Answer Posted / kaniyan
If one user put intent exclusive lock on a page or a table
or table space, at that time some wants to read the
content. He will get junk values. This is called dirty
read.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
what are s0c1, s0c4, s0c5, s0c7 abends?
What is the use of access method services in vsam?
is it necessary that all versions of the gdg have to be of the same record length?
On which dataset you can have alt index?
What are the common vsam error conditions and codes?
What is the biggest disadvantage of using a vsam dataset?
in a cobol select statement for a ksds can you tell me what are the 3 possibilities for access?
Describe the uses of ams?
What does the keyranges parameter in define cluster commends do?
What are the building blocks used in vsam datasets?
what is the probability of a complete system distortion under high end low performing multiprocessor job?
What is a lds (linear data set)?
What is the use of KSDS,LDS,ESDS,RRDS??what is VRRDS?? How are all these useful in realtime scenario??Plz helpme out...Its a recent question in IGATE..
Yes. Because the alternate key would first locate the primary key, which in turn locates the actual record. Needs twice the number of I/Os.
what is the purpose of the verify function of idcams?