IMS DB (IBM Information Management System) is a Database Management System that supports hierarchical databases and data manipulation language (DL/I calls).
IMS DB MCQs
IMS DB MCQs: This section contains multiple-choice questions and answers on the various topics of IMS DB. Practice these MCQs to test and enhance your skills on IMS DB.
List of IMS DB Multiple-choice Questions and Answers
1. IMS stands for ____.
- International message system
- Inter-management system
- Information management system
Answer: C) Information management system
Explanation:
IMS stands for Information Management System.
2. IMS was developed by which of the following company?
- Microsoft
- Apache
- IBM
Answer: D) IBM
Explanation:
IMS was developed by IBM in the year 1966.
3. IMS database is used by ____ programming languages?
- High-level
- Low-level
Answer: A) High-level
Explanation:
IMS database is used by high-level programming languages like COBOL.
4. The IMS database is a ____ database.
- Relational
- Non-relational
- Hierarchical
- Object-oriented
Answer: C) Hierarchical
Explanation:
The IMS database is a hierarchical database in which information is stored at various levels with each entity depending on entities at higher levels.
5. Does the IMS database management system maintain integrity?
- Yes
- No
Answer: A) Yes
Explanation:
IMS database management system protects data’s integrity and enables quick recovery of it by structuring it in a way that makes it easy to find.
6. In IMS, the task of the ____ is to operate as a platform for communication between the application programs and the database.
- Segment manager
- Database manager
- Transaction manager
- Operation manager
Answer: C) Transaction manager
Explanation:
The task of the transaction manager is to operate as a platform for communication between the application programs and the database.
7. IMS can use ____ as its back-end database to store the data?
- IMS DB
- DB2
- Both
Answer: C) Both
Explanation:
IMS can use IMS DB or DB2 as its back-end database to store the data.
8. To save and retrieve data from the database, a ____ interacts with the end user.
- Segment manager
- Database manager
- Transaction manager
- Operation manager
Answer: C) Transaction manager
Explanation:
To save and retrieve data from the database, a transaction manager interacts with the end user.
9. Which of the following comprises application programs that grant access to the data stored in the database?
- Data Language Interface DL/I
- Segment
- Segment Type
- Transaction manager
Answer: A) Data Language Interface DL/I
Explanation:
Data Language Interface DL/I comprises of application programs that grant access to the data stored in the database.
10. Does IMS support applications from different languages such as Java and XML?
- Yes
- No
Answer: A) Yes
Explanation:
IMS can be utilized to run programs written in several languages, including Java and XML.
11. IMS applications and data can be accessed over any platform. True or False?
- True
- False
Answer: A) True
Explanation:
Any platform can be employed to access IMS apps and data.
12. Among DB2 and IMS DB whose processing is extremely quick?
- DB2
- IMS DB
Answer: B) IMS DB
Explanation:
When compared to DB2, IMS DB processing is extremely quick.
13. A ____ is generated by combining groups of related data.
- Section
- Relationship
- Segment
- All of the above
Answer: C) Segment
Explanation:
A segment is generated by combining groups of related data.
14. Each segment of data contains a ____.
- Variable
- Data
- Value
- Field
Answer: D) Field
Explanation:
Each segment of data contains a field. Roll Number, Name, and Course, for instance, are all separate fields in the student segment.
15. Hierarchical databases work on the relationships between ____.
- Two fields
- Two variables
- Two or more segments
- Two or more category
Answer: C) Two or more segments
Explanation:
Hierarchical databases work on the relationships between two or more segments.
16. Which of the following is the segment that sits at the top of the hierarchy?
- Core segment
- Main segment
- First segment
- Root segment
Answer: D) Root segment
Explanation:
The root segment is the segment that sits at the top of the hierarchy.
17. All dependent segments can only be accessed through the ____ segment.
- Child segment
- Main segment
- Parent segment
- Root segment
Answer: D) Root segment
Explanation:
All dependent segments can only be accessed through the root segment.
18. The IMS database structure can only have how many root segments?
- Only two
- Only 1
- As many as you want
Answer: B) Only 1
Explanation:
The IMS database structure can only have one root segment.
19. Any segments besides the root segment are referred to as dependent segments?
- True
- False
Answer: A) True
Explanation:
True, any segments besides the root segment are referred to as dependent segments.
20. A segment is considered a ____ segment if it has another segment right above it in the hierarchy.
- Left
- Parent
- Child
- Core
Answer: C) Child
Explanation:
A segment is considered a child segment if it has another segment right above it in the hierarchy.
21. Two or more segment occurrences of a particular segment type under a single parent segment are called ____ segments.
- Duo segment
- Clone segment
- Pair segment
- Twin segment
Answer: D) Twin segment
Explanation:
The term “twin segments” refers to two or more occurrences of a specific segment type within a single parent segment.
22. Sibling segments are the segments of the same types and the same parent.
- True
- False
Answer: B) False
Explanation:
Sibling segments are the segments of different types and the same parent.
23. Each occurrence of the root segment, plus all the subordinate segment occurrences makes one database record? True or False?
- True
- False
Answer: A) True
Explanation:
One database record is made up of all instances of the root segment together with all instances of all subordinate segments.
24. In how many ways data can be processed in IMS?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
Data can be processed in the following two ways −
- Sequential Processing
- Random Processing
25. Which of the following processing is also known as Direct processing of data in IMS DB?
- Sequential Processing
- Random Processing
Answer: B) Random Processing
Explanation:
In IMS DB, random processing is also referred to as direct processing of data.
26. Which of the following specifies how the IMS database is organized and how an application may access it?
- IMS transaction manager
- IMS process manager
- IMS Control Blocks
Answer: C) IMS Control Blocks
Explanation:
IMS Control Blocks specify how the IMS database is organized and how an application may access it.
27. DL/I use how many types of Control Blocks?
- 5
- 4
- 3
- 2
Answer: C) 3
Explanation:
DL/I uses the following three types of Control Blocks −
- Database Descriptor (DBD)
- Program Specification Block (PSB)
- Access Control Block (ACB)
28. Once all the segments have been established, ____ defines the whole physical structure of the database.
- Database Descriptor (DBD)
- Program Specification Block (PSB)
- Access Control Block (ACB)
Answer: A) Database Descriptor (DBD)
Explanation:
Once all the segments have been established, DBD defines the whole physical structure of the database.
29. DBDGEN is a ____.
- Database Descriptor Generator
- Database Descriptor Validator
- Database Descriptor Builder
Answer: A) Database Descriptor Generator
Explanation:
DBDGEN is a Database Descriptor Generator.
30. Which of the following is responsible for creating control blocks?
- Database Generator
- Database Validator
- Database Administrator
Answer: C) Database Administrator
Explanation:
The Database Administrator is responsible for creating control blocks.
31. PSB stands for ____.
- Program-Specific block
- Personal system block
- Program Storage block
- Program Specification block
Answer: D) Program Specification block
Explanation:
PSB stands for program Specification block.
32. A program can use ____ PSB in a single execution.
- Only 1
- More than 1
- Any number of PSB
Answer: A) Only 1
Explanation:
No program can use more than one PSB in a single execution.
33. What is PCB?
- Program center block
- Program creation block
- Program communication block
- Program common block
Answer: C) Program communication block
Explanation:
PCB stands for Program communication block.
34. PSB consists of one or more control blocks called ____.
- PCB
- DBGEN
- DBD
- ACB
Answer: A) PCB
Explanation:
PSB consists of one or more control blocks called Program Communication Blocks (PCBs).
35. The PSB contains how many PCB for each DL/I database the application program will access?
- Zero
- One
- More than one
- Any number
Answer: B) One
Explanation:
The PSB contains one PCB for each DL/I database the application program will access.
36. ACBGEN is known as ____.
- Access communication block generator
- Access common block generator
- Access Control Blocks Generator
Answer: C) Access Control Blocks Generator
Explanation:
ACBGEN is known as Access Control Blocks Generator.
37. Which of the following is used to generate ACBs?
- ACBGEN
- PCBGEN
- DBDGEN
Answer: A) ACBGEN
Explanation:
ACBGEN is used to generate ACBs.
38. Which of the following DL/I statements are used in the COBOL program to access the database?
- Entry Statement
- Goback Statement
- Call Statement
- All of the above
Answer: D) All of the above
Explanation:
We use the following DL/I statements in the COBOL program to access the database −
- Entry Statement
- Goback Statement
- Call Statement
39. Which of the following is coded at the end of the application program?
- Entry Statement
- Goback Statement
- Call Statement
Answer: B) Goback Statement
Explanation:
GOBACK is coded at the end of the application program.
40. ‘GU’ code is used for the ____.
- Get unique function
- Get unusual function
- Get universal function
Answer: A) Get unique function
Explanation:
‘GU’ code is used for the Get Unique function.
41. Which of the following code is used to fetch a particular segment occurrence based on the field values?
- ISRT
- GN
- REPL
- GU
Answer: D) GU
Explanation:
GU code is used to fetch a particular segment occurrence based on the field values.
42. GN code is used for the ____.
- Get new function
- Get next function
- Get number function
- All of the above
Answer: B) Get next function
Explanation:
‘GN’ code is used for the Get Next function.
43. Which of the following Update functions are used in IMS DB?
- INSERT
- UPDATE
- DELETE
- All of the above
Answer: D) All of the above
Explanation:
The following Update functions are used in IMS DB −
- Insert
- Delete
- Replace
44. Which of the following code is used for the Insert function?
- INSERT
- INS
- ISRT
- INSRT
Answer: C) ISRT
Explanation:
ISRT code is used for the Insert function.
45. Which of the following function is used to add a new segment to the database?
- ADD
- ISRT
- CREATE
- APPEND
Answer: B) ISRT
Explanation:
ISRT function is used to add a new segment to the database.
46. Which of the following code is used for the Delete function?
- DELETE
- DEL
- DLETE
- DLET
Answer: D) DLET
Explanation:
‘DLET’ code is used for the Delete function.
47. Which of the following is used to remove a segment from an IMS DL/I database?
- REMOVE
- ERASE
- DLET
- DEL
Answer: C) DLET
Explanation:
‘DLET’ code is used for the Delete function. It is used to remove a segment from an IMS DL/I database.
48. Which code is used to replace a segment in the IMS DL/I database?
- REPL
- REPLACE
- MOVE
- SHIFT
Answer: A) REPL
Explanation:
REPL is used to replace a segment in the IMS DL/I database.
49. Which of the following code is used for the Restart function?
- RESTART
- START
- SRTART
- XRST
Answer: D) XRST
Explanation:
XRST code is used for the Restart function
50. What is SSA?
- Segment System Arguments
- Segment Search Accounts
- Segment Search Arguments
- Segment System Accounts
Answer: C) Segment Search Arguments
Explanation:
SSA stands for Segment Search Arguments.
51. How many types of SSA are there?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
There are two types of SSAs −
- Unqualified SSA
- Qualified SSA
52. Which type of SSA provides the name of the segment being used inside the call?
- Unqualified SSA
- Qualified SSA
Answer: A) Unqualified SSA
Explanation:
The name of the segment being utilized inside the call is provided via an unqualified SSA.
53. What is the length of a standard unqualified SSA?
- 15 bytes
- 10 bytes
- 9 bytes
- 2 bytes
Answer: C) 9 bytes
Explanation:
The length of a standard, unqualified SSA is 9 bytes.
54. The first 8 bytes of unqualified SSA holds ____.
- The segment name which is being used for processing.
- White spaces
- The segment category which is being used for processing
Answer: A) The segment name which is being used for processing.
Explanation:
The first 8 bytes of unqualified SSA holds the segment name which is being used for processing.
55. The last byte of unqualified SSA always contains ____.
- Left parenthesis
- Right parenthesis
- Space
Answer: C) Space
Explanation:
The last byte of unqualified SSA always contains space.
56. The specific database occurrence of a segment is provided to the segment type via a ____ SSA.
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
The specific database occurrence of a segment is provided to the segment type via a Qualified SSA.
57. Which command code can be utilized to get multiple segment occurrences with only one call?
- A
- D
- X
- P
Answer: B) D
Explanation:
The D command code can be utilized to get multiple segment occurrences with only one call.
58. Concatenating keys is done using ____ command code.
- A
- K
- C
- P
Answer: C) C
Explanation:
Concatenating keys is done using C command code.
59. U command code is ignored if it is used with a ____ SSA.
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
U command code is ignored if it is used with a qualified SSA.
60. V command code is ignored when used with a ____ SSA.
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
V command code is ignored when used with a qualified SSA.
61. ____ is the term used to describe when a program occupies more than one position in the IMS database.
- Multiple processing
- Parallel processing
- Dual processing
Answer: A) Multiple processing
Explanation:
Multiple processing is the term used to describe when a program occupies more than one position in the IMS database.
62. Multiple processing can be done in how many ways?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
Multiple processing can be done in two ways –
- Multiple PCBs
- Multiple Positioning
63. How many types of Get Hold calls do we specify in a DL/I call?
- 5
- 3
- 4
- 7
Answer: B) 3
Explanation:
There are three types of Get Hold call that we specify in a DL/I call:
- Get Hold Unique (GHU)
- Get Hold Next (GHN)
- Get Hold Next within Parent (GHNP)
64. Can we change the length of a segment using a REPL call?
- Yes
- No
Answer: B) No
Explanation:
With a REPL call, we are unable to modify a segment’s length.
65. Can we change the value of a key field using a REPL call?
- Yes
- No
Answer: B) No
Explanation:
Using a REPL call does not allow us to modify the value of a key field.
66. Which SSA cannot be used with a REPL call?
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
With a REPL call, we are unable to employ a qualified SSA.
67. Index pointer segment consists of how many parts?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
The index pointer segment consists of two parts −
- Prefix Element
- Data Element
68. A pointer to the Index Target Segment is present in the ____ of the index pointer segment.
- Prefix Element
- Data Element
Answer: A) Prefix Element
Explanation:
A pointer to the Index Target Segment is present in the prefix part of the index pointer segment.
69. Is it necessary that the index source segment and the target source segment should be the same?
- Yes
- No
Answer: B) No
Explanation:
The index source segment and the target source segment don’t necessarily have to match.
70. The ____ holds the key value from the segment in the index-built database.
- Prefix Element
- Data Element
Answer: B) Data Element
Explanation:
The data element holds the key value from the segment in the index-built database.
71. Each segment type can have ____ parent, according to a rule in the IMS database.
- Only 1
- More than 1
- Any number
Answer: A) Only 1
Explanation:
Each segment type can only have one parent, according to a rule in the IMS database.
72. How many types of logical relationships are there?
- 5
- 4
- 3
- 2
Answer: C) 3
Explanation:
There are three different kinds of logical relationships: unidirectional, bidirectional, and virtual.
73. DPCK stands for ____.
- Destination Parent Concatenated Key
- Deprecated Parent Concatenated Key
- Destroyed Parent Concatenated Key
- Degenerated Parent Concatenated Key
Answer: A) Destination Parent Concatenated Key
Explanation:
DPCK stands for Destination Parent Concatenated Key.
74. A concatenated segment consists of how many parts?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
A concatenated segment consists of the following two parts −
- Logical child segment
- Destination parent segment
75. A logical child segment consists of how many parts?
- 3
- 4
- 2
- 6
Answer: C) 2
Explanation:
A logical child segment consists of the following two parts:
- Destination Parent Concatenated Key (DPCK)
- Logical child user data
76. How many approaches are there for database recovery?
- 5
- 3
- 2
- 4
Answer: C) 2
Explanation:
The two approaches to database recovery are −
- Forward Recovery
- Backward Recovery
77. Which of the following database recovery is also known as backout recovery?
- Forward Recovery
- Backward Recovery
Answer: B) Backward Recovery
Explanation:
Backward recovery is also known as backout recovery.
78. A ____ is a stage where the database changes done by the application program are considered complete and accurate.
- Milestone
- Snap shot
- Breakpoint
- Checkpoint
Answer: D) Checkpoint
Explanation:
A checkpoint is a stage where the database changes done by the application program are considered complete and accurate.
79. Which checkpoint call can be used to establish a checkpoint?
- CHKP
- CKP
- CP
- CHEPOI
Answer: A) CHKP
Explanation:
A checkpoint can be established using a checkpoint call (CHKP).
80. How many checkpoint methods are there?
- 5
- 3
- 2
- 1
Answer: C) 2
Explanation:
There are two checkpoint approaches:
- Basic Checkpointing
- Symbolic Checkpointing