C.  Children
D.  Base-level members
Ans: D

33.  The EPM Workspace is accessed through which of the following?
A.  My Computer
B.  Excel
C.  Internet Explorer
D.  My Documents
Ans: C

34.  Hyperion Financial Reporting is used for which of the following?
A.  On-demand, highly formatted financial & operational reports
B.  Interactive Ad-hoc analysis
C.  Importing financial data
D.  All of the above
Ans: A

35.  What is the centralized administration environment in Hyperion called?
A.  Workplace
B.  Workspace
C.  Workforce
D.  Workplan
Ans: B

70 Top Spring Multiple Choice Questions and Answers

Spring Multiple Choice Questions and Answers

1. What is the meaning of the return data type void?
A.   An empty memory space is returned so that the developers can utilize it.
B.   void returns no data type.
C.   void is not supported in Java
D.   None of the above
Ans: B

2. A lower precision can be assigned to a higher precision value in JavA. For example a byte type data can be assigned to int type.
A.   True
B.   False
Ans : B

3. Which of the following statements about the Java language is true?
A.   Both procedural and OOP are supported in JavA.
B.   Java supports only procedural approach towards programming.
C.   Java supports only OOP approach.
D.   None of the above.
Ans: A

4. Which of the following statements is false about objects?
A.   An instance of a class is an object
B.   Objects can access both static and instance data
C.   Object is the super class of all other classes
D.   Objects do not permit encapsulation
Ans: D

5. Which methods can access to private attributes of a class?
A.   Only Static methods of the same class
B.   Only instances of the same class
C.   Only methods those defined in the same class
D.   Only classes available in the same package.
Ans: C

6. What is an aggregate object?
A.   An object with only primitive attributes
B.   An instance of a class which has only static methods
C.   An instance which has other objects
D.   None of the above
Ans: C

7. Assume that File is an abstract class and has toFile() methoD. ImageFile and BinaryFile are concrete classes of the abstract class File.
Also, assume that the method toFile() is implemented in both Binary File and Image File. A File references an ImageFile object in memory and the toFile method is called, which implementation method will be called?
A.   Binary File
B.   Image File
C.   Both File and Binary Files
D.   None of the above
Ans: B

8. A class can have many methods with the same name as long as the number of parameters or type of parameters is different. This OOP concept is known as
A.   Method Invocating
B.   Method Overriding
C.   Method Labeling
D.   Method Overloading
Ans: D

9. Which of the following is considered as a blue print that defines the variables and methods common to all of its objects of a specific kind?
A.   Object
B.   Class
C.   Method
D.   Real data types
Ans: B

10. What are the two parts of a value of type double?
A.   Significant Digits, Exponent
B.   Length, Denominator
C.   Mode, Numerator
Ans: A

11. After the following code fragment, what is the value in fname?
String str;
int fname;
str = "Foolish boy.";
fname = str.indexOf("fool");
A.   0
B.   2
C.   -1
D.   4
Ans: C

12. What is the value of ‘number’ after the following code fragment execution?
int number = 0;
int number2 = 12
while (number < number2)
{
number = number + 1;
}
A.   5
B.   12
C.   21
D.   13
Ans: B

13. Given the following code snippet;
int salaries[;
int index = 0;
salaries = new int salaries[4;
while (index < 4)
{
salaries[index = 10000;
index++;
}
What is the value of salaries [3?
A.   40000
B.   50000
C.   15000
D.   10000
Ans: D

14. Which of the following is not a return type?
A.   boolean
B.   void
C.   public
D.   Button
Ans: C

15. If result = 2 + 3 * 5, what is the value and type of ‘result’ variable?
A.   17, byte
B.   25, byte
C.   17, int
D.   25, int
Ans: C

16. What is the data type for the number 9.6352?
A.   float
B.   double
C.   Float
D.   Double
Ans: B

17. Assume that the value 3929.92 is of type ‘float’. How to assign this value after declaring the variable ‘interest’ of type float?
A.   interest = 3929.92
B.   interest = (Float)3929.92
C.   interest = 3929.92 (float)
D.   interest = 3929.92f
Ans: D

18. Which of the following statements is true?
A.   The default char data type is a space( ‘ ‘ ) character.
B.   The default integer data type is ‘int’ and real data type is ‘float’
C.   The default integer data type is ‘long’ and real data type is ‘float’
D.   The default integer data type is ‘int’ and real data type is ‘double’
Ans: D

19. How many numeric data types are supported in Java?
A.   8
B.   4
C.   2
D.   6
Ans: D

20. Which of the following statements declare class Sample to belong to the payroll.admindept package?
A.   package payroll;package admindept;
B.   import payroll.*;
C.   package payroll.admindept.Sample;
D.   import payroll.admindept.*;
E.   package payroll.admindept;
Ans: E

21. The class javA.lang.Exception is
A.   protected
B.   extends Throwable
C.   implements Throwable
D.   serializable
Ans: B

22. Which of the following statements is true?
A.   An exception can be thrown by throw keyword explicitly.
B.   An exception can be thrown by throws keyword explicitly.
Ans: A

23. All the wrapper classes (Integer, Boolean, Float, Short, Long, Double and Character) in java
A.   are private
B.   are serializable
C.   are immutatable
D.   are final
Ans: D

24. The code snippet
if( "Welcome".trim() == "Welcome".trim() )
System.out.println("Equal");
else
System.out.println("Not Equal");
will
A.   compile and display “Equal”
B.   compile and display “Not Equal”
C.   cause a compiler error
D.   compile and display NULL
Ans: C

25. Consider the following code snippet. What will be assigned to the variable fourthChar, if the code is executed?
String str = new String(“Java”);
char fourthChar = str.charAt(4);
A.   ‘a’
B.   ‘v’
C.   throws StringIndexOutofBoundsException
D.   null character
Ans: C

26. Which of the following statements is preferred to create a string "Welcome to Java Programming"?
A.   String str = “Welcome to Java Programming”
B.   String str = new String( “Welcome to Java Programming” )
C.   String str; str = “Welcome to Java Programming”
D.   String str; str = new String (“Welcome to Java Programming” )
Ans: A

27. Which of the following statements is true?
A.   A super class is a sub set of a sub class
B.   class ClassTwo extends ClassOne means ClassOne is a subclass
C.   class ClassTwo extends ClassOne means ClassTow is a super class
D.   the class Class is the super class of all other classes in JavA.
Ans: A

28. What kind of thread is the Garbage collector thread is?
A.   Non daemon thread
B.   Daemon thread
C.   Thread with dead state
D.   None of the above
Ans: B

29. When a thread terminates its processing, into what state that thread enters?
A.   Running state
B.   Waiting state
C.   Dead state
D.   Beginning state
Ans: C

30. Which statement is true?
A.   HashTable is a sub class of Dictionary
B.   ArrayList is a sub class of Vector
C.   LinkedList is a subclass of ArrayList
D.   Vector is a subclass of Stack
Ans: A

31. Which of these statements is true?
A.   LinkedList extends List
B.   AbstractSet extends Set
C.   HashSet extends AbstractSet
D.   WeakHashMap extends HashMap
Ans: C

32. Which of the following is synchronized?
A.   Set
B.   LinkedList
C.   Vector
D.   WeakHashMap
Ans: C

33. Select all the true statements from the following.
A.   AbstractSet extends AbstractCollection
B.   AbstractList extends AbstractCollection
C.   HashSet extends AbstractSet
D.   Vector extends AbstractList
E.   All of the above
Ans: E

34. Which of the methods should be implemented if any class implements the Runnable interface?
A.   start()
B.   run()
C.   wait()
D.   notify() and notifyAll()
Ans: B

35. A thread which has invoked wait() method of an object, still owns the lock of the object. Is this statement true or false?
A.   True
B.   False
Ans: B

36. Which of the following is not a method of the Thread class.
A.   public void run()
B.   public void start()
C.   public void exit()
D.   public final int getPriority()
Ans: C

37. To execute the threads one after another
A.   the keyword synchronize is used
B.   the keyword synchronizable is used
C.   the keyword synchronized is used
D.   None of the above
Ans: B

38. The object of DataInputStream is used to
A.   To covert binary stream into character stream
B.   To covert character stream into binary stream
C.   To write data onto output object
D.   All of the above
Ans: A

39. DataInputStream is an example of
A.   Output stream
B.   I/O stream
C.   Filtered stream
D.   File stream
Ans: C

40. From a MVC perspective, Struts provides the
   A. Model
   B. View
   C. Controller
Ans: B


41.Consider the following program:
import myLibrary.*;
public class ShowSomeClass
{
// code for the class...
}
What is the name of the java file containing this program?
A. myLibrary.java
B. ShowSomeClass.java
C. ShowSomeClass
D. ShowSomeClass.class
E. Any file name with the java suffix will do
Ans: B

42.Which of the following is TRUE?
A. In java, an instance field declared public generates a compilation error.
B. int is the name of a class available in the package javA.lang
C. Instance variable names may only contain letters and digits.
D. A class has always a constructor (possibly automatically supplied by the java compiler).
E. The more comments in a program, the faster the program runs.
Ans: D

43.Consider the following code snippet
String river = new String(“Columbia”);
System.out.println(river.length());
What is printed?
A. 6
B. 7
C. 8
D. Columbia
E. river
Ans: C

44. A constructor
A. must have the same name as the class it is declared within.
B. is used to create objects.
C. may be declared private
D. A and B
E. A, B and C
Ans: E

45.Which of the following may be part of a class definition?
A. instance variables
B. instance methods
C. constructors
D. all of the above
E. none of the above
Ans: D

46.What is different between a Java applet and a Java application?
A. An application can in general be trusted whereas an applet can't.
B. An applet must be executed in a browser environment.
C. An applet is not able to access the files of the computer it runs on
D. (A), (B) and (C).
E. None of the above
Ans: D

47.Consider
public class MyClass{
public MyClass(){/*code*/}
// more code...
}
To instantiate MyClass, you would write?
A. MyClass mc = new MyClass();
B. MyClass mc = MyClass();
C. MyClass mc = MyClass;
D. MyClass mc = new MyClass;
E. It can't be done. The constructor of MyClass should be defined as public void MyClass(){/*code*/}
Ans: A

48.What is byte code in the context of Java?
A. The type of code generated by a Java compiler
B. The type of code generated by a Java Virtual Machine
C. It is another name for a Java source file
D. It is the code written within the instance methods of a class.
E. It is another name for comments written within a program.
Ans: A

49.What is garbage collection in the context of Java?
A. The operating system periodically deletes all of the java files available on the system.
B. Any package imported in a program and not used is automatically deleteD.
C. When all references to an object are gone, the memory used by the object is automatically reclaimeD.
D. The JVM checks the output of any Java program and deletes anything that doesn't make sense.
E. Janitors working for Sun MicroSystems are required to throw away any Microsoft documentation found in the employees' offices.
Ans: c

50.You read the following statement in a Java program that compiles and executes.
submarine.dive(depth);
What can you say for sure?
A. depth must be an int
B. dive must be a methoD.(ans)
C. dive must be the name of an instance fielD.
D. submarine must be the name of a class
E. submarine must be a methoD.
Ans: B

51.  Formed on a diskette (or hard drive) during initialization.
A. source code
B. images
C. sectors
D. storage units
Ans: C

52.  The CPU consists of:
A. Control Unit, Temporary Memory, Output
B. Control Unit, Arithmetic Logic Unit, Temporary Memory
C. Input, Process, Storage, Output
D. Input, Control Unit, Arithmetic Logic Unit, Output
Ans: B

53.  OOP stands for:
A. Observable Object Programming
B. Object Observed Procedures
C. Object Oriented Programming
D. Object Overloading Practices
Ans: C

54.  Output printed on paper.
A. softcopy
B. hardcopy
C. source code
D. software
Ans: B

55.  A binary digit (1 or 0) signifying "on" or "off".
A. bit
B. byte
C. megabyte
D. gigabyte
Ans: A

56.  Our decimal number 44, when represented in binary, is:
A. 101100
B. 101010
C. 111000
D. 10100
 Ans: A

57.  Byte code is the machine language for a hypothetical computer called the:
A. Java Byte Code Compiler
B. Java Byte Code Interpreter
C. Java Virtual Machine
D. Java Memory Machine
Ans: C

58.  Equals 8 bits.
A. megabyte
B. gigabyte
C. sector
D. byte
Ans: D

59.  Java allows for three forms of commenting:
A. // single line, ** block lines, /*/ documentation
B. // single line, /*...*/ block lines, /**...*/ documentation
C. / single line, /* block lines, ** documentation
D. // single line, //...// block lines, //*...*// documentation
Ans: B

60.  To prepare a diskette (or hard drive) to receive information.
A. format
B. track
C. interpret
D. boot
Ans: A

61.  In Java, the name of the class must be the same as the name of  the .java file.
A. false
B. true - but case sensitivity does not apply
C. true - but additional numbers may be added to the name
D. true
Ans: D

62.  The name Java was derived from
A. a cup of coffee
B. an acronym for JBuilder Activated Variable Assembly
C. an acronym for Juxtapositioned Activated Variable Actions
D. an acronym for John's Answer for Various Accounts
Ans: A

63.  Programs that tell a computer what to do.
A. harware
B. software
C. hard copy
D. projects
Ans: B

64.  RAM stands for _________.
A. Read Anytime Memory
B. Read Allocated Memory
C. Random Access Memory
D. Random Allocated Memory
Ans: C

65.  Several computers linked to a server to share programs and storage space.
A. library
B. grouping
C. network
D. integrated system
Ans: C

66.  Source code in Java will not run if it is not indenteD.
A. true
B. false
Ans: B

67.  When working in Java with JBuilder, each program you write should be assigned to a new project.
A. true
B. false
Ans: A

68.  The four equipment functions of a computer system.
A. Input, Process, Control Unit, Output
B. Input, Control Unit, Arithmetic Logic Unit, Output
C. Input, Process, Storage, Output
D. Input, Process, Library Linking, Output
Ans: C

69.  Translates and executes a program line by line.
A. compiler
B. interpreter
C. linker
D. control unit
Ans: B

70.  The physical components of a computer system.
A. control unit
B. hardware
C. software
D. ALU
Ans: B

40 Top JCL Multiple Choice Questions and Answers

JCL Multiple Choice Questions and Answers

1. What is the function of DD DISP parameter?
A. Tells the system what to do with the dataset following normal termination of the step
B. Describes the status of the dataset
C. Tells the system what to do with the dataset following abnormal termination of the step
D. All of the above
Ans:  D

2. How is the record format of an output dataset specified?
A. RECORG parameter
B. STORCLAS parameter
C. RECFM parameter
D. None of the above
Ans:  C

3. What is the purpose of DD * statement in JCL?
A. Begins an input data prompt at the system console
B. Begins an in-stream dataset
C. Marks the end of a command stream
D. Includes all datasets within a naming pattern
Ans:  B

4. A DD statement has 2 types of parameters. Name them?
A. Positional, Keyword
B. Keyword, Control
C. Dynamic, Static
D. Named, Dynamic
Ans: A

5. What is the function of JOB statement in JCL?
A. Marks the end of a job
B. Marks the beginning of an instream procedure
C. Marks the beginning of a job & assigns a name to the job
D. Assigns an execution priority to a job
Ans:  C

6. How can a job send a status message to a TSO user at the completion of a job?
A. STATUS
B. NOTIFY
C. ENDMSG
D. USER
Ans:  B

7. What is the function of a DD statement?
A. Identifies & describes a dataset
B. Delimits a DO loop
C. Marks the start of a declarative section
D. Delimits the start of an inline include section
Ans:  A

8. When output dataset space is required, what quantity categories are used?
A. Primary, Secondary, Directory
B. Address, Units, CONTIG or ALS
C. Displacement and length
D. Megabytes, Kilobytes and Bytes
Ans:  A

9. What statement marks the beginning of a job step; assigns a name to the step; identifies the program or catalogued or in-stream procedure to be executed in the step?
A. START
B. RUN
C. EXEC
D. GO
Ans:  C

10. How can unused space allocation be returned to the system when a dataset is closed?
A. RETURN
B. RLSE
C. CONTIG
D. CLOSE
Ans:  B

11. Can an individual step be restricted from using all the jobs allowed CPU time?
A. Yes
B. No
C. Only in Catalogued Procedure
D. Through the STEPTIME parameter
Ans:  A

12. Where can program checkpoints be stored for use in a restart?
A. CHCKPOINT DD statement
B. SYSCHK DD statement
C. CHKOUT DD statement
D. CHECK or DD statement
Ans:  B

13. How can the disposition of sysout datasets be set for an entire jobstream?
A. SYSOUT parameter
B. OUTPUT parameter
C. DEFAULT parameter
D. DEST keyword
Ans:  A

14. What statement marks the end of an in-stream or Catalogued procedure?
A. STREAM
B. SET
C. PROC
D. PEND
Ans:  D

15. What is the function of DD name parameter with a 2 part structure; Audit.Report?
A. Override the Audit DD statement in the report
B. Override the Report DD statement in the Audit procedure
C. Concatenate a dataset onto a DD statement in a called module
D. Delete the Audit DD statement in the Report
Ans:  B

16. Which DD parameters are required?
A. All parameters & Keywords are optional
B. Dsname, SPACE, RECFM
C. Dsname, SPACE, UNIT
D. Dsname, DISP, SPACE
Ans:  A

17. How can an in-stream dataset be terminated?
A. //
B. //*
C. /*
D. None of the above
Ans:  C

18. What is the function of the DD DCB keyword?
A. Begins the subparameters of the DCB
B. Begins the DASD control block
C. Marks the close of the DCB
D. Modifies the record type parameters
Ans:  A

19. What is the maximum length of a single line of JCL?
A. 71 bytes
B. 60 bytes
C. 55 bytes
D. 80 bytes
Ans:  A

20. What is the purpose of DD DUMMY statement?
A. Marks a deleted DD statement
B. Begins an interpreted command stream
C. Specifies no space allocation & no disposition processing
D. Suppress command processing
Ans:  C

21. Many JCL statements contain specific values designed to direct and control the execution of the statement. What are these fields called?
A. Linkage Variables
B. Parameters
C. Control Libraries
D. Includes
Ans:  B

22. When space is allocated for an output dataset, what units can be used?
A. Disks
B. Megabytes
C. Cylinders, Tracks, Blocks
D. Bytes
Ans:  C

23. What is the format of comment statement?
A. //
B. //*
C. /*
D. None of the above
Ans:  B

24. A DD statement consists of 4 fields. Name them?
A. Name, DD, Space, Device
B. Format, Name, DD, Space
C. DD, parameter, device, format
D. Name, DD, parameter, comments
Ans:  D

25. What DD statement is used to supply the name of a dataset?
A. Name
B. Dsname
C. Label
D. File
Ans:  B

26. What is the purpose of the DD KEYLEN parameter?
A. Specify the length of a data set key in bytes
B. Override the key length of an SMS defined VSAM dataset
C. Override the key length specified in the dataset label
D. All of the above
Ans:  D

27. What is the function of the STEPLIB DD statement?
A. Identify a library to be searched for programs named in the EXEC statement
B. Identify a library containing executable job steps
C. Override the system step library within a job stream
D. All of the above
Ans:  D

28. How can return codes be tested before execution of a job step?
A. Through the RC keyword
B. Through the CODE keyword
C. Through the COND keyword
D. Through the RETURNCD keyword
Ans:  C

29. What is concatenating?
A. Overriding or adding procedures
B. Logically connecting input datasets
C. Overriding a called PROC dsname
D. All of the above
Ans:  B

30. How can values be passed from the job stream to an executable program?
A. Through the PARM keyword
B. Through the VALUE parameter
C. Through the PGM parameter
D. All of the above
Ans:  A

31. Must tape dataset definitions include VOL=SER specifications?
A. Yes
B. No
C. Only for uncataloged datasets
D. Only for cataloged datasets
Ans:  C

32. What is the function of //JCLLIB statement?
A. Identifies the source of the JCL commands
B. Points to the system software library
C. Marks the beginning of the in-stream JCL
D. Identifies the libraries that the system will search for include groups or procedures named in EXEC statements
Ans:  D

33. What parameter of the job statement is used to limit the CPU time consumed by the job?
A. RUNTIME
B. TIME
C. LIMIT
D. EXECMAX
Ans:  B

34. What statement marks the beginning of an in-stream or cataloged procedure in JCL and assigns default values to parameters defined in the procedure?
A. STREAM
B. SET
C. PROC
D. PEND
Ans:  C

35. How can a stopped job be started again?
A. Through the RETURN parameter
B. Through the STARTUP parameter
C. Through the RESTART parameter
D. Through the CHECKPNT keyword
Ans:  C

36. In order to continue a job after a return code of 12 in step1, what the step2 EXEC statement include?
A. CONTINUE
B. COND = (12,NE)
C. COND = (12,GE)
D. COND = (12,EQ)
Ans:  B

37. In SMS datasets, what is the function of the DD MGMTCLAS keyword?
A. Specify a management class for a new dataset
B. Lookup a storage profile from the class library
C. Begin a storage class definition block
D. Alters the default storage profile for the dataset
Ans:  A

38. How can the submitting users RACF authority be overridden in a job stream?
A. Through the USER parameter
B. Through the USER and PASSWORD parameter
C. By notifying the console operation to override the authority
D. Through the RACF parameter
Ans:  B

39. What parameters can be used to limit the number of records written to a SYSOUT dataset?
A. LIMIT
B. OUTLIM
C. SIZE
D. MAX
Ans:  B

40. What statement can be used to send data to another MVS JES3 node?
A. LINK
B. CONNECT
C. XMIT
D. SEND
Ans:  C