After signing on to CICS, how does a user invoke a transaction?
A. By issuing a TSO command
B. By typing a TRANSID
C. By typing EXEC CICS
D. By typing INVOKE CICS
正解:B
質問 2:
Which of the following mainframe technologies requires a coupling facility?
A. CTC ring
B. Parallel Sysplex
C. zAAP
D. Shared DASD
正解:B
質問 3:
Which of the following is the most commonly used interface for z/OS application programmers?
A. X Window
B. TN 3270
C. TSO/E and ISPF
D. Rational Developer for System z (RDz)
正解:C
質問 4:
Which of the following RACF structures retains information about users, resources, and access authorities?
A. Groups
B. Templates
C. Profiles
D. Access
正解:C
質問 5:
Which of the following describes the WebSphere Application Server (WAS) capability to detect application failures and to restart when a failure occurs?
A. ASM
B. SRM
C. RSM
D. ARM
正解:D
質問 6:
The range of virtual addresses that z/OS can assign to a user or separately running program is called a(n) ___________ space.
A. Mapping
B. Address
C. Physical
D. Virtual
正解:B