Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM A6030-042 Exam - Cheat-Test.com

Free A6030-042 Sample Questions:

1. In which of the following examples will a dummy argument be passed?
A.DCL A EXT ENTRY; DCL (X,Y) FIXED BIN; CALL A(X,Y);
B.DCL A EXT ENTRY (FIXED, BINARY); DCL (X,Y) FIXED BIN; CALL A(X,Y);
C.DCL A EXT ENTRY (FIXED BINARY); DCL (X,Y) FIXED BIN; CALL A(X,Y);
D.PGM: PROC OPTIONS(MAIN); DCL (X,Y) FIXED BIN; CALL C (X,Y); C: PROC (A,B); DCL (A,B) BIN FIXED; END C; END PGM;
Answer: B

2. Which of the following will definitely NOT cause an unresolved external entry?
A.Missing library at link time
B.The main procedure name matching the binder or load module 'name'
C.A mismatch in names between the CALL and the actual procedure
D.An incorrect DECLARE for the external entry
Answer: B

3. Which of the following best describes an atomic transaction?
A.The database modifications must follow an 'all or nothing' rule
B.Only valid data will be written to database
C.If one part of the transaction fails, the remainder may still be processed
D.Referential Integrity is maintained in the database
Answer: A

4. SUBSCRIPTRANGE checks which of the following?
A.The subscripts of an array are checked for conformance with iSUB defining rules.
B.The address generated for accessing an array element is checked to be sure it falls within the storage allocated to the array.
C.The value of each subscript used to refer to an array element is checked for validity after the element is accessed.
D.The value of each subscript used to refer to an array element is checked for validity before the element is accessed.
Answer: D

5. A program reads a GSAM dataset sequentially, reads complementary information from
DB2­Databases and uses this information to update an IMS­Database. At the end of the program statistics about how many records have been read and how many IMS­Segments have been updated should be printed. The program should write checkpoints regularly and should be restartable. Which of the following groups of information saved when the checkpoint is written will provide enough information to be able to restart the program correctly?
A.The key of the last record read from the GSAM dataset and the key of the last IMS segment changed.
B.The number of records read from the GSAM dataset and the number of IMS segments changed.
C.The number of records read from the GSAM dataset, the key of the last record read from the GSAM dataset and the key of the last IMS segment updated.
D.The key of the last IMS segment changed and the number of segments changed.
Answer: B

6. The lead developer is presenting sample code. One of the team members identifies an error in the code. Which of the following is the most appropriate response for the lead developer to make?
A.Apologize for the error and continue the presentation.
B.Thank the person for pointing out the error.
C.Suggest that this error be discussed in the next meeting.
D.Declare the point irrelevant because this is sample code.
Answer: B

7. Given the following code: DCL INDATA FILE RECORD INPUT; DCL INSTRUC CHAR(100); DCL EOF BIT(1) INIT('0'B); ON ENDFILE(INDATA) EOF = '1'B; OPEN FILE(INDATA); READ FILE(INDATA) INTO(INSTRUC); DO WHILE (^EOF); CALL SR_PROCESS; READ FILE(INDATA) INTO(INSTRUC); END; CLOSE FILE(INDATA); If the database (input file) changes from OS­PS to DB2 view and the necessary syntax has been changed accordingly, which of the following DB2­related steps is NOT additionally required to guarantee the same level of stability and functionality?
A.Check the SQLCODE after each EXEC SQL FETCH statement.
B.Check the SQLCODE after each EXEC SQL OPEN / CLOSE statement.
C.Set the EOF bit to '1'B, if SQLCODE = 100 (not found).
D.Check the CURRENT SQLID.
Answer: D

8. What could be used when a structure is passed to a subroutine to verify that the area the structure occupies in storage has not been overwritten?
A.Structure is passed as a pointer.
B.Structure has eyecatchers at start and at end.
C.Structure has a length field at start.
D.Structure is passed as an aggregate.
Answer: B

9. In the following example what value will be printed to SYSPRINT, if any, from the PUT LIST in PGM_A? PGM_A: PROC; DCL INPARM CHAR (10) INIT('FIRST CALL'); DCL P_OUT PTR; DCL OUTPARM CHAR(10) BASED (P_OUT); DCL PGM_B ENTRY(CHAR(10),PTR) EXTERNAL; CALL PGM_B (INPARM,P_OUT); IF OUTPARM = 'RESULT ' THEN DO; INPARM = ''; CALL PGM_B (INPARM,P_OUT); END; PUT LIST(OUTPARM); END; PGM_B: PROC(INPARM,P_OUT); DCL INPARM CHAR (10); DCL P_OUT PTR; DCL OUTPARM CHAR (10) INIT(''); P_OUT = ADDR(OUTPARM); IF INPARM ='FIRST CALL' THEN OUTPARM = 'RESULT '; ELSE OUTPARM =
'NO RESULT '; END;
A.Blanks
B.'NO RESULT'
C.Unpredictable
D.'RESULT'
Answer: C

10. Which of the following is NOT part of the PL/I code review?
A.Training course for the program's author
B.Attendance of people with technical expertise
C.Decision whether the review object is a appropriate solution
D.Documentation of results of the review
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved