Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - IMS: DB DL/1 Programming

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


MFIMS02

IMS: DB DL/1 Programming
DURATION: 5 days

FEE: $2,475

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Programmer
  • System Analyst
  • System Designer
  • Database Administrator
  • System Programmer
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. Components of IMS DL/1
      • IMS component functionality.
    2. IMS DL/1 Structure
      • The architecture of an IMS database.
      • Segments/records, parent/child segments, and twins and siblings.
      • Segment limits and sensitivity, processing options, key sequence field, search field, DBDGEN, and PSBGEN.
    3. Program Structure and Interface to IMS
      • Calls to IMS and how they need to be coded.
      • Code a basic program which invokes IMS through DL/1.
    4. Database Retrieval Calls
      • Process the data in an IMS database using the GET call in DL/1.
      • Code WORKING-STORAGE, Linkage Section, and Entry Statement calls for retrieving input messages; these exercises utilize an existing database.
      • Perform GU, GHU, GN, and GNP operations.
    5. Database Update Calls
      • Update the data in an IMS database using the GET call in DL/1.
      • Using the database from the previous exercise, search for a segment, and perform a delete and replacement of values.
      • Insert new records into the database.
    6. Advanced Techniques
      • Code a complex search pattern.
      • Use the boolean operators to perform complex searches.
      • Code Qualified SSAs, Unqualified SSAs, and Boolean SSAs.
    7. Characteristics of a DL/1 Database
      • GSAM, HDAM, HIDAM.
      • How to reorganize a database.
      • Run the reorganize utility for the specified database.
    8. Logical Relationships and Searching
      • Add and use a secondary index.
      • Develop a query routine to a database from which the user can select a primary or secondary index.
    9. System Service Calls
      • The reasons for issuing Checkpoint Calls.
      • Issue a symbolic checkpoint.
      • Implement a PSB: Program Specific Block.
      • Recognize and appreciate the considerations associated with program and call parameters.
    10. Testing
      • Use DL/1 debugging aids for testing programs.
      • Issue a symbolic checkpoint.
      • Given a program with three errors, locate and fix the errors.

    Virtual Classroom   Blended Learning    

Synchronous
Instruction
Asynchronous
Instruction

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.