Home »
MCQs
IMS DB MCQs (Multiple-Choice Questions)
IMS DB (IBM Information Management System) is a Database Management System that supports hierarchical databases and data manipulation language (DL/I calls).
IMS DB MCQs
IMS DB MCQs: This section contains multiple-choice questions and answers on the various topics of IMS DB. Practice these MCQs to test and enhance your skills on IMS DB.
List of IMS DB Multiple-choice Questions and Answers
1. IMS stands for ____.
- International message system
- Inter-management system
- Information management system
Answer: C) Information management system
Explanation:
IMS stands for Information Management System.
Discuss this Question
2. IMS was developed by which of the following company?
- Microsoft
- Google
- Apache
- IBM
Answer: D) IBM
Explanation:
IMS was developed by IBM in the year 1966.
Discuss this Question
3. IMS database is used by ____ programming languages?
- High-level
- Low-level
Answer: A) High-level
Explanation:
IMS database is used by high-level programming languages like COBOL.
Discuss this Question
4. The IMS database is a ____ database.
- Relational
- Non-relational
- Hierarchical
- Object-oriented
Answer: C) Hierarchical
Explanation:
The IMS database is a hierarchical database in which information is stored at various levels with each entity depending on entities at higher levels.
Discuss this Question
5. Does the IMS database management system maintain integrity?
- Yes
- No
Answer: A) Yes
Explanation:
IMS database management system protects data's integrity and enables quick recovery of it by structuring it in a way that makes it easy to find.
Discuss this Question
6. In IMS, the task of the ____ is to operate as a platform for communication between the application programs and the database.
- Segment manager
- Database manager
- Transaction manager
- Operation manager
Answer: C) Transaction manager
Explanation:
The task of the transaction manager is to operate as a platform for communication between the application programs and the database.
Discuss this Question
7. IMS can use ____ as its back-end database to store the data?
- IMS DB
- DB2
- Both
Answer: C) Both
Explanation:
IMS can use IMS DB or DB2 as its back-end database to store the data.
Discuss this Question
8. To save and retrieve data from the database, a ____ interacts with the end user.
- Segment manager
- Database manager
- Transaction manager
- Operation manager
Answer: C) Transaction manager
Explanation:
To save and retrieve data from the database, a transaction manager interacts with the end user.
Discuss this Question
9. Which of the following comprises application programs that grant access to the data stored in the database?
- Data Language Interface DL/I
- Segment
- Segment Type
- Transaction manager
Answer: A) Data Language Interface DL/I
Explanation:
Data Language Interface DL/I comprises of application programs that grant access to the data stored in the database.
Discuss this Question
10. Does IMS support applications from different languages such as Java and XML?
- Yes
- No
Answer: A) Yes
Explanation:
IMS can be utilized to run programs written in several languages, including Java and XML.
Discuss this Question
11. IMS applications and data can be accessed over any platform. True or False?
- True
- False
Answer: A) True
Explanation:
Any platform can be employed to access IMS apps and data.
Discuss this Question
12. Among DB2 and IMS DB whose processing is extremely quick?
- DB2
- IMS DB
Answer: B) IMS DB
Explanation:
When compared to DB2, IMS DB processing is extremely quick.
Discuss this Question
13. A ____ is generated by combining groups of related data.
- Section
- Relationship
- Segment
- All of the above
Answer: C) Segment
Explanation:
A segment is generated by combining groups of related data.
Discuss this Question
14. Each segment of data contains a ____.
- Variable
- Data
- Value
- Field
Answer: D) Field
Explanation:
Each segment of data contains a field. Roll Number, Name, and Course, for instance, are all separate fields in the student segment.
Discuss this Question
15. Hierarchical databases work on the relationships between ____.
- Two fields
- Two variables
- Two or more segments
- Two or more category
Answer: C) Two or more segments
Explanation:
Hierarchical databases work on the relationships between two or more segments.
Discuss this Question
16. Which of the following is the segment that sits at the top of the hierarchy?
- Core segment
- Main segment
- First segment
- Root segment
Answer: D) Root segment
Explanation:
The root segment is the segment that sits at the top of the hierarchy.
Discuss this Question
17. All dependent segments can only be accessed through the ____ segment.
- Child segment
- Main segment
- Parent segment
- Root segment
Answer: D) Root segment
Explanation:
All dependent segments can only be accessed through the root segment.
Discuss this Question
18. The IMS database structure can only have how many root segments?
- Only two
- Only 1
- As many as you want
Answer: B) Only 1
Explanation:
The IMS database structure can only have one root segment.
Discuss this Question
19. Any segments besides the root segment are referred to as dependent segments?
- True
- False
Answer: A) True
Explanation:
True, any segments besides the root segment are referred to as dependent segments.
Discuss this Question
20. A segment is considered a ____ segment if it has another segment right above it in the hierarchy.
- Left
- Parent
- Child
- Core
Answer: C) Child
Explanation:
A segment is considered a child segment if it has another segment right above it in the hierarchy.
Discuss this Question
21. Two or more segment occurrences of a particular segment type under a single parent segment are called ____ segments.
- Duo segment
- Clone segment
- Pair segment
- Twin segment
Answer: D) Twin segment
Explanation:
The term "twin segments" refers to two or more occurrences of a specific segment type within a single parent segment.
Discuss this Question
22. Sibling segments are the segments of the same types and the same parent.
- True
- False
Answer: B) False
Explanation:
Sibling segments are the segments of different types and the same parent.
Discuss this Question
23. Each occurrence of the root segment, plus all the subordinate segment occurrences makes one database record? True or False?
- True
- False
Answer: A) True
Explanation:
One database record is made up of all instances of the root segment together with all instances of all subordinate segments.
Discuss this Question
24. In how many ways data can be processed in IMS?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
Data can be processed in the following two ways −
- Sequential Processing
- Random Processing
Discuss this Question
25. Which of the following processing is also known as Direct processing of data in IMS DB?
- Sequential Processing
- Random Processing
Answer: B) Random Processing
Explanation:
In IMS DB, random processing is also referred to as direct processing of data.
Discuss this Question
26. Which of the following specifies how the IMS database is organized and how an application may access it?
- IMS transaction manager
- IMS process manager
- IMS Control Blocks
Answer: C) IMS Control Blocks
Explanation:
IMS Control Blocks specify how the IMS database is organized and how an application may access it.
Discuss this Question
27. DL/I use how many types of Control Blocks?
- 5
- 4
- 3
- 2
Answer: C) 3
Explanation:
DL/I uses the following three types of Control Blocks −
- Database Descriptor (DBD)
- Program Specification Block (PSB)
- Access Control Block (ACB)
Discuss this Question
28. Once all the segments have been established, ____ defines the whole physical structure of the database.
- Database Descriptor (DBD)
- Program Specification Block (PSB)
- Access Control Block (ACB)
Answer: A) Database Descriptor (DBD)
Explanation:
Once all the segments have been established, DBD defines the whole physical structure of the database.
Discuss this Question
29. DBDGEN is a ____.
- Database Descriptor Generator
- Database Descriptor Validator
- Database Descriptor Builder
Answer: A) Database Descriptor Generator
Explanation:
DBDGEN is a Database Descriptor Generator.
Discuss this Question
30. Which of the following is responsible for creating control blocks?
- Database Generator
- Database Validator
- Database Administrator
Answer: C) Database Administrator
Explanation:
The Database Administrator is responsible for creating control blocks.
Discuss this Question
31. PSB stands for ____.
- Program-Specific block
- Personal system block
- Program Storage block
- Program Specification block
Answer: D) Program Specification block
Explanation:
PSB stands for program Specification block.
Discuss this Question
32. A program can use ____ PSB in a single execution.
- Only 1
- More than 1
- Any number of PSB
Answer: A) Only 1
Explanation:
No program can use more than one PSB in a single execution.
Discuss this Question
33. What is PCB?
- Program center block
- Program creation block
- Program communication block
- Program common block
Answer: C) Program communication block
Explanation:
PCB stands for Program communication block.
Discuss this Question
34. PSB consists of one or more control blocks called ____.
- PCB
- DBGEN
- DBD
- ACB
Answer: A) PCB
Explanation:
PSB consists of one or more control blocks called Program Communication Blocks (PCBs).
Discuss this Question
35. The PSB contains how many PCB for each DL/I database the application program will access?
- Zero
- One
- More than one
- Any number
Answer: B) One
Explanation:
The PSB contains one PCB for each DL/I database the application program will access.
Discuss this Question
36. ACBGEN is known as ____.
- Access communication block generator
- Access common block generator
- Access Control Blocks Generator
Answer: C) Access Control Blocks Generator
Explanation:
ACBGEN is known as Access Control Blocks Generator.
Discuss this Question
37. Which of the following is used to generate ACBs?
- ACBGEN
- PCBGEN
- DBDGEN
Answer: A) ACBGEN
Explanation:
ACBGEN is used to generate ACBs.
Discuss this Question
38. Which of the following DL/I statements are used in the COBOL program to access the database?
- Entry Statement
- Goback Statement
- Call Statement
- All of the above
Answer: D) All of the above
Explanation:
We use the following DL/I statements in the COBOL program to access the database −
- Entry Statement
- Goback Statement
- Call Statement
Discuss this Question
39. Which of the following is coded at the end of the application program?
- Entry Statement
- Goback Statement
- Call Statement
Answer: B) Goback Statement
Explanation:
GOBACK is coded at the end of the application program.
Discuss this Question
40. 'GU' code is used for the ____.
- Get unique function
- Get unusual function
- Get universal function
Answer: A) Get unique function
Explanation:
'GU' code is used for the Get Unique function.
Discuss this Question
41. Which of the following code is used to fetch a particular segment occurrence based on the field values?
- ISRT
- GN
- REPL
- GU
Answer: D) GU
Explanation:
GU code is used to fetch a particular segment occurrence based on the field values.
Discuss this Question
42. GN code is used for the ____.
- Get new function
- Get next function
- Get number function
- All of the above
Answer: B) Get next function
Explanation:
'GN' code is used for the Get Next function.
Discuss this Question
43. Which of the following Update functions are used in IMS DB?
- INSERT
- UPDATE
- DELETE
- All of the above
Answer: D) All of the above
Explanation:
The following Update functions are used in IMS DB −
Discuss this Question
44. Which of the following code is used for the Insert function?
- INSERT
- INS
- ISRT
- INSRT
Answer: C) ISRT
Explanation:
ISRT code is used for the Insert function.
Discuss this Question
45. Which of the following function is used to add a new segment to the database?
- ADD
- ISRT
- CREATE
- APPEND
Answer: B) ISRT
Explanation:
ISRT function is used to add a new segment to the database.
Discuss this Question
46. Which of the following code is used for the Delete function?
- DELETE
- DEL
- DLETE
- DLET
Answer: D) DLET
Explanation:
'DLET' code is used for the Delete function.
Discuss this Question
47. Which of the following is used to remove a segment from an IMS DL/I database?
- REMOVE
- ERASE
- DLET
- DEL
Answer: C) DLET
Explanation:
'DLET' code is used for the Delete function. It is used to remove a segment from an IMS DL/I database.
Discuss this Question
48. Which code is used to replace a segment in the IMS DL/I database?
- REPL
- REPLACE
- MOVE
- SHIFT
Answer: A) REPL
Explanation:
REPL is used to replace a segment in the IMS DL/I database.
Discuss this Question
49. Which of the following code is used for the Restart function?
- RESTART
- START
- SRTART
- XRST
Answer: D) XRST
Explanation:
XRST code is used for the Restart function
Discuss this Question
50. What is SSA?
- Segment System Arguments
- Segment Search Accounts
- Segment Search Arguments
- Segment System Accounts
Answer: C) Segment Search Arguments
Explanation:
SSA stands for Segment Search Arguments.
Discuss this Question
51. How many types of SSA are there?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
There are two types of SSAs −
- Unqualified SSA
- Qualified SSA
Discuss this Question
52. Which type of SSA provides the name of the segment being used inside the call?
- Unqualified SSA
- Qualified SSA
Answer: A) Unqualified SSA
Explanation:
The name of the segment being utilized inside the call is provided via an unqualified SSA.
Discuss this Question
53. What is the length of a standard unqualified SSA?
- 15 bytes
- 10 bytes
- 9 bytes
- 2 bytes
Answer: C) 9 bytes
Explanation:
The length of a standard, unqualified SSA is 9 bytes.
Discuss this Question
54. The first 8 bytes of unqualified SSA holds ____.
- The segment name which is being used for processing.
- White spaces
- The segment category which is being used for processing
Answer: A) The segment name which is being used for processing.
Explanation:
The first 8 bytes of unqualified SSA holds the segment name which is being used for processing.
Discuss this Question
55. The last byte of unqualified SSA always contains ____.
- Left parenthesis
- Right parenthesis
- Space
Answer: C) Space
Explanation:
The last byte of unqualified SSA always contains space.
Discuss this Question
56. The specific database occurrence of a segment is provided to the segment type via a ____ SSA.
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
The specific database occurrence of a segment is provided to the segment type via a Qualified SSA.
Discuss this Question
57. Which command code can be utilized to get multiple segment occurrences with only one call?
- A
- D
- X
- P
Answer: B) D
Explanation:
The D command code can be utilized to get multiple segment occurrences with only one call.
Discuss this Question
58. Concatenating keys is done using ____ command code.
- A
- K
- C
- P
Answer: C) C
Explanation:
Concatenating keys is done using C command code.
Discuss this Question
59. U command code is ignored if it is used with a ____ SSA.
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
U command code is ignored if it is used with a qualified SSA.
Discuss this Question
60. V command code is ignored when used with a ____ SSA.
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
V command code is ignored when used with a qualified SSA.
Discuss this Question
61. ____ is the term used to describe when a program occupies more than one position in the IMS database.
- Multiple processing
- Parallel processing
- Dual processing
Answer: A) Multiple processing
Explanation:
Multiple processing is the term used to describe when a program occupies more than one position in the IMS database.
Discuss this Question
62. Multiple processing can be done in how many ways?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
Multiple processing can be done in two ways –
- Multiple PCBs
- Multiple Positioning
Discuss this Question
63. How many types of Get Hold calls do we specify in a DL/I call?
- 5
- 3
- 4
- 7
Answer: B) 3
Explanation:
There are three types of Get Hold call that we specify in a DL/I call:
- Get Hold Unique (GHU)
- Get Hold Next (GHN)
- Get Hold Next within Parent (GHNP)
Discuss this Question
64. Can we change the length of a segment using a REPL call?
- Yes
- No
Answer: B) No
Explanation:
With a REPL call, we are unable to modify a segment's length.
Discuss this Question
65. Can we change the value of a key field using a REPL call?
- Yes
- No
Answer: B) No
Explanation:
Using a REPL call does not allow us to modify the value of a key field.
Discuss this Question
66. Which SSA cannot be used with a REPL call?
- Qualified
- Unqualified
Answer: A) Qualified
Explanation:
With a REPL call, we are unable to employ a qualified SSA.
Discuss this Question
67. Index pointer segment consists of how many parts?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
The index pointer segment consists of two parts −
- Prefix Element
- Data Element
Discuss this Question
68. A pointer to the Index Target Segment is present in the ____ of the index pointer segment.
- Prefix Element
- Data Element
Answer: A) Prefix Element
Explanation:
A pointer to the Index Target Segment is present in the prefix part of the index pointer segment.
Discuss this Question
69. Is it necessary that the index source segment and the target source segment should be the same?
- Yes
- No
Answer: B) No
Explanation:
The index source segment and the target source segment don't necessarily have to match.
Discuss this Question
70. The ____ holds the key value from the segment in the index-built database.
- Prefix Element
- Data Element
Answer: B) Data Element
Explanation:
The data element holds the key value from the segment in the index-built database.
Discuss this Question
71. Each segment type can have ____ parent, according to a rule in the IMS database.
- Only 1
- More than 1
- Any number
Answer: A) Only 1
Explanation:
Each segment type can only have one parent, according to a rule in the IMS database.
Discuss this Question
72. How many types of logical relationships are there?
- 5
- 4
- 3
- 2
Answer: C) 3
Explanation:
There are three different kinds of logical relationships: unidirectional, bidirectional, and virtual.
Discuss this Question
73. DPCK stands for ____.
- Destination Parent Concatenated Key
- Deprecated Parent Concatenated Key
- Destroyed Parent Concatenated Key
- Degenerated Parent Concatenated Key
Answer: A) Destination Parent Concatenated Key
Explanation:
DPCK stands for Destination Parent Concatenated Key.
Discuss this Question
74. A concatenated segment consists of how many parts?
- 5
- 4
- 3
- 2
Answer: D) 2
Explanation:
A concatenated segment consists of the following two parts −
- Logical child segment
- Destination parent segment
Discuss this Question
75. A logical child segment consists of how many parts?
- 3
- 4
- 2
- 6
Answer: C) 2
Explanation:
A logical child segment consists of the following two parts:
- Destination Parent Concatenated Key (DPCK)
- Logical child user data
Discuss this Question
76. How many approaches are there for database recovery?
- 5
- 3
- 2
- 4
Answer: C) 2
Explanation:
The two approaches to database recovery are −
- Forward Recovery
- Backward Recovery
Discuss this Question
77. Which of the following database recovery is also known as backout recovery?
- Forward Recovery
- Backward Recovery
Answer: B) Backward Recovery
Explanation:
Backward recovery is also known as backout recovery.
Discuss this Question
78. A ____ is a stage where the database changes done by the application program are considered complete and accurate.
- Milestone
- Snap shot
- Breakpoint
- Checkpoint
Answer: D) Checkpoint
Explanation:
A checkpoint is a stage where the database changes done by the application program are considered complete and accurate.
Discuss this Question
79. Which checkpoint call can be used to establish a checkpoint?
- CHKP
- CKP
- CP
- CHEPOI
Answer: A) CHKP
Explanation:
A checkpoint can be established using a checkpoint call (CHKP).
Discuss this Question
80. How many checkpoint methods are there?
- 5
- 3
- 2
- 1
Answer: C) 2
Explanation:
There are two checkpoint approaches:
- Basic Checkpointing
- Symbolic Checkpointing
Discuss this Question