Download - Course Catalog - Manta Technologies
December, 2018 Edition.
Manta Technologies Inc.6850 Vista Lodge LoopCastle Pines, CO 80108
Copyright Manta Technologies Inc. 1994-2019. All rights reserved.
Manta courses are presented using EasyTutor, a trademark of Hansen Training Systems, Inc.
Ethernet is a trademark of the Xerox Corporation
UNIX is a trademark of the X/Open Company Ltd.
Linux is a trademark of Linus Torvalds
Apache and Tomcat are trademarks of the Apache Software Foundation.
Microsoft, JScript, Microsoft Access, Microsoft Excel, Microsoft Office, Microsoft Windows, and Microsoft Wordare trademarks of the Microsoft Corporation.
Sun, Sun Microsystems, Java, and JavaServer Pages are trademarks of Sun Microsystems, Inc.
The following are trademarks of International Business Machines Corporation:
Db2
IBM
IBM i
ILE
Integrated Language Environment
System i Access
Navigator for i
Net.Data
Operational Assistant
System i Navigator
PC5250
PDM
Personal Communications 5250
PowerVM
ILE RPG
SEU
System i
WebSphere
Printed in the United States of America.
Table of Contents Table of Contents .............................................................................................................................................III
The IBM i Training Library..................................................................................................................................1
Features..........................................................................................................................................................1
The Manta Experience....................................................................................................................................2
Manta Offerings..............................................................................................................................................3
System Requirements....................................................................................................................................3
Licensing.........................................................................................................................................................3
Keep Track of Your Students’ Progress.........................................................................................................4
Special Introductory Price: Free!....................................................................................................................4
Ordering Courses............................................................................................................................................4
Money-Back Guarantee..................................................................................................................................4
Legal Stuff.......................................................................................................................................................4
Combination Packs.............................................................................................................................................5
Curriculum Recommendations...........................................................................................................................7
System Users and IT Managers.....................................................................................................................7
Programmers and Analysts............................................................................................................................7
System Operators...........................................................................................................................................8
System Administrators....................................................................................................................................8
Course Descriptions...........................................................................................................................................9
Introduction to the IBM i Environment .............................................................................................................10
Getting Started on IBM i...............................................................................................................................11
Integrated File System Concepts..................................................................................................................12
Using IBM i Commands................................................................................................................................13
Using Navigator for i.....................................................................................................................................15
Introduction to the IBM i Environment Competency Exam...........................................................................16
Using Query Manager......................................................................................................................................17
Using Query for i...............................................................................................................................................18
Getting Started with Db2 Web Query...............................................................................................................19
Fundamentals of IBM i Operations...................................................................................................................20
Work Management Concepts.......................................................................................................................21
Submitting and Managing Batch Jobs..........................................................................................................22
Controlling Printer Output.............................................................................................................................23
Controlling Users, Queues, Printers, and Subsystems................................................................................24
Monitoring an IBM i System..........................................................................................................................25
Using Tapes..................................................................................................................................................26
Fundamentals of IBM i Operations Competency Exam...............................................................................27
Fundamentals of Operations Using Navigator for i..........................................................................................28
Work Management Concepts.......................................................................................................................29
Basic Operations Using Navigator for i.........................................................................................................30
Work Management Using Navigator for i......................................................................................................32
Tape Management Using Navigator for i......................................................................................................33
Fundamentals of Operations Using Navigator for i Competency Exam.......................................................34
IBM i System Management..............................................................................................................................35
Starting and Stopping the System................................................................................................................36
Managing Devices........................................................................................................................................37
Backing Up Your System.............................................................................................................................38
Checking Storage Utilization.........................................................................................................................39
Cleaning Up System Storage.......................................................................................................................40
Software Maintenance..................................................................................................................................41
Using Virtual Media.......................................................................................................................................42
Handling Problems........................................................................................................................................43
System Management Using System i Navigator..........................................................................................44
IBM i System Management Competency Exam...........................................................................................46
PowerVM Concepts..........................................................................................................................................47
System i Access for Windows..........................................................................................................................49
Introduction toSystem i Access for Windows.......................................................................................................................50
Using PC5250...............................................................................................................................................51
Transferring Files Between Your PC and an IBM i System.........................................................................52
Using the Directory Update Function............................................................................................................53
Installing System i Access for Windows.......................................................................................................54
System i Access for Windows Competency Exam.......................................................................................56
IBM i Security...................................................................................................................................................57
Introduction to IBM i Security........................................................................................................................58
Granting Object Authority.............................................................................................................................59
Controlling Application Security....................................................................................................................60
System Security Considerations...................................................................................................................61
Creating an Application Environment...........................................................................................................63
Creating and Maintaining User Profiles........................................................................................................64
Security-Related System Values..................................................................................................................65
IBM i Security Using System i Navigator......................................................................................................66
IBM i Security Competency Exam................................................................................................................68
IBM Navigator for i............................................................................................................................................69
Using Navigator for i.....................................................................................................................................70
Basic Operations Using Navigator for i.........................................................................................................71
Work Management Using Navigator for i......................................................................................................72
Tape Management Using Navigator for i......................................................................................................73
IBM Navigator for i Competency Exam........................................................................................................74
System i Navigator...........................................................................................................................................75
Using System i Navigator ............................................................................................................................75
IBM i Operations Using System i Navigator ................................................................................................76
System Management Using System i Navigator..........................................................................................78
IBM i Security Using System i Navigator......................................................................................................79
Managing TCP/IP Using System i Navigator................................................................................................80
System i Navigator Competency Exam........................................................................................................82
Work Management for System Administrators.................................................................................................83
Work Management Concepts.......................................................................................................................84
Working with System Values........................................................................................................................85
Managing Subsystems.................................................................................................................................86
Subsystem Workflow and Job Control..........................................................................................................87
Streamlining IBM i Operations......................................................................................................................88
Job Accounting.............................................................................................................................................90
Performance Tuning.....................................................................................................................................91
Work Management for System Administrators Competency Exam.............................................................92
TCP/IP in the IBM i Environment......................................................................................................................93
TCP/IP Fundamentals..................................................................................................................................94
TCP/IP Applications......................................................................................................................................95
Configuring and Managing TCP/IP...............................................................................................................96
Managing TCP/IP Using System i Navigator................................................................................................98
TCP/IP in the IBM i Environment Competency Exam................................................................................100
Using the Advanced Job Scheduler...............................................................................................................101
Advanced Job Scheduler Concepts...........................................................................................................102
The AJS Text-Based Interface....................................................................................................................103
The AJS Web-Based Interface...................................................................................................................105
Using the Advanced Job Scheduler Competency Exam............................................................................107
The Integrated File System............................................................................................................................108
IFS Security....................................................................................................................................................109
PowerVM Concepts........................................................................................................................................111
Implementing Single Sign-On.........................................................................................................................113
Configuring the HTTP Server.........................................................................................................................115
The IBM i Programming Environment............................................................................................................117
IBM i Application Programming Concepts..................................................................................................118
IBM i Programming Tools...........................................................................................................................119
ILE Program Development.........................................................................................................................121
The IBM i Programming Environment Competency Exam.........................................................................122
Java Fundamentals........................................................................................................................................123
Introduction to Java....................................................................................................................................124
The Basics of Java Programming...............................................................................................................125
Java Fundamentals Competency Exam.....................................................................................................127
Free-Form RPG Programming.......................................................................................................................128
Fundamentals of Free-Form RPG..............................................................................................................129
File Processing with Free-Form RPG.........................................................................................................130
Rounding Out the Essentials of Free-Form RPG.......................................................................................131
Working with Complex Data Types in Free-Form RPG..............................................................................132
Developing a Modular Application in Free-Form RPG...............................................................................133
Developing an Interactive Program in Free-Form RPG.............................................................................134
Advanced Free-Form RPG Programming..................................................................................................136
Free-Form RPG Programming Competency Exam....................................................................................137
RPG Programming.........................................................................................................................................138
RPG Fundamentals....................................................................................................................................139
RPG File Processing..................................................................................................................................140
Rounding Out the Essentials of RPG.........................................................................................................141
Working with Complex Data Types............................................................................................................143
Developing a Modular RPG Application.....................................................................................................144
Developing an Interactive RPG Program...................................................................................................145
Advanced RPG Programming....................................................................................................................147
RPG Programming Competency Exam......................................................................................................148
Coding Free-Form RPG.................................................................................................................................149
Using Screen Design Aid (SDA).....................................................................................................................150
Using the ILE Source-Level Debugger...........................................................................................................151
Working with Db2 Databases.........................................................................................................................152
Introduction to Db2 ....................................................................................................................................153
Creating and Managing Physical Files ......................................................................................................154
Creating and Managing Logical Files ........................................................................................................155
Processing a Db2 Database ......................................................................................................................156
Using Triggers.............................................................................................................................................157
Using Referential Integrity..........................................................................................................................158
Working with Db2 Databases Competency Exam......................................................................................159
Using Structured Query Language (SQL)......................................................................................................160
SQL Fundamentals.....................................................................................................................................161
Coding SQL Statements in a Free-Form RPG Program............................................................................162
Coding SQL Statements in an RPG Program............................................................................................163
Coding SQL Statements in a COBOL Program.........................................................................................164
SQL Stored Procedures..............................................................................................................................165
Implementing Business Rules Using Constraints and Triggers.................................................................167
Using Structured Query Language (SQL) Competency Exam...................................................................169
.......................................................................................................................................................................169
Control Language Programming....................................................................................................................170
Introduction to CL Programming.................................................................................................................171
Controlling Command and Program Flow..................................................................................................173
Interactive CL Applications.........................................................................................................................174
Message Processing in a CL Program.......................................................................................................175
Accessing Database Files, Data Queues, and Data Areas........................................................................176
Control Language Programming Competency Exam.................................................................................177
eBusiness for IBM i Programmers ................................................................................................................178
eBusiness: From HTML to WebSphere......................................................................................................179
Coding HTML and XHTML: Basic Elements..............................................................................................180
Coding HTML and XHTML: Advanced Elements.......................................................................................182
Coding JavaScript.......................................................................................................................................183
Using JavaScript to Enhance Web Pages..................................................................................................184
Writing a CGI Program in RPG...................................................................................................................185
Developing Web Applications Using Net.Data...........................................................................................187
Ajax Programming......................................................................................................................................189
eBusiness for IBM i Programmers Competency Exam .............................................................................191
Using Rational Developer for i (RDi) .............................................................................................................192
Introduction to RDi......................................................................................................................................193
Using the Remote System Explorer (RSE).................................................................................................194
Using the Integrated i Debugger.................................................................................................................195
Using Rational Developer for i (RDi) Competency Exam ..........................................................................196
COBOL Programming ...................................................................................................................................197
Developing a COBOL Program..................................................................................................................198
COBOL Output Programming.....................................................................................................................200
COBOL Input Programming........................................................................................................................201
Performing Arithmetic in COBOL................................................................................................................202
COBOL Table Processing..........................................................................................................................203
COBOL File Processing..............................................................................................................................205
Writing Subprograms in COBOL................................................................................................................206
COBOL Programming Competency Exam ................................................................................................208
The IBM i Training LibraryKeeping yourself and your staff up to date on the latest IBM i technologies is vital tosustaining your company’s productivity and profits. And there’s no better way to acquire theskills you need than web-based training (WBT) from Manta Technologies. Manta trainingoffers you and your staff the maximum in training effectiveness with the minimum of programadministration and cost.
Manta Technologies’ IBM i Training Library is an integrated collection of courses forprogrammers, operators, system administrators, and users of the IBM i operating system. Allcourses use interactive training sessions that run in all popular browsers.
Features Manta is the premier company in the IBM i
training and education business. We arecelebrating our 23rd anniversary this year.
Manta has more IBM i courses than anyone,with over 130 courses currently available.
All courses use self-contained, interactivesessions.
Students can train anywhere: at the office, athome, or on the road.
Because all courses are online, students cantrain anytime: 24/7/365.
Every course can be taken from any PC ortablet that can run a standard browser.
Manta’s exclusive IBM i simulator lets studentspractice IBM i procedures on a PC or tablet.When they move to a real system, they will havethe confidence and skills to perform systemtasks correctly the first time.
Manta’s student-paced courses are easy toschedule, averaging two hours in length. Youcan finish a complete course in a morning or anafternoon or at home in the evening.
Manta’s flexible licensing provides low-costtraining for one student or hundreds.
The low price of Manta courses will typically letyou train an entire department for the cost ofsending one student to a traditional class.
Because training is delivered from the Mantaweb site, course updates are immediatelyavailable. This means that you receive free,immediate maintenance.
If we add a course to a product you purchased(such as a combination pack), you haveimmediate access to the new course at noextra charge.
A Manta Competency Exam is available forevery course. Not only do the exams help youdetermine whether you have mastered thematerial covered, they are also an excellent wayto test whether a new employee has the skillsyou need.
Manta's exercises and exams are built aroundrealistic, on-the-job situations in which thestudent must enter commands, select menuoptions, write code, and perform other system-related tasks using Manta's exclusive IBM isimulator.
At the end of each exam, the student is directedto remedial training, if needed, and the resultsare logged for reporting via our built-in StudentAdministration function.
Manta courses make an excellent onlinereference when students are back on the job. Inaddition, a complementary PDF StudentReference Guide is provided with each Mantaseries or stand-alone courses.
This catalog and the Manta web site,www.mantatech.com, offer detailed coursedescriptions and curriculumrecommendations for common job functions.
Manta The IBM i Training Library Technologies Inc. 2
The Manta ExperienceWhat makes taking a Manta course a unique learning experience? High on anyone’s list would be Manta’sexclusive training delivery system. This system was designed for the sole purpose of providing the besttraining for the IBM i environment. Unique to the system are built-in simulators of both 5250 workstations andPC-based graphical user interfaces (GUIs), such as those used by RDi and RSE. Equally important is Manta’sdesign philosophy: to tailor courses and exercises around the student’s job requirements. For example, ratherthan having students answer multiple-choice questions about RPG statements, our RPG courses requirestudents to actually enter statements as they would on the job.
Student Control Functions
Manta screen includes the following options:
All courses that are available to the studentare reached from a single Menu.
Navigation buttons let the student proceedas fast or as slow as desired.
When a break is needed, a student can seta Bookmark and then use the GoTofunction to return to that point at a later time.
Students can often receive a Hint to directthem towards the correct answer. If this is
not enough, the Answer button will provide boththe correct answer and an explanation.
Sound effects can be turned on and off with theAudio Control. Most course also have a soundtrack that can be turned off or on as desired.
The Help Topics provide detailed instructions forall student activities.
The Handy Links menu includes links to Manta’sweb site and online curriculum planner, as wellas to the IBM i Knowledge Center.
.A complete IBM i Glossary is never more than aclick away.
Manta Curriculum Recommendations Technologies Inc. 3
Manta Offerings
The Manta IBM i Training Library
The Manta IBM i Training Library is a collection ofcourses for programmers, operators, systemadministrators, and users. Each course takes 2-6hours to complete. The library is designed as anintegrated curriculum. Students can progress fromentry-level courses to advanced topics that preparethem for professional certifications.
Related courses are combined into a series. Anexample is the 7-course Free-Form RPGProgramming series. Similarly, related series arecombined into a combination pack. An example isthe RPG Development Combination Pack, whichincludes not only the RPG Programming series, butalso 38 other courses that cover everything that anRPG programmer needs to be productive.
When a course is not contained within a series, wecall it a stand-alone course. An example is UsingScreen Design Aid (SDA), which is also in the RPGDevelopment Combination Pack.
Our largest combination pack is the complete IBM iTraining Library. This package includes all of our130+ courses.
Every course has a corresponding CompetencyExam, which tests the student's mastery of thecourse objectives. At the end of each exam is areport that shows the student's results and, if theyare not satisfactory, points the student to theappropriate session for review. For stand-alonecourses, the exam is packaged at the end of thecourse. For courses within a series, the exams arepackaged together and offered as a separateproduct. (Some customers use the exams as apretest because, if you pass the exam, there is noneed to take the course.) If you purchase the entireseries, the exams are included at no additional cost.
Student Reference Guides are available in PDFformat for all Manta series and stand-alone courses.These can be downloaded from each student's mainmenu. Each Student Reference Guide (SRG)includes a summary of all major topics. As a result,the guides make an excellent reference whenstudents have finished their studies and are back onthe job.
System Requirements
The Manta courseware can run in the current releaseof all popular browsers, including Internet Explorer,Firefox, Chrome, Opera, and Safari. (We currentlyrecommend Chrome.)
The Manta courseware automatically checks yourbrowser’s configuration to ensure that it is set up asrequired to run the training. A quick way todetermine whether any configuration changes areneeded is to take a sample session from the Mantaweb site.
Licensing
All courses have a concurrent-user license. Thelicense does not limit the number of students whocan use a product, only the number who can beusing it at the same time. The base term is oneyear.
Individuals and most small organizations prefer thesingle-user license. With formal scheduling (forexample, by assigning a morning or an afternoon toeach student), we find that up to ten students canshare a single-user license.
If your organization prefers to train students ingroups, rather than one at a time, consider amultiple-user license. Unlike the single-userlicense, the multiple-user license lets multiplestudents use the same product simultaneously.
The user limit applies to whatever product(s) youorder. If you buy a one-user license for the entirelibrary, for example, only one student can use thelibrary at a time. To increase the number of studentswho can train simultaneously, you can move to afive-user license for the library or buy additional usercapabilities for only those products used by multiplestudents. A popular combination is a single-userlicense for the library and a five-user license for theProgram Development Combination Pack.
For any product, moving from a single-user licenseto a 5-user license increases the price by only 50%.Each additional student over 5 increases the price by10% of the single-user price.
Renewals
The month before your license expires, we will sendyou an invoice to renew the license. The renewalrate for the second year is 50% of the list price. Foreach subsequent year, the renewal rate is 25% ofthe list price. This percentage reflects how much ofthe Manta IBM i Training Library is typically updatedor replaced each year. This price automaticallyincludes any courses added to a series, combinationpackage, or the complete library.
Manta Curriculum Recommendations Technologies Inc. 4
Keep Track of Your Students’ ProgressManta’s Student Administration support isincluded with all course orders at no additionalcharge. It allows a training administrator to monitorand control the use of the Manta IBM i TrainingLibrary courseware. This feature lets you:
Grant course access only to registered students
Create custom student menus
Print reports detailing student course usage
Print reports detailing students’ CompetencyExam results
Check your license status
Special Introductory Price: Free!A typical Manta course consists of six to eightsessions, each 15 to 20 minutes long. You can visitour web site (www.mantatech.com) to take the firstsession of any course in the IBM i Training Libraryfor free. These are not the “bait-and-switch” demosprovided by some vendors, but the actual trainingprovided by MantaNow!, our Internet deliverysystem. In all, approximately 40 hours of trainingare available for free, out of the hundreds of hoursavailable via MantaNow! Directions for taking asample session are available from the CourseOptions menu at www.mantatech.com.
Ordering CoursesYou can place orders by phone, by e-mail, by U.S.Mail, or online.
We recommend that you start the order process byvisiting our web site, which will guide you throughthe order process and make sure that you get allavailable discounts.
Mail orders:
Manta Technologies Inc. 8234 Blue Ridge Avenue
Littleton, CO 80125
Phone orders: 1-800-40-MANTA (1-800-406-2682)
Orders outside the U.S. and Canada: 1-847-528-2114
Web site: www.mantatech.com
Major credit cards (American Express, VISA,MasterCard) and corporate purchase orders areaccepted. You may also use PayPal.
Prices listed throughout this catalog are in U.S.currency. All prices are subject to change withoutnotice.
Money-Back GuaranteeWe want you to be happy with your Manta purchase.If, after reviewing your order, you are not satisfied forany reason, you may cancel your purchase within 15calendar days for a full refund minus, at Manta’sdiscretion, any bank charges for credit cardpurchases and refunds.
If you are not sure whether you will like Manta'straining approach, be sure to view a samplesession. (You can view the first session of anycourse from our web site, www.mantatech.com.)Because the sample sessions use the actual Mantasoftware, your ability to view a session verifies thatall Manta courses will run successfully on your PC.
If you are interested in a particular topic, check thecourse description in this catalog. For every course,the catalog describes in detail the course objectives,recommended audience, and prerequisites. Weguarantee that the course teaches the skills listed inthe catalog. In fact, built into our coursedevelopment procedure is a quality assurance checkto verify that every objective is not only covered indetail, but also is sufficiently tested in thecorresponding Competency Exam.
If you like the sample session and the catalogdescription matches your training requirements, youshould be pretty confident that the course will meetyour needs. If you are considering multiple courses,such as a combination pack or the entire library,there is one more step you can take to minimize yourrisk. Rather than buying everything at once, buy asingle course or take a course online. If you laterupgrade to a larger product (like a Combination Packor the entire library) that contains what you havealready purchased, we will prorate the amount ofyour license that has been used and apply 100% ofthe remainder to the new purchase.
Legal StuffManta's sale Terms and Conditions and License areavailable for downloading atwww.mantatech.com/manta/legal.
Manta Curriculum Recommendations Technologies Inc. 5
Combination PacksCombination packs offer an additional savingsof 10% off the individual series prices.
Operations Combination Pack
Combo order number: OPRCUR One-year, single-user license: $2,430
This package includes the 24 courses and examsintended for operators, system administrators, andadvanced users: Introduction to the IBM i Environment series Fundamentals of IBM i Operations series Fundamentals of Operations Using Navigator for
i series IBM i System Management series Using the Advanced Job Scheduler series PowerVM Concepts The IBM Navigator for i series
System Administration Combination Pack
Combo order number: ADMCUR One-year, single-user license: $4,670
This package includes the 47 System Administrationcourses and exams: Introduction to the IBM i Environment series Fundamentals of IBM i Operations series Fundamentals of Operations Using Navigator for
i series IBM i System Management series Using the Advanced Job Scheduler series IBM i Security series Work Management for System Administrators
series TCP/IP in the IBM i Environment series The IBM Navigator for i series System i Navigator series The Integrated File System IFS Security PowerVM Concepts Implementing Single Sign-On Configuring the HTTP Server
Manta Curriculum Recommendations Technologies Inc. 6
Programming Combination Packs
Manta offers three ways to save on combinations ofour popular programming courses.
Program Development Combination Pack
Combo order number: PGMCUR One-year, single-user license: $4,760
Includes all 64 programming courses and exams: Introduction to the IBM i Environment series The IBM i Programming Environment series Using Rational Developer for i (RDi) series Free-Form RPG Programming series RPG Programming series Coding Free-Form RPG COBOL Programming series Java Fundamentals series Control Language Programming series Working with Db2 Databases series Using Structured Query Language (SQL) series eBusiness for IBM i Programmers series Using the ILE Source-Level Debugger Using Screen Design Aid (SDA) Using Query Manager Using Query for i5/OS Getting Started with Db2 Web Query
RPG Development Combination Pack
Combo order number: RPGCUR One-year, single-user license: $3,790
Includes the 47 courses and exams needed by atraditional RPG programmer: Introduction to the IBM i Environment series The IBM i Programming Environment series Using Rational Developer for i (RDi) series Free-Form RPG Programming series RPG Programming series Coding Free-Form RPG Control Language Programming series Working with Db2 Databases series Using Structured Query Language (SQL) series Using the ILE Source-Level Debugger Using Screen Design Aid (SDA) Using Query Manager Using Query for i5/OS Getting Started with Db2 Web Query
COBOL Development Combination Pack
Combo order number: COBCUR One-year, single-user license: $3,690
Includes the 39 courses and exams needed by aCOBOL programmer:
Introduction to the IBM i Environment series The IBM i Programming Environment series Using Rational Developer for i (RDi) series COBOL Programming series Control Language Programming series Working with Db2 Databases series Using Structured Query Language (SQL) series Using the ILE Source-Level Debugger Using Screen Design Aid (SDA) Using Query Manager Using Query for i5/OS Getting Started with Db2 Web Query
Manta Curriculum Recommendations Technologies Inc. 7
Curriculum RecommendationsThis section identifies required and recommended training for the following audiences:
System users and IT managers
Programmers and analysts
System operators
System administrators
System Users and IT Managers
Required
The Introduction to the IBM i Environment series
Recommended
The System i Access for Windows series
Work Management Concepts
Introduction to Db2
Introduction to System i Security
Using Query Manager or Using Query for i or Getting Started with Db2 Web Query
TCP/IP Fundamentals
TCP/IP Applications
eBusiness: From HTML to WebSphere
Programmers and Analysts
Required
The Introduction to the IBM i Environment series
The IBM i Programming Environment series
The Using Rational Developer for i (RDi) series
The Free-Form RPG Programming series or
The RPG Programming series and Coding a Free-Form RPG Program or
The COBOL Programming series or
The Java Fundamentals series
The Control Language Programming series
The Working with Db2 Databases series
The Using Structured Query Language (SQL) series
Using Screen Design Aid (SDA)
Using the ILE Source-Level Debugger
Recommended
The System i Access for Windows series
The Fundamentals of IBM i Operations series and/or the Fundamentals of Operations Using Navigator for i series
The IBM i Security series
Using Query Manager or Using Query for i or GettingStarted with Db2 Web Query
TCP/IP Fundamentals
TCP/IP Applications
The eBusiness for IBM i Programmers series
Configuring the HTTP Server
Manta Curriculum Recommendations Technologies Inc. 8
System OperatorsRequired
The Introduction to the IBM i Environment series
The Fundamentals of IBM i Operations series and/orthe Fundamentals of Operations Using Navigator fori series
The IBM i System Management series
Recommended
The System i Access for Windows series
Introduction to IBM i Security
Introduction to Db2
Introduction to CL Programming
Controlling Command and Program Flow
TCP/IP Fundamentals
TCP/IP Applications
PowerVM Concepts or Introduction to Logical Partitioning
Note: Depending on your installation’s policies and procedures, operators may also be required to take courses from the system administrators’ curriculum.
System AdministratorsRequired
The Introduction to the IBM i Environment series
The Fundamentals of IBM i Operations series and/or the Fundamentals of Operations Using Navigator for i series
The IBM i System Management series
The IBM i Security series
Creating and Maintaining User Profiles
The Work Management for System Administrators series
The TCP/IP in the IBM i Environment series
The Using the Advanced Job Scheduler series
PowerVM Concepts or Introduction to Logical Partitioning
Implementing Single Sign-On
Configuring the HTTP Server
Recommended
The System i Access for Windows series
Introduction to Db2
The Integrated File System
IFS Security
The CL Programming Series
Using Query Manager or Using Query for i or GettingStarted with Db2 Web Query
eBusiness: From HTML to WebSphere
Manta Introduction to the IBM i Environment Technologies Inc. 9
Course DescriptionsThe remainder of this catalog lists detailed course descriptions. The following information is provided for eachcourse:
Order number
Price
Overview
Approximate study time
Objectives
Topic outline
Audience
Prerequisites
Reference materials
Similar information is provided for each series and competency exam.
Manta Introduction to the IBM i Environment Technologies Inc. 10
Introduction to the IBM i Environment
Order Number: UINT00
Max.Users
FirstYear
SecondYear
Later Years
1 $432 $216 $1085 $648 $324 $162
Each add’l $44 $22 $11
Overview
The Introduction to the IBM i Environment seriesdescribes the basic skills needed to use an IBM isystem. The series describes how to sign on,navigate the IBM i menu structure, enter data, usecommands, and perform other common tasks. Asyou learn the basic skills, you will also learn IBM iconcepts. You will learn how to access an IBM isystem using both a traditional 5250 workstation anda personal computer.
This series contains the following courses:
Getting Started on IBM i
Integrated File System Concepts
Using IBM i Commands
Using Navigator for i
Introduction to the IBM i Environment Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 10-16 hours
Audience
This series should be taken by anyone who will beusing an IBM i system. This audience includesmanagers, programmers, operators, end users, andother personnel.
Prerequisites
While this is an "introductory" series, we do notassume that you are ignorant about computers andinformation technology. On the contrary, we assumeyou have experience using a personal computer(PC). You know how to use a keyboard and youunderstand basic computer concepts. In fact, youmay even be a PC guru. By making theseassumptions, we can compare what you don't knowin the IBM i environment with what you have alreadymastered in the PC world.
Manta Introduction to the IBM i Environment Technologies Inc. 11
Getting Started on IBM i
Order Number: UINT01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the basic skills needed to use anIBM i system. As you will see, most users can easilyselect the functions they require by using a hierarchyof menus and other panels.
The course begins by showing you how to sign onan IBM i system. It then discusses the four types ofIBM i panels: menus, data entry panels, lists, andinformation panels. You will see the general rulesfor navigating through the menu structure, forentering data, and for performing operations on theobjects in a list. As part of this discussion, you willsee how to send messages to other users and howto sign off the system.
Next, the course describes how you can change thelevel of assistance provided to you by the system.
This course then describes IBM i message types.You will see how to review the messages sent toyou, how to delete the messages you have read,and how to respond to messages that require ananswer.
The remainder of the course covers the IBM i helpfacilities. These facilities let you ask for helpinformation about a specific message, panel, inputfield, column, or menu option. You can also locateinformation about tasks or procedures and aboutgeneral topics.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Sign on an IBM i system
Navigate through the IBM i menu structure
Sign off the system either permanently ortemporarily
Fill in fields on a data entry panel
Select objects from a list
Identify the various types of IBM i panels andmessages
Use system functions to perform the followingtasks:
o Display the Operational Assistant menu
o Change your password
o Send a message to another user
o Change the level of assistance provided toyou by IBM i
o Display messages sent to you
o Respond to messages that require ananswer
o Delete messages that you have read
o Ask for system help information about aspecific message, panel, input field, column,or menu option
Topic Outline
Signing on an IBM i System
Using Menus
Data Entry
Assistance Levels
Messages
Help Facilities
Audience
The course is intended for anyone who will use anIBM i system. This audience includes managers,programmers, operators, end users, and otherpersonnel.
Prerequisites
While this course has no formal prerequisites, aminimal knowledge of computer fundamentals isassumed.
Manta Introduction to the IBM i Environment Technologies Inc. 12
Integrated File System Concepts
Order Number: UINT02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
A unique advantage of an IBM i system is its abilityto store data in a variety of formats, including thoseformats used by Windows, Linux, and Unix systems.This capability is provided by the integrated filesystem (IFS), which provides a single mechanism forstoring and retrieving all objects on an IBM i system.
In describing the IFS, the course first reviews filesystems with which you may be familiar. It thendescribes the structure of the IBM i root file system.During this discussion, you will learn how to create anew directory and change your current directory.
The library file system is covered next, including thekey concepts of objects and libraries. You will seehow the system locates objects in multiple librariesand how to change your current library.
The course then discusses storage managementconcepts, including virtual storage, external storagepools, and single-level storage.
Once you have studied these various file systems,you will be ready to see how the integrated filesystem supports them all within a commonframework. You will see how objects can beaccessed using the facilities of their native filesystems or by using IFS facilities. Finally, thecourse covers the other file systems supportedwithin the IFS. These include the document libraryservices file system, the open systems file system,the NetClient file system, the optical file system, andothers.
Approximate Study Time: 4 hours
Objectives
After completing this course, you should be able to:
Describe the purpose of a file system
Describe the organization and naming rules forthe Windows and Unix (or AIX or Linux) filesystems
Describe the structure of the root file system
Specify the name required to locate an object inthe root file system using either an absolute or arelative path name
Display or change your current directory
Create or remove a directory
Identify the differences between a hard link anda symbolic link
Identify the symbolic link needed to support agiven processing requirement
Define IBM i terms, including memory, auxiliarystorage pool, page, virtual storage, single-levelstorage, object, type, attribute, database file,member, record, and journal
Identify valid IBM i object names
Describe the circumstances under which aqualified object name is required
Match IBM i library types with their descriptions
Identify the library that will contain a newlycreated object
Given the name of an object and a library list,identify the library in which the object will befound
Display and change a job's library list
List the objects in a library
Describe the purpose of the integrated filesystem
Describe how objects from the library filesystem, the document library services filesystem, and the open systems file system arestored within the integrated file system
Specify the root file system name of an objectstored in the library file system
Describe the purpose of a coded character setidentifier (CCSID)
Identify the file systems supported by theintegrated file system
Identify root file system facilities that cannot beused for objects in other file systems
Manta Introduction to the IBM i Environment Technologies Inc. 13
Topic Outline
File Systems
The Root File System
The Library File System
Computer Storage
The Integrated File System
Support for Other File Systems
Audience
The course is intended for anyone who will use anIBM i system. This audience includes managers,programmers, operators, end users, and otherpersonnel.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous course of this series:
Getting Started on IBM i
Related Courses
This course is similar to The Integrated File Systemcourse. While Integrated File System Concepts isintended for the general user, The Integrated FileSystem is designed for system administrators andothers who need to know all of the commands andmenus available for manipulating IFS objects.
Using IBM i Commands
Order Number: UINT03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
The first course of this series, Getting Started onIBM i, covered the basic skills required by all IBM iusers. This course, Using IBM i Commands, goesbeyond the basics to cover the role of jobs,commands, and programs in an IBM i environment.
The course begins by looking at jobs. You will followa typical batch job as it moves through the system.Then, you will see how this process differs for aninteractive job.
The course then addresses IBM i commands,covering the basic rules for command names andthe rules for command formatting. You will see thevarious ways in which you can enter commands, andyou will have the opportunity to practice eachtechnique. You will see how to enter commands in afree-form format, how to use the command promptfacility, and how to use the Command Entry panel.You will also learn how to enter Unix-typecommands using the Qshell command interpreter.
Finally, you will see how frequently used commandscan be put into the form of a CL program or REXXprocedure. The course describes the IBM i programdevelopment process and the programminglanguages used on an IBM i system. During thisdiscussion, it also introduces a unique feature of theIBM i architecture, the technology-independentmachine interface.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Define IBM i work management terms
List the steps performed by the IBM i operatingsystem when running a batch or interactive job
Describe the relationship between IBM i menusand CL commands
Use your knowledge of IBM i command syntaxto match the names of commands with theirfunctions
Identify common ways in which objects can bemanipulated
Manta Introduction to the IBM i Environment Technologies Inc. 14
Predict the result of given object operationswhen performed on a library
Identify improperly coded IBM i commands
Identify the action that IBM i performs when youleave out a required command parameter
Identify the types of access permitted by thevarious IBM i security levels
Use IBM i facilities to display a detaileddescription of a command
Enter IBM i commands using the commandprompt facility
Control the destination of command output
Use IBM i facilities to determine the name of thecommand that performs a given function
Repeat and optionally modify a previouslyentered command
Invoke the Command Entry panel
Start and stop the Qshell command interpreter
Enter Qshell commands
List the steps required to create an executableprogram
Identify differences between IBM i controllanguage (CL) programs and REXX procedures
Describe the difference between the originalprogram model (OPM) development processand the integrated language environment (ILE)development process
Identify differences between Java and traditionalprogramming languages
Describe the purpose of the IBM i technology-independent machine interface
Topic Outline
Jobs
Commands
Entering Commands
Repeating Previous Commands
Using Qshell
Programs
Audience
The course is intended for anyone who will use anIBM i system. This audience includes managers,programmers, operators, end users, and otherpersonnel.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous courses of this series:
Getting Started on IBM i
Integrated File System Concepts
Manta Introduction to the IBM i Environment Technologies Inc. 15
Using Navigator for i
Order Number: UINT06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes IBM Navigator for i. Becausethis product is a browser-based interface to the IBM ioperating system, it is more commonly known as theweb console. If you have used System i Navigator,you will see that the web console provides similarcapabilities. The major difference is that System iNavigator requires special software to be installedon the user's PC, while the web console uses astandard browser.
The course begins with an introduction to the webconsole. You will first see how it differs fromprevious IBM i interfaces. Then, you will see how tostart and stop it.
Basic use of the web console is discussed next. Youwill learn how to use the controls provided by theweb console to locate and invoke individualfunctions. You will also see how to use the webconsole's help facilities.
The course then considers two of the tasks for whichgeneral users most often use Navigator for i. Thecourse first covers accessing IBM i messages.Among other things, you will see how to view themessages that have been sent to you and how tosend a message to another user. More advancedcontrols are also covered, including how to filter andsort the data displayed by the console.
Next, the course shows you how to access theintegrated file system using Navigator for i. You willsee how to create directories and move filesbetween your PC and the IBM i system.
The course ends by describing how to enter IBM icommands using the web console and how to invokethe web console's built-in 5250 terminal emulator.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Start the web console
Close individual web console pages
End a web console session
Navigate the web console window to locate aspecified task
Access the web console help facilities
Select an action for an item in a web consoledisplay
Use web console controls to determine thelayout of a list display
Add a web console page to your list of favorites
Use the web console to perform the followingtasks:
o Work with messages
o Create or remove an IFS directory
o Work with files in IFS directories
o Enter IBM i commands
o Use the built-in 5250 emulator
Topic Outline
Introduction to System i Navigator
Working with Messages
Using System i Navigator for File Access
Working with Connection Definitions
Power Techniques
Audience
This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous courses of this series:
Getting Started on IBM i
Integrated File System Concepts
Using IBM i Commands
Related Courses
This course is identical to course NAVI01.
Manta Introduction to the IBM i Environment Technologies Inc. 16
Introduction to the IBM i EnvironmentCompetency ExamOrder Number: UINT99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up theIntroduction to the IBM i Environment series:
Getting Started on IBM i
Integrated File System Concepts
Using IBM i Commands
Using Navigator for i
The exam is divided into four parts, one for eachcourse in the series. Successfully completing allparts of the exam demonstrates your proficiency inthe basic skills required to use an IBM i system.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the Introduction to the IBM i Environmentseries. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The Introduction to the IBM i Environment series,including this exam, should be taken by anyone whowill be using an IBM i system. This audienceincludes managers, programmers, operators, endusers, and other personnel.
Prerequisites
While this series has no formal prerequisites, aminimal knowledge of computer fundamentals isassumed.
Manta Using Query Manager Technologies Inc. 17
Using Query Manager
Order Number: UUQM01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
If you are like many IBM i users, you frequently needto get information from a Db2 database. Thisrequest for information, or query, can be easilydescribed and run using the IBM Query Managerproduct.
This course begins with an introduction to QueryManager terminology and facilities. It then describeshow to start and end a Query Manager session, andhow to examine and change your Query Managerprofile settings. You will then see how to define andrun queries. Starting with very basic queries, youwill proceed to more advanced queries, such as aquery that generates summary data and a query thatjoins two files. The course ends by describing howto generate a report from the data returned by aquery.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Identify the uses for Query Manager
Use and define Query Manager terminology
Start and end a Query Manager session
Examine and/or modify your Query Managerprofile settings
Define a query that:
o Returns all records and all fields in a file
o Returns records from a file in a specifiedorder
o Returns only selected fields from eachrecord in a file
o Returns only selected records from a file
o Creates a new field that is derived fromexisting fields
o Generates summary data
o Joins two files
Run a query
Define a report form that:
o Changes the format of the data returned bya query
o Specifies column headers for the datareturned by a query
o Uses a control break
o Prints page headers and/or footers
o Prints report headers and/or footers
Topic Outline
Introduction to Query Manager
Query Manager Sessions
Defining and Running a Basic Query
Advanced Querying Capabilities
Creating a Report Form
Audience
This course is intended for anyone interested inusing Query Manager to query a Db2 database.
Prerequisites
This course assumes that you have a basicknowledge of IBM i concepts, terminology, and use.You can satisfy this prerequisite by successfullycompleting the Manta series Introduction to the IBMi Environment.
Reference Materials
A Student Reference Guide is available for thiscourse.
Manta Using Query for i
Technologies Inc. 18
Using Query for i
Order Number: UUQR01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
If you are like many IBM i users, you frequently needto get information from a Db2 database. Thisrequest for information, or query, can be easilydescribed and run using the IBM Query for i product.
This course begins with an introduction to relationaldatabase terminology and Query facilities. You willsee how to access the displays from which youdefine and manipulate queries.
You will then see how to define and run queries.Starting with very basic queries, you will proceed tomore advanced queries, such as a query thatgenerates summary data and a query that joins twofiles. The course ends by describing Query's reportformatting capabilities.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Use and define relational database terminology
Display the Work with Queries display
Define a query that:
o Returns all records and all fields in a file
o Returns records from a file in a specifiedorder
o Returns only selected fields from eachrecord in a file
o Returns only selected records from a file
o Creates a new field that is derived fromexisting fields
o Joins two files
Run a query
Use Query report formatting capabilities to:
o Edit numeric data
o Specify column headings for the datareturned by a query
o Generate a query report that includessummary data
o Create a report that uses control breaks
Specify whether the data returned by a query isdisplayed at your workstation, routed to aprinter, or written to another file
Define the printer and report characteristics fora printed report
Topic Outline
Introduction to Query for i
Defining and Running a Basic Query
Advanced Querying Capabilities
Customizing a Query Report
Audience
This course is intended for anyone interested inusing Query for i to query a Db2 database.
Prerequisites
This course assumes that you have a basicknowledge of IBM i concepts, terminology, and use.You can satisfy this prerequisite by successfullycompleting the Manta series, Introduction to the IBMi Environment.
Reference Materials
A Student Reference Guide is available for thiscourse.
Manta Getting Started with Db2 Web Query Technologies Inc. 19
Getting Started with Db2 Web Query
Order Number: UUWQ01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
If you are like many IBM i users, you frequently needto get information from a Db2 database. Thisrequest for information, or query, can be easilydescribed and run using the IBM Db2 Web Query fori product (more frequently referred to as simply Db2Web Query).
This course begins with an introduction to relationaldatabase terminology and Db2 Web Query facilities.You will see how to access and log into Db2 WebQuery, and how to access the Db2 Web Query helpfacility.
You will then see how to define and run queries.Starting with very basic queries, you will proceed tomore advanced queries, such as a query thatgenerates summary data and a query that joins twofiles.
The course ends by describing Db2 Web Query'sreport formatting capabilities.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Use and define relational database terminology
Log into Db2 Web Query
Create a Db2 Web Query synonym for a Db2 file
Access the Db2 Web Query help facility
Log off Db2 Web Query
Select the fields that are included for eachrecord returned by a query
Select the records that are returned by a query
Return records from a file in a specified order
Run a query
Save a query
Define a query that creates a new field, thecontents of which are derived from existing fields
Define a query that joins two files
Define a query that returns only summary data
Define a query that generates a detail report thatincludes totals and/or subtotals
Create metadata for a Query for i query
Use Db2 Web Query to run a Query for i query
Hide a field in a report
Define your own column headings in a report
Define a report heading and footing for a report
Have Db2 Web Query edit numeric data
Use Report Assistant Report Options to changethe look of a report
Topic Outline
Introduction to Db2 Web Query
Defining and Running a Basic Query
Deriving a New Field from Existing Fields
Joining Records from Two or More Files
Generating Summary Data
Working with Query for i Queries
Enhancing Your Reports
Audience
This course is intended for anyone interested inusing Db2 Web Query to create and run queries.
Prerequisites
This course assumes that you have a basicknowledge of IBM i concepts, terminology, and use.You can satisfy this prerequisite by successfullycompleting the Manta series, Introduction to the IBMi Environment.
Reference Materials
A Student Reference Guide is available for thiscourse.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 20
Fundamentals of IBM i Operations
Order Number: OPER00
Max.Users
FirstYear
SecondYear
Later Years
1 $756 $378 $1905 $1,134 $568 $284
Each add’l $76 $38 $19
Overview
The Fundamentals of IBM i Operations seriesdescribes the job processing environment on anIBM i system and the common tasks performed byan IBM i operator. The series describes how tosubmit batch jobs, monitor and control theirexecution, and manage the printer output theycreate. It also shows how to perform variousmanagement tasks for interactive jobs. Globaloperational tasks, such as managing subsystems,controlling tape devices, and determining jobswaiting for operator intervention, are also covered.
This series contains the following courses:
Work Management Concepts
Submitting and Managing Batch Jobs
Controlling Printer Output
Controlling Users, Queues, Printers, and Subsystems
Monitoring an IBM i system
Using Tapes
Fundamentals of IBM i Operations Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 10-14 hours
Audience
This series should be taken by anyone who will beusing IBM i work management facilities. Thisaudience includes users who submit and monitorthe execution of their own batch jobs, users whocontrol the printing of their output, and operatorswho are responsible for monitoring and controllingjob processing.
Prerequisites
All courses in this series assume that you canperform basic IBM i operations. In particular, you
should know how to sign on the system anddisplay the Operational Assistant Menu. Inaddition, you should know how to start System iNavigator from a PC.
You can satisfy this prerequisite by successfullycompleting the courses from the Introduction tothe IBM i Environment series. If you feel youalready have the necessary skills, you can verifyyour belief by successfully completing theCompetency Exam for this series.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 21
Work Management Concepts
Order Number: OPER01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the concepts you must befamiliar with in order to submit and monitor jobs onan IBM i system.
The course begins by discussing interactive jobs.These are the sessions that are started whenusers sign on the system. It then describes howbatch jobs are executed in the system. Next, thecourse considers the role three components of theIBM i system — subsystems, job descriptions, andjob queues — play in the processing of batch jobs.The course then discusses spooling, the processused to store printer output, and describes howspooled output is managed by the IBM i system.The course ends by illustrating the flow of aninteractive job and a batch job through the system.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Name the types of IBM i jobs and identify howeach is begun
Name the IBM i objects used to support jobprocessing, and identify the functionsperformed by each
Name the IBM i components used to managethe output created by jobs, and identify thefunctions performed by each
List the steps performed by the IBM i operatingsystem when running a batch or interactive job
Topic Outline
Job Types
Subsystems and Job Descriptions
Job Queues
Spooled Files and Output Queues
Job Flow
Audience
This course is intended for anyone who will beusing IBM i work management facilities. Thisaudience includes users who submit and monitorthe execution of their own batch jobs, users whocontrol the printing of their output, and operatorswho are responsible for monitoring and controllingjob processing. The course is also recommendedfor anyone who wants to learn how work ismanaged on an IBM i system.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 22
Submitting and Managing Batch Jobs
Order Number: OPER02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
The previous course in this series, WorkManagement Concepts, introduced job processingconcepts. It described how a submitted job isplaced in a job queue where it is selected forexecution. This course, Submitting and ManagingBatch Jobs, shows you how to submit batch jobsand control their execution.
The course begins by describing how to submit abatch job. It then describes the Work with UserJobs display used to manage batch jobs. Adiscussion of how to interpret this display and howto use it to hold, release, or delete jobs is next.The course ends by showing how to changecertain attributes of a job.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Submit a batch job
Have a job executed automatically based on apredefined schedule
Display the status of a batch job
Hold, release, or cancel a job
Change the priority of a job in a job queue
Move a job from one job queue to another
Topic Outline
Executing Batch Jobs
Displaying Job Status
Holding, Releasing, and Canceling Jobs
Changing a Job
Audience
This course is intended for anyone who isresponsible for monitoring and controlling jobprocessing on an IBM i system. It should also betaken by users who submit and monitor theexecution of their own batch jobs.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i facilities. In particular,you should know how to sign on the system anddisplay the Operational Assistant Menu. You cansatisfy this prerequisite by successfully completingthe courses from the Introduction to the IBM iEnvironment series.
In addition, you should have an understanding ofIBM i work management concepts. You can satisfythis prerequisite by successfully completing thefirst course of this series, Work ManagementConcepts.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 23
Controlling Printer Output
Order Number: OPER03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course discusses how to manage and controlthe printer output created by IBM i jobs.
The course begins by describing how to invokeIBM i displays to see the spooled files in thesystem. It then describes the various operationsthat can be performed from these displays. Thecourse covers how to examine the contents of aspooled file, how to hold and release a spooled file,how to delete a spooled file from an output queue,how to change the attributes of a spooled file, andhow to send a spooled file to another user. Inaddition, you will see how to examine and respondto messages sent by the printer writer, and how toreceive more detailed information on the status ofa spooled file.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Display the spooled files currently in thesystem
Examine the contents of a spooled file
Hold, release, or delete a spooled file
Examine and respond to printer messages
Display detailed information about the status ofa spooled file
Change the attributes of a spooled file
Send a spooled file to a user on anothersystem
Topic Outline
Displaying Spooled Files
Holding, Releasing, and Deleting SpooledFiles
Learning More About the Status of a SpooledFile
Changing Spooled File Attributes
Sending a Spooled File to Another User
Audience
This course is intended for anyone who isresponsible for monitoring and controlling jobprocessing on an IBM i system. It should also betaken by users who control the printing of thespooled files produced by their own jobs.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i facilities. In particular,you should know how to sign on the system anddisplay the Operational Assistant Menu. You cansatisfy this prerequisite by successfully completingthe courses from the Introduction to the IBM iEnvironment series.
In addition, you should have an understanding ofIBM i work management concepts. You can satisfythis prerequisite by successfully completing thefirst course of this series, Work ManagementConcepts.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 24
Controlling Users, Queues, Printers,and Subsystems
Order Number: OPER04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Previous courses of the Fundamentals of IBM iOperations series have described tasks that mightbe performed by any user who submits batch jobsand controls job output. This course describesadditional work management tasks that aretypically reserved for the IBM i operator.
The course begins by describing how to manageinteractive jobs, the sessions in which systemusers are involved. You will see how to invoke theWork with Signed-On Users display, which is a listof all signed-on users. Various ways to manipulatethe list — such as sorting it on different fields andchanging the information displayed for each user— are described. The course then describesseveral operations that can be performed from thisdisplay. You will see how to send a message to auser or group of users and how to sign a user offthe system.
Next, the course describes how to manage jobqueues. You will see how to display informationabout the job queues in your system and how tohold and release job queues. The course showshow to display detailed information about a job inthe system, and explains how to view the job logfor a job.
Printer writers are considered next: how to start aprinter writer, stop a printer writer, respond toprinter writer messages, and hold and release aprinter. You will also see how assign a printerwriter to a different output queue. Finally, thecourse describes how to start and stop asubsystem.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Display a list of all signed-on users, usingavailable functions to control the order andcontents of the list
Locate a specified user in the Work withSigned-On Users display
Display additional information about aspecified user or job, including the jobdescription, run attributes, and job log
Send a message to a single user, a group ofusers, or all users
Sign a user off the system
Display a list of the job queues and theirstatus
Display the contents of a job queue
Hold, release, or clear a job queue
Display detailed information about a job
Start or stop a writer
Respond to writer messages
Display detailed status information about awriter
Display the output queue associated with awriter
Assign a writer to a specific output queue
Start and stop a subsystem
Topic Outline
Displaying Signed-On Users
Managing Signed-On Users
Managing Job Queues
Displaying Job Information
Managing Printers and Writers
Starting and Stopping Subsystems
Audience
This course is intended for anyone who isresponsible for monitoring and controlling jobprocessing on an IBM i system.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i facilities. In particular,you should know how to sign on the system anddisplay the Operational Assistant Menu. You cansatisfy this prerequisite by successfully completingthe courses from the Introduction to the IBM iEnvironment series.
In addition, you should have an understanding ofIBM i work management concepts and facilities.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:
Work Management Concepts
Submitting and Managing Batch Jobs
Controlling Printer Output
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 25
Monitoring an IBM i System
Order Number: OPER05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
As the central operator of an IBM i system, youshould periodically check how the system isrunning. This course describes the tools availableto you for examining the system's status and whatyou should look for to spot potential problems.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Identify the IBM i displays that you should useto check on jobs, output, printers, devices,communications, and system status
Specify what operator intervention, if any, isrequired when given a system display ormessage
Display and respond to messages directed tothe system operator
Locate additional information about an errormessage
Display the system history log
Topic Outline
Why Monitoring the System is Important
Checking the System Status
Checking on Jobs
Checking on Output
Checking Devices
Checking for Messages
Checking the System Clock
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses fromfollowing Manta series:
The Introduction to the IBM i Environmentseries
In addition, you should have completed theprevious courses of this series:
Work Management Concepts
Submitting and Managing Batch Jobs
Controlling Printer Output
Controlling Users, Queues, Printers, and Subsystems
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 26
Using Tapes
Order Number: OPER06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the operational procedures forhandling and maintaining tape volumes on an IBM isystem.
The course begins by describing the terms andconcepts associated with magnetic tape volumesand devices. You will see how data is recorded ona tape and the purpose of tape labels. The coursethen discusses the proper handling of tapevolumes and how you should respond to commontape messages.
Next, the course covers the IBM i commands anddisplays used to work with tape volumes anddevices. You will see how to create a backup of anIBM i library, display and change the status of atape device, initialize tapes, copy tapes, andperform other tape-related tasks.
Finally, the course covers how to display or printtape information, including the contents of tapelabels and the data recorded on a tape.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Define tape-related terms, including block,inter-block gap, read/write head, label, andtape mark
Describe the format of a standard-labeled tape
Identify the contents of volume and file labels
Identify the proper procedures for handlingtape reels and cartridges
Identify the IBM i command to perform a giventape
Identify the purpose of the write-protect tab ontape cartridges and the write-enable ring ontape reels, and determine whether a given reelor cartridge can be used for output
Create a backup of an IBM i library
Properly respond to tape-related messages
Verify that a tape device is operating properly
Display the status of a tape device
Vary a tape device online or offline
Initialize one tape or a series of tapes
Display tape labels
Print the contents of a tape
Make a copy of a tape
Topic Outline
Tape Concepts
Tape Handling
Controlling the Status of Tape Devices
Initializing Tapes
Displaying Tape Information
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses fromfollowing series:
The Introduction to the IBM i Environmentseries
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 27
Fundamentals of IBM i Operations Competency ExamOrder Number: OPER99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up theFundamentals of IBM i Operations series:
Work Management Concepts
Submitting and Managing Batch Jobs
Controlling Printer Output
Controlling Users, Queues, Printers, and Subsystems
Monitoring an IBM i system
Using Tapes
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the operational skills required to control jobs inan IBM i system.
Approximate time to complete all parts of the exam: 60-90 minutes
Recommended Uses
This Competency Exam was designed as amastery test for the Fundamentals of IBM iOperations series. We recommend that you takethe exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.
Evaluation
The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.
Audience
The Fundamentals of IBM i Operations series,including this exam, should be taken anyone whowill be using IBM i work management facilities.This audience includes users who submit andmonitor the execution of their own batch jobs,users who control the printing of their output, andoperators who are responsible for monitoring andcontrolling job processing.
Prerequisites
All courses in this series assume that you canperform basic IBM i operations. In particular, youshould know how to sign on the system anddisplay the Operational Assistant Menu. Inaddition, you should know how to start System iNavigator from a PC.
You can satisfy this prerequisite by successfullycompleting the courses from the Introduction tothe IBM i Environment series. If you feel youalready have the necessary skills, you can verifyyour belief by successfully completing theCompetency Exam for this series.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 28
Fundamentals of Operations Using Navigator for i
Order Number: ONAV00
Max.Users
FirstYear
SecondYear
Later Years
1 $432 $216 $1085 $648 $324 $162
Each add’l $44 $22 $11
Overview
The Fundamentals of Operations UsingNavigator for i series describes the job processingenvironment on an IBM i system and the commontasks performed by an IBM i operator. The seriesdescribes how to submit batch jobs, monitor andcontrol their execution, and manage the printeroutput they create. It also shows how to performvarious management tasks for interactive jobs.Global operational tasks, such as managingsubsystems, controlling devices, and determiningjobs waiting for operator intervention, are alsocovered.
Rather than using the green-screen, text-basedinterface (as does the Manta series Fundamentalsof IBM i Operations), this series covers how toperform all tasks using IBM Navigator for i (alsoknown as the web console), a browser-basedinterface to the IBM i operating system.
This series contains the following courses:
Work Management Concepts
Basic Operations Using Navigator for i
Work Management Using Navigator for i
Tape Management Using Navigator for i
Fundamentals of Operations Using Navigatorfor i Competency Exam
Approximate Study Time for the Entire Series: 8-12 hours
Audience
This series should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.
The first two courses are also recommended forprogrammers and users who submit and monitorthe execution of their own batch jobs and/or whocontrol the printing of their output.
Prerequisites
This series assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series. If you feel you alreadyhave the necessary skills, you can verify yourbelief by successfully completing the CompetencyExam for that series.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 29
Work Management Concepts
Order Number: ONAV01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the concepts you must befamiliar with in order to submit and monitor jobs onan IBM i system.
The course begins by discussing interactive jobs.These are the sessions that are started whenusers sign on the system. It then describes howbatch jobs are executed in the system. Next, thecourse considers the role three components of theIBM i system — subsystems, job descriptions, andjob queues — play in the processing of batch jobs.The course then discusses spooling, the processused to store printer output, and describes howspooled output is managed by the IBM i system.The course ends by illustrating the flow of aninteractive job and a batch job through the system.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Name the types of IBM i jobs and identify howeach is begun
Name the IBM i objects used to support jobprocessing, and identify the functionsperformed by each
Name the IBM i components used to managethe output created by jobs, and identify thefunctions performed by each
List the steps performed by the IBM i operatingsystem when running a batch or interactive job
Topic Outline
Job Types
Subsystems and Job Descriptions
Job Queues
Spooled Files and Output Queues
Job Flow
Audience
This course is intended for anyone who will beusing IBM i work management facilities. Thisaudience includes users who submit and monitorthe execution of their own batch jobs, users whocontrol the printing of their output, and operatorswho are responsible for monitoring and controllingjob processing. The course is also recommendedfor anyone who wants to learn how work ismanaged on an IBM i system.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 30
Basic Operations Using Navigator for i
Order Number: ONAV02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to use Navigator for i toperform basic IBM i operator tasks. The coursebegins by expanding upon topics that wereintroduced in Using Navigator for i. You will firstsee how to use the Run Command function tosubmit batch jobs and how to view and sendmessages as the system operator.
You will then see how to manage batch jobs thatyou submit for execution. Tasks covered includeholding, releasing, and deleting jobs, changing thepriority of a job, and displaying detailed informationabout a job. You will then see how to performthese tasks for other types of jobs and jobsbelonging to other users.
Navigator facilities for managing spooled files arecovered next. You will see how hold, release, view,and delete spooled files, change their attributes,display spooled files in PDF format, and sendspooled files to users on other systems. Finally, thecourse covers the Navigator for i functions formanaging printers and their associated printerwriters.
Approximate Study Time: 2 hours
Objectives
After completing this topic, you should be able touse Navigator for i to perform the following tasks:
Submit a batch job
Display and respond to messages directed tothe system operator
Send a message to a single user, a group ofusers, or all users
Display the system history log
Display the status of a job
Hold, release, or delete a job
Reply to a job-related message
Move a batch job from one job queue toanother
Display detailed information about a job
Change the priority of a job in a job queue
Select the columns shown in the User Jobsdisplay
Tailor the User Jobs display to show all batchjobs, all interactive jobs, or all jobs
Filter the User Jobs display to locate aspecified job
Sign an interactive user off the system
Display the spooled files currently in thesystem
Examine the contents of a spooled file
Hold, release, or delete a spooled file
Display or change the properties of a spooledfile
Move a spooled file to another output queue
Cause a spooled file to print next
Examine and respond to printer messages
Send a spooled file to a user on anothersystem
Display the spooled files waiting to print on aspecified printer
Determine the status of a printer
Start, stop, or restart a printer writer
Hold or release a printer writer
Respond to writer messages
Change the description of a printer device
Display or change the output queue associatedwith a writer
Vary a printer device online or offline
Topic Outline
Using Navigator for System Operation
Controlling Batch Jobs
Controlling Other Jobs
Controlling Printer Output
Managing Printers and Writers
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 31
Audience
This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.
It is also recommended for programmers and userswho submit and monitor the execution of their ownbatch jobs and/or who control the printing of theiroutput.
Prerequisites
This course assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series and the previous courseof this series, Work Management Concepts.
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 32
Work ManagementUsing Navigator for i
Order Number: ONAV03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to use Navigator for i toperform common IBM i operator tasks involvingwork management. The course begins by showingyou how to control job and output queues. You willsee how to hold, release, and clear these queuesand display their properties. Controllingsubsystems is covered next, including how to startand stop a subsystem, display its properties, andview the job queues and memory pools it isassigned.
The course then describes Navigator for i facilitiesfor monitoring your system. First you will see howto display execution statistics for a job, including itsCPU usage. Then you will see how to displaydetailed system status information, including theweb console dashboard.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Display the contents of a job or an outputqueue
Hold, release, or clear a job or an outputqueue
Display the properties of a job or an outputqueue
Display a list of the writers using an outputqueue
Display a list of the subsystems and theirstatus
Display a list of the jobs running in asubsystem
Display the properties of a subsystem
Display a list of the job queues associated witha subsystem
Start and stop a subsystem
Display detailed information and performancestatistics about active jobs
Determine the allocation of system memorypools and list the job or subsystems usingeach pool
Identify the purpose of each system memorypool
Display comprehensive system statusinformation
Examine the status of the disk devicesattached to your system
Display a chart showing basic health indicatorsfor key system resources
Topic Outline
Managing Job Queues
Managing Output Queues
Controlling Subsystems
Displaying Job Information
Displaying Memory Pool Information
Displaying System Status Information
Audience
This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.
Prerequisites
This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series.You should have also completed the previouscourses of this series:
Work Management Concepts
Basic Operations Using Navigator for i
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 33
Tape ManagementUsing Navigator for i
Order Number: ONAV04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the operational procedures forhandling and maintaining tape volumes anddevices on an IBM i system. This discussionincludes both physical tape volumes and virtualtape volumes that are stored on disk.
The course begins by describing the terms andconcepts associated with magnetic tape volumesand devices. You will see how data is recorded ona tape and the purpose of tape labels. The coursethen introduces virtual tape volumes, imagecatalogs, and virtual devices.
Next, the course covers the IBM Navigator for itasks used to work with physical and virtual tapevolumes and devices. You will see how to displayand change the status of a tape device, respond totape-related messages, and initialize a tapevolume.
Finally, the course covers how to display or printtape information, including the contents of tapelabels and the data recorded on a tape. You willalso see how to duplicate a tape volume.
Approximate Study Time: 3-4 hours
Objectives
After completing this course, you should be able to:
Define tape-related terms, including block,inter-block gap, read/write head, label, andtape mark
Describe the format of a standard-labeled tape
Identify the contents of volume and file labels
Describe the purpose of the write-protect tabor knob on a tape cartridge
Identify the proper procedures for handlingtape cartridges
Define terms relating to virtual media, includingvirtual volume, image catalog,and virtualdevice
Describe the procedures for creating and usingvirtual tapes
Identify applications for virtual tapes
Display the status of a tape device
Vary a tape device online or offline
Reset a tape device
Identify the job that is currently using a tapedevice
Display a tape device's properties
Load or unload an image catalog in a virtualdevice
Mount, load, or unload a specified virtualvolume
Write-protect a virtual volume
Delete a virtual volume or a complete imagecatalog
List all image catalogs or the volumes in aparticular catalog
Respond properly to tape volume- and tapedevice-related message
Initialize a tape volume
Display tape labels
Print the contents of a tape
Duplicate a tape
Topic Outline
Tape Concepts
Virtual Tapes
Working with Tape Devices
Managing Virtual Tape Volumes and ImageCatalogs
Responding to Tape Messages
Displaying Tape Information
Audience
This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.
Prerequisites
This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series.You should have also completed the previouscourses of this series:
Work Management Concepts
Basic Operations Using Navigator for i
Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 34
Fundamentals of Operations Using Navigator for i Competency ExamOrder Number: ONAV99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up theFundamentals of Operations Using Navigatorfor i series:
Using Navigator for i
Basic Operations Using Navigator for i
Work Management Using Navigator for i
Tape Management Using Navigator for i
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to use System i Navigator.
Approximate time to complete all parts of the exam: 90 minutes
Recommended Uses
This Competency Exam was designed as amastery test for the Fundamentals ofOperations Using Navigator for i series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.
Evaluation
The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.
Audience
The Fundamentals of Operations UsingNavigator for i series, including this exam, shouldbe taken by the person responsible for theoperation of an IBM i system. This person may bea dedicated operator, a system administrator, or adesignated user.
The first two courses and their exams are alsorecommended for programmers and users whosubmit and monitor the execution of their ownbatch jobs and/or who control the printing of theiroutput.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.
Manta IBM i System Management Technologies Inc. 35
IBM i System ManagementOrder Number: OSYS00
Max.Users
FirstYear
SecondYear
Later Years
1 $972 $486 $2445 $1,458 $729 $366
Each add’l $97 $49 $24
Overview
The IBM i System Management series isdesigned for the person responsible for the day-to-day operation of an IBM i system. It covers thosetasks relating to the overall management of thesystem.
This series contains the following courses:
Starting and Stopping the System
Managing Devices
Backing Up Your System
Checking Storage Utilization
Cleaning Up System Storage
Software Maintenance
Using Virtual Media
Handling Problems
System Management Using System i Navigator
IBM i System Management Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 14-18 hours
Audience
This series should be taken by any personresponsible for the physical operation of an IBM isystem. This person may be a system operator, adesignated user, or a system administrator.
While most of the tasks described in this series canbe performed by any system operator (someonewith a user class of *SYSOPR), some tasks can beperformed only by personnel with a user class of*SECADM or *SECOFR.
Prerequisites
All courses in this series assume that you canperform basic IBM i operations. You can satisfythis prerequisite by successfully completing thecourses from the following Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
If you feel you already have the necessary skills,you can verify your belief by successfullycompleting the Competency Exams for theseseries.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta IBM i System Management Technologies Inc. 36
Starting and Stopping the System
Order Number: OSYS01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the operational procedures forstarting and stopping an IBM i system. You willlearn how to perform both manual (assisted) andautomatic (unassisted) IPLs. You will also learnhow to tell the system to power itself on and off atspecified times.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Describe the major events that take placeduring a system initial program load (IPL)operation
Perform an unattended IPL, an attended IPL,a remote IPL, or a timed IPL and describewhen each should be used
Change IPL options under the direction ofyour system administrator
Power off the system using a systemcommand, the system control panel powerswitch, or an emergency power switch
Restart an active system
Define an automatic power on and power offschedule
Topic Outline
The IPL Process
The System Control Panel
Performing an Unattended IPL
Performing an Attended IPL
Shutting Down or Restarting the System
Setting Up an Automatic Power On and OffSchedule
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator, a system administrator, or a designateduser.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
Manta IBM i System Management Technologies Inc. 37
Managing Devices
Order Number: OSYS02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the operational proceduresfor creating, changing, and deleting the IBM iconfiguration objects that describe devices, lines,and controllers.
The course begins by describing the relationshipbetween devices, lines, controllers, and theircorresponding configuration objects. It thenreviews how to display, interpret, and change thestatus of these objects on an IBM i system.
The course then shows how to display deviceattributes and how to modify or rename existingconfiguration objects. Procedures for adding newdevices are covered next. As you will see, thereare two different techniques for adding a newdevice. You can have the system create thenecessary configuration objects automatically, oryou can create these objects manually.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should beable to:
Determine the current status of a device
Determine the controller to which a device isattached
Display a list of all devices attached to acontroller and a list of all controllers attachedto a line
Vary a device or controller online or offline
Reset the corresponding I/O processor whenvarying a device or controller online
Change the name or text description of aconfiguration object
Display the details of a device or controllerdescription
Print a chart showing a system's deviceconfiguration
Enable and disable the system's automaticconfiguration features
Identify the configuration object required todefine a specified device
Create, change, or delete a configurationobject under the direction of your systemadministrator
Topic Outline
Introduction to Configuration Objects
Changing the Status of Configuration Objects
Modifying Configuration Objects
Using Automatic Configuration
Creating Configuration Objects
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator, a system administrator, or a designateduser.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
Manta IBM i System Management Technologies Inc. 38
Backing Up Your System
Order Number: OSYS03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the basic operationalprocedures for backing up an IBM i system andrestoring objects after a failure. The course beginsby describing the save and restore operations thatare supported by IBM i and suggests strategies fordeveloping a backup plan. The backup strategyimplemented by the IBM i Operational Assistant isdescribed in detail. You will see how to set upautomatic backups and how to tailor the backupplan to meet your installation's requirements. Thecourse then shows you how to perform backupoperations to cover situations that are notperformed automatically. Finally, you will see howto restore a damaged library and its objects.
Approximate Study Time: 120 minutes
Objectives
After completing this course, you should be able to:
Identify the IBM i commands used to save orrecover specified types of objects
Describe the advantages and disadvantagesof various backup strategies
Describe the backup strategy that is providedby the IBM i Operational Assistant
Identify and initialize the tapes needed tosupport a given backup plan
Set up a schedule to perform daily, weekly,and monthly backups automatically
Set automatic backup parameters to controlthe objects that are copied during a daily,weekly, or monthly backup operation
Modify the library and folder lists that are usedby the automatic backup facility
Print the automatic backup schedule
Back up IBM-supplied objects or the entiresystem
Initiate an unscheduled backup run
Determine the tape that contains the mostrecent copy of an object
Restore a damaged library from a backuptape
Restore changed objects into a library
Topic Outline
Save and Restore Operations
Preparing a Backup Plan
Preparing the Backup Tapes
Setting Up Automatic Backups
Changing the Library and Folder Lists
Special Backup Operations
Restoring Libraries and Objects
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a senioroperator or a system administrator.
To perform all of the tasks described in this courseon a real IBM i system, your user profile mustspecify a user class of *SECADM and you musthave *SAVSYS authority.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy theseprerequisite by successfully completing thecourses from the following Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
Although not absolutely required, we recommendthat you take the previous courses of this seriesbefore you start this one:
Starting and Stopping the System
Managing Devices
Manta IBM i System Management Technologies Inc. 39
Checking Storage Utilization
Order Number: OSYS04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
One aspect of managing an IBM i system ischecking on how system storage is being used.This course describes the operational proceduresfor collecting disk storage utilization data andprinting this information in a variety of usefulreports. The discussion includes techniques forspotting and responding to potential storageproblems.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Describe the tools provided by IBM i to helpyou determine how storage is being used onyour system
Schedule a weekly or monthly batch job tocollect disk space utilization data
Identify the disk space utilization report thatprovides the information you need to respondto a suspected space problem
Use IBM i facilities to generate a disk spaceutilization report that satisfies specifiedinformation requirements
Topic Outline
The Need for Storage Management
Collecting Disk Space Utilization Data
Printing Disk Space Utilization Reports
Selecting a Report Type
Audience
This course should be taken by the personresponsible for managing the disk storage of anIBM i system. This person may be a senioroperator or a system administrator.
To perform the tasks described in this course on areal IBM i system, your user profile must specify auser class of *SECOFR and you must have*ALLOBJ authority.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy theseprerequisite by successfully completing thecourses from the following Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
Manta IBM i System Management Technologies Inc. 40
Cleaning Up System Storage
Order Number: OSYS05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the operational proceduresfor cleaning up the storage of an IBM i system.The discussion is divided into four major parts.After describing the need for installation standardsregarding storage use, the course describes thetasks that can be performed by each user to assistin system cleanup. It then describes how you candelete unneeded objects by scheduling IBM i'sautomatic cleanup facility. Finally, the coursedescribes additional techniques that you can use tominimize the amount of storage that is not beingput to active use.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Identify tasks that can be performed by eachuser to assist in system cleanup
Identify the IBM i commands available to auser to manage his or her use of systemstorage
Set up a schedule to have the system performcleanup tasks automatically
Initiate a system cleanup operation when anautomatic schedule has not been established
Identify the events that take place duringautomatic system cleanup
Identify tasks that can be performed by thesystem administrator to reclaim systemstorage
Determine whether an IPL should beperformed to help relieve a storage or addressshortage
Clear a message queue to reset its size backto its original value
Recover storage that is currently unavailable
Topic Outline
Establishing System Cleanup Standards
Cleaning Up User Objects
Performing Automatic Cleanup
Other Cleanup Tasks
Audience
This course should be taken by the personresponsible for managing the disk storage of anIBM i system. This person may be a senioroperator or a system administrator.
To perform the tasks described in this course on areal IBM i system, your user profile must specify auser class of *SECADM or *SECOFR and youmust have *ALLOBJ authority.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy theseprerequisite by successfully completing thecourses from the following Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
Although not absolutely required, we recommendthat you take the previous courses of this seriesbefore you start this one:
Starting and Stopping an IBM i System
Managing Devices
Backing Up Your System
Checking Storage Utilization
Manta IBM i System Management Technologies Inc. 41
Software Maintenance
Order Number: OSYS06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the maintenance of systemsoftware, particularly the IBM i operating systemand the IBM i Licensed Internal Code.
The course first discusses the procedures fordetermining the current release levels of installedprogram products. The remainder of the coursecovers the procedures for handling programtemporary fixes (PTFs).
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Determine the current release level ofinstalled program products
Define terms that relate to the management ofPTFs
Determine which version of the LicensedInternal Code is currently in use and which willbe used for the next IPL
Display and interpret the status of a PTF
Order a PTF, a cumulative PTF package, aPTF summary, or PSP information
Print and interpret a PTF cover letter
Install a PTF package
Verify that the application of a PTF wassuccessful
Permanently apply a PTF that was appliedtemporarily
Topic Outline
Identifying System Software
PTF Concepts
Ordering PTFs
Preparing for PTF Installation
Installing PTFs
Audience
This course should be taken by the personresponsible for managing the software installed onan IBM i system. This person may be a senioroperator or a system administrator.
To perform the tasks described in this course on areal IBM i system, your user profile must specify asecurity officer (*SECOFR) user class.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
Although not absolutely required, we alsorecommend that you take the previous courses ofthis series before you start this one:
Starting and Stopping the System
Managing Devices
Backing Up Your System
Checking Storage Utilization
Cleaning Up System Storage
Manta IBM i System Management Technologies Inc. 42
Using Virtual Media
Order Number: OSYS09
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Virtual media, including virtual tape volumes andvirtual optical volumes, are IBM i objects thatreside in system storage. Nevertheless, theybehave exactly like their physical counterparts,tape cartridges and CD/DVD platters. This coursebegins by explaining virtual media concepts anddiscussing common applications for virtual tapeand virtual optical volumes.
The course then covers the commands used to setup virtual media. As you will see, this involvescreating virtual tape devices, virtual opticaldevices, and image catalogs. You will see how tocopy data from a physical volume to a virtualvolume and how to create and initialize blankvirtual tapes. You will also see how to load avirtual image catalog into a virtual device for use.
Catalog shadowing is covered next. This is amethod for sharing virtual images among morethat one virtual device. As a result, multipleprograms can use the same image catalog orvirtual volume at the same time.
The course then describes the remainingcommands for working with image catalogs andvirtual volumes. The course ends with adiscussion of errors that are commonlyencountered when using virtual media, how toavoid them, and how to respond when avoidanceis not possible.
Approximate Study Time: 2 hours
Objectives
After completing this topic, you should be able touse System i Navigator to perform the followingtasks:
Define virtual media terms
Describe the procedures for creating and usingvirtual media
Identify applications for virtual tape and opticalvolumes
Create virtual tape and optical devices
Display the status of virtual devices
Create an image catalog
Add a virtual tape or virtual optical volume toan image catalog
Load or unload an image catalog in a virtualdevice
Mount, load, or unload a specified virtualvolume
Identify the advantages and limitations of usingdependent image catalogs
Create a dependent catalog
Display a menu of all image catalogcommands
Match image catalog commands with theirfunctions
Write-protect a virtual volume
Release unused space from virtual tapevolumes
Delete a virtual volume or a complete imagecatalog
Verify that an optical image catalog containsvalid upgrade or PTF images
List all image catalogs or the volumes in aparticular catalog
Identify the causes of common virtual mediaand device errors, the best way to respond tothem, and steps you can take to avoid them
Manta IBM i System Management Technologies Inc. 43
Topic Outline
Virtual Media Concepts and Applications
Creating Virtual Devices
Creating Image Catalogs
Catalog Shadowing
Working with Image Catalogs
Handling Errors
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a senioroperator or a system administrator.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operations series
This course also assumes that you are familiar withbasic IBM i system management, including devicemanagement, taking backups, and applying PTFs.You can satisfy this prerequisite by successfullycompleting previous courses of this series.
Managing Devices
Backing Up Your System
Software Maintenance
An understanding of logical partitioning is alsorecommended, but not absolutely required. Youcan satisfy this prerequisite by successfullycompleting either of the following Manta courses:
PowerVM Concepts
Introduction to Logical Partitioning
Handling Problems
Order Number: OSYS07
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces the operator to the topic ofIBM i problem management. It describes andexpands upon the detailed problem-analysisprocedure that is recommended by IBM.
The course begins with a description of the toolsand information sources available to help youdiagnose a system-related problem. It then detailsthe procedures for displaying message information,performing automatic problem analysis, andworking with entries in the problem log. Finally, thecourse covers the procedures for displayingSystem Reference Codes.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Identify the ways in which IBM i may notifyyou of a problem it detected
Identify the tools and sources of informationavailable to you when diagnosing a systemproblem
Display all available information about aproblem reported in a message
Recognize messages for which additionalproblem analysis is available
Initiate problem analysis from the DisplayMessage panel, from the Work with Problemspanel, or with the Analyze Problem command
Create a problem record when problemanalysis is not available
Interpret the status of a problem record
Invoke the Work with Problems panel and useit to display the status and history of aproblem
Transmit a problem report to the IBM servicesupport center
Query IBM about the status of a reportedproblem
Mark a problem record as verified or closed
Display the current settings of the systemservice attributes
Manta IBM i System Management Technologies Inc. 44
Determine whether a System Reference Codehas been displayed
Topic Outline
Problem-Solving Tools
Handling System Problems
Automatic Problem Analysis
Working with Problems
Service Attributes
System Reference Codes
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator, a system administrator, or a designateduser.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
Although not absolutely required, we alsorecommend that you take the previous courses ofthis series before you start this one:
Starting and Stopping the System
Managing Devices
Backing Up Your System
Checking Storage Utilization
Cleaning Up System Storage
Software Maintenance
System ManagementUsing System i Navigator
Order Number: OSYS08
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to use System i Navigatorto perform common IBM i system managementtasks.
The course begins by showing you how to restartan IBM i system and how to specify restart options.The course then describes how to manage thedevices attached to your system. You will see howto determine the current status of a device andhow to display a list of all of your system'shardware resources. The course then describeshow to work with system software. You will seehow to display a list of the installed software onyour system and how to determine the currentrelease level of installed program products.
Next, the course covers how to back up yoursystem. Specifically, you will see how to set up aschedule to perform daily, weekly, and monthlybackups automatically, how to modify the libraryand folder lists that are used by the automaticbackup facility, and how to initialize the tapesneeded for a backup operation.
The course then covers system values. You willsee how to both display and change the currentsetting of a system value. Finally, the coursecovers using virtual media. Specifically, you willsee how to manage virtual tape devices, virtualtape volumes, and their image catalogs.
Approximate Study Time: 90 minutes
Manta IBM i System Management Technologies Inc. 45
Objectives
After completing this topic, you should be able touse System i Navigator to perform the followingtasks:
Restart an IBM i system
Specify restart options
Determine the current status of a device
Display a list of your system's hardwareresources
Determine the current release level of installedIBM i program products
Set up a schedule to perform daily, weekly,and monthly backups automatically
Modify the library and folder lists that are usedby the automatic backup facility
Initialize the tapes needed for a backupoperation
Display the current setting of a system value
Change the setting of a system value
Create a virtual tape device
Create an image catalog
Add a virtual tape volume to an image catalog
Load or unload an image catalog in a virtualtape device
Mount, load, or unload a specified virtualvolume
Change the attributes of a virtual tape volume
Delete a virtual tape volume or a completeimage catalog
List all tape image catalogs or the volumes in aparticular catalog
Topic Outline
Restarting the System
Managing Devices
Working with System Software
Backing Up Your System
Working with System Values
Working with Virtual Tapes
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicated
operator, a system administrator, or a designateduser.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operations series
This course also assumes that you are familiar withbasic IBM i system management. You can satisfythis prerequisite by successfully completingprevious courses of this series.
Starting and Stopping the System
Managing Devices
Backing Up Your System
Software Maintenance
Using Virtual Media
Related Courses
This course is identical to course INAV03.
Manta IBM i System Management Technologies Inc. 46
IBM i System Management Competency ExamOrder Number: OSYS99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the IBM iSystem Management series:
Starting and Stopping the System
Managing Devices
Backing Up Your System
Checking Storage Utilization
Cleaning Up System Storage
Software Maintenance
Using Virtual Media
Handling Problems
System Management Using System iNavigator
The exam is divided into separate parts, one foreach course in the IBM i System Managementseries. Successfully completing all parts of theexam demonstrates your proficiency in theoperational skills required to manage an IBM isystem.
Approximate time to complete all parts of the exam: 150 minutes
Recommended Uses
This Competency Exam was designed as amastery test for the IBM i System Managementseries. We recommend that you take the examafter you complete the series. Alternatively, youcan take the corresponding portion of the examwhen you complete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.
Evaluation
The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.
Audience
The IBM i System Management series, includingthis exam, should be taken by any personresponsible for the physical operation of thecomputer system. This person may be a systemoperator, a designated user, or a systemadministrator.
While most of the tasks described in this series canbe performed by any system operator (someonewith a user class of *SYSOPR), some tasks can beperformed only by personnel with a user class of*SECADM or *SECOFR.
Prerequisites
All courses in this series assume that you canperform basic IBM i operations. You can satisfythis prerequisite by successfully completing thecourses from the following Manta series:
The Introduction to the IBM i Environmentseries
The Fundamentals of IBM i Operationsseries
If you feel you already have the necessary skills,you can verify your belief by successfullycompleting the Competency Exams for theseseries.
Manta PowerVM Concepts Technologies Inc. 47
PowerVM ConceptsOrder Number: LPAR02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
PowerVM is IBM's umbrella term for the collectionof virtualization technologies that are available withits Power Systems family. The most important ofthese technologies is logical partitioning, or LPAR,which lets one physical system run multipleoperating systems concurrently, including one ormore copies of IBM i, AIX, and/or Linux.
The course begins with an overview of logicalpartitioning concepts and applications. You willlearn the basic terminology and see how LPAR hasevolved. The course then goes into greater detailon how specific resources are shared amongpartitions, including processors, memory, and I/Odevices. Ways in which partitions cancommunicate with each other are also discussed.
Special considerations for sharing resource amongpartitions are covered next. In particular, partitionscan use both direct I/O, in which physical devicesare owned by the partition, and virtual I/O, in whichresources are supplied by a host partition. VirtualI/O is particularly useful in allocating storage to apartition from DASD owned by another partition.
The last session of the course covers thetechniques that are used to create and managepartitions. Two separate approaches are used byPower Systems. On smaller systems, partitionmanagement tasks are performed using theIntegrated Virtualization Manager (IVM). Largersystems use a separate Hardware ManagementConsole (HMC).
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Identify the advantages of using logicalpartitioning rather than independent systems ora single system image
Distinguish between physical and logicalpartitioning
Define logical partitioning terms
Describe the major tasks performed by thePower Systems hypervisor
Identify the operating systems that can run inhost and client partitions
Describe the purpose of the IntegratedVirtualization Manager (IVM) and HardwareManagement Console (HMC)
Describe how the resources of a sharedprocessor pool are allocated among partitions
Describe the difference between using cappedand uncapped processors in a partition
Describe the benefit of using multiple sharedprocessor pools
Given the performance rating of a system andits partition definitions, compute theperformance to be expected for a givenpartition
Specify whether a proposed dynamic memorychange is valid
Describe how the resources of a sharedmemory pool are allocated among partitions
Distinguish between logically overcommittedand physically overcommitted shared memory
Describe the relationship between an IOP andan IOA
Describe the restrictions concerning themovement of I/O resources between partitions
Identify the ways in which a partition can beprovided with a console
Describe the purpose of virtual I/O, virtual LAN,virtual Fibre Channel, and virtual OptiConnectin an LPARed system
Given a description of which partitions need tocommunicate, determine the number of virtualLANs and virtual adaptors that need to becreated
Distinguish between dedicated I/O and virtualI/O devices
Describe how a host partition can providevirtual disks, a virtual console, a virtual opticaldevice, and/or a virtual tape drive to a clientpartition
Identify ways in which IBM i, AIX, Linux, andWindows can share files and printers across anetwork
Describe the purpose of a partition profile on aPower System
Describe how fixes to the hypervisor code aredistributed
Manta PowerVM Concepts Technologies Inc. 48
Describe how system administration andoperations personnel create and changepartition definitions
Identify the security authority needed toperform specified LPAR operations
Describe how power-related IBM i systemvalues are handled in an LPAR environment
Describe how software and hardware errorsare reported to IBM in an LPAR environment
Topic Outline
LPAR Applications
Partitioning Processor Resources
Active Memory Sharing
Partitioning I/O Resources
InterPartition Communications
VIOS and Client Partitions
Partition Management
Audience
This course is intended for IT personnel who willoperate, administer, or plan for the installation ofan IBM Power System or BladeCenter server.
PrerequisitesThis course assumes that you are familiar withbasic computer concepts and terminology. Somefamiliarity with IBM i, AIX, and Linux is desired, butnot absolutely required. In particular, if yourinstallation uses AIX and/or Linux but not IBM i (orvice versa), you may skip sections that do notapply to your environment.
Reference Materials
No other materials are required to take this course.
A Student Reference Guide is available for thiscourse and LPAR01.
Related Products
Students should take this course of theirorganization uses a Power System or Bladeserver.
If the organization uses older iSeries or System ihardware, students should take Introduction toLogical Partitioning instead.
Manta System i Access for Windows Technologies Inc. 49
System i Access for Windows
Order Number: CIAW00
Max.Users
FirstYear
SecondYear
Later Years
1 $540 $270 $1365 $810 $405 $204
Each add’l $54 $27 $14
Overview
System i Access for Windows is a series of coursesthat cover the use of IBM's System i Access forWindows product. This series contains the followingcourses:
Introduction to System i Access for Windows
Using PC5250
Transferring Files Between Your PC and anIBM i System
Using the Directory Update Function
Installing System i Access for Windows
System i Access for Windows CompetencyExam
Approximate Study Time for the Entire Series: 10-12 hours
Audience
This series should be taken anyone who will beSystem i Access for Windows to access an IBM isystem host system via a personal computer.
Prerequisites
All courses in this series assume that you arefamiliar with both the Windows and IBM ienvironments. The IBM i-related prerequisites arecovered in the Manta series Introduction to theIBM i Environment.
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta System i Access for Windows Technologies Inc. 50
Introduction toSystem i Access for Windows
Order Number: CIAW01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course provides an introduction to System iAccess for Windows for Windows.
The course begins by describing the key differencesbetween System i Access for Windows and othermembers of the System i Access family. It thenintroduces the primary System i Accesscomponents, including PC5250, Data Transfer,System i Navigator, and the AFP WorkbenchViewer. You will see how to invoke System i Accessfunctions from either the System i Access forWindows folder or the Windows Start menu. Thecourse then describes the remaining services andfunctions provided by System i Access for Windowsand its various components.
Next, the course describes how to keep your copy ofSystem i Access for Windows up to date. Finally,you will see how to obtain online directions forperforming various tasks using System i Access forWindows, and how to obtain additional informationon System i Access for Windows screens.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Describe the function and capabilities ofPC5250, Data Transfer, System i Navigator, theAFP Workbench Viewer, and System i Accessmiddleware
Start System i Access functions using theWindows Start menu or desktop icons
Create a desktop icon to represent PC5250 orthe System i Navigator
Identify the services and facilities provided bySystem i Access for Windows
Describe the methods available for specifyingthe user ID and password for a System iAccess for Windows connection
Check the service level of the installed copy ofSystem i Access for Windows
Define a service schedule
Use the online System i Access for WindowsUser's Guide
Use System i Access help facilities to learnmore about a screen area
Topic Outline
The Primary System i Access Functions
Starting System i Access
The System i Access for Windows Folder
Keeping System i Access Up to Date
Getting Help
Audience
This course should be taken by anyone who will beSystem i Access for Windows to access an IBM isystem host via a personal computer.
Prerequisites
This course assumes you are familiar with both theWindows and IBM i environments. The IBM i-related prerequisites are covered in the Mantaseries Introduction to the IBM i Environment.
Manta System i Access for Windows Technologies Inc. 51
Using PC5250
Order Number: CIAW02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes Personal Communications5250 (PC5250), the emulator program that allowsyour PC to emulate both a 5250 terminal and an IBMi printer.
The course begins by describing the basic servicesprovided by PC5250. You will see how to initiate andterminate a PC5250 session. The course thendescribes how PC5250 uses keyboard mapping tomap PC keys to the special-purpose 5250 keys.You will see how to determine which PC key(s) aremapped to a specified 5250 key and how to modifythe default keyboard map. Next, the coursedescribes the various ways in which PC5250provides mouse support. You will see how to enablethe various types of hotspots and how to use andcreate popup keypads.
The course then describes the more advancedPC5250 features. You will see the various ways inwhich you can customize your PC5250 environment,how to use PC5250 for printer emulation, how tosave changes to your PC5250 session configuration,and how to create and use PC5250 macros.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should beable to:
Initiate and terminate a PC5250 session
Display the 5250 key to which a specified PCkey is mapped and the PC key(s) mapped to aspecified 5250 key
Create and use your own keyboard map
Use your mouse to position the text cursor
Use PC5250 hotspots
Display, use, and define a popup keypad
Customize your PC5250 session by modifyingthe PC5250 tool bar, changing the colors of thePC5250 window, and changing the format ofthe PC5250 window
Start and terminate a PC5250 printer session
Move a spooled file from one output queue toanother
Respond as required to expected printer writermessages
Save your PC5250 session configuration in aprofile
Initiate a PC5250 session using a profile
Use the Multiple Session feature to startmultiple PC5250 sessions with a singleoperation
Create a PC5250 macro
Use the Play tool bar button to execute a macro
Assign a PC5250 macro to any of the following:
o A tool bar button
o A hotspot
o A popup keypad button
o A mouse button
o A keyboard key
Topic Outline
Introduction to Personal Communications 5250
Displaying and Changing the Keyboard Map
PC5250 Mouse Support
Customizing PC5250
Printer Sessions
Using Profiles
Creating and Using Macros
Audience
This course should be taken by anyone who will beusing PC5250 for display station and/or printeremulation.
Manta System i Access for Windows Technologies Inc. 52
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM i-relatedprerequisites are covered in the Manta seriesIntroduction to the IBM i Environment.
This course also assumes you are familiar with basicSystem i Access for Windows functions andterminology
You can satisfy this prerequisite by successfullycompleting the first course of this series:
Introduction to System i Access for Windows
You may also have obtained these skills by takingother courses or through relevant work experience.
Transferring Files Between Your PC and an IBM i System
Order Number: CIAW03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to perform data transfersusing System i Access for Windows.
You will see how to download IBM i data to your PCand how to upload data from your PC to an IBM isystem. The course describes the various optionsthat control and affect a data transfer, and it showshow to execute a previously saved data transferrequest.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should beable to:
Define and use data transfer terminology
Perform a data download operation
Perform a data download operation that usesmultiple IBM i files as input
Manipulate a file being downloaded in thefollowing ways:
o Extract specified fields from each record
o Extract specified records from the file
o Create summary records from the file
o Change the order of records
Perform a data upload operation
Save a data transfer request
Execute a previously saved data transferrequest
Create a desktop icon for a data transferrequest
Display and change data transfer properties
Use commands to execute batch transferrequests
Manta System i Access for Windows Technologies Inc. 53
Topic Outline
Introduction to File Transfers
Performing a Basic Download Operation
Advanced Options for Download Operations
Uploading Files to an IBM i System
Saving and Executing File Transfer Requests
Audience
This course should be taken by anyone who wantsto use System i Access for Windows to transfer databetween a PC and an IBM i system.
Prerequisites
This course assumes that you are familiar with boththe Windows and IBM i environments. The IBM i-related prerequisites are covered in the Mantaseries Introduction to the IBM i Environment.
This course also assumes you are familiar with basicSystem i Access for Windows functions andterminology. You can satisfy this prerequisite bysuccessfully completing the first course of thisseries:
Introduction to System i Access for Windows
You may also have obtained these skills by takingother courses or through relevant work experience.
Using the Directory Update Function
Order Number: CIAW04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the Directory Update function ofSystem i Access for Windows. You will see how touse this function to distribute application updates toall personal computers connected to your IBM isystem.
The course begins with a discussion of the DirectoryUpdate function from a user's perspective. You willsee how to invoke the Directory Update functionmanually and how to have it invoked automaticallywhen Windows is started.
The course then describes how to configure theDirectory Update function to update PC applications.Included in this discussion is a description of thelogic used by the Directory Update function when itcompares source and target directories.
Finally, the course covers the creation and use of anupdate package. The use of a package file canimprove the performance of update processing foran application.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Invoke the System i Access Directory Updatefunction
Determine the amount of space required for anupdate
Determine which files need to be updated
Cause the Directory Update function to beinvoked automatically when Windows is started
Describe the operation of a file-driven updateversus a package-driven update
Add an application to the System i AccessDirectory Update configuration
Change the Directory Update entry for anapplication
Create an application package file for use bythe System i Access Directory Update function
Manta System i Access for Windows Technologies Inc. 54
Identify the steps required to refresh a targetdirectory when a file is accidentally deleted orreplaced
Topic Outline
Running the Update Function
Configuring the Update Function
Creating Update Packages
Audience
This course is intended for technical staff memberswho are responsible for managing personalcomputers that are connected to an IBM i system.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM i-relatedprerequisites are covered in the Manta seriesIntroduction to the IBM i Environment.
The course also assumes you are already familiarwith the basic use of System i Access for Windows.These prerequisites can be satisfied by successfullycompleting the first course of this series:
Introduction to System i Access for Windows
You may also have obtained these skills by takingother courses or through relevant work experience.
Installing System i Access for Windows
Order Number: CIAW05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the steps required to installSystem i Access for Windows on a personalcomputer. It also covers procedures that you willfind useful in the day-to-day administration ofSystem i Access for Windows.
The course begins with a description of the variousways in which System i Access for Windows can beinstalled on a personal computer. These includeinstalling from an IBM i system, another file server,and the IBM-supplied DVD.
The course then walks through the installationprocess, showing you how to configure System iAccess for Windows and control which componentsare installed. You will also see how to create an IBMi system connection definition and verify that all IBMi servers that will be needed by the user areavailable.
The course then shows you how to control whichSystem i Access for Windows functions are availableto the user. Two control mechanisms are available:Windows policies and the System i NavigatorApplication Administration function.
Next, the course describes the maintenance ofSystem i Access for Windows using service packs. .Finally, the course shows how to solve severalpotential problems related to how virtual devices areassigned to System i Access for Windows users.
Approximate Study Time: 2 hours
Manta System i Access for Windows Technologies Inc. 55
Objectives
After completing this course, you should beable to:
Identify the ways in which System i Access forWindows can be installed on a personalcomputer
Install System i Access for Windows on apersonal computer
Describe how System i Access for Windowsfunctions can be added or removed
Use System i Navigator to create a connectiondefinition, verify a connection, and display aconnection's properties
Identify the recommended backup method forvarious objects making up the System i Accessfor Windows configuration
Use the System i Navigator ApplicationAdministration function to prohibit a user fromaccessing selected System i Navigator orSystem i Access for Windows functions
Identify the differences between Windowspolicies, Application Administration localsettings, and Application Administration centralsettings in controlling the functions available toa user
Describe the service method used by System iAccess for Windows
Determine the current service level of aninstalled copy of System i Access for Windows
Install a System i Access for Windows servicepack
Limit the number of emulation sessions that canbe started by a PC5250 user
Describe how to avoid the proliferation of virtualdevice descriptions for System i Access forWindows users
Describe how to route a PC5250 user's outputto his or her PC
Topic Outline
Installation Options
Installing System i Access for Windows
Defining a Connection
Security Considerations
Updating System i Access for Windows
Controlling Sessions, Output, and Virtual Devices
Audience
This course is intended for technical staff memberswho will be responsible for connecting one or morepersonal computers to an IBM i system usingSystem i Access for Windows.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM i-relatedprerequisites are covered in the Manta seriesIntroduction to the IBM i Environment.
The course also assumes you are already familiarwith the basic use of System i Access for Windows.This prerequisite can be satisfied by successfullycompleting the Manta course, Introduction toSystem i Access for Windows.
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta System i Access for Windows Technologies Inc. 56
System i Access for Windows Competency ExamOrder Number: CIAW99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the Systemi Access for Windows series:
Introduction to System i Access for Windows
Using PC5250
Transferring Files Between Your PC and anIBM i System
Using the Directory Update Function
Installing System i Access for Windows
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to effectively use System iAccess for Windows.
Approximate time to complete all parts of the exam: 90 minutes
Recommended Uses
This Competency Exam was designed as a masterytest for the System i Access for Windows series.We recommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The System i Access for Windows series,including this exam, should be taken by anyone whowill be System i Access for Windows to access anIBM i system via a personal computer.
Prerequisites
This exam, like all courses in this series, assumesthat you are familiar with the Windows and IBM ienvironments. The IBM i-related prerequisites arecovered in the Manta series Introduction to theIBM i Environment.
Manta System i Access for Windows Technologies Inc. 57
IBM i Security
Order Number: ASEC00
Max.Users
FirstYear
SecondYear
Later Years
1 $864 $432 $2165 $1,296 $648 $324
Each add’l $86 $43 $22
Overview
The IBM i Security series describes the securityfacilities that are built into the IBM i operatingsystem. It also covers the IBM i commands andsystem values for controlling resource security.
The series describes IBM i security at three levels:physical security, user profile security, and resourcesecurity. Physical security controls who can accessthe hardware, including the system unit and devicessuch as workstations and printers. Under the topicof user profile security, you will see how the securityofficer can control system access through the use ofsystem values and user profile options. Under thetopic of resource security, you will see how to restrictaccess to system resources and secure sensitivedata.
IBM i resource security consists of a variety ofsecurity concepts and mechanisms, including objectownership, public authority, private authority, groupprofiles, primary group authority, authorization lists,and adopted authority. You will see how these areused and how to select the best security mechanismfor a given security requirement. You will also learnto use IBM i commands and panels to establish andmodify your security plan and to create an executionenvironment for an application system.
This series contains the following courses:
Introduction to IBM i Security
Granting Object Authority
Controlling Application Security
System Security Considerations
Creating an Application Environment
Security-Related System Values
Creating and Maintaining User Profiles
IBM i Security Using System i Navigator
IBM i Security Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 14-20 hours
Audience
This series should be taken by security officers andother personnel who are responsible for designingand implementing a system security plan. Theaudience also includes system administrators,programmers, managers, and users who willparticipate in security planning for the system as awhole or for one or more applications.
Prerequisites
All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. You can satisfy these prerequisitesby successfully completing the courses in thefollowing series:
Introduction to the IBM i Environment
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta System i Access for Windows Technologies Inc. 58
Introduction to IBM i Security
Order Number: ASEC01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces IBM i security.
The course begins with a discussion of the physicalsecurity of an IBM i system. Physical securitycontrols who can access the hardware, including thesystem unit and devices such as workstations andprinters. In the next session, on user profilesecurity, you will see how the security officer cancontrol system access through the use of systemvalues and user profile options. Then, in a sessionon resource security, you will see how the securityofficer and object owners can restrict access tosystem resources and secure sensitive data whileallowing authorized users to perform their jobs.
The course then covers the IBM i commands thatallow you to determine the objects that can beaccessed by a given user and the users who canaccess a given object. The course ends with adiscussion of the security issues related to IBM-supplied profiles and the Dedicated Service Toolspassword.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Identify the operating mode setting that isrequired to achieve a given security result
Identify the types of access permitted by eachof the IBM i security levels
Display a specified user profile
Identify ways in which user profile options canhelp establish security rules
Identify the powers granted to a user by his orher user class and special authority
Identify the authorities needed for a user toaccess libraries, directories, and objects inspecified ways
Use IBM i commands to determine the objectsthat can be accessed by a given user and todetermine the users who can access a givenobject
Explain the importance of changing the defaultpasswords for IBM-supplied user profiles andthe Dedicated Service Tools
Topic Outline
Physical Security
User Profile Security
Resource Security
Checking Access Authorities
IBM-Supplied User Profiles
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta System i Access for Windows Technologies Inc. 59
Granting Object Authority
Order Number: ASEC02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
In this course, you will see how to grant users theauthority to access the objects that you own orcontrol.
The first session covers public authority, the rightthat any user has to an object. As you will see,public authority is specified for an object when it iscreated and can be changed later by the object'sowner.
In the second and third sessions, you will see how togrant private authority to an object. Private authorityallows a user to access an object in ways notavailable to a general user. Objects stored in bothlibraries and directories are discussed.
The final session of this course covers how totransfer the ownership of an object to another user.
You will be able to use the commands covered inthis course if you are the owner of the object or ifyou have sufficient authority. For example, youmight be the security officer with *ALLOBJ authority.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able touse IBM i facilities to perform the following tasks:
Specify the public authority for a new object
Determine which users can access an objectand their respective levels of authority
Grant a user the authority to access an object
Revoke the authority of a user to access anobject
Change the level of authority a user has to anobject
Pass the ownership of an object to another user
Document the authority and ownership changesyou made during an interactive session byprinting your job log
Where appropriate, you will see how to performthese tasks for objects in both the library and root filesystems.
Topic Outline
Defining Public Authority
Granting Private Authority
Securing IFS Objects
Changing Object Ownership
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Finally, the course assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe first course of this series:
Introduction to IBM i Security
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta System i Access for Windows Technologies Inc. 60
Controlling Application Security
Order Number: ASEC03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
If you took the previous courses in this series, yousaw that a user can gain an authority to an object inany of three ways:
Via a special authority
Through the object's public authority
By receiving a private authority to the object
This course describes three additional ways a usercan gain authority to access an object:
By membership in a group
Through an authorization list
Via an adopted authority
These methods are often employed to grant a userthe necessary authorities to access the programs,database files, and other objects that make up anapplication system.
Each method is covered in a separate interactivesession.
The first session of this course covers group profiles.A group profile can be used to give object authorityto a collection of users with common accessrequirements.
An authorization list is used to control access to acollection of objects. The second session of thiscourse discusses the application securityrequirement that is satisfied by authorization lists. Italso covers the IBM i facilities for creating andmaintaining such lists.
Adopted authority is covered in the third session.Adopted authority grants a user the temporaryauthority needed to execute a program. You will seehow to set up adopted authority for an applicationand the considerations that you must keep in mind toavoid potential security exposures.
The course ends with a discussion of authorityholders. These are objects that can be used toprovide IBM i security for System/36 applications.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Order the steps required to set up a groupprofile and member profiles
Identify the authorities granted to a user bybeing a member of a group
Describe how user profile parameters can beused to control the ownership and authoritiesfor objects created by group members
Compare the advantages of using anauthorization list to those of using a groupprofile
Identify the authorities granted to a user via agiven authorization list
Identify the steps required to use adoptedauthority
Describe the purpose of authority holders
Use IBM i facilities to
o Create, edit, display, or delete anauthorization list
o Add, change, or remove a user entry in anauthorization list
o Put an object under the control of anauthorization list
o Remove an object from the control of anauthorization list
o Display the objects under the control of anauthorization list
o Determine the users who can access anobject as a result of adopted authority
Topic Outline
Group Profiles
Authorization Lists
Adopted Authority
Authority Holders
Manta System i Access for Windows Technologies Inc. 61
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Finally, the course assumes that you have anunderstanding of IBM i security concepts and knowhow to grant object authorities. You can satisfy thisprerequisite by successfully completing the previouscourses of this series:
Introduction to IBM i Security
Granting Object Authority
You may also have obtained these skills by takingother courses or through relevant work experience.
System Security Considerations
Order Number: ASEC04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Other courses in this series describe all the ways inwhich an object can be protected and the ways inwhich authority to an object can be granted to auser. They also show the related IBM i commandsand panels. This course shows how the varioussecurity mechanisms can be used together to satisfya given security requirement.
The course begins with a review of the IBM i securitymechanisms that are covered in other courses in thisseries. While you should now understand how eachmechanism works by itself, the situation can getcomplicated when two or more techniques are usedtogether.
The second session describes the logic followed byIBM i to determine whether a user has the necessaryauthority to access an object in a specified manner.In addition, the session offers recommendations forsetting up a security plan that makes use of this logicto improve system performance.
The course then describes a security feature thatwas introduced in the third course of this series,primary groups. As described in ControllingApplication Security, a primary group is a groupprofile that provides improved performance for groupmembers who access objects owned by anothergroup member. You will see how to set up andmaintain primary groups using IBM i commands.
The remaining topics of the course are directed tothe security officer and other personnel who areresponsible for the overall security plan for yourorganization's IBM i system. Your need tounderstand these issues depends on your jobfunctions and your installation's security level.Following are the topics covered:
Security audit journaling
Security levels 40 and 50
Backup and recovery
Approximate Study Time: 90 minutes
Manta System i Access for Windows Technologies Inc. 62
Objectives
After completing this course, you should be able to:
Select the optimal security mechanism toimplement a given application requirement
Determine the authority of a user to access anobject, given the description of an applicationthat uses a variety of security mechanisms
Determine the primary group, if any, associatedwith an object
Designate a primary group for an object
Change the primary group for an object
Identify the types of security events that can beidentified using IBM i security auditing facilities
Identify the events that are treated as securityviolations by security levels 40 and 50, but notby level 30
Identify the location of IBM i security informationand how this affects an installation's backup/recovery plan
Topic Outline
Security Review
Authority Checking
Using Primary Groups
Security Auditing
Security Levels 40 and 50
Backup and Recovery
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Finally, the course assumes that you have anunderstanding of IBM i security concepts, includinggroup profiles, authorization lists, and adoptedauthority. You can satisfy this prerequisite bysuccessfully completing the previous courses of thisseries:
Introduction to IBM i Security
Granting Object Authority
Controlling Application Security
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta System i Access for Windows Technologies Inc. 63
Creating an Application Environment
Order Number: ASEC05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the objects that make up atypical application environment. In particular, itdetails the security-related tasks that should beperformed when installing a new application system.
The course begins with a discussion of applicationlibraries. You will see common library organizationstrategies and how to define a library for a group ofusers. The discussion is then repeated forintegrated file system directories.
Next, the course describes how you can provideadditional protection by creating dedicated message,output, and job queues for an application. Then, youwill see how to control access to devices: inparticular, how to limit access to a workstation tothose users who are members of a specified group.
The course then describes the role of the jobdescription in establishing the user's environment.Special consideration is given to eliminating securityexposures made possible by the creative use of ajob description.
The course ends with a summary of therecommended sequence of tasks to set up anapplication.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Identify the security issues that need to beconsidered when defining each object thatmakes up an application’s environment
Create a library, a directory, an output queue,and a job description for use by an application
Change the current library and home directoryof a user
Restrict access to workstations and otherdevices
Specify the recommended sequence of tasks toset up an application
Topic Outline
Creating Libraries
Creating Directories
Creating Queues
Controlling Device Access
Creating a Job Description
Setting Up an Application System
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Finally, the course assumes that you have anunderstanding of IBM i security concepts, includinggroup profiles, authorization lists, and adoptedauthority. You can satisfy this prerequisite bysuccessfully completing the previous courses of thisseries:
Introduction to IBM i Security
Granting Object Authority
Controlling Application Security
System Security Considerations
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta System i Access for Windows Technologies Inc. 64
Creating and Maintaining User Profiles
Order Number: ASEC06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes user profiles, the key elementin establishing a user environment. The coursebegins with five interactive sessions, each of whichdiscusses a collection of user profile options:
Basic profile options
Security options
Group member options
Job, message, and output options
Environment options
You will see the purpose of each user profile fieldand the options available to you as the securityadministrator.
The course then describes the IBM i commandsused to create and maintain user profiles. This partof the course begins with an introduction to thecommands associated with user profiles and theauthorities required to perform various user profilefunctions. You will then practice creating profiles ina simulated IBM i session. Next, you will practicedisplaying, changing, and deleting profiles. Finally,the course describes how to test a profile that youhave created.
Approximate Study Time: 2.5 hours
Objectives
After completing this course, you should be able to:
Predict the result of a sign-on attempt, given thecurrent values of the appropriate fields in theuser's profile
Identify the differences between a group profileand the profile for a group member
Identify the authority required to perform agiven function on a user profile
Code the user profile parameter to satisfy agiven requirement
Create, display, change, and delete a userprofile
Identify the steps you should perform to test aprofile that you have created
Topic Outline
Basic User Profile Options
Security Options
Group Member Options
Job, Message, and Output Options
Environment Options
Commands for Working with User Profiles
Creating User Profiles
Using Profile Commands
Testing the Profiles You Have Created
Audience
The course is intended for the security officer oradministrator who is responsible for enrolling newusers on the system. It is also valuable formanagers and other personnel who will participate insystem security decisions.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Finally, the course assumes that you have anunderstanding of IBM i security. You can satisfy thisprerequisite by successfully completing the previouscourses of this series:
Introduction to IBM i Security
Granting Object Authority
Controlling Application Security
System Security Considerations
Manta System i Access for Windows Technologies Inc. 65
Security-Related System Values
Order Number: ASEC07
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the security-related systemvalues. These control the sign-on and password-change processes.
The course is divided into three interactive sessions.The course begins by reviewing the purpose ofsystem values and the commands you can use todisplay or change the settings of system values.You can skip this session if you are already familiarwith these tasks.
The second session covers those system values thatcontrol the sign-on process. You will see how tocontrol the number of attempts the user will be givento sign on and the action the system should take inresponse to a sign-on failure. You will also see howto control the actions taken by the system when itdetects that a workstation has been left unattended.
The third session discusses those system valuesthat are password related. You will see how to forcepasswords to expire after a specified number of daysand how to control the types of passwords that auser may enter.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Change IBM i system values to controlpassword selection and system access
Predict the result of a sign-on attempt orpassword change, given the current settings ofthe appropriate system values
Identify the two ways that password rules canbe specified
Code the appropriate system values to rejectpasswords meeting specified criteria
Topic Outline
Changing System Values
System Values that Control the Sign-OnProcess
Password-Related System Values
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe first course of this series:
Introduction to IBM i Security
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta System i Access for Windows Technologies Inc. 66
IBM i Security Using System i Navigator
Order Number: ASEC08
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to perform security-related tasks using System i Navigator.
The course begins by describing how to work withobject authority. You will see how to specify thepublic authority for a new object, determine whichusers can access an object and their respectivelevels of authority, and grant a user the authority toaccess an object.
You will then see how to work with user and groupprofiles. You will see how to create, display,change, and delete both user and group profiles.The course then covers authorization lists. You willsee how to display the contents of an authorizationlist, add, change, or remove a user from anauthorization list, display the objects under control ofan authorization list, and how to create and deleteauthorization lists.
Next, you will see how to perform the tasks neededto prepare for the installation of an applicationsystem. This includes how to create a library, createa directory, and change the current library and homedirectory of a user. The course ends by showingyou how to display and change security-relatedsystem values.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able touse System i Navigator to perform the followingtasks:
Specify the public authority for a new object
Determine which users can access an objectand their respective levels of authority
Grant a user the authority to access an object
Revoke the authority of a user to access anobject
Change the level of authority a user has to anobject
Pass the ownership of an object to another user
Display the attributes of a user profile
Create, change, and delete user profiles
Display the attributes of a group profile
Create, change, and delete group profiles
Identify the authorities granted to a user bybeing a member of a group
Determine the primary group, if any, associatedwith an object
Designate a primary group for an object, changethe primary group for an object, or remove theprimary group associated with an object
Display the contents of an authorization list
Add, change, or remove a user from anauthorization list
Display the objects under control of anauthorization list
Create and delete authorization lists
Put an object under the control of, or remove anobject from under the control of, an authorizationlist
Create a library
Create a directory
Change the current library and home directory ofa user
Display and change security-related systemvalues
Use the System i Navigator Security Wizard toset up the security-related system values onyour system.
Topic Outline
Granting Object Authority
Creating and Maintaining User Profiles
Working with Group Profiles
Working with Authorization Lists
Creating an Application Environment
Working with Security-Related System Values
Manta System i Access for Windows Technologies Inc. 67
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course also assumes that you are familiar withthe concepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe previous courses of this series:
Introduction to IBM i Security
Granting Object Authority
Controlling Application Security
System Security Considerations
Creating an Application Environment
Creating and Maintaining User Profiles
Security-Related System Values
You may also have obtained these skills by takingother courses or through relevant work experience.
Related Courses
This course is identical to course INAV04.
Manta System i Access for Windows Technologies Inc. 68
IBM i Security Competency ExamOrder Number: ASEC99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the IBM iSecurity series:
Introduction to IBM i Security
Granting Object Authority
Controlling Application Security
System Security Considerations
Creating an Application Environment
Creating and Maintaining User Profiles
Security-Related System Values
IBM i Security Using System i Navigator
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the operational skills required to develop asecurity plan for your IBM i system.
Approximate time to complete all parts of the exam: 2.5 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the IBM i Security series. We recommendthat you take the exam after you complete theseries. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The IBM i Security series, including this exam,should be taken by security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. You can satisfy these prerequisitesby successfully completing the courses in thefollowing series:
Introduction to the IBM i Environment
The courses in this series also assume that youhave some knowledge of security issues as theyapply to a computer installation. You may also haveobtained these skills by taking other courses orthrough relevant work experience.
Manta IBM Navigator for i Technologies Inc. 69
IBM Navigator for i
Order Number: NAVI00
Max.Users
FirstYear
SecondYear
Later Years
1 $432 $216 $1085 $648 $324 $162
Each add’l $44 $22 $11
Overview
IBM Navigator for i, also known as the web console,is a browser-based interface to the IBM i operatingsystem. If you have used System i Navigator, youwill see that the web console provides similarcapabilities. The major difference is that System iNavigator requires special software to be installedon the user's PC, while the web console uses astandard browser. IBM has announced that IBMNavigator for i is its strategic graphical interface,meaning that future enhancements will be made toNavigator for i rather than to System i Navigator.
This series currently contains the following courses:
Using IBM Navigator for i
Basic Operations Using Navigator for i
Work Management Using Navigator for i
Tape Management Using Navigator for i
IBM Navigator for i Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 8-12 hours
Audience
This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.
Prerequisites
This series assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series. If you feel you alreadyhave the necessary skills, you can verify your beliefby successfully completing the Competency Examfor that series.
Manta IBM Navigator for i Technologies Inc. 70
Using Navigator for i
Order Number: NAVI01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes IBM Navigator for i. Becausethis product is a browser-based interface to the IBM ioperating system, it is more commonly known as theweb console. If you have used System i Navigator,you will see that the web console provides similarcapabilities. The major difference is that System iNavigator requires special software to be installedon the user's PC, while the web console uses astandard browser.
The course begins with an introduction to the webconsole. You will first see how it differs fromprevious IBM i interfaces. Then, you will see how tostart and stop it.
Basic use of the web console is discussed next. Youwill learn how to use the controls provided by theweb console to locate and invoke individualfunctions. You will also see how to use the webconsole's help facilities.
The course then considers two of the tasks for whichgeneral users most often use Navigator for i. Thecourse first covers accessing IBM i messages.Among other things, you will see how to view themessages that have been sent to you and how tosend a message to another user. More advancedcontrols are also covered, including how to filter andsort the data displayed by the console.
Next, the course shows you how to access theintegrated file system using Navigator for i. You willsee how to create directories and move filesbetween your PC and the IBM i system.
The course ends by describing how to enter IBM icommands using the web console and how to invokethe web console's built-in 5250 terminal emulator.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Start the web console
Close individual web console pages
End a web console session
Navigate the web console window to locate aspecified task
Access the web console help facilities
Select an action for an item in a web consoledisplay
Use web console controls to determine thelayout of a list display
Add a web console page to your list of favorites
Use the web console to perform the followingtasks:
o Work with messages
o Create or remove an IFS directory
o Work with files in IFS directories
o Enter IBM i commands
o Use the built-in 5250 emulator
Topic Outline
Introduction to System i Navigator
Working with Messages
Using System i Navigator for File Access
Working with Connection Definitions
Power Techniques
Audience
This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous courses of this series:
Getting Started on IBM i
Integrated File System Concepts
Using IBM i Commands
Related Courses
This course is identical to course UINT06.
Manta IBM Navigator for i Technologies Inc. 71
Basic Operations Using Navigator for i
Order Number: NAVI02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to use Navigator for i toperform basic IBM i operator tasks. The coursebegins by expanding upon topics that wereintroduced in Using Navigator for i. You will first seehow to use the Run Command function to submitbatch jobs and how to view and send messages asthe system operator.
You will then see how to manage batch jobs that yousubmit for execution. Tasks covered include holding,releasing, and deleting jobs, changing the priority ofa job, and displaying detailed information about ajob. You will then see how to perform these tasks forother types of jobs and jobs belonging to otherusers.
Navigator facilities for managing spooled files arecovered next. You will see how hold, release, view,and delete spooled files, change their attributes,display spooled files in PDF format, and sendspooled files to users on other systems. Finally, thecourse covers the Navigator for i functions formanaging printers and their associated printerwriters.
Approximate Study Time: 2 hours
Objectives
After completing this topic, you should be able to useNavigator for i to perform the following tasks:
Submit a batch job
Display and respond to messages directed tothe system operator
Send a message to a single user, a group ofusers, or all users
Display the system history log
Display the status of a job
Hold, release, or delete a job
Reply to a job-related message
Move a batch job from one job queue to another
Display detailed information about a job
Change the priority of a job in a job queue
Select the columns shown in the User Jobsdisplay
Tailor the User Jobs display to show all batchjobs, all interactive jobs, or all jobs
Filter the User Jobs display to locate a specifiedjob
Sign an interactive user off the system
Display the spooled files currently in the system
Examine the contents of a spooled file
Hold, release, or delete a spooled file
Display or change the properties of a spooledfile
Move a spooled file to another output queue
Cause a spooled file to print next
Examine and respond to printer messages
Send a spooled file to a user on another system
Display the spooled files waiting to print on aspecified printer
Determine the status of a printer
Start, stop, or restart a printer writer
Hold or release a printer writer
Respond to writer messages
Change the description of a printer device
Display or change the output queue associatedwith a writer
Vary a printer device online or offline
Topic Outline
Using Navigator for System Operation
Controlling Batch Jobs
Controlling Other Jobs
Controlling Printer Output
Managing Printers and Writers
Audience
This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, a systemadministrator, or a designated user.
Prerequisites
This course assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series (including UsingNavigator for i) and the Work ManagementConcepts course.
Manta IBM Navigator for i Technologies Inc. 72
Work ManagementUsing Navigator for i
Order Number: NAVI03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to use Navigator for i toperform common IBM i operator tasks involving workmanagement. The course begins by showing youhow to control job and output queues. You will seehow to hold, release, and clear these queues anddisplay their properties. Controlling subsystems iscovered next, including how to start and stop asubsystem, display its properties, and view the jobqueues and memory pools it is assigned.
The course then describes Navigator for i facilitiesfor monitoring your system. First you will see how todisplay execution statistics for a job, including itsCPU usage. Then you will see how to displaydetailed system status information, including the webconsole dashboard.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Display the contents of a job or an output queue
Hold, release, or clear a job or an output queue
Display the properties of a job or an outputqueue
Display a list of the writers using an outputqueue
Display a list of the subsystems and their status
Display a list of the jobs running in a subsystem
Display the properties of a subsystem
Display a list of the job queues associated with asubsystem
Start and stop a subsystem
Display detailed information and performancestatistics about active jobs
Determine the allocation of system memorypools and list the job or subsystems using eachpool
Identify the purpose of each system memorypool
Display comprehensive system statusinformation
Examine the status of the disk devices attachedto your system
Display a chart showing basic health indicatorsfor key system resources
Topic Outline
Managing Job Queues
Managing Output Queues
Controlling Subsystems
Displaying Job Information
Displaying Memory Pool Information
Displaying System Status Information
Audience
This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.
Prerequisites
This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series(including Using Navigator for i), the WorkManagement Concepts course, and BasicOperations Using Navigator for i.
Manta IBM Navigator for i Technologies Inc. 73
Tape ManagementUsing Navigator for i
Order Number: NAVI04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the operational procedures forhandling and maintaining tape volumes and deviceson an IBM i system. This discussion includes bothphysical tape volumes and virtual tape volumes thatare stored on disk.
The course begins by describing the terms andconcepts associated with magnetic tape volumesand devices. You will see how data is recorded on atape and the purpose of tape labels. The coursethen introduces virtual tape volumes, imagecatalogs, and virtual devices.
Next, the course covers the IBM Navigator for i tasksused to work with physical and virtual tape volumesand devices. You will see how to display andchange the status of a tape device, respond to tape-related messages, and initialize a tape volume.
Finally, the course covers how to display or printtape information, including the contents of tapelabels and the data recorded on a tape. You willalso see how to duplicate a tape volume.
Approximate Study Time: 3-4 hours
Objectives
After completing this course, you should be able to:
Define tape-related terms, including block, inter-block gap, read/write head, label, and tape mark
Describe the format of a standard-labeled tape
Identify the contents of volume and file labels
Describe the purpose of the write-protect tab orknob on a tape cartridge
Identify the proper procedures for handling tapecartridges
Define terms relating to virtual media, includingvirtual volume, image catalog,and virtual device
Describe the procedures for creating and usingvirtual tapes
Identify applications for virtual tapes
Display the status of a tape device
Vary a tape device online or offline
Reset a tape device
Identify the job that is currently using a tapedevice
Display a tape device's properties
Load or unload an image catalog in a virtualdevice
Mount, load, or unload a specified virtual volume
Write-protect a virtual volume
Delete a virtual volume or a complete imagecatalog
List all image catalogs or the volumes in aparticular catalog
Respond properly to tape volume- and tapedevice-related message
Initialize a tape volume
Display tape labels
Print the contents of a tape
Duplicate a tape
Topic Outline
Tape Concepts
Virtual Tapes
Working with Tape Devices
Managing Virtual Tape Volumes and ImageCatalogs
Responding to Tape Messages
Displaying Tape Information
Audience
This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, a systemadministrator, or a designated user.
Prerequisites
This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series.You should have also completed the previouscourses of this series:
Work Management Concepts
Basic Operations Using Navigator for i
Manta IBM Navigator for i Technologies Inc. 74
IBM Navigator for i Competency ExamOrder Number: NAVI99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the IBMNavigator for i series:
Using Navigator for i
Basic Operations Using Navigator for i
Work Management Using Navigator for i
Tape Management Using Navigator for i
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to use System i Navigator.
Approximate time to complete all parts of the exam: 90 minutes
Recommended Uses
This Competency Exam was designed as a masterytest for the IBM Navigator for i series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The IBM Navigator for i series, including this exam,should be taken by anyone who will be using Systemi Navigator. This audience is primarily operators and
system administrators, but may include end usersand other personnel.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.
Manta System i Navigator Technologies Inc. 75
System i NavigatorOrder Number: INAV00
Max.Users
FirstYear
SecondYear
Later Years
1 $540 $270 $1365 $810 $405 $204
Each add’l $54 $27 $14
Overview
System i Navigator is a graphical user interface(GUI) that provides an "explorer-like" view of IBM iresources. It has evolved over the years from aninteresting option to a required IBM i interface. Assystem administrators and operators become morecomfortable with System i Navigator, many are usingit for most of their day-to-day work. The courses inthis series cover different aspects of System iNavigator.
This series contains the following courses:
Using System i Navigator
IBM i Operations Using System i Navigator
System Management Using System i Navigator
IBM i Security Using System i Navigator
Managing TCP/IP Using System i Navigator
System i Navigator Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series:10-14 hours
Audience
This series should be taken by anyone who will beusing System i Navigator. This audience is primarilyoperators and system administrators, but mayinclude end users and other personnel.
Prerequisites
The prerequisites for each course in this series areunique. See the course description for a course tosee its prerequisites.
Using System i Navigator
Order Number: INAV01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes System i Navigator, agraphical user interface (GUI) that provides an"explorer-like" view of IBM i resources.
The course begins with an introduction to System iNavigator. You will see how to start it, how torequest System i Navigator services, and how to useits online help facility. The format of the System iNavigator window is also discussed.
The course then considers two of the tasks for whichgeneral users most often use System i Navigator.The course first covers accessing IBM i messages.Among other things, you will see how to view themessages that have been sent to you and how tosend a message to another user. Next, the courseshows you how to access the integrated file systemusing System i Navigator. You will see how tocreate directories and move files between your PCand an IBM i system.
The course then describes how to define andmanage connection definitions. The course ends bydescribing power techniques that you can employ tomore effectively use System i Navigator.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Start System i Navigator
Work with the objects in the System i Navigatormain window
Display a pop-up menu for an object in theSystem i Navigator main window
Change the appearance of the System iNavigator main window
Access the System i Navigator Help facility
Use System i Navigator to work with messages
Create or remove an IFS directory using Systemi Navigator
Work with files in IFS directories
Create a connection definition
Verify a connection
Manta System i Navigator Technologies Inc. 76
Change your IBM i password
Move and/or copy IBM i objects using drag anddrop mouse operations
Sort lists in the System i Navigator details panes
Use the System i Navigator Find function tolocate the next occurrence of a text string in adetails pane
Use the Include option in the Integrated FileSystem folder to list only certain files
Topic Outline
Introduction to System i Navigator
Working with Messages
Using System i Navigator for File Access
Working with Connection Definitions
Power Techniques
Audience
The course is intended for anyone who will useSystem i Navigator to access an IBM i system. Thisaudience includes managers, programmers,operators, end users, and other personnel.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the following courses of the Introductionto the IBM i Environment series:
Getting Started on IBM i
Integrated File System Concepts
Using IBM i Commands
Related Courses
This course is identical to course UINT04.
IBM i Operations Using System i Navigator
Order Number: INAV02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to use System i Navigator toperform common IBM i operator tasks.
The course begins by showing you how to submitand managing batch jobs. You will then see how towork with your printer output and the printer outputof other users. Next, the course covers managingsystem users. You will then see how to control jobqueues and subsystems. The course then describesthe System i Navigator facilities for monitoring yousystem. The course ends by covering the System iNavigator functions for managing tapes and tapedrives.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Enter a CL command
Submit a batch job
Display the status of a batch job
Hold, release, or cancel a job
Change the priority of a job in a job queue
Move a job from one job queue to another
Display a list of the spooled files currently in thesystem
Examine the contents of a spooled file
Hold, release, or delete a spooled file
Examine and respond to printer messages
Change the attributes of a spooled file
Send a spooled file to a user on another system
Display a list of all signed-on users
Send a message to a single user, a group ofusers, or all users
Sign a user off the system
Display a list of the job queues and their status
Manta System i Navigator Technologies Inc. 77
Display the contents of a job queue
Hold, release, or clear a job queue
Display a list of the subsystems and their status
Display a list of the jobs running in a subsystem
Display a list of the job queues associated with asubsystem
Start and stop a subsystem
Displayed detailed information and performancestatistics about a job
Examine the status of a printer
Start and stop a printer
Examine the status of hardware devicesattached to your system
Vary a tape device online or offline
Reset a tape device
Identify the job that is currently using a tapedevice
Initialize a tape
Display tape labels
Print the contents of a tape
Make a copy of a tape
Display a tape device's properties
Topic Outline
Submitting and Managing Batch Jobs
Controlling Printer Output
Controlling System Users
Controlling Job Queues
Controlling Subsystems
Monitoring an IBM i system
Using Tapes
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisite bysuccessfully completing the Introduction to the IBMi Environment series and the first six courses of theFundamentals of IBM i Operations series.
Related Courses
This course is identical to course OPER07.
Manta System i Navigator Technologies Inc. 78
System Management Using System i Navigator
Order Number: INAV03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to use System i Navigator toperform common IBM i system management tasks.
The course begins by showing you how to restart anIBM i system and how to specify restart options. Thecourse then describes how to manage the devicesattached to your system. You will see how todetermine the current status of a device and how todisplay a list of all of your system's hardwareresources. The course then describes how to workwith system software. You will see how to display alist of the installed software on your system and howto determine the current release level of installedprogram products.
Next, the course covers how to back up yoursystem. Specifically, you will see how to set up aschedule to perform daily, weekly, and monthlybackups automatically, how to modify the library andfolder lists that are used by the automatic backupfacility, and how to initialize the tapes needed for abackup operation.
Finally, the course covers system values. You willsee how to both display and change the currentsetting of a system value.
Approximate Study Time: 90 minutes
Objectives
After completing this topic, you should be able to useSystem i Navigator to perform the following tasks:
Restart an IBM i system
Specify restart options
Determine the current status of a device
Display a list of your system's hardware resources
Determine the current release level of installed IBM iprogram products
Set up a schedule to perform daily, weekly, andmonthly backups automatically
Modify the library and folder lists that are used bythe automatic backup facility
Initialize the tapes needed for a backup operation
Display the current setting of a system value
Change the setting of a system value
Topic Outline
Restarting an IBM i system
Managing Devices
Working with System Software
Backing Up Your System
Working with System Values
Audience
This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.
Prerequisites
This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisite bysuccessfully completing the courses from thefollowing series:
The Introduction to the IBM i Environment series
The Fundamentals of IBM i Operations series
This course also assumes that you are familiar withbasic IBM i system management. You can satisfythis prerequisite by successfully completing thefollowing courses of the IBM i System Managementseries.
Starting and Stopping the System
Managing Devices
Backing Up Your System
Software Maintenance
Related Courses
This course is identical to course OSYS08.
Manta System i Navigator Technologies Inc. 79
IBM i Security Using System i Navigator
Order Number: INAV04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to perform security-related tasks using System i Navigator.
The course begins by describing how to work withobject authority. You will see how to specify thepublic authority for a new object, determine whichusers can access an object and their respectivelevels of authority, and grant a user the authority toaccess an object.
You will then see how to work with user and groupprofiles. You will see how to create, display,change, and delete both user and group profiles.The course then covers authorization lists. You willsee how to display the contents of an authorizationlist, add, change, or remove a user from anauthorization list, display the objects under control ofan authorization list, and how to create and deleteauthorization lists.
Next, you will see how to perform the tasks neededto prepare for the installation of an applicationsystem. This includes how to create a library, createa directory, and change the current library and homedirectory of a user. The course ends by showingyou how to display and change security-relatedsystem values.
Approximate Study Time: 120 minutes
Objectives
After completing this course, you should be able touse System i Navigator to perform the followingtasks:
Specify the public authority for a new object
Determine which users can access an objectand their respective levels of authority
Grant a user the authority to access an object
Revoke the authority of a user to access anobject
Change the level of authority a user has to anobject
Pass the ownership of an object to another user
Display the attributes of a user profile
Create, change, and delete user profiles
Display the attributes of a group profile
Create, change, and delete group profiles
Identify the authorities granted to a user bybeing a member of a group
Determine the primary group, if any, associatedwith an object
Designate a primary group for an object, changethe primary group for an object, or remove theprimary group associated with an object
Display the contents of an authorization list
Add, change, or remove a user from anauthorization list
Display the objects under control of anauthorization list
Create and delete authorization lists
Put an object under the control of, or remove anobject from under the control of, an authorizationlist
Create a library
Create a directory
Change the current library and home directory ofa user
Display and change security-related systemvalues
Use the System i Navigator Security Wizard toset up the security-related system values onyour system.
Topic Outline
Granting Object Authority
Creating and Maintaining User Profiles
Working with Group Profiles
Working with Authorization Lists
Creating an Application Environment
Working with Security-Related System Values
Manta System i Navigator Technologies Inc. 80
Audience
The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.
Prerequisites
This course also assumes that you are familiar withthe concepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe following courses of the IBM i Security series:
Introduction to IBM i Security
Granting Object Authority
Controlling Application Security
System Security Considerations
Creating an Application Environment
Creating and Maintaining User Profiles
Security-Related System Values
You may also have obtained these skills by takingother courses or through relevant work experience.
Related Courses
This course is identical to course ASEC08.
Managing TCP/IP Using System i NavigatorOrder Number: INAV05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers how to use System iNavigator to configure and manage TCP/IP onan IBM i system. TCP/IP is unlike most IBM icomponents in that some TCP/IP functions canonly be configured using System i Navigator —no equivalent commands exist.
The course begins by discussing the basicconfiguration tasks that can be performed usingeither the text-based (green-screen) interface orSystem i Navigator. You will see how to useSystem i Navigator to confirm that all TCP/IPcomponents are installed, to check the status oflines, to create a new TCP/IP interface, and tospecify TCP/IP route information.
The course then shows how to identify thedomain name servers to be used and how toupdate the local host table. You will also seehow to modify global TCP/IP settings, includingport restrictions and the servers to be startedautomatically.
Basic TCP/IP troubleshooting is covered next.You will see the System i Navigator equivalentsof PING, NETSTAT, and TRACERT, as well asother displays that are unique to System iNavigator.
TCP/IP application servers are discussed next.You will see how to start and end individualservers and how to set common configurationoptions, including whether a server is startedautomatically when TCP/IP is started and thenumber of server tasks to be used initially. Thecourse then shows how to configure two serversthat can only be set up using System iNavigator: DHCP and DNS.
The course ends by showing how to configure adial-up line that uses the TCP/IP Point-to-PointProtocol (PPP).
Approximate Study Time: 3 hours
Manta System i Navigator Technologies Inc. 81
Objectives
After completing this course, you should be able to:
Determine whether the TCP/IP software hasbeen installed on an IBM i system
Display the status of the lines used for TCP/IPcommunication
Configure a TCP/IP interface for an IBM isystem
Specify routing information for hosts not withinthe local subnetwork
Specify the full local domain name for an IBM isystem
Identify a remote system to be used as a domainname server
Restrict access to the TCP/IP ports
Control which TCP/IP application servers arestarted automatically when TCP/IP is started
Update the local host table to identify otherhosts in the network
Display the status of all active TCP/IPconnections
Use PING to test whether a particular host canbe reached from your system
Display the route used for a connection
Display the IP address associated with a givendomain name or vice versa
Display the status all active TCP/IP connections
Start and end TCP/IP application servers
Specify configuration options for commonly usedTCP/IP application servers, including LDP, FTP,Telnet, and SNTP
Describe how the HTTP server is configured
Describe the function of the System i Accessservers
Configure a DHCP server to have an IBM isystem assign IP addresses for the localnetwork
Identify the trade-offs involved in setting theDHCP lease duration
Change the DHCP configuration for a subnet
Configure a TCP/IP point-to-point connection
Configure a DNS server to have an IBM i systemact as the local domain name server
Start or end a TCP/IP point-to-point connection
Topic Outline
Configuring Interfaces and Routes
Identifying Hosts
Testing Connections
Configuring Application Servers
Configuring DHCP
Configuring a Domain Name Server
Defining a Point-to-Point Connection
Audience
This course is intended for IBM i professionals whowill install and maintain TCP/IP on an IBM i system.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.
The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the following courses of the TCP/IP inthe IBM i Environment series:
TCP/IP Fundamentals
TCP/IP Applications
Configuring and Managing TCP/IP
You may also have obtained these skills bytaking other courses or through relevant workexperience.
Related Courses
This course is identical to course CTCP04.
Manta System i Navigator Technologies Inc. 82
System i Navigator Competency ExamOrder Number: INAV99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the System iNavigator series:
Using System i Navigator
IBM i Operations Using System i Navigator
System Management Using System i Navigator
IBM i Security Using System i Navigator
Managing TCP/IP Using IBM i Navigator
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to use System i Navigator.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the System i Navigator series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The System i Navigator series, including this exam,should be taken by anyone who will be using Systemi Navigator. This audience is primarily operators andsystem administrators, but may include end usersand other personnel.
Prerequisites
The prerequisites for each course in this series areunique. See the course description for a course tosee its prerequisites.
Manta Work Management for System Administrators Technologies Inc. 83
Work Management for System Administrators
Order Number: AWRK00
Max.Users
FirstYear
SecondYear
Later Years
1 $756 $378 $1905 $1,134 $567 $285
Each add’l $76 $38 $19
Overview
The Work Management for SystemAdministrators series describes how to performmany of the work management tasks required for anIBM i system. The series describes how to createand manage subsystems, job descriptions, classes,and output queues. It also shows how to changesystem values and enable the job accountingcapabilities of your IBM i system. You will learntechniques for streamlining IBM i operations,including scheduling jobs automatically, having thesystem automatically respond to selected messages,having commands entered automatically at IPL, andcreating simplified versions of IBM i commands. Theseries also describes how to monitor and tune theperformance of your system.
This series contains the following courses:
Work Management Concepts
Working with System Values
Managing Subsystems
Subsystem Workflow and Job Control
Streamlining IBM i Operations
Job Accounting
Performance Tuning
Work Management for System AdministratorsCompetency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 11-15 hours
Audience
This series is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.
Prerequisites
All courses in this series assume that you have abasic knowledge of IBM i facilities. You can satisfythis prerequisite by successfully completing thecourses in the Introduction to the IBM iEnvironment series.
Reference Materials
A Student Reference Guide is available for thisseries.
Related Courses
For a complete understanding of IBM i workmanagement, you should also take the courses inthe Fundamentals of IBM i Operations series.That series covers the work management tasksrelated to the routine operation of the system, suchas submitting batch jobs, controlling jobs, andcontrolling spooled files and printers.
Manta Work Management for System Administrators Technologies Inc. 84
Work Management Concepts
Order Number: AWRK01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes basic work managementconcepts.
The course begins by discussing interactive jobs.These are the sessions that are started when userssign on the system. It then describes how batchjobs are executed in the system. Next, the courseconsiders the role three components of the IBM isystem — subsystems, job descriptions, and jobqueues — play in the processing of batch jobs. Thecourse then discusses spooling, the process used tostore printer output, and describes how spooledoutput is managed by the IBM i system. The courseends by illustrating the flow of an interactive job anda batch job through the system.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Name the types of IBM i jobs and identify howeach is begun
Name the objects used to support jobprocessing, and identify the functionsperformed by each
Name the IBM i components used to managethe output created by jobs, and identify thefunctions performed by each
List the steps performed by the IBM i operatingsystem when running a batch or interactive job
Topic Outline
Job Types
Subsystems and Job Descriptions
Job Queues
Spooled Files and Output Queues
Job Flow
Audience
This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.
Manta Work Management for System Administrators Technologies Inc. 85
Working with System Values
Order Number: AWRK02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
The IBM i operating system uses a set of variables,called system values, to control the overall operationof your computer system. If your system is part of anetwork, another set of values, called networkattributes, is used to control networking andcommunications. This course describes how systemvalues and network attributes are used and how youcan manipulate them.
The course begins by describing one tool fordisplaying and changing the contents of selectedsystem values and network attributes, the ChangeSystem Options display. This display is sufficient formany system administrators, particularly those withnew systems. However, most system administratorseventually want to know what functions they cancontrol via system values and what settings mightimprove the performance of their systems. Becauseof this, subsequent sessions of the course describethe purpose of each system value, with emphasis onthose system values that are most frequentlychanged by system administrators.
In addition to learning the purpose of each systemvalue, you will see how to display or change thecontents of system values using the DSPSYSVAL,CHGSYSVAL, and WRKSYSVAL commands. Youwill also see how to copy the contents of a systemvalue into a CL program variable.
Finally, the course describes how to display orchange the contents of network attributes.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Identify the system value responsible forcontrolling a specified system function
Display or change the contents of a systemvalue
Code the command to copy the contents of asystem value into a CL program variable
Code the command to change the contents of asystem value
Display or change the value of a networkattribute
Code the command to copy the value of anetwork attribute into a CL program variable
Topic Outline
Changing System Options
Displaying and Changing System Values
Basic System Values
Manipulating System Values in a CL Program
System Control System Values
Advanced System Values
Network Attributes
Audience
The course should be taken by any personresponsible for managing an IBM i system. Thisperson may be a system administrator, a systemprogrammer, or a system operator.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.
You should also have an understanding of IBM iwork management and security concepts. You cansatisfy this prerequisite by successfully completingthe following courses:
Work Management Concepts
Introduction to IBM i Security
Manta Work Management for System Administrators Technologies Inc. 86
Related Courses
Because system values control so many aspects ofsystem operation, the ability to display and changetheir contents is a prerequisite skill for many of thecourses in the Manta system administrationcurriculum. While this course describes eachsystem value, it does not discuss the associatedsystem functions in detail. For a completeunderstanding of such functions, you need to takeadditional courses. Following is a partial list ofManta courses that cover specific system values andtheir effect on system functions:
Security-Related System Values Starting and Stopping an IBM i system Managing Subsystems Subsystem Workflow and Job Control Performance Tuning
Managing Subsystems
Order Number: AWRK03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Every job executes in a subsystem. Therefore, theway in which subsystems are defined and used onyour system greatly affects how your systemperforms.
This course describes how to manage thesubsystems on your IBM i system. The course firstpresents the commands used to start and stop asubsystem. It then takes a detailed look at thecontents of a subsystem description. You will seenot only the attributes that define a subsystem, butalso the contents of a routing entry and each type ofwork entry.
The course then shows different methods you canuse to create a subsystem description. Next, youwill see how to modify the attributes of a subsystemdescription and how to add, modify, and deleterouting and work entries. The course ends byshowing how to delete a subsystem description.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Start and stop a subsystem
Examine a subsystem description
Name and describe the values that are storedin a subsystem description
Use the CRTDUPOBJ command to create acopy of a subsystem description
Use the Work with Objects display to create acopy of a subsystem description
Use the CRTSBSD command to define a newsubsystem description
Alter the attributes of a subsystem
Add a new workstation, job queue, or routingentry to a subsystem description
Change or remove a workstation, job queue, orrouting entry
Delete a subsystem description
Manta Work Management for System Administrators Technologies Inc. 87
Topic Outline
Starting and Ending a Subsystem
Examining a Subsystem Description
Creating a Subsystem Description
Modifying a Subsystem Description
Deleting a Subsystem Description
Audience
This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.
In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first two course of thisseries:
Work Management Concepts
Working with System Values
Subsystem Workflow and Job Control
Order Number: AWRK04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to manage several objecttypes that play an important role in workmanagement: job descriptions, job classes, jobqueues, and output queues.
The course begins by describing various tasks youcan perform in managing job descriptions. You seehow to create, display, change, and delete a jobdescription. The course then shows how to performthese same tasks for job classes. The course endsby describing how to create job queues and outputqueues.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Name and describe the values that are storedin a job description
Create, copy, display, modify, and delete a jobdescription
Name and describe the values that are storedin a job class
Create, copy, display, modify, and delete a jobclass
Create and delete a job queue
Name and describe the attributes that define anoutput queue
Create, copy, modify, and delete an outputqueue
Topic Outline
Working with Job Descriptions
Working with Job Classes
Working with Job Queues
Working with Output Queues
Manta Work Management for System Administrators Technologies Inc. 88
Audience
This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.
In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first two course of thisseries:
Work Management Concepts
Working with System Values
Related Courses
See Creating an Application Environment (ASEC05),in the IBM i Security series, for another perspectiveon creating job descriptions and output queues. Thatcourse describes how to create a secureenvironment for a new application, including thesecurity aspects of job descriptions, output queues,message queues, libraries, directories, and devicedescriptions. In contrast, Subsystem Workflow andJob Control discusses the available options for jobsdescriptions and output queues in greater detail. Italso covers classes and job queues and thecommands used to manipulate these objects.
Streamlining IBM i Operations
Order Number: AWRK05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
More and more IBM i shops are moving towards"lights out" operation, in which the system runswithout a full-time operator in attendance. Othershops still have full-time operators, but are reducingthe hours during which the computer room is staffed.To automate operations-related tasks, you can turnto several program products available from majorsoftware vendors.
Alternatively, you can begin a move towardsautomated operations using the free tools that aredescribed in this course. All of these tools are builtinto IBM i. Because they are poorly documentedand not well advertised, however, you may not knowthey exist.
For most IBM i installations, the first step inautomating operations is to submit batch productionjobs for execution on a predetermined schedule.The course begins by showing you how toaccomplish this using the job scheduler that comeswith IBM i.
Once a shop's batch jobs are being submittedautomatically, the next step towards automatedoperations is preprogramming responses to systemmessages. In the second session of this course,you will see how to reduce operator interactions byusing the system reply list to have the system replyautomatically to specified messages.
Next, you will see how to modify the system startupprogram. This program is executed automatically atthe end of the IPL process. By modifying it, you canautomatically enter commands to start jobs, servers,or subsystems and perform other tasks withoutoperator intervention. As you will see, a commonreason to modify the startup program is to startTCP/IP automatically after each IPL.
The remainder of the course covers ways to modifythe commands provided with IBM i. First you willsee how to change the default value of a commandparameter. Then you will see how to createsimplified versions of IBM i commands.
Manta Work Management for System Administrators Technologies Inc. 89
Approximate Study Time: 2 hours
Objectives
After completing this course, you should beable to:
Submit a job to run at a predetermined time
Have a job executed automatically based on apredefined schedule
Create the system message queue
Have the system respond automatically to aspecified inquiry message
Modify the system startup program
Copy an IBM i command
Change the default value for an IBM i commandparameter
Create a CL program to reapply changes youhave made to IBM i commands
Create simple commands that invoke one ormore IBM i commands
Topic Outline
Scheduling Jobs
Automatic Message Response
Modifying the Startup Program
Changing Command Defaults
Creating Commands
Audience
This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.
The course also assumes you have a detailedknowledge of IBM i work management. You cansatisfy this prerequisite by successfully courses ofthis series:
Work Management Concepts
Working with System Values
Managing Subsystems
Subsystem Workflow and Job Control
Finally, you should have basic knowledge of IBM iCL programming. You can satisfy this prerequisiteby successfully completing the IBM i ApplicationProgramming Concepts and Facilities series and thefirst three courses of Manta's CL Programmingseries:
Introduction to CL Programming
Variables and Built-In Functions
Controlling Command and Program Flow
Manta Work Management for System Administrators Technologies Inc. 90
Job Accounting
Order Number: AWRK06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to implement jobaccounting on your system.
The course begins by describing the generalconcepts of job accounting. You will see how jobaccounting information can be used and whatinformation is recorded for each job. The coursenext describes how to enable job accounting on yoursystem. This discussion includes an overview ofjournal management. The course ends bydescribing how to examine the job accounting data.
Approximate Study Time: 60 minutes
Objectives
After completing this course, you should be able to:
Describe the function of job accounting
List the steps the system uses in determiningthe accounting code for a job
List the steps required to set up job accounting
Create a journal receiver for the accountingjournal
Create the accounting journal
Enable job accounting
Create a database file to which job accountingdata can be copied
Copy data from the accounting journal to adatabase file
Topic Outline
Job Accounting Overview
Setting Up Job Accounting
Processing Job Accounting Data
Audience
This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.
In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first two course of thisseries:
Work Management Concepts
Working with System Values
Manta Work Management for System Administrators Technologies Inc. 91
Performance Tuning
Order Number: AWRK07
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to monitor systemperformance and how to tune your system to reachoptimal performance.
The course begins by describing the conceptsbehind performance tuning. You will then see howto enable both automatic system tuning and theexpert cache function to have the system doperformance tuning for you. Next, the coursedescribes how to define your own storage poolconfiguration. You will then see the various panelsthat include system performance data, and how tointerpret the data on these panels. The course endswith a discussion on how to manually tune yoursystem.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Use and define the terms related toperformance tuning on an IBM i system
Describe how the performance of a program orgroup of programs can be affected bycontrolling processor and main storage usage
Identify the factors that affect the page fault ratein a storage pool
Determine whether automatic performancetuning is currently enabled on your system
Enable automatic performance tuning on yoursystem
Display, and optionally change, the currentstorage pool configuration
Enable the expert cache function for a sharedstorage pool
Describe the effect of changing automaticperformance tuning guidelines
Use the following panels to monitor systemperformance:
o Work with System Status
o Work with Disk Status
o Work with Active Jobs
Adjust your system's storage pool configurationto achieve optimum system performance
Topic Outline
Introduction to Performance Tuning
Automatic System Tuning
Defining a Storage Pool Configuration
Monitoring System Performance
Tuning Your System
Audience
This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.
In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first four course of thisseries:
Work Management Concepts
Working with System Values
Managing Subsystems
Subsystem Workflow and Job Control
Manta Work Management for System Administrators Technologies Inc. 92
Work Management for System Administrators Competency ExamOrder Number: AWRK99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the WorkManagement for System Administrators series:
Work Management Concepts
Working with System Values
Managing Subsystems
Subsystem Workflow and Job Control
Streamlining IBM i Operations
Job Accounting
Performance Tuning
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to manage system activity on anIBM i system.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the Work Management for SystemAdministrators series. We recommend that youtake the exam after you complete the series.Alternatively, you can take the corresponding portionof the exam when you complete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The Work Management for SystemAdministrators series, including this exam, isintended for anyone responsible for managing thesystem activity of an IBM i system. Systemadministrators, system programmers, and systemoperators would be personnel operating in this jobcapacity.
Prerequisites
All courses in this series assume that you have abasic knowledge of IBM i facilities. You can satisfythis prerequisite by successfully completing thecourses in the Introduction to the IBM iEnvironment series.
Manta TCP/IP in the IBM i Environment Technologies Inc. 93
TCP/IP in the IBM i EnvironmentOrder Number: CTCP00
Max.Users
FirstYear
SecondYear
Later Years
1 $432 $216 $1085 $648 $324 $162
Each add’l $43 $22 $11
Overview
The TCP/IP in the IBM i Environment series coversthe configuration and use of TCP/IP on an IBM isystem.
This series contains the following courses:
TCP/IP Fundamentals
TCP/IP Applications
Configuring and Managing TCP/IP
Managing TCP/IP Using System i Navigator
TCP/IP in the IBM i Environment CompetencyExam
The first course in the series provides anintroduction to TCP/IP for the IBM i professional. Itdescribes how TCP/IP is actually a suite ofprotocols that are arranged in a layeredarchitecture. It then covers all but the topmostlayer in detail, giving special attention to the TCPand IP protocols.
The second course describes the major servicesand protocols that make up the TCP/IP applicationlayer. The use of common TCP/IP applications inan IBM i environment is covered.
The third course covers the steps you mustperform to configure and run TCP/IP on an IBM isystem.
The fourth course shows you how to set up andmanage TCP/IP using System i Navigator. As youwill see, some TCP/IP applications, includingDHCP and DNS, can only be set up in this way.
Approximate Study Time for the Entire Series: 10-14 hours
Audience
The first two courses of this series should be takenby all IBM i professionals who will be using TCP/IPprotocols, applications, or related products. Theremaining courses are intended for the systemadministrator responsible for configuring andmanaging TCP/IP on an IBM i system.
Prerequisites
All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. This prerequisite can be satisfiedby successfully completing the Introduction to theIBM i Environment series. A basic knowledge ofdata communications is also required.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta TCP/IP in the IBM i Environment Technologies Inc. 94
TCP/IP FundamentalsOrder Number: CTCP01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course provides an introduction to TCP/IP forIBM i professionals.
The course begins by describing the role of TCP/IPin allowing users with dissimilar networks,computer hardware, and operating systems tocommunicate over a virtual internetwork. It thendescribes the structure and overall administrationof the worldwide Internet.
Next, the course describes the addressingstructures used for a TCP/IP internetwork and therelationship between IP addresses and domainnames. You will see the functional layers thatmake up the TCP/IP architecture and the majorprotocols defined within each layer.
The remainder of the course describes the networkinterface layer, the internet layer, and the transportlayer in greater detail. The application layer iscovered in the next course of this series, TCP/IPApplications.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should beable to:
Define the key terms related to the TCP/IPprotocol suite
Identify the components of a TCP/IP internet
Describe the structure of the Internet
Identify the organizations involved inmaintaining and administering the Internet
Identify the differences between IPv4 and IPv6addresses
Identify the components of an internet address
Convert an IPv4 address to dotted-decimalnotation
Define an IPv4 subnet mask, given adescription of a network and its addressingscheme
Convert IPv6 addresses between their shortand long form
Identify the types of IP addresses
Describe how the relationship between adomain name and an IP address isdetermined
Identify the functional layers of the TCP/IParchitecture
Describe the IBM i implementation of theTCP/IP protocol suite
Distinguish between a local area network anda wide area network
Identify the local area and wide area networktypes supported by the IBM i implementationof TCP/IP
Describe the process used by the InternetProtocol (IP) in routing data to a remotesystem
Match the major TCP/IP internet layerprotocols with their functions
Describe the differences between aconnection-oriented and a connectionlesscommunications protocol
Identify the major differences between theTCP/IP transport layer protocols, TCP andUDP
Describe the processes used by TCP andUDP in transmitting a message from onesystem to another
Topic Outline
Internetworks
TCP/IP Addressing
Host Names and Domains
The TCP/IP Protocol Suite
The Data-Link Layer
The Internet Layer
The Transport Layer
Manta TCP/IP in the IBM i Environment Technologies Inc. 95
Audience
This course is intended for IBM i professionals whowill be installing or using TCP/IP protocols,applications, or related products.
Prerequisites
This course assumes that you are familiar with IBMi concepts and terminology. A basic knowledge ofdata communications is also required.
TCP/IP ApplicationsOrder Number: CTCP02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course provides an introduction to TCP/IPapplication services.
The course begins by describing the client/servermodel that is used by the TCP/IP application layer.As you will see, the services provided by theapplication layer can be divided into three groups:end-user services, support services, andapplication programming interfaces. The ways toinvoke TCP/IP applications on an IBM i system arealso discussed.
Next, the course describes two of the mostcommonly used TCP/IP applications: TELNET andFTP. TELNET is a terminal emulation program.You will see how to use TELNET to sign ontoanother host, regardless of whether your host andthe remote host are System i servers, System zservers, PCs, or UNIX-based systems. You willalso see how to use FTP (the File TransferProtocol) to transfer files between your system andanother host.
Then you will see how the Line Printer Requester(LPR) and Line Printer Deamon (LPD) allow you toroute spooled files between systems in a network.
The course ends with a discussion of how IBM isystems can be used as Internet servers.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Describe the method used by TCP/IP toimplement typical application services
Use the PING (VFYTCPCNN) command totest whether a particular host can be reachedfrom your system
Identify the applications that are supported bymost TCP/IP implementations
Use TELNET to initiate an IBM i session froma remote system
Use FTP to transfer files between your systemand a remote host
Send a spooled file to a remote system forprinting
Manta TCP/IP in the IBM i Environment Technologies Inc. 96
Configure an IBM i output queue to routespooled files to a remote system automatically
Identify the three protocols that define theWorld Wide Web
Identify the IBM i programs that provide webservices
Topic Outline
The Client/Server Model
Using TELNET
Using FTP
Remote Printing
The World Wide Web
Audience
This course is intended for IBM i professionals whowill be installing or using TCP/IP protocols,applications, or related products.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.
The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the first course of this series, TCP/IPFundamentals.
Configuring and Managing TCP/IPOrder Number: CTCP03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the steps you must perform toconfigure and run TCP/IP on an IBM i system.
The course begins with a review of the hardwareand software required to support TCP/IP on anIBM i system. It then introduces a sample intranetthat is used as a case study example throughoutthe remainder of the course.
Next, the course shows you how to configure aTCP/IP interface, start TCP/IP, and test thenetwork connection. For complex networks, youwill see how to specify routing information for hostsnot within the local subnetwork.
TCP/IP application servers are discussed next.You will see how to start and end individual serversand control whether a server is startedautomatically when TCP/IP is started.
The course then describes the ways in which thedomain names that are used on your system canbe translated into their corresponding IPaddresses. These methods include defining alocal host table, using a remote domain nameserver, and using the IBM i system as a domainname server.
Depending on its release level, your IBM i systemmay also support TCP/IP over various types ofpoint-to-point connections. You will see how toconfigure connections that use the Point to PointProtocol (PPP).
Finally, the course discusses IBM i securityconsiderations, listing steps that you can take toenhance the security of an IBM i system in aTCP/IP environment.
Approximate Study Time: 2 hours
Manta TCP/IP in the IBM i Environment Technologies Inc. 97
Objectives
After completing this course, you should be able to:
Determine whether the TCP/IP software hasbeen installed on an IBM i system
Identify the IBM i authority needed toconfigure TCP/IP
Interpret an intranet addressing diagram
Configure a TCP/IP interface for an IBM isystem
Specify routing information for hosts not withinthe local subnetwork
Display the status of the TCP/IP network
Start and end TCP/IP
Start and end TCP/IP application servers
Control whether a TCP/IP application server isstarted automatically when TCP/IP is started
Specify the full local domain name for an IBMi system
Update IBM i's local host table to identify otherhosts in the network
Identify a remote system to be used as adomain name server
Configure a TCP/IP point-to-point connection
Start or end a TCP/IP point-to-pointconnection
Identify steps you can take to enhance thesecurity of an IBM i system in a TCP/IPenvironment
Restrict access to the TCP/IP ports
Prevent a TCP/IP user from signing on as thesecurity officer
Topic Outline
TCP/IP Requirements
Configuring TCP/IP
Configuring Application Servers
Identifying Hosts
Defining a Point to Point Connection
Security Considerations
Audience
This course is intended for IBM i professionals whowill install and maintain TCP/IP on an IBM isystem.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.
The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the previous courses of this series:
TCP/IP Fundamentals
TCP/IP Applications
Manta TCP/IP in the IBM i Environment Technologies Inc. 98
Managing TCP/IP Using System i NavigatorOrder Number: CTCP04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers how to use System iNavigator to configure and manage TCP/IP onan IBM i system. TCP/IP is unlike most IBM icomponents in that some TCP/IP functions canonly be configured using System i Navigator— no equivalent commands exist.
The course begins by discussing the basicconfiguration tasks that can be performedusing either the text-based (green-screen)interface or System i Navigator. You will seehow to use System i Navigator to confirm thatall TCP/IP components are installed, to checkthe status of lines, to create a new TCP/IPinterface, and to specify TCP/IP routeinformation.
The course then shows how to identify thedomain name servers to be used and how toupdate the local host table. You will also seehow to modify global TCP/IP settings, includingport restrictions and the servers to be startedautomatically.
Basic TCP/IP troubleshooting is covered next.You will see the System i Navigatorequivalents of PING, NETSTAT, andTRACERT, as well as other displays that areunique to System i Navigator.
TCP/IP application servers are discussed next.You will see how to start and end individualservers and how to set common configurationoptions, including whether a server is startedautomatically when TCP/IP is started and thenumber of server tasks to be used initially.The course then shows how to configure twoservers that can only be set up using System iNavigator: DHCP and DNS.
The course ends by showing how to configurea dial-up line that uses the TCP/IP Point-to-Point Protocol (PPP).
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Determine whether the TCP/IP software hasbeen installed on an IBM i system
Display the status of the lines used for TCP/IPcommunication
Configure a TCP/IP interface for an IBM isystem
Specify routing information for hosts not withinthe local subnetwork
Specify the full local domain name for an IBM isystem
Identify a remote system to be used as adomain name server
Restrict access to the TCP/IP ports
Control which TCP/IP application servers arestarted automatically when TCP/IP is started
Update the local host table to identify otherhosts in the network
Display the status of all active TCP/IPconnections
Use PING to test whether a particular host canbe reached from your system
Display the route used for a connection
Display the IP address associated with a givendomain name or vice versa
Display the status all active TCP/IPconnections
Start and end TCP/IP application servers
Specify configuration options for commonlyused TCP/IP application servers, includingLDP, FTP, Telnet, and SNTP
Describe how the HTTP server is configured
Describe the function of the System i Accessservers
Configure a DHCP server to have an IBM isystem assign IP addresses for the localnetwork
Identify the trade-offs involved in setting theDHCP lease duration
Change the DHCP configuration for a subnet
Configure a TCP/IP point-to-point connection
Configure a DNS server to have an IBM isystem act as the local domain name server
Start or end a TCP/IP point-to-point connection
Manta TCP/IP in the IBM i Environment Technologies Inc. 99
Topic Outline
Configuring Interfaces and Routes
Identifying Hosts
Testing Connections
Configuring Application Servers
Configuring DHCP
Configuring a Domain Name Server
Defining a Point-to-Point Connection
Audience
This course is intended for IBM i professionals whowill install and maintain TCP/IP on an IBM isystem.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.
The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the previous courses of this series:
TCP/IP Fundamentals
TCP/IP Applications
Configuring and Managing TCP/IP
You may also have obtained these skills bytaking other courses or through relevant workexperience.
Related Courses
This course is identical to course INAV05.
Manta TCP/IP in the IBM i Environment Technologies Inc. 100
TCP/IP in the IBM i Environment Competency ExamOrder Number: CTCP99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the TCP/IPin the IBM i Environment series:
TCP/IP Fundamentals
TCP/IP Applications
Configuring and Managing TCP/IP
Managing TCP/IP Using System i Navigator
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to configure TCP/IP on an IBMi system and use common TCP/IP applications.
Approximate time to complete all parts of the exam: 90 minutes
Recommended Uses
This Competency Exam was designed as amastery test for the TCP/IP in the IBM iEnvironment series. We recommend that youtake the exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.
Evaluation
The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate session for review.
Audience
The TCP/IP in the IBM i Environment series,including this exam, should be taken by all IBM iprofessionals who will be using TCP/IP protocols,applications, or related products. You can skip thethird and fourth courses and their correspondingexams unless you are responsible for configuringand managing TCP/IP on an IBM i system.
Prerequisites
All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. This prerequisite can be satisfiedby successfully completing the Introduction to theIBM i Environment series. A basic knowledge ofdata communications is also required.
Manta Using the Advanced Job Scheduler Technologies Inc. 101
Using the Advanced Job Scheduler
Order Number: AAJS00
Max.Users
FirstYear
SecondYear
Later Years
1 $324 $162 $825 $486 $243 $123
Each add’l $32 $16 $8
Overview
This three-course series covers the IBM AdvancedJob Scheduler for i. The first course, AdvancedJob Scheduler Concepts, provides the conceptsthat everyone will need, including users,managers, operators, and system administrators.The remaining courses are for the operators andsystem administrators responsible for setting upand managing the Advanced Job Scheduler.
The second course, The AJS Text-BasedInterface, covers the traditional, text-based (green-screen) interface to the job scheduler, as well asthe AJS commands. The third course, The AJSWeb-Based Interface, covers the graphicalinterfaces supported by System i Navigator andIBM Navigator for i.
Approximate Study Time for the Entire Series: 10-14 hours
Topic Outline
This series contains the following courses:
Advanced Job Scheduler Concepts
The AJS Text-Based Interface
The AJS Web-Based Interface
Using the Advanced Job Scheduler Competency Exam
Audience
This series is for everyone who will be using theIBM Advanced Job Scheduler for i. The firstcourse, Advanced Job Scheduler Concepts, isdesigned for users, managers, operators, andsystem administrators. The remaining courses are forthe operators and system administrators responsible forsetting up and managing the Advanced Job Scheduler.
Prerequisites
Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing the
courses in the Manta Introduction to the IBM iEnvironment series.
Certain topics within the second and third coursesassume you also have a detailed understanding ofIBM i security and work management. You cansatisfy these prerequisites by successfullycompleting the courses in the following Mantaseries:
IBM i Security
Work Management for System Administrators
The third course also assumes you are familiarwith IBM's Navigator for i product, including how tosign onto your IBM i system using a browser andnavigate the menu structure. You can satisfy thisprerequisite by successfully completing the Mantacourse Using IBM Navigator for i.
You may also have gained this knowledge fromattending classes or from relevant workexperience.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta Using the Advanced Job Scheduler Technologies Inc. 102
Advanced Job Scheduler Concepts
Order Number: AAJS01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces the IBM Advanced JobScheduler for i, a batch scheduling facility that isavailable with IBM i. You will see how the job schedulercan be used to automate the submission and tracking ofthe batch jobs that are run in your installation.
The course begins by describing the advantages that theAdvanced Job Scheduler provides compared to previousjob scheduling methods. It then dives into the mechanicsof job scheduling, describing the options available forspecifying job attributes, defining a schedule, andidentifying the relationships between the programs andmanual processes that make up an application system.You will see how to provide notifications to users andsupport personnel concerning a job's status. Other topicscovered include establishing job default settings, routingreports to users, controlling security, and setting up thejob scheduler.
This information is needed not only by systemsadministrators and operators who will set up andmanage the job scheduler, but also by users andmanagers who will participate in scheduling decisions.
Approximate Study Time: 3.5 hours
Objectives
After completing this course, you should be able to:
Describe the purpose of a job scheduler
Identify the features offered by the IBMAdvanced Job Scheduler for i
Distinguish between the five interfacessupported by the Advanced Job Scheduler
Define terms relating to the Advanced JobScheduler
Describe the basic information that must besupplied to schedule a job for repeated,automatic execution
Describe the ways in which parameters can bepassed to a program that is called by ascheduled job
Describe the operations that can be performedon an AJS job
Describe how a desired job schedule shouldbe specified to the Advanced Job Scheduler
Distinguish between a predefined schedule, ascheduling calendar, a reference calendar, afiscal calendar, and a holiday calendar
Distinguish between job dependency, objectdependency, and active dependency
Describe the various reasons why the jobscheduler may postpone the execution of a job
Describe how the job scheduler can accountfor both manual and automated steps in ascheduled process
Identify the various ways in which job attributescan be specified
Describe the facilities available to restrict theuse of job schedule functions
Identify the purpose of various job schedulerglobal properties
Identify the types of notifications that the jobscheduler can send to a user
Describe the purpose of an escalation list
Describe the options for routing job output tousers
Describe the purpose of an output queuemonitor
Distinguish between the job history and activitylog information that is maintained by the jobscheduler
Describe reasons for using a multiplescheduling environment
Identify additional AJS considerations thatapply when using a multiple schedulingenvironment
Manta Using the Advanced Job Scheduler Technologies Inc. 103
Topic Outline
Job Scheduling
Defining a Job to AJS
Scheduling Options
Job Dependencies
Applications and Job Controls
Notifications and Report Distribution
Multiple Scheduling Environments
Audience
The course serves as an introduction to everyone whowill be using the IBM Advanced Job Scheduler for i.This includes users, managers, operators, and systemadministrators. Later courses in this series teach thehands-on skills needed to set up and manage the jobscheduler.
Prerequisites
Before you begin your study of the material, you shouldhave a working knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the MantaIntroduction to the IBM i Environment series.
You may also have gained this knowledge fromattending classes or from relevant workexperience.
The AJS Text-Based Interface
Order Number: AAJS02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course teaches the hands-on skills needed toset up and manage the IBM Advanced JobScheduler for i using the traditional text-based(green-screen) interface. You can skip this course(or take it later) if you will be using IBM Navigatorfor i to set up and manage the job scheduler.
The course begins by showing you where theAdvanced Job Scheduling functions are locatedand how to use them to schedule a job forrepeated execution. You will learn how to identifythe commands making up the job, provideparameter information, specify job attributes,define a schedule, identify dependencies, providenotifications to users, initialize the job's local dataarea, and specify recovery procedures to be usedin the case of job failure. Subsequent sessions ofthe course cover the creation of supporting itemsincluding calendars and report distribution lists.
As you progress from session to session, thediscussion moves from scheduling an individual jobto the creation of job groups and applications. Thefinal session of the course covers those tasksrelated to the setup and management of the jobscheduler as a whole. Tasks include starting andstopping the scheduler, defining global defaults,and controlling the permissions of users to performjob scheduling tasks.
Approximate Study Time: 2.5 hours
Objectives
After completing this course, you should be able to:
Schedule a job for repeated, automaticexecution
Provide job attributes for a single job, for alljobs within an application, or for all jobs run bythe job scheduler
Display, change, print, or delete theinformation defining a job to the scheduler
Implement a desired job schedule
Create a scheduling calendar, a holidaycalendar, and a fiscal calendar
Manta Using the Advanced Job Scheduler Technologies Inc. 104
Define a job as part of a job group
Specify the action to be taken in case of a jobfailure
Restart a failed job group at a specified job
Identify job, active, and resource dependenciesto the job scheduler
Associate a job with an application
Create a library list to be used by the jobscheduler
Define command variables that can be used tosupply common parameter information tomultiple programs and jobs
Route job reports to the output queues ofspecified users
Notify specified users concerning a job's status
Display a job's scheduling history and job log
Display the log of job scheduler activity
Delete history and log entries that are nolonger needed
Print the job schedule for a specified timeperiod
Start and stop the job monitor
Reset the schedule for one or all jobs
Set up the job scheduler by specifying itsglobal properties
Control the permissions of users to perform jobscheduling tasks
Topic Outline
Defining a Job
Scheduling a Job
Defining Job Dependencies
Applications and Job Controls
Report Distribution
Notifications and Logs
System Controls
Audience
This course teaches the hands-on skills needed toset up and manage the Advanced Job Schedulerusing the traditional text-based (green-screen)interface. It should be taken by all operators andsystem administrators responsible for performingthose tasks.
Prerequisites
Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing thecourses in the Manta Introduction to the IBM iEnvironment series.
Certain topics within this course assume you alsohave a detailed understanding of IBM i securityand work management. You can satisfy theseprerequisites by successfully completing thecourses in the following Manta series:
IBM i Security
Work Management for System Administrators
You may also have gained this knowledge fromattending classes or from relevant workexperience.
Finally, the course also assumes you have takenthe first course of this series, Advanced JobScheduler Concepts.
Manta Using the Advanced Job Scheduler Technologies Inc. 105
The AJS Web-Based Interface
Order Number: AAJS03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course teaches the hands-on skills needed toset up and manage the IBM Advanced JobScheduler for i using the web-based IBM Navigatorfor i. This is IBM's strategic product for IBM isystem management. Because the screens aresimilar, students can also take this course to learnhow to use the older System i Navigator product toperform many of the same tasks. You should beaware, however, that newer features of theAdvanced Job Scheduler are available onlythrough the Navigator for i interface.
The course begins by showing you where theAdvanced Job Scheduling functions are locatedand how to use them to schedule a job forrepeated execution. You will learn how to identifythe commands making up the job, provideparameter information, specify job attributes,define a schedule, identify dependencies, providenotifications to users, initialize the job's local dataarea, and specify recovery procedures to be usedin the case of job failure. Subsequent sessions ofthe course cover the creation of supporting itemsincluding calendars, job queue monitors, reportdistribution lists, and escalation lists.
As you progress from session to session, thediscussion moves from scheduling an individual jobto the creation of job groups and applications. Thefinal session of the course covers those tasksrelated to the set-up and management of the jobscheduler as a whole. Tasks include starting andstopping the scheduler, defining global defaults,and controlling the permissions of users to performjob scheduling tasks.
Approximate Study Time: 3.5 hours
Objectives
After completing this course, you should be able touse the Advanced Job Scheduler's web-basedinterface to:
Schedule a job for repeated, automaticexecution
Provide job attributes for a single job, for alljobs within an application, or for all jobs run bythe job scheduler
Submit a job for immediate execution
Display, change, or delete the informationdefining a job to the scheduler
Implement a desired job schedule
Create and change the following job scheduleritems:
o Scheduling calendars, holiday calendars, and fiscal calendars
o Job groups
o Applications
o Library lists
o Job queue monitors
o Report distribution lists
o Escalation lists
Add a job to a job group
Identify job, active, and resource dependencies
Create a work flow
Indicate that a work flow has started or that awork flow step is complete
Define command variables that can be used tosupply common parameter information tomultiple programs and jobs
Create a recipient to hold user addressinformation
Stop the escalation of a message
Use AJS facilities to send an e-mail to a user
Route job reports to specified users, either bycopying spooled files to specified outputqueues or by sending reports as PDFattachments
Monitor an output queue, causing spooled filesplaced in the queue to be sent to specifiedusers
Control the format of banner pages added torouted reports
Manta Using the Advanced Job Scheduler Technologies Inc. 106
Display a job's scheduling history and the logof job scheduler activity
Specify a retention period for history and logentries
Set up the job scheduler by specifying itsglobal properties
Reset all scheduled jobs
Control the permissions of users to perform jobscheduling tasks
Start and stop the job monitor
Topic Outline
Defining a Job
Scheduling a Job
Defining Job Dependencies
Applications and Job Controls
Notifications
Report Distribution
Job History and Activity Logs
System Controls
Audience
This course teaches the hands-on skills needed toset up and manage the job scheduler using theweb-based IBM Navigator for i or the PC client-based System i Navigator. As a result, it should betaken by all operators and system administratorsresponsible for performing those tasks.
Prerequisites
Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing thecourses in the Manta Introduction to the IBM iEnvironment series.
Certain topics within this course assume you alsohave a detailed understanding of IBM i securityand work management. You can satisfy theseprerequisites by successfully completing thecourses in the following Manta series:
IBM i Security
Work Management for System Administrators
This course also assumes you are familiar withIBM's Navigator for i product, including how to signonto your IBM i system using a browser andnavigate the menu structure. You can satisfy thisprerequisite by successfully completing the Mantacourse Using IBM Navigator for i.
You may also have gained this knowledge fromattending classes or from relevant workexperience.
Finally, the course also assumes you have takenthe first course of this series, Advanced JobScheduler Concepts.
Manta Using the Advanced Job Scheduler Technologies Inc. 107
Using the Advanced Job Scheduler Competency ExamOrder Number: AAJS99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the Usingthe Advanced Job Scheduler series:
Advanced Job Scheduler Concepts
The AJS Text-Based Interface
The AJS Web-Based Interface
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to set up and manage theAdvanced Job Scheduler.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as amastery test for the Using the Advanced JobScheduler series. We recommend that you takethe exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.
Evaluation
The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. If youscore less than 80%, you will be directed to theappropriate course for review.
Audience
This series is for everyone who will be using theIBM Advanced Job Scheduler for i. The firstcourse, Advanced Job Scheduler Concepts, isdesigned for users, managers, operators, andsystem administrators. The remaining courses arefor the operators and system administratorsresponsible for setting up and managing theAdvanced Job Scheduler.
Prerequisites
Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing thecourses in the Manta Introduction to the IBM iEnvironment series.
Certain topics within the second and third coursesassume you also have a detailed understanding ofIBM i security and work management. You cansatisfy these prerequisites by successfullycompleting the courses in the following Mantaseries:
IBM i Security
Work Management for System Administrators
The third course also assumes you are familiarwith IBM's Navigator for i product, including how tosign onto your IBM i system using a browser andnavigate the menu structure. You can satisfy thisprerequisite by successfully completing the Mantacourse Using IBM Navigator for i.
You may also have gained this knowledge fromattending classes or from relevant workexperience.
Manta The Integrated File System Technologies Inc. 108
The Integrated File System
Order Number: FIFS01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
The integrated file system (IFS) provides a singlemechanism for storing and retrieving all objects onan IBM i system.
This course first reviews file systems with whichyou may be familiar, including the IBM i library filesystem, the document library services file system,the PC file system, and the UNIX file system. Itthen describes the structure of the integrated filesystem and how it provides support for the otherfile systems. You will see how objects can beaccessed using the facilities of their native filesystems or using IFS facilities. The course thencovers IFS commands, menus, and applicationprogramming interfaces.
Approximate Study Time: 120 minutes
Objectives
After completing this course, you should be able to:
Describe the structure of the integrated filesystem
Specify the name required to locate an objectin the integrated file system using either anabsolute or a relative path name
Identify the differences between a hard linkand a symbolic link
Identify the symbolic link needed to support agiven processing requirement
Describe how multiple links and symbolic linksprovide additional ways to access an object
Describe how objects from the IBM i libraryfile system, the document library services filesystem, the open systems file system, and theWindows server file system are stored withinthe integrated file system
Identify integrated file system facilities thatcannot be used for objects in other filesystems
Use IBM i commands to:
o Display or change your current directory
o Create, rename, or remove directories,hard links, and symbolic links
o Display the links in a directory and follow adirectory link to a lower level
o Copy, move, check out, check in, save, orrestore an object in the integrated filesystem
Topic Outline
File Systems
Integrated File System Structure
Support for Other File Systems
IFS Directory and Object Manipulation Commands
IFS Link and Security Commands
Audience
This course is intended for all IBM i users who willdefine, manipulate, or use objects stored in theIBM i integrated file system.
Prerequisites
This course assumes that you have anunderstanding of basic IBM i concepts andfacilities.
Manta IFS Security Technologies Inc. 109
Related Courses
This course is similar to Integrated File SystemConcepts, a course in the Introduction to the IBMi Environment series. Integrated File SystemConcept is intended for the general user, TheIntegrated File System is designed for systemadministrators and others who need to know all ofthe commands and menus available formanipulating IFS objects.
In addition to the topics covered in this course, IBMi system administrators need to learn how tocontrol the security of IFS directories and theobjects they contain. This subject is covered intwo places in the Manta curriculum. If you arealready familiar with IBM i security, you can takethe IFS Security course (AIFS02). If you areunfamiliar with IBM i security, you should take theIBM i Security series (ASEC00). This seriesdiscusses security for all objects, including thosestored in directories.
IFS Security
Order Number: AIFS02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the IBM i commands used tocontrol the security of integrated file system (IFS)directories and the objects they contain.
The course begins by relating the security of IFSobjects to what you already know, the security oflibraries and traditional IBM i objects. As you willsee, the concepts of object ownership, publicauthority, private authority, group profiles,authorization lists, and adopted authority carry overto the IFS environment with little change.
The course then describes the commands andpanels used to grant a user private authority to anIFS object. You will also see how to transfer theownership of an IFS object to another user.
Next, the course describes the concept of primarygroup authority. While primary group authority isnot limited to files and directories, this concept wasintroduced to IBM i at the same time as theintegrated file system. You will see how to assignprimary group authority for an IFS object.
Finally, the course describes a security problemthat is introduced by the combined use of System iAccess and the integrated file system. Afterunderstanding why the problem exists, you willlearn how to implement IBM's recommendedsolution.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Identify the authorities needed for a user toaccess directories and files in specified ways
Identify the default value that is used when nopublic authority is specified for an IFS object
Specify the public authority for a new directory
Change the home directory of a user
Determine which users can access an IFSobject and their respective authorities
Grant a user the authority to access an IFSobject
Manta IFS Security Technologies Inc. 110
Revoke the authority of a user to access anIFS object
Change the level of authority a user has to anIFS object
Put an IFS object under the control of anauthorization list
Pass the ownership of an IFS object toanother user
Determine the primary group, if any,associated with an IFS object
Designate a primary group for an IFS object
Change the primary group for an IFS object
Describe the security problem introduced bythe combined use of System i Access and theintegrated file system
Use an authorization list to limit the ability ofSystem i Access users to view library objects
Topic Outline
File and Directory Authorities
Securing IFS Objects
Changing Object Ownership
Using Primary Group Authority
Restricting System i Access Users
Audience
The course is intended for security officers andother personnel who are responsible for designingand implementing a system security plan. Theaudience also includes system administrators,programmers, managers, and users who willparticipate in security planning for the system as awhole or for one or more applications.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
You should also understand the structure and useof the integrated file system. You can satisfy thisprerequisite by successfully completing thefollowing course:
The Integrated File System
Finally, the course assumes that you have anunderstanding of IBM i security concepts andcommands. It is assumed that you obtained thisunderstanding through relevant work experience orby taking other courses. If you are unfamiliar withIBM i security, you should not take this course.Instead, you should take the courses in the IBM iSecurity series. That series includes all of thetopics covered by this course.
Reference Materials
A Student Reference Guide is available for thiscourse.
Manta PowerVM Concepts Technologies Inc. 111
PowerVM ConceptsOrder Number: LPAR02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
PowerVM is IBM's umbrella term for the collectionof virtualization technologies that are available withits Power Systems family. The most important ofthese technologies is logical partitioning, or LPAR,which lets one physical system run multipleoperating systems concurrently, including one ormore copies of IBM i, AIX, and/or Linux.
The course begins with an overview of logicalpartitioning concepts and applications. You willlearn the basic terminology and see how LPAR hasevolved. The course then goes into greater detailon how specific resources are shared amongpartitions, including processors, memory, and I/Odevices. Ways in which partitions cancommunicate with each other are also discussed.
Special considerations for sharing resource amongpartitions are covered next. In particular, partitionscan use both direct I/O, in which physical devicesare owned by the partition, and virtual I/O, in whichresources are supplied by a host partition. VirtualI/O is particularly useful in allocating storage to apartition from DASD owned by another partition.
The last session of the course covers thetechniques that are used to create and managepartitions. Two separate approaches are used byPower Systems. On smaller systems, partitionmanagement tasks are performed using theIntegrated Virtualization Manager (IVM). Largersystems use a separate Hardware ManagementConsole (HMC).
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Identify the advantages of using logicalpartitioning rather than independent systems ora single system image
Distinguish between physical and logicalpartitioning
Define logical partitioning terms
Describe the major tasks performed by thePower Systems hypervisor
Identify the operating systems that can run inhost and client partitions
Describe the purpose of the IntegratedVirtualization Manager (IVM) and HardwareManagement Console (HMC)
Describe how the resources of a sharedprocessor pool are allocated among partitions
Describe the difference between using cappedand uncapped processors in a partition
Describe the benefit of using multiple sharedprocessor pools
Given the performance rating of a system andits partition definitions, compute theperformance to be expected for a givenpartition
Specify whether a proposed dynamic memorychange is valid
Describe how the resources of a sharedmemory pool are allocated among partitions
Distinguish between logically overcommittedand physically overcommitted shared memory
Describe the relationship between an IOP andan IOA
Describe the restrictions concerning themovement of I/O resources between partitions
Identify the ways in which a partition can beprovided with a console
Describe the purpose of virtual I/O, virtual LAN,virtual Fibre Channel, and virtual OptiConnectin an LPARed system
Given a description of which partitions need tocommunicate, determine the number of virtualLANs and virtual adaptors that need to becreated
Distinguish between dedicated I/O and virtualI/O devices
Describe how a host partition can providevirtual disks, a virtual console, a virtual opticaldevice, and/or a virtual tape drive to a clientpartition
Identify ways in which IBM i, AIX, Linux, andWindows can share files and printers across anetwork
Describe the purpose of a partition profile on aPower System
Describe how fixes to the hypervisor code aredistributed
Manta PowerVM Concepts Technologies Inc. 112
Describe how system administration andoperations personnel create and changepartition definitions
Identify the security authority needed toperform specified LPAR operations
Describe how power-related IBM i systemvalues are handled in an LPAR environment
Describe how software and hardware errorsare reported to IBM in an LPAR environment
Topic Outline
LPAR Applications
Partitioning Processor Resources
Active Memory Sharing
Partitioning I/O Resources
InterPartition Communications
VIOS and Client Partitions
Partition Management
Audience
This course is intended for IT personnel who willoperate, administer, or plan for the installation ofan IBM Power System or BladeCenter server.
PrerequisitesThis course assumes that you are familiar withbasic computer concepts and terminology. Somefamiliarity with IBM i, AIX, and Linux is desired, butnot absolutely required. In particular, if yourinstallation uses AIX and/or Linux but not IBM i (orvice versa), you may skip sections that do notapply to your environment.
Reference Materials
No other materials are required to take this course.
A Student Reference Guide is available for thiscourse and LPAR01
Related Products
Students should take this course of theirorganization uses a Power System or Bladeserver.
If the organization uses older iSeries or System ihardware, students should take Introduction toLogical Partitioning instead.
Manta Implementing Single Sign-On Technologies Inc. 113
Implementing Single Sign-On
Order Number: AISS01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
We use the term single sign-on to mean the abilityto access multiple computer systems within anorganization after signing on only once. Thiscourse will show you how to implement a singlesign-on for a network containing systems runningboth Windows and IBM i.
The course begins with a definition of the singlesign-on problem. You will see why solutions suchas using the same ID and password on all systemshave failed. It then describes, in detail, the twotools used to implement single sign-on in the IBM ienvironment: the Kerberos protocol and EnterpriseIdentify Mapping (EIM).
After the concepts and operation of Kerberos andEIM have been covered, the course goes into thedetails of setting up Kerberos and EIM on an IBM isystem. While wizards are available to help youperform these tasks, a thorough understanding ofthe process will help you avoid potential pitfalls.
The course ends by showing you how to enableKerberos authentication for common PC-to-IBM iapplications, including System i Navigator, Systemi Access, and NetServer. Common problems arealso discussed.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Describe why using the same user ID andpassword on all systems in a network is not apractical solution to the single sign-on problem
Distinguish between authentication andauthorization
Describe the key difference in the tasksperformed by the Kerberos protocol andEnterprise Identity Mapping
Define Kerberos terms, including principalname, realm, Key Distribution Center, TicketGranting Ticket, and Service Ticket
Order the steps used by the Kerberos protocolto authenticate a user to a network server
Identify security risks that Kerberos eliminates
Identify security risks that Kerberos does noteliminate
Describe potential Kerberos problems that canresult from a poorly designed DNS process
Describe the purpose of Enterprise IdentityMapping
Describe how the use of Kerberos and EIMeliminates the need for most passwords
Distinguish between an EIM domain and aregistry
Describe the relationship between EIM andLDAP
Use the Network Authentication Service (NAS)wizard to configure Kerberos on an IBM isystem
Describe the function of a keytab file
Use System i Navigator facilities to maintainthe keytab file
Use System i Navigator to create an EIMdomain and a registry
Define EIM associations to relate a Kerberosprincipal name to an IBM i user profile
Create an EIM policy association that maps allusers in a registry to a specific user ID ofanother registry
Set up System i Navigator to use Kerberosauthentication
Describe how System i Access and NetServerare enabled for Kerberos authentication
Manta Implementing Single Sign-On Technologies Inc. 114
Identify potential difficulties in setting upKerberos and EIM
Topic Outline
The Quest for a Single Sign-0n
Kerberos Concepts
Enterprise Identity Mapping Concepts
Adding an IBM i System to a WindowsNetwork
Activating EIM on the IBM i System
Using Kerberos-Enabled Applications
Audience
The course is intended for system administratorswho will implement the Kerberos protocol andEnterprise Identity Mapping (EIM) on an IBM isystem.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Manta series Introduction to theIBM i Environment.
The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the TCP/IP in the IBM i Environmentseries.
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
A Student Reference Guide is available for thiscourse.
Manta The IBM i Programming Environment Technologies Inc. 115
Configuring the HTTP Server
Order Number: CWEB01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Every IBM i system comes with a server programcalled the IBM HTTP Server for i (powered byApache). An HTTP server is the TCP/IPapplication-level component that delivers HTMLdocuments and other objects upon request to abrowser or other client application. This courseshows you how to configure the HTTP server todeliver both static and dynamic content to Internetusers within your own organization or around theworld.
The course begins with an introduction to HTTP.You will see the data flow in both static webrequests (which retrieve existing objects) anddynamic requests (in which the resulting responseis created by a server-side program). The Apacheserver and its relationship to the IBM HTTP Serverfor i is also discussed.
The course then shows you how to access thegraphical control panel for the HTTP server andhow to use it to create a new server instance. Youwill learn how to start the server and check yourwork. You will also see how to specify the locationof your web documents and control access tothem.
Dynamic web applications are covered next. Firstyou will see how to configure the HTTP server tosupport server-side includes. These arecommands for the server that can be embeddedwithin HTML documents to perform such actionsas including the current date or the contents of aspecified HTML document. Then you will see howto configure a CGI program and control its use.
The course ends with a tour of other functions thatare available from the HTTP server control panel.In particular, you will see how the wizards andforms of the control panel are used to createApache server directives. You will see how todisplay and edit these directives directly and whereyou can find additional information about theoptions available.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Identify the three protocols used by basic webapplications
Describe the major functions of an HTTPserver
Describe how a web page invokes a CGIprogram and passes data to it
Interpret an HTTP message header
Identify the roles of server-side includes,Net.Data, and PHP in web applications
Describe the relationship between the IBMHTTP Server for i and Apache servers
Define Apache terms
Access the Web Administration control page
Create an HTTP server instance
Start or stop an HTTP server
Verify that a newly created HTTP serverinstance is working correctly
Identify the effect that a web application'sstructure will have on its performance
Describe the security options that are availablewhen setting up a web application
Add a directory to a web application byassociating the directory's physical name withan alias
Specify the action that the server should takewhen no index.html file is available
Configure the HTTP server to process server-side includes
Code server-side include commands
Identify important considerations when writinga CGI program
Configure the HTTP server to invoke CGIprograms
Configure the HTTP server to supportpersistent CGI transactions
Identify optional server settings that control thebehavior of a CGI program
Select the HTTP Web Administration wizard orform to change a specified server setting
Display and edit the HTTP server configurationfile
Display the Web Administration form for aspecified Apache server directive
Manta The IBM i Programming Environment Technologies Inc. 116
Topic Outline
HTTP Concepts
Configuring a Server
Adding Your Web Documents
Server-Side Includes
Using CGI Programs
Exploring Apache
Audience
This course should be taken by individualsresponsible for managing an organization's website. This audience may include webmasters,developers, and system administrators.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM iprerequisites can be satisfied by completed thefollowing Manta series:
Introduction to the IBM i Environment
It also assumes you are familiar with TCP/IPconcepts and common applications, including FTP,DNS, and HTTP. This latter prerequisite can besatisfied by completing the following Mantacourses:
TCP/IP Fundamentals
eBusiness: From HTML to WebSphere
Reference Materials
No other materials are required to take this course.
A Student Reference Guide is available for thiscourse.
Manta The IBM i Programming Environment Technologies Inc. 117
The IBM i Programming Environment
Order Number: PIPE00
Max.Users
FirstYear
SecondYear
Later Years
1 $324 $162 $825 $486 $243 $123
Each add’l $32 $16 $8
Overview
The IBM i Programming Environment seriesintroduces you to application development on anIBM i system. The series describes theprogramming languages that are commonly usedto develop applications in the IBM i environment,as well as the tools available for developingprograms.
Emphasis is placed on the development of ILEprograms using modern tools such as RationalDeveloper for i (RDi) and the Remote SystemsExplorer (RSE). However, the legacy developmenttools PDM and SEU are also covered.
A major part of program development in the IBM ienvironment is working with Db2 for i, the databasemanagement system that is on every IBM i system.The series covers Db2 concepts and describeshow to create a database file using both SQL andDDS. You will also see the tools available forentering SQL statements and performing databasequeries.
This series also describes the advanced featuresand capabilities of ILE. The described featuresand capabilities allow you to:
More easily manage ILE programs
Write more sophisticated applications
Improve the performance of your ILEapplications
This series contains the following courses:
IBM i Application Programming Concepts
IBM i Programming Tools
ILE Program Management
IBM i Programming Environment CompetencyExam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 9-11 hours
Audience
This series is intended for application developersand programmers who are new to the IBM ienvironment. However, it can be taken by anyoneinterested in learning about the tools used todevelop programs in the IBM i environment.
Prerequisites
This series assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta The IBM i Programming Environment Technologies Inc. 118
IBM i Application Programming Concepts
Order Number: PIPE01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to applicationdevelopment on an IBM i system. The coursebegins by identifying and describing theprogramming languages that are commonly usedto develop applications in the IBM i environment,followed by a more detailed look at CL programs.Next, the course describes the ILE programdevelopment process.
The course then provides an overview of Db2 for i,the database management system that is on everyIBM i system. Next is a discussion on thedifferences between external data and programdescribed data. The course ends by describinghow to create a database file using both SQL andDDS, and how to perform a database query usingthe SQL SELECT statement.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Identify and describe the programminglanguages that are commonly used forapplication development in the IBM ienvironment
Describe how a program written in a particularprogramming language is invoked
List the advantages of packaging CLcommands into a CL program
Identify the CL statements that are commonlyused in a CL program
List the advantages offered by the ILE programdevelopment process
Describe the difference between the originalprogram model (OPM) development processand the integrated language environment (ILE)development process
List the steps required to create an executableILE program
Describe the structure of an ILE program
Identify the types of objects that can be usedas input to a bind operation
List the steps the binder performs in resolvingthe symbols referenced by a module
Identify the advantages database managementsystems offer over a traditional file system
Describe the structure of a relational databaseand use relational database terminology
Describe the Db2 implementation of arelational database
Define and use the terms related to distributeddatabase processing
Describe the processing capabilities in adistributed database environment
Identify the function and capabilities of atrigger program
Use and define referential integrity terminology
Describe the difference between external dataand program described data
Describe the characteristics of a table, giventhe SQL CREATE TABLE statement used todefine it
Describe the characteristics of a physical file,given the DDS source statements used todefine it
Describe the general structure of the SQLSELECT statement
Name and describe the most commonly usedSELECT statement clauses
Describe the results of a query, given an SQLSELECT statement
Topic Outline
Programming Languages
CL Programs
Introduction to ILE
Db2 for i
Defining a Database
SQL Queries
Manta The IBM i Programming Environment Technologies Inc. 119
Audience
This course is intended for application developersand programmers who are new to the IBM ienvironment. However, it can be taken by anyoneinterested in learning about applicationdevelopment in the IBM i environment.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
A Student Reference Guide is available for theseries that contains this course.
IBM i Programming Tools
Order Number: PIPE02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to the tools commonlyused for program and application development inthe IBM i environment.
The first two tools that are described are theRemote System Explorer (RSE) component ofRational Developer for i (RDi) and the LPEX editor,which can be launched from the RSE. You will seehow to use the RSE to work with libraries, objects,and source members on a remote IBM i system,how to use the LPEX editor to create and edit IBM isource members, and how to compile, bind, andexecute programs using the RSE.
The next two tools the course covers are theSource Entry Utility (SEU) and ProgramDevelopment Manager (PDM) components of theApplication Development Toolset (ADTS). You willsee how to use PDM to work with libraries, objects,and source members, how to use the SEU tocreate and edit IBM i source members, and how tocompile, bind, and execute programs using PDM.
Next, the course shows how to use both System iNavigator and Interactive SQL to enter andexecute SQL statements. The course ends byshowing how to use additional tools to query adatabase. These tools include Db2 Web Query fori, Query Manager, and Query for i.
Approximate Study Time: 3 hours
Manta The IBM i Programming Environment Technologies Inc. 120
Objectives
After completing this course, you should be able to:
Start RDi
Define the following RDi terms:
o Workbench
o View
o Editor
o Perspective
Access the RDI Help facility
Use the RSE to work with libraries, objects,and source members on a remote IBM isystem
Launch the RSE LPEX Editor
Use the LPEX editor to create and edit IBM isource members
Use the RSE to:
o Compile a source program
o Bind a module
o Execute a program
Use the Source Entry Utility (SEU) to createand edit IBM i source members
Use PDM to:
o Compile a source program
o Bind a module
o Execute a program
Use System i Navigator to enter and executean SQL statement
Use Interactive SQL to enter and execute anSQL statement
Use the following tools to create and run abasic query:
o Db2 Web Query for i
o Query Manager
o Query for i
Topic Outline
Introduction to RDi and the RSE
Using the LPEX Editor
Program Development using the RSE
Using the Legacy Toolset (PDM and SEU)
Creating and Running SQL Statements
Query Tools
Audience
This course is intended for application developersand programmers who are new to the IBM ienvironment. However, it can be taken by anyoneinterested in learning about the tools used todevelop programs in the IBM i environment.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.
It also assumes you are familiar with the basicconcepts of IBM i application programming. Youcan satisfy this prerequisite by successfullycompleting the previous course in this series, IBM iApplication Programming Concepts.
Reference Materials
A Student Reference Guide is available forthe series that contains this course.
Manta The IBM i Programming Environment Technologies Inc. 121
ILE Program Development
Order Number: PIPE03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the advanced features andcapabilities of the Integrated LanguageEnvironment (ILE). The features and capabilitiesdescribed in this course allow you to:
More easily manage ILE programs
Write more sophisticated applications
Improve the performance of your ILEapplications
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Use the CRTPGM command to create anexecutable program
Use the CRTSRVPGM command to bind ILEmodules into a service program
Use RSE to generate a CRTSRVPGMcommand>
Use PDM to generate a CRTSRVPGMcommand
Use binder language to define a serviceprogram with hidden procedures and/or dataitems
Use binder language to define a serviceprogram with multiple signatures
Use the UPDPGM and UPDSRVPGMcommands to replace modules in an ILEprogram without repeating a bind operation
Create a binding directory
Add an entry to a binding directory
Delete an entry from a binding directory
Describe the role that activation groups play inthe execution of an ILE application
Specify the activation group in which aprogram or service program is to run
Develop an activation group managementstrategy for an application
Topic Outline
The CRTPGM Command
Creating a Service Program
Using Binder language
Performing Updates on an ILE Program
Working with Binding Directories
Activation Group Management
Audience
This course is intended for programmers andapplication developers who would like to use themore advanced features and capabilities of theIntegrated Language Environment.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i programming conceptsand facilities. You can satisfy this prerequisite bysuccessfully completing the first two courses in thisseries:
IBM i Application Programming Concepts
IBM i Programming Tools
Manta The IBM i Programming Environment Technologies Inc. 122
The IBM i Programming EnvironmentCompetency ExamOrder Number: PIPE99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the IBM iProgramming Environment series:
IBM i Application Programming Concepts
IBM i Programming Tools
ILE Program Development
The exam is divided into two parts, one for eachcourse in the series. Successfully completing bothparts of the exam demonstrates your proficiency inthe basic skills required to develop programs in anIBM i environment.
Approximate time to complete all parts of the exam: 1 hour
Recommended Uses
This Competency Exam was designed as amastery test for the IBM i ProgrammingEnvironment series. We recommend that youtake the exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.
Evaluation
The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.
Audience
The IBM i Programming Environment series,including this exam, is intended for applicationdevelopers and programmers who are new to theIBM i environment. However, it can be taken byanyone interested in learning about the tools usedto develop programs in the IBM i environment.
Prerequisites
This series assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta Java Fundamentals Technologies Inc. 123
Java Fundamentals
Order Number: PJAV00
Max.Users
FirstYear
SecondYear
Later Years
1 $216 $108 $545 $324 $162 $81
Each add’l $22 $11 $5
Overview
The Java Fundamentals series introduces you tothe Java programming language. It describes thebasic skills needed to write, compile, and execute asimple Java program in both the IBM i and theWindows environments.
This series contains the following courses:
Introduction to Java
The Basics of Java Programming
Java Fundamentals Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 5-6 hours
Audience
This course is intended for IBM i programmers newto the Java programming language. It is alsoappropriate for anyone wanting a basic introductionto Java.
Prerequisites
This series assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.
The series course also assumes that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
Introduction to the IBM i Environment
Reference Materials
A Student Reference Guide is available for thisseries.
Manta Java Fundamentals Technologies Inc. 124
Introduction to Java
Order Number: PJAV01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to the Java programminglanguage and the Java environment.
The course begins with a brief history of Java. You willsee the features that make Java unique amongprogramming languages and learn the terms that areunique to the Java environment. The course then gives adetailed description of the Java Development Kit (JDK). Itdescribes how to download the JDK and shows how touse several of the tools that the kit provides. You will seehow to compile a Java program, execute a class, andcreate a jar file.
Next, the course describes IBM i's support for Java. Youwill see the various ways to create a Java source file in anIBM i directory. The course then describes how to startQshell, the alternative IBM i command interpreterdesigned to accept and process Java commands. You willlearn how to use a CL command to execute a class. Youwill also be introduced to the IBM Toolbox for Java, acollection of classes to assist you in writing Java programsthat access IBM i resources.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Identify the differences between Java and otherprogramming languages
Give a brief history of Java
Use and define common Java terms
Name and describe the major features of Java
Compile a Java program
Execute a Java program
Create a jar file
Use the EDTF command to create a Javasource program in an IFS directory
Start the Qshell command interpreter
Use Java Platform, SE tools on an IBM i system
Execute a class using a CL command
Describe the contents of the IBM Toolbox forJava
Topic Outline
What is Java?
The Java Development Kit
Java and IBM i
Audience
This course is intended for IBM i programmers newto the Java programming language. It is alsoappropriate for anyone wanting a basic introductionto Java.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Manta Java Fundamentals Technologies Inc. 125
The Basics of Java Programming
Order Number: PJAV02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to the Java programminglanguage. The course begins by describing basicJava syntax. In addition to learning the basic syntaxrules for coding Java statements and the basicorganization of every Java program, you will seehow to include comments in a Java program, how todeclare a class, how to code the import andpackage statements, and how to declare and invokea method. The course then takes a look at Javavariables. You will see the various data types thatJava supports and learn how to declare a Javavariable and assign a value to a Java variable.
The course next looks at the conditional executioncontrol structures — such as If/Else and Do While —that Java supports. This is followed by anintroduction to object oriented programming. Thisdiscussion uses easy-to-understand Java examplesto illustrate the concepts of encapsulation,instantiation, inheritance, and polymorphism. Next,the course looks at some of the slightly moresophisticated data structures supported by Java.These include arrays, vectors, and mutable(modifiable) strings. The course ends with adiscussion of how to work with and manipulatedates.
Approximate Study Time: 3.5 hours
Objectives
After completing this course, you should be able to:
Describe the basic syntax rules for coding Javastatements
Code comments in a Java program
Describe the basic organization of a Java sourceprogram
Declare a class
Code the import and package statements
Declare a method
Invoke a method
Name and describe the Java-supported datatypes
Declare a Java variable
Assign a value to a Java variable
Implement the following control structures in aJava program:
o If
o If/Else
o Case
o Do While
o Do Until
o For
Define the following object-oriented programming terms:
o Encapsulation
o Instantiation
o Inheritance
o Polymorphism
Code the Java statements to create an object
Code a class that can be used as an object
Use the methods in a class to manipulate acorresponding object
Define the following Java-related terms:
o Constructor
o Method overloading
o Method overriding
Declare, instantiate, and manipulate an array, avector, a mutable string, and/or a Date object
Topic Outline
Java Syntax
The Basics of Java Variables
Conditional Processing
Introduction to Object-Oriented Programming
Arrays, Vectors, and Mutable Strings
Working with Dates
Manta Java Fundamentals Technologies Inc. 126
Audience
This course is intended for IBM i programmers newto the Java programming language. It is alsoappropriate for anyone wanting a basic introductionto Java.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Finally, the course assumes you have a basicunderstanding of Java concepts and the Javaenvironment. You can satisfy this prerequisite bysuccessfully completing the first course in thisseries:
Introduction to Java
Manta Java Fundamentals Technologies Inc. 127
Java FundamentalsCompetency Exam
Order Number: PJAV99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the JavaFundamentals series:
Introduction to Java
The Basics of Java Programming
The exam is divided into two parts, one for eachcourse in the series. Successfully completing bothparts of the exam demonstrates your proficiency inthe basic skills required to write Java programs.
Approximate time to complete all parts of the exam: 40 minutes
Recommended Uses
This Competency Exam was designed as a masterytest for the Java Fundamentals series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The Java Fundamentals series, including thisexam, is intended for IBM i programmers new to theJava programming language. It is also appropriatefor anyone wanting a basic introduction to Java.
Prerequisites
This series assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.
The series also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Manta Free-Form RPG Programming Technologies Inc. 128
Free-Form RPG Programming
Order Number: PFFR00
Max.Users
FirstYear
SecondYear
Later Years
1 $756 $378 $1905 $1,134 $567 $285
Each add’l $76 $38 $19
Overview
RPG IV is unique among programming languages inthat it supports two ways to enter statements. Olderversions of RPG use a fixed-format syntax, in whichthe components of a statement must be entered inspecific columns. The current version of RPGsupports this traditional syntax as well as a free-formsyntax that is similar to that used by most modernprogramming languages. It is this free-form syntaxthat is taught in this series.
The Free-Form RPG Programming series containsthe following courses:
Fundamentals of Free-Form RPG
File Processing with Free-Form RPG
Rounding Out the Essentials of Free-Form RPG
Working with Complex Data Types in Free-FormRPG
Developing a Modular Free-Form RPG Application
Developing an Interactive Program in Free-FormRPG
Advanced Free-Form RPG Programming
Free-Form RPG Programming Competency Exam
Approximate Study Time for the Entire Series: 19-25 hours
Audience
This series is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Prerequisites
All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Related Products
The Free-Form RPG Programming series isintended for new programmers who need to learnonly the free-form RPG statements. Students whoneed to learn the older, fixed-format statementsshould take the Manta RPG Programming seriesinstead. That series also discusses key differencesbetween RPG III and RPG IV.
Students who have completed the RPGProgramming series (or who already know RPG,including the free-form C specs introduced in 2001)can take the Programming Free-Form RPG courseto learn the free-form H, F, D, and P specsintroduced in 2014.
IBM has announced that the free-form RPGstatements will never be supported in SEU, theSource Entry Utility. We recommend that RPGdevelopers use Rational Developer for i (RDi),which is covered in the Manta series of the samename. RDi contains prompting and help facilitiesexpressly designed for the free-form RPGprogrammer.
This series covers the standard, record-oriented I/Othat is supported by RPG. Today, mostorganizations use embedded SQL statements inaddition to – or instead of – the RPG I/O op codes.Using embedded SQL is covered in the MantaUsing Structured Query Language (SQL) series.
Both Rational Developer for i (RDi) and UsingStructured Query Language (SQL) can be takenbefore, during, or after the Free-Form RPGProgramming series. The IBM i ProgrammingEnvironment series, which is a prerequisite to thisone, introduces both RDi and SQL at a levelsufficient to complete this series.
Manta Free-Form RPG Programming Technologies Inc. 129
Fundamentals of Free-Form RPG
Order Number: PFFR01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to the RPG IVprogramming language.
The course begins by describing the general codingrequirements of an RPG program. In doing so, itdiscusses the different types of RPG statements anddefines common RPG terms. A sample RPGprogram is illustrated.
The course then takes a detailed look at thestatements used to define various types of dataitems. Next, it examines the statements used toassign a value to a data item, perform arithmeticoperations, and perform character-stringmanipulation. The statements used to implementstructured programming control structures arecovered next. The course ends by describing thedirectives available to control the behavior of the ILERPG compiler.
Approximate Study Time: 3.5 hours
Objectives
After completing this course, you should be able to:
Use RPG terminology
Name the seven RPG specification types anddescribe the function of each
Describe the format rules for free-form RPGstatements
Identify the rules for RPG statement continuation
Code a cycle-main module and a linear-mainmodule
Code the definition specification for a stand-alone field, a named constant, and a datastructure
Name and use the RPG operation codes thatassign a value to a data item
Code the IF, IF/ELSE, DO UNTIL, DO WHILE,SELECT, and FOR structures in an RPGprogram
Code the RPG statements used to exit from aprogram
Name the most commonly used RPG compilerdirectives and describe the function of each
Topic Outline
Introduction to RPG
A Sample RPG Program
Definition Specifications
Manipulating Data Items
Conditional Processing
Compiler Directives
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
The course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Manta Free-Form RPG Programming Technologies Inc. 130
File Processing with Free-Form RPG
Order Number: PFFR02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to process database andprinter files in an RPG program.
The course first shows how to code the filespecification for a database file. The course thencovers the various RPG op codes that are used toprocess a database file. You will see how to performbasic file operations, such as how to read records(both sequentially and randomly), update a record,delete a record, and add a record to a file. You willalso see how to perform more advanced fileoperations, such as how to set the file positionwithout reading a record, how to use a compositekey, and how to release a locked record.
The course then describes the various ways for anRPG program to detect an error condition and theways to obtain information as to the cause of theerror. The course ends by showing you how to codean RPG program that uses commitment control.
Approximate Study Time: 2.5 hours
Objectives
After completing this course, you should be able to:
Code the file specification for both a databaseand printer file
Identify the F-spec keyword used to specify agiven database or printer file attribute
Detect an error condition in an RPG program
Obtain information pertaining to a file error
Code RPG programs that perform the followingfile processing:
o Reads records (either sequentially orrandomly) from a file
o Updates records in a file
o Deletes records from a file
o Adds records to a file
o Sets the file position without reading arecord
o Processes the group of records with thesame key value
o Uses a composite key to access records
o Releases a record previously locked forupdate
o Opens and closes a file
o Forces file changes to auxiliary storage
Code an RPG program that uses commitmentcontrol
Topic Outline
Coding File Specifications
Basic Database File Processing
Advanced Database File Processing
Error Processing
Using Commitment Control
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have a basicunderstanding of RPG programming concepts. Youcan satisfy this prerequisite by successfullycompleting the first course in this series:
RPG Fundamentals
Manta Free-Form RPG Programming Technologies Inc. 131
Rounding Out the Essentials of Free-Form RPG
Order Number: PFFR03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course rounds out your basic RPG coding skills.These skills, along with those you acquired by takingthe first two courses in the Free-Form RPGProgramming series, are the foundation on whichlater courses in the series will build.
The course begins by identifying the type ofinformation that can be provided on a control (orheader) specification and showing you how to codea CTL-OPT statement.
Next, the course considers built-in functions and thevarious operations they perform. It then describesthe date and time processing capabilities built intothe RPG IV language.
You will then see how to code a subroutine and howto call it from other routines. The course ends bydescribing how to detect error conditions, and how toobtain status information that indicates the cause ofan error.
Approximate Study Time: 2.5 hours
Objectives
After completing this course, you should be able to:
Code a control specification
Identify the control specification keyword used tospecify a given piece of information
Identify the RPG built-in function used toperform a specified operation
Code an RPG program that manipulates date ortime fields in the following ways:
o Compares two date or time fields
o Performs date or time arithmetic
o Converts a date or time field from one format to another
o Extracts a portion of a date, time, or timestamp field
o Verifies that the contents of a date, time, or timestamp field are valid
Call a subroutine in an RPG program
Code a subroutine in an RPG program
Detect an error condition in an RPG program
Obtain information that indicates the cause of anerror
Topic Outline
The Control (Header) Specification
RPG Built-In Functions
Working with Dates and Times
Using Subroutines
Program Error Processing
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
The course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
In addition, the course assumes that you have anunderstanding of basic RPG programming conceptsand RPG file processing capabilities. You cansatisfy this prerequisite by successfully completingthe first two courses in this series:
Fundamentals of Free-Form RPG
File Processing with Free-Form RPG
Manta Free-Form RPG Programming Technologies Inc. 132
Working with Complex Data Types in Free-Form RPG
Order Number: PFFR04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to define and work withthe more complex data types that RPG supports.
The course begins by describing how to define andwork with variable-length data items. Arrays arecovered next. You will see how to define, initialize,modify, search, and sort an array. The course thendescribes how to load a compile-time array byincluding the array data at the end of the sourcemodule. RPG tables are discussed next. As you willsee, tables are defined and processed differentlythan arrays. The course ends by describing arraydata structures and multiple-occurrence datastructures. You will see how to define each and howto reference the data that they contain.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Define variable-length data items
Code an RPG program that uses variable-lengthdata items
Define an array and a table
Define and load a compile-time array or table
Code an RPG program that processes an arrayor table
Define an array data structure and a multiple-occurrence data structure
Code an RPG program that processes an arraydata structure or a multiple-occurrence datastructure
Topic Outline
Using Variable-Length Data Items
Using Arrays
Using Compile-Time Arrays
Using Tables
Array and Multiple-Occurrence DataStructures
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This also course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:
Fundamentals of Free-Form RPG
File Processing with Free-Form RPG
Rounding Out the Essentials of Free-Form RPG
Manta Free-Form RPG Programming Technologies Inc. 133
Developing a Modular Application in Free-Form RPG
Order Number: PFFR05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers how to code and call proceduresand subprograms in RPG.
The course first describes the concepts related toprocedures and subprograms, including how theyshare data. Next, the course describes how to codeand to call a subprocedure. User-defined functionsare covered next, followed by external proceduresand subprograms.
You will then see how to make data items and filesavailable to other procedures by making themglobal. The course also describes how the differencebetween automatic and static storage determineswhat happens to data items and files when aprocedure is called repeatedly. Included in this topicis a discussion of RPG facilities for keeping suchresources in static storage.
Finally, the course covers advanced topics related toprocedures and subprograms. You will see how toaccept parameters in a main program, how to code aprocedure that accepts a variable number ofparameters or a variable-length parameter, and howto pass a file to a procedure.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Identify the advantages of modularizing anapplication
Identify and describe the methods that can beused to modularize an application
Describe the techniques that can be used toallow a calling program or
procedure to communicate with a subprogram orcalled procedure
Describe the requirements of a prototyped call
Code a prototype definition
Code a subprocedure, external procedure, orsubprogram
Call a subprocedure, external procedure, orsubprogram
Code a user-defined function
Invoke a user-defined function
Distinguish between local and global files anddata items
Export and import data items
Distinguish between static and automaticstorage
Define a local variable that is kept in staticstorage
Describe how an RPG program or procedurecontrols whether the value of a data item isretained between calls
Define a file whose control information is kept instatic storage
Code a main program that accepts parameters
Code a procedure that accepts a variablenumber of parameters, including no parameters
Code the keywords to trim and adjust parametervalues
Code a procedure that accepts a variable-lengthparameter
Pass a file to a procedure
Topic Outline
Developing a Modular Application
Coding and Using a Procedure
User-Defined Functions
External Procedures and Subprograms
Scope of Definitions
Advanced Parameter Considerations
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Manta Free-Form RPG Programming Technologies Inc. 134
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:
Fundamentals of Free-Form RPG
File Processing with Free-Form RPG
Rounding Out the Essentials of Free-Form RPG
Working with Complex Data Types in Free-FormRPG
Developing an Interactive Program inFree-Form RPG
Order Number: PFFR06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create an interactiveapplication, in which an RPG program gets datafrom, and displays results to, a user at a traditionalgreen-screen workstation. While such programs arerarely written from scratch any more, programmersneed to understand the logic of such programs inorder to maintain them or to covert them to web-based applications.
The course begins by describing the role a displayfile plays in an interactive application and how adisplay file is created. You will see the datadescription specifications (DDS) source statementsmost commonly used for a display file. The coursethen considers the requirements for an interactiveRPG program. You will see how to code the filespecification for a display file and how to displaydata at, and receive data from, a workstation.
The remainder of the course is devoted to the topicof subfiles. After being introduced to the conceptsrelated to subfiles, you will see the DDS statementsused to define a load-all subfile. You will then seehow to code an RPG program to load and display asubfile. The course next uses DDS and RPGprogram examples to illustrate the differencesbetween load-all, expanding, and single-pagesubfiles. You will also see how to code an RPGprogram that reads and updates the records in asubfile.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Interpret the DDS statements used to define adisplay file
Use the CRTDSPF command to create a displayfile from DDS source
Code the file specification for a display file
Use the EXFMT, READ, and WRITE op codesto send data to and receive data from aworkstation user
Manta Free-Form RPG Programming Technologies Inc. 135
Use indicators to determine if a special-purposekey, such as a function key, was pressed
Interpret the DDS statements used to define asubfile
Code the RPG statements to define, load, anddisplay a subfile
Describe the differences between a load-allsubfile, an expanding subfile, and a single-pagesubfile
Describe the differences between the DDS for aload-all subfile, an expanding subfile, and asingle-page subfile
Code the RPG statements to read subfilerecords
Code the RPG statement to update a subfilerecord
Topic Outline
Creating a Display File
Coding an Interactive Program
Introduction to Subfiles
Using Expanding and Single-Page Subfiles
Reading and Updating Subfile Records
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:
Fundamentals of Free-Form RPG
File Processing with Free-Form RPG
Rounding Out the Essentials of Free-Form RPG
Developing a Modular Free-Form RPGApplication
Manta Free-Form RPG Programming Technologies Inc. 136
Advanced Free-Form RPG Programming
Order Number: PFFR07
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes advanced RPG codingtechniques involving the use of data areas, pointers,dynamic storage, null-capable fields, and outputspecifications.
The course begins by describing how an RPGprogram can access and modify a data area. Next,you will see how to define and use pointers in anRPG program. The course then shows how an RPGprogram can acquire, use, and free dynamic storageand how to process null-capable fields within anRPG program. The course ends by describing howto code the output specifications for a program-described printer file.
Approximate Study Time: 2.5 hours
Objectives
After completing this course, you should be able to:
Access the contents of a data area
Change the contents of a data area
Define and use a basing pointer data item
Define and use a procedure pointer data item
Use the %ALLOC built-in function to acquiredynamic storage
Use the DEALLOC op code to free previouslyacquired dynamic storage
Use the %REALLOC built-in function to changethe length of previously acquired dynamicstorage
Use the ALWNULL control specification tocontrol whether a program can read from and/orwrite to files containing null-capable fields
Identify a data item as being null capable
Use the %NULLIND built-in function todetermine whether a null-capable field containsa null value
Pass a null-capable field and its null-byte map toa program or procedure
Identify and describe the F-spec keywords thatare used with printer files
Use the EXCEPT op code to write records to aprogram-described printer file
Code the output specifications for a program-described printer file
Topic Outline
Using Data Areas
Using Pointers
Acquiring and Using Dynamic Storage
Processing Null-Capable Fields
Using Program-Described Printer Files
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the first five courses of this series:
Fundamentals of Free-Form RPG
File Processing with Free-Form RPG
Rounding Out the Essentials of Free-Form RPG
Working with Complex Data Types in Free-FormRPG
Developing a Modular Free-Form RPGApplication
Manta Free-Form RPG Programming Technologies Inc. 137
Free-Form RPG Programming Competency ExamOrder Number: PFFR99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the Free-Form RPG Programming series:
Fundamentals of Free-Form RPG
File Processing with Free-Form RPG
Rounding Out the Essentials of Free-Form RPG
Working with Complex Data Types in Free-FormRPG
Developing a Modular Free-Form RPGApplication
Developing an Interactive Program in Free-FormRPG
Advanced Free-Form RPG Programming
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to develop free-form RPGapplications.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the Free-Form RPG Programming series.We recommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than
80%, you will be directed to the appropriate sessionfor review.
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.
Prerequisites
All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.
These courses also assume that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
Finally, the courses in this series also assume youfamiliar with IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
The IBM i Programming Environment
Reference Materials
While no other materials are required to take thisexam, you will be asked to do extensive RPGcoding. It is recommended that you have one of thefollowing reference sources available when takingthe exam:
The ILE RPG Language Reference manual
Access to the IBM i Knowledge Center
This Manta Student Reference Guide for theFree-Form RPG Programming series
Manta RPG Programming Technologies Inc. 138
RPG Programming
Order Number: PRPG00
Max.Users
FirstYear
SecondYear
Later Years
1 $756 $378 $1905 $1,134 $567 $285
Each add’l $76 $38 $19
Overview
The RPG Programming series covers thedevelopment of ILE RPG applications on an IBM isystem.
This series contains the following courses:
RPG Fundamentals
RPG File Processing
Rounding Out The Essentials of RPG
Working with Complex Data Types
Developing a Modular RPG Application
Developing an Interactive RPG Program
Advanced RPG Programming
RPG Programming Competency Exam
Approximate Study Time for the Entire Series: 17-24 hours
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.
Prerequisites
All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.
These courses also assume that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
Finally, the courses in this series also assume youfamiliar with IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
The IBM i Programming Environment
Reference Materials
A Student Reference Guide is available for thisseries.
Manta RPG Programming Technologies Inc. 139
RPG Fundamentals
Order Number: PRPG01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to the RPG IVprogramming language.
The course begins by describing the general codingrequirements of an RPG program. In doing so, itdiscusses the different specification types of RPGstatements and defines common RPG terms.
The course then shows how to use the Source EntryUtility (SEU). You will see how to use the SEUprompting facility to enter the source code for anRPG program. You will also see how the SEUsyntax checker works.
Next, the course takes a detailed look at thedefinition specification, which is used to definevarious types of data items. The course thenexamines the calculation specification in depth, andcovers the op codes used to assign a value to a dataitem, perform arithmetic operations, and performcharacter string manipulation. The op codes used toimplement IF, IF/ELSE, and DO WHILE logicstructures are covered next. The course ends bydescribing some additional coding considerations,such as how to continue an RPG statement and howto exit from an RPG program.
Approximate Study Time: 2.5 hours
Objectives
After completing this course, you should be able to:
Name the seven RPG specification types anddescribe the function of each
Use RPG terminology
Identify the rules for RPG statementcontinuation
Name the most commonly used RPG compilerdirectives and describe the function of each
Use the LPEX editor's prompting facility to enterRPG statements
Use the SEU's prompting facility to enter RPGstatements
Name and describe the various data typessupported by RPG
Code the definition specification for a stand-alone field, a named constant, and a datastructure
Name and use the RPG op codes that assign avalue to a data item
Code an IF structure in an RPG program
Code an IF/ELSE structure in an RPG program
Code a DO WHILE structure in an RPGprogram
Code the RPG statements used to exit from aprogram
Topic Outline
Introduction to RPG
Using the LPEX Editor and SEU PromptingFacilities
Definition Specifications
Manipulating Data Items
Conditional Processing
Additional RPG Coding Considerations
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Manta RPG Programming Technologies Inc. 140
RPG File Processing
Order Number: PRPG02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to process database andprinter files in an RPG program.
The course first shows how to code the filespecification for a database file. The course thencovers the various RPG op codes that are used toprocess a database file. You will see how to performbasic file operations, such as how to read records(both sequentially and randomly), update a record,delete a record, and add a record to a file. You willalso see how to perform more advanced fileoperations, such as how to set the file positionwithout reading a record, how to use a compositekey, and how to release a locked record.
The course then describes the various ways for anRPG program to detect an error condition and theways to obtain information as to the cause of theerror. Next, you will see how to code an RPGprogram that uses commitment control. The courseends by covering the coding requirements of aprogram that produces printed output.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Code the file specification for both a databaseand printer file
Identify the F-spec keyword used to specify agiven database or printer file attribute
Detect an error condition in an RPG program
Obtain information pertaining to a file error
Code RPG programs that perform the followingfile processing:
o Read records (either sequentially orrandomly) from a file
o Update records in a file
o Delete records from a file
o Add records to a file
o Set the file position without reading a record
o Process the group of records with the samekey value
o Use a composite key to access records
o Release a record previously locked forupdate
o Open and close a file
o Force file changes to auxiliary storage
o Write records to a program-described printerfile
Code an RPG program that uses commitmentcontrol
Code the output specifications for a program-described printer file
Topic Outline
Coding File Specifications
Basic Database File Processing
Advanced Database File Processing
Error Processing
Using Commitment Control
Producing Printed Output
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.
Manta RPG Programming Technologies Inc. 141
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have a basicunderstanding of RPG programming concepts. Youcan satisfy this prerequisite by successfullycompleting the first course in this series:
RPG Fundamentals
Rounding Out the Essentials of RPG
Order Number: PRPG03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course rounds out your basic RPG coding skills.These skills, along with those you acquired by takingthe first two courses in the RPG Programmingseries, are the foundation on which later courses inthe series will build.
The course begins by identifying the type ofinformation that can be provided on a headerspecification and showing you how to code an H-spec.
Next, the course shows how to use subroutines tomodularize a program. You will see how to code asubroutine and how to call it from other routines.The course then considers built-in functions and thevarious operations they perform.
Next, the course describes the date processingcapabilities built into the RPG IV language. Thecourse ends by describing the obsolete languagefeatures you are most likely to encounter whenmodifying and maintaining existing RPG programs.
Approximate Study Time: 2 hours
Manta RPG Programming Technologies Inc. 142
Objectives
After completing this course, you should be able to:
Code a header specification
Identify the header specification keyword usedto specify a given piece of information
Call a subroutine in an RPG program
Code a subroutine in an RPG program
Identify the RPG built-in function used toperform a specified operation
Code an RPG program that manipulates date ortime fields in the following ways:
Compares two date or time fields
Performs date or time arithmetic
Converts a date or time field from oneformat to another
Extracts a portion of a date, time, ortimestamp field
Verifies that the contents of a date, time, ortimestamp field are valid
Identify the coding differences between a fixed-format C-spec and a free-format C-spec
Describe how indicators are used to detectvarious exception and error conditions
Given an obsolete RPG op code, identify itsfunction
Topic Outline
The Header (Control) Specification
Using Subroutines
RPG Built-In Functions
Working with Dates and Times
Obsolete Language Elements and Op Codes
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have aunderstanding of basic RPG programming conceptsand RPG file processing capabilities. You cansatisfy this prerequisite by successfully completingthe first two course in this series:
RPG Fundamentals
RPG File Processing
Manta RPG Programming Technologies Inc. 143
Working with Complex Data Types
Order Number: PRPG04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to define and work withthe more complex data types that RPG supports.The course begins by describing how to define andwork with variable-length data items. Run-timearrays are covered next. You will see how todefine, initialize, modify, search, and sort a run-timearray. The course then describes how to define andload two other types of arrays: compile-time andprerun-time arrays. This is followed by a discussionof RPG tables. You will see how to both define andwork with tables. The course ends by describingmultiple-occurrence data structures. You will seehow to define a multiple-occurrence data structureand how to reference the data that it contains.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Define a variable-length data item
Code an RPG program that uses variable-length data items
Define a run-time array
Define a compile-time array
Define a prerun-time array
Code an RPG program that processes an array
Define a table
Code an RPG program that processes a table
Define a multiple-occurrence data structure
Code an RPG program that processes amultiple-occurrence data structure
Topic Outline
Using Variable-Length Data Items
Using Run-Time Array
Using Compile-Time and Prerun-Time Arrays
Using Tables
Using Multiple-Occurrence Data Structures
Audience
This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who will be developing ILERPG applications.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses in this series:
RPG Fundamentals
RPG File Processing
Rounding Out the Essentials of RPG
Manta RPG Programming Technologies Inc. 144
Developing a Modular RPG Application
Order Number: PRPG05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers how to code and callsubprograms and procedures in RPG.
The course first describes the concepts related tosubprograms and procedures. You will beintroduced to the two types of procedures andsubprograms (prototyped and non-prototyped) andsee how programs and procedures share data.Next, the course describes how to code and to call aprototyped procedure or subprogram.Subprocedures and user-defined functions arecovered next.
The course then shows how to code and to call non-prototyped procedures and subprograms. Thisdiscussion includes how to define a parameter list topass and accept parameters.
You will then see the coding requirements for alinear-main module. A linear-main module is onethat includes a main procedure but does not includethe code for the program cycle. Finally, the coursecovers advanced topics related to procedures andsubprograms. You will see how to acceptparameters in a main program, how to code aprocedure that accepts a variable number ofparameters or a variable-length parameter, and howto export and import data items.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should beable to:
Identify the advantages of modularizing anapplication
Identify and describe the methods that can beused to modularize an application
Describe the techniques that can be used toallow a calling program or procedure tocommunicate with a subprogram or calledprocedure
Describe the differences between a prototypedand non-prototyped call
Code a prototype definition
Code a prototyped procedure or subprogram
Call a prototyped procedure or subprogram
Code a subprocedure
Code a user-defined function
Invoke a user-defined function
Identify the op codes used to:
o Call a non-prototyped subprogram
o Call a non-prototyped procedure
o Define a parameter list for a non-prototypedcall
Identify and describe the three types of RPGmodules
Identify and describe the coding requirementsfor a linear-main module
Code a main program that accepts parameters
Code a procedure that accepts a variablenumber of parameters
Code a procedure that accepts a variable-length parameter
Define a local variable that is stored in staticstorage
Export and import data items
Manta RPG Programming Technologies Inc. 145
Topic Outline
Using Subprograms and Procedures
Prototyped Procedures and Subprograms
Coding a Subprocedure
Non-Prototyped Subprograms and Procedures
Coding a Linear-Main Module
Advanced Topics
Audience
This course is intended for IBM i programmers newto the RPG programming language. It can also betaken by RPG III programmers who want to learnRPG IV.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:
RPG Fundamentals
RPG File Processing
Rounding Out the Essentials of RPG
Working with Complex Data Types
Developing an Interactive RPG Program
Order Number: PRPG06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create an interactiveapplication.
The course begins by describing the role a displayfile plays in an interactive application and how adisplay file is created. You will see the datadescription specifications (DDS) source statementsmost commonly used for a display file. The coursethen considers the requirements for an interactiveRPG program. You will see how to code the F-specfor a display file and how to display data at, andreceive data from, a workstation.
The remainder of the course is devoted to the topicof subfiles. After being introduced to the conceptsrelated to subfiles, you will see the DDS statementsused to define a load-all subfile. You will then seehow to code an RPG program to load and display asubfile. The course next uses DDS and RPGprogram examples to illustrate the differencesbetween load-all, expanding, and single-pagesubfiles. You will also see how to code an RPGprogram that reads and updates the records in asubfile.
Approximate Study Time: 2 hours
Manta RPG Programming Technologies Inc. 146
Objectives
After completing this course, you should beable to:
Interpret the DDS statements used to define adisplay file
Use the CRTDSPF command to create adisplay file from DDS source
Code the F-spec for a display file
Use the EXFMT, READ, and WRITE op codesto send data to and receive data from aworkstation user
Use indicators to determine if a special-purposekey, such as a function key, was pressed
Interpret the DDS statements used to define asubfile
Code the RPG statements to define, load, anddisplay a subfile
Describe how a load-all subfile, an expandingsubfile, and a single-page subfile differ
Describe how the DDS for a load-all subfile, anexpanding subfile, and a single-page subfilediffers
Code the RPG statements to read subfilerecords
Code the RPG statement to update a subfilerecord
Topic Outline
Creating a Display File
Coding an Interactive Program
Introduction to Subfiles
Using Expanding and Single-Page Subfiles
Reading and Updating Subfile Records
Audience
This course is intended for IBM i programmers newto the RPG programming language. It can also betaken by RPG III programmers who want to learnRPG IV.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:
RPG Fundamentals
RPG File Processing
Rounding Out the Essentials of RPG
Working with Complex Data Types
Developing a Modular RPG Application
Manta RPG Programming Technologies Inc. 147
Advanced RPG Programming
Order Number: PRPG07
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes advanced RPG codingtechniques.
The course begins by describing how an RPGprogram can access and modify a data area. Next,you will see how to detect error conditions, and howto obtain status information that indicates the causeof the error. The course then shows how to defineand use pointers in an RPG program. The courseends by describing how an RPG program canacquire, use, and free dynamic storage.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Access the contents of a data area
Change the contents of a data area
Detect an error condition in an RPG program
Obtain information that indicates the cause ofan error
Define and use a basing pointer data item
Define and use a procedure pointer data item
Use the %ALLOC built-in function to acquiredynamic storage
Use the DEALLOC statement to free previouslyacquired dynamic storage
Use the %REALLOC built-in function to changethe length of previously acquired dynamicstorage
Topic Outline
Using Data Areas
Error Processing
Using Pointers
Acquiring and Using Dynamic Storage
Audience
This course is intended for IBM i programmers newto the RPG programming language. It can also betaken by RPG III programmers who want to learnRPG IV.
Prerequisites
This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the first five courses of this series:
RPG Fundamentals
RPG File Processing
Rounding Out the Essentials of RPG
Working with Complex Data Types
Developing a Modular RPG Application
Manta RPG Programming Technologies Inc. 148
RPG Programming Competency ExamOrder Number: PRPG99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the RPGProgramming series:
RPG Fundamentals
RPG File Processing
Rounding Out The Essentials of RPG
Working with Complex Data Types
Developing a Modular RPG Application
Developing an Interactive RPG Program
Advanced RPG Programming
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to develop ILE RPGapplications.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the RPG Programming series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate sessionfor review.
Audience
The RPG Programming series, including this exam,is intended for programmers new to the RPGprogramming language. It can also be taken byRPG III programmers who want to learn RPG IV.
Prerequisites
All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.
These courses also assume that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:
Introduction to the IBM i Environment
Finally, the courses in this series also assume youfamiliar with IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
The IBM i Programming Environment
Manta Coding Free-Form RPG Technologies Inc. 149
Coding Free-Form RPG
Order Number: PRPG11
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
RPG has undergone numerous enhancementsduring the last fifty years. A major theme of theenhancements has been to make the languageeasier to learn and code. The most recent changes,called free-form RPG, continue this trend. In anutshell, free-form RPG removes the strict columnrequirements for most RPG statements. As withmany newer languages, statements can spanmultiple lines and begin in any column. In additionto making the language easier to use by existingRPG programmers, the enhancements make itpossible for programmers with experience in otherlanguages to become productive more readily,especially when performing maintenance work.
This course begins with an overview of free-formRPG and how the enhancements continue a trendthat has been going on for years. The coding detailsfor free-form H, F, D, and P specs are then covered.You will see how to code the new statements andhow they compare to those with which you arealready familiar. The course ends with a discussionof the tools available to write programs using thenew format and to convert existing programs to usethe free-form statements.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be ableto:
Describe the general rules for coding free-formRPG statements
Given an existing RPG IV statement, code theequivalent statement using free-form RPG
Given a description of a program's generalrequirements, code an H spec using free-formRPG
Given a description of a file to be used by aprogram, code the corresponding F spec usingfree-form RPG
Given a description of a stand-alone field, anamed constant, and a data structure to be usedby a program, code the corresponding D specsusing free-form RPG
Given a description of a procedure to be used bya program, code the procedure's P spec,procedure interface, and prototype definitionusing free-form RPG
Describe the support for free-form RPGstatements available in the Source-Entry Utility(SEU) and Rational Developer for i (RDi).
Identify software available to convert existingRPG programs to use free-form statementswhere possible.
Topic Outline
Introduction to Free-Form RPG
Free-Form H Specs
Free-Form F Specs
Free-Form D Specs
Free-Form P Specs and Procedure Prototypes
Programming Tools
Competency Exam
Audience
This course is intended for both experienced RPGprogrammers and those programmers who are newto the language.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities. Italso assumes that you can write and compile RPGIV programs on an IBM i system. You can satisfythese prerequisites by successfully completing thecourses in the following Manta series:
Introduction to the IBM i Environment
The IBM i Programming Environment
RPG Programming
Reference Materials
A Student Reference Guide is available for thiscourse.
Manta Using Screen Design Aid (ADA) Technologies Inc. 150
Using Screen Design Aid (SDA)
Order Number: PSDA01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to the Screen DesignAid (SDA), which is part of the ApplicationDevelopment Toolset program product.
The course begins with an introduction to displayfiles and the Data Description Specifications (DDS)used to create them. While you do not need anextensive knowledge of DDS in order to use SDA, abasic knowledge of DDS for display files makes iteasier to understand the choices you have whenusing SDA.
Next, the course walks you through the process ofusing SDA to design screens.
The course then describes how to use SDA to createa *MENU object, define a subfile, and associateonline help with a display or menu.
The course ends by describing some additionalfunctions and capabilities of SDA, including itsdisplay test function, and its support for definingwindows.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able touse SDA to:
Design a display
Create a display file
Define the fields on a display
Specify field-, record-, and file-level keywords
Assign indicators to fields
Make modifications to a screen design
Create a menu display
Create a *MENU object
Define a subfile
Generate help specifications
Create online help for a menu
Test a display file
Create a window display
Design a display that includes the current date,current time, system name, and/or user profilename for the current job
Topic Outline
Introduction to Display Files, DDS, and SDA
Creating a Basic Display File
Rounding Out the Essentials
Creating a Menu
Creating Subfiles
Online Help
Additional Capabilities
Audience
This course is intended primarily for programmersbut can be taken by anyone who will be using SDAto design screens and create display files.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities and programming in theIBM i environment. You can satisfy this prerequisiteby successfully completing the following Mantaseries:
Introduction to the IBM i Environment
The IBM i Programming Environment
Reference Materials
A Student Reference Guide is available for thiscourse.
Manta Using the ILE Source-Level Debugger
Technologies Inc. 151
Using the ILE Source-Level Debugger
Order Number: PILE06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to use the ILE source-level debugger to debug a program interactively. Itshows how to set breakpoints (both unconditionaland conditional), display the value of a data item,change the value of a data item, and step through aprogram one statement at a time. It covers all of thedebugging functions provided by the debugger, boththose implemented using debugging commands andthose implemented using function keys.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Define and use the terms related to the ILEsource-level debugger, such as debug mode,debug data, and debug view
Name and describe the different debug viewsthat can be generated when creating a module
Start the ILE source-level debugger by placingyour interactive job in debug mode
Set both unconditional and conditionalbreakpoints in a program
Display the current contents of a data item
Change the contents of a data item
Step through a program one statement at atime
Use a watch condition to stop programexecution when the value of a data item ischanged
Add programs to and remove programs fromdebug mode
Define and use abbreviations for a data itemname, an expression, or a debug commandwhile debugging a program
Topic Outline
Introduction to the ILE Source-Level Debugger
Sample Debugging Session
Using Breakpoints
Displaying and Changing Data Items
Stepping Through a Program
Additional Debugging Functions
Audience
This course is intended for anyone who will bedeveloping ILE programs in the IBM i environment.
Prerequisites
This course assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Manta Working with Db2 Databases
Technologies Inc. 152
Working with Db2 Databases
Order Number: PDBP00
Max.Users
FirstYear
SecondYear
Later Years
1 $648 $324 $1625 $972 $486 $243
Each add’l $65 $32 $16
Overview
The Working with Db2 Databases series coversDb2 for i, the relational database managementsystem that is part of every IBM i system. This seriescontains the following courses:
Introduction to Db2
Creating and Managing Physical Files
Creating and Managing Logical Files
Processing a Db2 Database
Using Triggers
Using Referential Integrity
Working with Db2 Databases CompetencyExam
The first course in the series describes basic Db2concepts. It also looks at the products and tools thatare used with a Db2 database, including those usedin a distributed database environment.
The next two courses in the series describe how todefine, create, and manage the physical and logicalfiles in a Db2 database. The fourth course describesthe capabilities of an application that processes filesin a Db2 database and, in doing so, takes a detailedlook at the OVRDBF, OPNDBF, and OPNQRYFcommands.
The last two courses cover two advanced databasetopics. You will see how to code and use triggerprograms and how to implement referential integrityin a Db2 database.
Approximate Study Time for the Entire Series: 10-14 hours
Audience
The first course in the series, Introduction to Db2,should be taken by everyone who needs anunderstanding of relational databases. Theremaining courses are for the programmer who willcreate, maintain, and develop applications thatprocess Db2 databases.
Prerequisites
All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the seriesIntroduction to the IBM i Environment.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta Working with Db2 Databases
Technologies Inc. 153
Introduction to Db2
Order Number: PDBP01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you to Db2, the relationaldatabase management system that is part of everyIBM i system. The course begins by describingbasic database concepts, focusing in particular onrelational databases. It then describes the Db2implementation of a relational database. The courseprovides a detailed description of physical files,logical files, and the products and tools that are usedwith a Db2 database. It ends with a description ofthe tools and products that are used in a distributeddatabase environment.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Identify the advantages database managementsystems offer over a traditional file system
Describe the structure of a relational databaseand use relational database terminology
Describe the Db2 implementation of a relationaldatabase
Name and describe the types of physical filesand logical files that IBM i supports
Describe the structure of a physical file and alogical file
Identify the different ways in which a physicalfile and a logical file can be defined and created
Identify and describe the tools available to auser for accessing a Db2 database
Identify and describe the different ways in whichan application program can access a Db2database
Describe the processing capabilities in adistributed database environment
Describe the functions and capabilities of thevarious tools and products available for adistributed database environment
Identify the function and capabilities of a triggerprogram
Topic Outline
Db2 Concepts
Physical Files
Logical Files
Accessing a Database
Database Tools and Products
Audience
This course is intended for anyone who will beworking with a Db2 database. This audienceincludes:
Programmers and application developers whowill be creating Db2 databases and developingapplications that process Db2 databases
System administrators who will be responsiblefor managing a Db2 database
Managers and other users who will be definingand running database queries
The course is also recommended for anyone whowants to learn Db2 concepts and capabilities.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.
Manta Working with Db2 Databases
Technologies Inc. 154
Creating and Managing Physical Files
Order Number: PDBP02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create and managethe physical files in a Db2 database. The coursebegins by describing the basics of DDS coding andhow to create a DDS source member. It then covershow to define a physical file using DDS. Next, thecourse shows how to use the CRTPF command tocreate a physical file from DDS, and how to use theCRTSRCPF command to create a source physicalfile. The course then describes field reference files.It shows how to both create and use a fieldreference file. The course ends by showing how toperform various management and maintenancetasks on physical files.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Use the SEU to create a DDS source member
Code the DDS statements to define a dataphysical file
Use PDM to create a data physical file fromDDS source
Use the CRTPF command to create a dataphysical file from DDS source
Use the CRTSRCPF command to create asource physical file
Define and create a field reference file
Use field referencing when defining a physicalfile
Display the attributes of a physical file
Change the attributes of a physical file
Delete, copy, move, or rename a physical file
Reorganize a physical file
Add a member to a physical file
Remove a member from a physical file
Rename a member in a physical file
Topic Outline
DDS Basics
Defining a Data Physical File
Creating a Physical File
Using a Field Reference File
Working with Physical Files
Audience
This course is intended for programmers andapplication developers who will be creating Db2databases. It should also be taken by anyone whowill be creating and/or managing physical files.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2.
Manta Working with Db2 Databases
Technologies Inc. 155
Creating and Managing Logical Files
Order Number: PDBP03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create and managethe logical files in a Db2 database. The coursebegins by describing how to use DDS statementsdefine simple logical files. You will see how to:
Specify an alternative ordering to the records ina physical file
Allow access only to selected fields in eachrecord in a physical file
Extract selected records from a physical file
The course then describes how to define a joinlogical file and a multiple-format logical file usingDDS statements. The course ends by showing howto perform various management and maintenancetasks on logical files.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Code the DDS statements to define a simplelogical file that:
o Defines an alternative access path to aphysical file
o Allows access only to selected fields fromrecords in a physical file
o Allows access only to selected records in aphysical file
Define a field in a logical file that is aconcatenation of two fields from a physical file
Define a field in a logical file that is a substringof a field from a physical file
Code the DDS statements to define a joinlogical file
Code the DDS statements to define a multiple-format logical file
Use PDM to create a logical file from DDSsource
Use the CRTLF command to create a logicalfile from DDS source
Display the attributes of a logical file
Change the attributes of a logical file
Delete, copy, move, or rename a logical file
Add a member to a logical file
Topic Outline
Defining a Simple Logical File
Defining a Join Logical File
Defining a Multiple-Format Logical File
Creating a Logical File
Working with Logical Files
Audience
This course is intended for programmers andapplication developers who will be creating Db2databases. It should also be taken by anyone whowill be creating and/or managing logical files.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2 and DDS. In particular, you should know howto define a physical file using DDS. You can satisfythese prerequisites by successfully completing thefirst two courses in this series:
Introduction to Db2
Creating and Managing Physical Files
Manta Working with Db2 Databases
Technologies Inc. 156
Processing a Db2 Database
Order Number: PDBP04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the capabilities of anapplication that processes files in a Db2 database.The course begins by describing the basic fileoptions supported by Db2. It then shows how to usethe OVRDBF command to override the fileprocessing options in effect for a program. You willnext see how programs running in the same job canshare an open data path (ODP) to a Db2 file. Thisdiscussion includes descriptions of the OPNDBFand CLOF commands. The course ends by showinghow to use the OPNQRYF command to create analternative view of the data in a Db2 database.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Identify and describe the basic file operationssupported by Db2
Identify what operations set and change fileposition
Describe how Db2 indicates to an applicationprogram that an exception or error conditionexists
Use the OVRDBF command to override adatabase file's attributes and an applicationprogram's file processing options
List the benefits provided by a shared opendata path
Use the OPNDBF command to open a shareddatabase file
Use the CLOF command to close a shareddatabase file
Use the OPNQRYF command to define analternative view of the data in a database
Topic Outline
Processing Files in a High-Level LanguageProgram
Overriding Database File Processing Options
Sharing Database Files
Using the OPNQRYF Command
Audience
This course is intended for programmers andapplication developers who will be creatingapplications that process a Db2 database.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2.
Manta Working with Db2 Databases
Technologies Inc. 157
Using Triggers
Order Number: PDBP05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to code and use triggerprograms.
The course begins by describing trigger programconcepts and terminology. You will then see how tocode a trigger program. Next, the course covers theCL commands related to triggers. You will see howto assign a trigger to a file, display information aboutthe triggers assigned to a file, and remove a trigger.The course ends by discussing the design andperformance issues that are unique to triggerprograms.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Describe the function and capabilities of atrigger program
Identify the database events that can cause atrigger to fire
Identify appropriate applications for a trigger
Identify the different types of triggers that canbe assigned to a file
Describe the general format of the trigger bufferand the information it contains
Describe and use common trigger programcoding techniques
Assign a trigger to a file
Display information about the triggers that havebeen assigned to a file
Remove a trigger from a file
Define what is meant by cascading triggers andrecursive trigger firing
Identify situations in which a multiple-purposetrigger program is appropriate
Describe the techniques that can be used tolimit user access to trigger programs
Identify the issues related to error handling in atrigger program
Describe the effects of using commitmentcontrol with a trigger program
List the processing limitations of a triggerprogram
Topic Outline
Introduction to Triggers
Coding a Trigger Program
CL Commands for Working with Triggers
Trigger Program Design and PerformanceConsiderations
Audience
This course is intended for programmers andapplication developers who will be creating triggerprograms.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2. Finally, it assumes you have areading knowledge of either RPG IV or COBOL.
Manta Working with Db2 Databases
Technologies Inc. 158
Using Referential Integrity
Order Number: PDBP06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to implement referentialintegrity in a Db2 database. The course begins bydescribing the concept of referential integrity anddiscussing how it is implemented in a Db2 database.Next, you will see how to define a referentialconstraint, the set of rules that defines therelationship between two files. The course thendescribes how to work with referential constraintsand how to resolve a check pending situation.
The course ends by showing how an application candetect a constraint violation.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should beable to:
Use and define referential integrity terminology
Name and define the various referentialconstraint rules
Name and describe the different types ofphysical file constraints
List the steps required to implement referentialintegrity
Identify the various referential constraint states
Define a unique or primary key constraint
Define a referential constraint
Display the constraint information for a file
Display a list of the records that caused areferential constrain to be marked as checkpending
Change the status of a constraint
Delete a constraint
Describe the techniques that can be used in anRPG program to detect a constraint violation
Describe the techniques that can be used in aCOBOL program to detect a constraint violation
Topic Outline
Introduction to Referential Integrity
Defining Constraints
Working with Constraints
Detecting Constraint Violations in an Application
Audience
This course is intended for programmers andapplication developers who will be creating physicalfile constraints and working with files for whichconstraints have been defined.
Prerequisites
This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2. Finally, it assumes you have areading knowledge of either RPG IV or COBOL.
Manta Working with Db2 Databases
Technologies Inc. 159
Working with Db2 Databases Competency ExamOrder Number: PDBP99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the Workingwith Db2 Databases series:
Introduction to Db2
Creating and Managing Physical Files
Creating and Managing Logical Files
Processing a Db2 Database
Using Triggers
Using Referential Integrity
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to create a Db2 database anddevelop applications that process that database.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the Working with Db2 Databases series.We recommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The Working with Db2 Databases series, includingthis exam, should be taken by anyone who willcreating Db2 databases and/or developingapplications that process a Db2 database.
Prerequisites
All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
Introduction to the IBM i Environment
Manta Using Structured Query Language (SQL)
Technologies Inc. 160
Using Structured Query Language (SQL)
Order Number: PSQL00
Max.Users
FirstYear
SecondYear
Later Years
1 $486 $243 $1225 $729 $365 $183
Each add’l $49 $25 $13
Overview
Using Structured Query Language (SQL) is aseries of courses that cover the programming anduse of Structured Query Language (SQL)statements in an IBM i Db2 environment.
This series contains the following courses:
SQL Fundamentals
Coding SQL Statements in a Free-Form RPGProgram
Coding SQL Statements in an RPG Program
Coding SQL Statements in a COBOL Program
SQL Stored Procedures
Implementing Business Rules UsingConstraints and Triggers
Using Structured Query Language (SQL)Competency Exam
Approximate Study Time for the Entire Series: 12-15 hours
Audience
This series is intended primarily for programmers,but can be taken by anyone interested in learninghow to use SQL to work with a Db2 database.
Prerequisites
All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
Introduction to the IBM i Environment
The courses also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
If you feel you already have the necessary skills, youcan verify your belief by successfully completing theCompetency Exams for these series.
In addition, the three courses that cover how toembed SQL statements within a high-level languageprogram also assume that you are an experiencedRPG or COBOL programmer. Of these courses, youneed to take only the single course that correspondsto your preferred programming language.
Manta Using Structured Query Language (SQL)
Technologies Inc. 161
SQL Fundamentals
Order Number: PSQL01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Structured Query Language (SQL) is a standardizedlanguage for defining and manipulating data in arelational database, such as the Db2 database foundon an IBM i system. This course provides anintroduction to SQL and describes the SQLstatements to:
Define queries
Change the contents of a file
Create and delete libraries and files
You will also see how to use Interactive SQL to enter and run SQL statements.
Approximate Study Time: 2 ½ hours
Objectives
After completing this course, you should be able to:
Identify the components of the Db2 QueryManager and SQL Development Kit
Use and define SQL terminology
Identify the Db2 objects to which SQL terms aremapped
Use Interactive SQL to execute an SQLstatement
Use the SQL SELECT statement to define aquery that
o Returns all records from a file and all fieldsfrom each record
o Returns only selected records from a file
o Returns only selected fields from returnedrecords
o Returns records from a file in a specifiedorder
o Generates and returns summary data
o Joins data from two or more files
o Uses a subquery
Code the SQL statements required to add,delete, and change the data in a database
Code the SQL statements required to createlibraries and files
Code the SQL statements required to deletelibraries and files
Topic Outline
Introduction to SQL
Defining and Running a Basic Query
Advanced Querying Capabilities
Making Changes to the Contents of a File
Creating and Deleted SQL Objects
Audience
This course is intended primarily for programmers,but can be taken by anyone interested in learninghow to use SQL to work with a Db2 database.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
If you feel you already have the necessary skills, youcan verify your belief by successfully completing theCompetency Exams for these series.
Manta Using Structured Query Language (SQL)
Technologies Inc. 162
Coding SQL Statements in a Free-Form RPG Program
Order Number: PSQL05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create an RPG SQLapplication using free-form RPG.
The course begins by describing the codingrequirements for embedding SQL statements in anRPG program. This includes a discussion on how todetect and handle errors that occur during theprocessing of an SQL statement. The course thendescribes the CL command used to compile an RPGprogram which includes embedded SQL statements.
Next, the course describes how to use an SQLcursor to access the records returned by a queryand how to develop an application that executesSQL statements dynamically. This is followed by adescription of the SQL statements used to supportcommitment control.
The course ends with a discussion of SQLapplication performance and optimization.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Code an RPG program with embedded SQLstatements
Detect and handle errors that occur during theprocessing of an SQL statement
Use the SQLRPGLE command to compile aprogram with embedded SQL statements
Code the SQL statements used to define andmanipulate an SQL cursor
Code an RPG program that executes adynamic SQL statement
Use SQL statements to perform commit androllback operations
Optimize an SQL application
Topic Outline
Embedding SQL Statements in a Free-FormRPG Program
Compiling a Program with Embedded SQLStatements
Using an SQL Cursor to Process MultipleRecords
Developing a Dynamic SQL Application
SQL and Commitment Control
Performance and Optimization Considerations
Audience
This course is intended for RPG programmers whowill be developing SQL applications in free-formRPG.
Prerequisites
This course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in the SQL Fundamentalsseries.
The course also assumes that you are anexperienced free-form RPG programmer. You cansatisfy this prerequisite by successfully completingthe Free-Form RPG Programming series.
Manta Using Structured Query Language (SQL)
Technologies Inc. 163
Coding SQL Statements in an RPG Program
Order Number: PSQL02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create an RPG SQLapplication.
The course begins by describing the codingrequirements for embedding SQL statements in anRPG program. This includes a discussion on how todetect and handle errors that occur during theprocessing of an SQL statement. The course thendescribes the CL commands used to compile anRPG program which includes embedded SQLstatements.
Next, the course describes how to use an SQLcursor to access the records returned by a queryand how to develop an application that executesSQL statements dynamically. This is followed by adescription of the SQL statements used to supportcommitment control.
The course ends with a discussion of SQLapplication performance and optimization.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Code an RPG program with embedded SQLstatements
Detect and handle errors that occur during theprocessing of an SQL statement
Use the SQLRPGLE and SQLRPG commandsto compile a program with embedded SQLstatements
Use Program Development Manager (PDM) tocompile a program with embedded SQLstatements
Code the SQL statements used to define andmanipulate an SQL cursor
Code an RPG program that executes adynamic SQL statement
Use SQL statements to perform commit androllback operations
Optimize an SQL application
Topic Outline
Embedding SQL Statements in an RPGProgram
Compiling a Program with Embedded SQLStatements
Using an SQL Cursor to Process MultipleRecords
Developing a Dynamic SQL Application
SQL and Commitment Control
Performance and Optimization Considerations
Audience
This course is intended for RPG programmers whowill be developing SQL applications.
Prerequisites
This course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in this series, SQLFundamentals.
The course also assumes that you are anexperienced RPG programmer. If you are notfamiliar with both OPM and ILE programdevelopment procedures, it is recommended thatyou also take The IBM i ProgrammingEnvironment series.
Manta Using Structured Query Language (SQL)
Technologies Inc. 164
Coding SQL Statements in a COBOLProgram
Order Number: PSQL03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create a COBOL SQLapplication.
The course begins by describing the codingrequirements for embedding SQL statements in aCOBOL program. This includes a discussion onhow to detect and handle errors that occur duringthe processing of an SQL statement. The coursethen describes the CL commands used to compile aCOBOL program which includes embedded SQLstatements.
Next, the course describes how to use an SQLcursor to access the records returned by a queryand how to develop an application that executesSQL statements dynamically. This is followed by adescription of the SQL statements used to supportcommitment control.
The course ends with a discussion of SQLapplication performance and optimization.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Code a COBOL program with embedded SQLstatements
Code the SQL statement to generate acommunications area in a program
Code the SQL statements to define a declaresection in your program
Detect and handle errors that occur during theprocessing of an SQL statement
Use the SQLCBLLE and SQLCBL commandsto compile a program with embedded SQLstatements
Use Program Development Manager (PDM) tocompile a program with embedded SQLstatements
Code the SQL statements used to define andmanipulate an SQL cursor
Code a COBOL program that executes adynamic SQL statement
Use SQL statements to perform commit androllback operations
Optimize an SQL application
Topic Outline
Embedding SQL Statements in a COBOLProgram
Compiling a Program with Embedded SQLStatements
Using an SQL Cursor to Process MultipleRecords
Developing a Dynamic SQL Application
SQL and Commitment Control
Performance and Optimization Considerations
Audience
This course is intended for COBOL programmerswho will be developing SQL applications.
Prerequisites
This course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in this series, SQLFundamentals.
The course also assumes that you are anexperienced COBOL programmer. If you are notfamiliar with both OPM and ILE programdevelopment procedures, it is recommended thatyou also take The IBM i ProgrammingEnvironment series.
Manta Using Structured Query Language (SQL)
Technologies Inc. 165
SQL Stored Procedures
Order Number: PSQL04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create, code, andexecute an SQL stored procedure.
The course begins by introducing the concepts ofstored procedures in general and SQL storedprocedures in particular. You will see theadvantages of using a stored procedure in adistributed environment and how a stored procedureis invoked. Next, the course describes how to createan SQL procedure. You will see how to create anSQL procedure using both the SQL CREATEPROCEDURE statement and System i Navigator.
The course then describes how to code thestatements in an SQL procedure. You will first seehow to code SQL control statements, which are usedto control the logic flow, declare variables and setthose variables. It then describes the SQLstatements used to detect and handle warnings andexceptions in an SQL procedure. You will then seehow to use an SQL cursor to access the rowsreturned by a query and how to develop anapplication that executes SQL statementsdynamically.
The course ends by describing the various ways inwhich you can work with stored procedures.
Objectives
Identify the two types of stored procedures anddescribe the differences between them
Identify the advantages of using a storedprocedure in a distributed environment
Describe the purpose of registering an SQLstored procedure, how this task is accomplished,and what effect registering a stored procedurehas on the system catalog
Given the specifications for a stored procedure,code the SQL statement to invoke it
Code the CREATE PROCEDURE statement tocreate an SQL procedure
Define a compound SQL statement
Declare a local variable in an SQL storedprocedure
Assign a value to a local variable or a parameter
Implement the following control structures in anSQL stored procedure:
o If
o If/Else
o Case
o Do While
o Do Until
Use the SQLSTATE and SQLCODE variablesto detect and handle errors.
Define and use a condition handler to detect andhandle errors
Code an SQL procedure that processes multiplerows returned by a query
Code the SQL statements used to define andmanipulate an SQL cursor
Code an SQL procedure that accepts an SQLstatement as a parameter and executes thatstatement
Code an SQL procedure that executes adynamic SQL statement which includes aparameter marker
Code the SQL DROP statement to delete anSQL procedure
Enter the CL RUNSQLSTM command toexecute an SQL script
Use System i Navigator to:
o Create a procedure
o Display a list of the stored procedures in aschema
o Delete an SQL procedure
o Recreate an SQL Procedure
o Display an SQL procedure's properties
Use RDi to:
o Create and execute an SQL script
o Display a list of the stored procedures in aschema
o Delete an SQL procedure
Manta Using Structured Query Language (SQL)
Technologies Inc. 166
Topic Outline
Introduction to Stored Procedures
Creating an SQL Procedure
Coding an SQL Procedure
Error Handling
Using a Cursor
Developing a Dynamic SQL Procedure
Working with SQL Procedures
Audience
This course is intended for programmers and otherswho will be coding and creating SQL storedprocedures.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in this series, SQLFundamentals.
Manta Using Structured Query Language (SQL)
Technologies Inc. 167
Implementing Business Rules Using Constraints and Triggers
Order Number: PSQL06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
All organizations have business rules that affect thecreation and storage of data. This course detailshow such rules can be built into a database so thatthey are enforced by the Db2 database managerrather than by individual application programs. Twomechanisms by which business rules can beenforced by Db2 are called constraints and triggers.
The course begins by describing the how constraintslimit the data that can be stored in a Db2 database.Primary key, unique, and check constraints arediscussed first, followed by referential constraints.With all four types of constraints, you will see how todefine a constraint when you create a table, how toadd a constraint later, how to alter a constraint, andhow to remove a constraint when it is no longerneeded. You will also see how an applicationprogram that uses a table can determine when aconstraint violation has occurred.
The effect of a constraint is to limit what can happento a table during an insert, an update, or a deleteoperation. In contrast, a trigger is a set of one ormore SQL statements that is executed automaticallywhen a specified database event occurs. You willsee common applications for triggers and learn theoptions available for defining them. The course thencovers the SQL statements for creating, enabling ordisabling, and dropping triggers. The course ends byshowing how to handle errors that occur during theexecution of a trigger.
Approximate Study Time: 3 hours
Objectives
Define and use relational database terminologyrelated to constraint and triggers
Create a table with a compound primary key
Create a table with a unique, check, orreferential constraint
Name and define the various referentialconstraint rules
Display the constraint and trigger information fora file
Describe the issues involved when adding aconstraint to an existing table
Alter a table to add a unique, check, orreferential constraint
Alter a table to remove a constraint
Identify the various referential constraint states
Describe how an RPG program, a COBOLprogram, or an SQL stored procedure candetermine whether a constraint violation hasoccurred
Describe the function and capabilities of atrigger
Identify the database events that can cause atrigger to fire
Identify appropriate applications for a trigger
Identify the different types of triggers that can beassigned to a table
Define what is meant by cascading triggers andrecursive trigger firing
Identify situations in which a multiple-purposetrigger is appropriate
Code the SQL statements to:
o Create a trigger
o Enable or disable a trigger
o Remove a trigger
Topic Outline
Using Constraints
Referential Integrity
Implementing Constraints
Trigger Concepts
Implementing Triggers
Audience
This course is intended for programmers andapplication designers who will be either creatingSQL constraints and triggers or working withapplications involving tables which use them.
Manta Using Structured Query Language (SQL)
Technologies Inc. 168
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Finally, the course assumes that you have a basicknowledge of SQL and can code SQL statementsand procedures. You can satisfy this prerequisite bysuccessfully completing the following courses in thisseries:
SQL Fundamentals
SQL Stored Procedures
In addition, if you will be taking any of the followingcourses on embedded SQL, we recommend that youdo so before beginning this one.
Coding SQL Statements in a Free-Form RPGProgram
Coding SQL Statements in an RPG Program
Coding SQL Statements in a COBOL Program
Manta Using Structured Query Language (SQL)
Technologies Inc. 169
Using Structured Query Language (SQL) Competency ExamOrder Number: PSQL99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the UsingStructured Query Language (SQL) series:
SQL Fundamentals
Coding SQL Statements in an RPG Program
Coding SQL Statements in a COBOL Program
SQL Stored Procedures
Implementing Business Rules UsingConstraints and Triggers
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to code SQL statements anddevelop SQL applications.
Approximate time to complete all parts of the exam: 2 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the Using Structured Query Language(SQL) series. We recommend that you take theexam after you complete the series. Alternatively,you can take the corresponding portion of the examwhen you complete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The Using Structured Query Language (SQL)series, including this exam, is intended forprogrammers who will code SQL statements and/ordevelop applications that include SQL statements.
Prerequisites
All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
Introduction to the IBM i Environment
The courses also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
In addition, the three courses that cover how toembed SQL statements within a high-level languageprogram also assume that you are an experiencedRPG or COBOL programmer. Of these courses, youneed to take only the single course that correspondsto your preferred programming language.
Manta Using Structured Query Language (SQL)
Technologies Inc. 170
Control Language Programming
Order Number: PCLP00
Max.Users
FirstYear
SecondYear
Later Years
1 $540 $270 $1365 $810 $405 $204
Each add’l $54 $27 $14
Overview
The Control Language Programming series isintended for IBM i programmers, operators, andother personnel who will write CL programs.
The first course of the series presents an overviewof CL commands and CL programs. It also showshow variables are defined and used in a CLprogram. Subsequent courses show how toimplement logic structures such as IF, IF/ELSE, andloops; how to pass control and data betweenprograms; how to display screens at a user'sworkstation; and how to receive data from that user.The series covers the CL commands used to accessrecords from a database, how to send and receivemessages, and how to monitor messages to handleerrors in a CL program. You will also see how touse data queues and data areas to communicatewith other programs. This series contains thefollowing courses:
Introduction to CL Programming
Controlling Command and Program Flow
Interactive CL Applications
Message Processing in a CL Program
Accessing Database Files, Data Queues, andData Areas
Control Language Programming CompetencyExam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 10-12 hours
Audience
This series should be taken by anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.
Prerequisites
All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
Introduction to the IBM i Environment
The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Reference Materials
A Student Reference Guide is available for thisseries.
Manta Using Structured Query Language (SQL)
Technologies Inc. 171
Introduction to CL Programming
Order Number: PCLP01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces the IBM i control language(CL) and control language programs.
The course begins by discussing how CL commandsare used to communicate with the IBM i operatingsystem. It describes the structure and syntax of CLcommands and the command coding rules. Thecourse then presents the concept of a CL programand lists the CL commands most frequently used ina CL program.
This course next covers CL variables. It shows howto declare and initialize a variable and describes thevarious ways in which variables can be manipulated.The course ends with a discussion of the built-infunctions that can be used in a CL program tomodify the contents of a variable.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Identify the various components of a CLcommand
List the syntax rules for coding CL commands
Execute a CL program both in an interactiveand a batch environment
List the advantages of packaging CLcommands into a CL program
Code a simple CL source program
Identify the commands frequently used in a CLprogram
Continue a CL command on a new line in a CLprogram
Use comments to document a CL program
Name and describe the different types of CLvariables
Declare and initialize variables in a CL program
Use the CHGVAR command to alter thecontents of a variable
Code the RTVSYSVAL command required toaccept a specified system value into a variable
Code the RTVJOBA command required toaccept job information into a variable
Code the CVTDAT command to convert a datefrom one format to another
Define and use a defined variable
Define and use a pointer variable
Define and use a based variable
Use the %SWITCH function to test the settingsof the job switches
Use the %BINARY function to interpret thecontents of a character variable as a signedbinary integer and store the correspondingdecimal value in a decimal variable
Use the %BINARY function to convert adecimal value to its corresponding signedbinary value and store the result in a charactervariable
Use the %SUBSTRING function to obtain asubstring of a character variable
Use the %ADDRESS function to change or testthe contents of a pointer variable
Use the %OFFSET function to change or testthe contents of the offset value for a pointervariable
Topic Outline
Control Language Commands
Control Language Programs
Commands Commonly Used in a CL Program
Entering CL Source Statements
Introduction to CL Variables
CL Variables – The Rest of the Story
Built-In Functions
Audience
This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.
Manta Using Structured Query Language (SQL)
Technologies Inc. 172
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Manta Using Structured Query Language (SQL)
Technologies Inc. 173
Controlling Command and Program Flow
Order Number: PCLP03
Max.
Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows you how to control the flow ofcommand execution within a program and how topass control between programs and/or procedures.
The course first describes how to test conditions in aCL program and how to control the execution ofcommands based on the result of such a test. Thisdiscussion includes a description of the logicstructures used in conditional processing and CLprogram excerpts that illustrate the use ofconditional processing.
The course then describes how to modularize anapplication. You will see how to modularize anapplication using subroutines, procedures, andsubprograms.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Code CL commands to implement an IFstructure
Code CL commands to implement an IF/ELSEstructure
Code CL commands to implement an executionloop
Code CL commands to implement a nested IFstructure
Code the CL command to call a subroutine
Code a subroutine in a CL program
Code a CL subprogram or procedure to performa specified function
Code a CL program that calls a subprogram ora procedure
Use parameters to communicate betweenprograms
Topic Outline
Introduction to Conditional Processing
Coding an Execution Loop
Using Subroutines
Calling Programs and Procedures
Coding Subprograms and Called Procedures
Audience
This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
The course also assumes that you have a basicunderstanding of CL programming concepts andknow how to declare and use variables in a CLprogram. You can satisfy these prerequisites bysuccessfully completing the first course in thisseries:
Introduction to CL Programming
Manta Using Structured Query Language (SQL)
Technologies Inc. 174
Interactive CL Applications
Order Number: PCLP04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to create an interactiveapplication.
The course begins by describing the role a displayfile plays in an interactive application and how adisplay file is created. You will see the datadescription specifications (DDS) source statementsmost commonly used for a display file. The coursethen considers the requirements for an interactiveCL program. You will see how to declare a displayfile in a CL program and how to display data at andreceive data from a workstation.
You will also see the requirements for a multiplerequest terminal (MRT) program. An MRT programis one that communicates with multiple workstations.The course ends by describing how to overridecertain attributes in a display file.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Interpret the DDS statements used to define adisplay file
Code a CL program that uses a display file tocommunicate with a workstation user
Code a multiple request terminal (MRT) CLprogram
Override certain attributes specified in a displayfile
Topic Outline
Creating a Display File
Coding an Interactive Program
Working with Multiple Workstations
Overriding Display File Parameters
Audience
This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
The course also assumes that you have a basicunderstanding of CL programming concepts, knowhow to declare and use variables in a CL program,and know how to control the flow of execution in aCL program. You can satisfy these prerequisites bysuccessfully completing the first two courses in thisseries:
Introduction to CL Programming
Controlling Command and Program Flow
Manta Using Structured Query Language (SQL)
Technologies Inc. 175
Message Processing in a CL Program
Order Number: PCLP05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes how to send and receivemessages and how to detect and handle errors in aCL program.
The course begins by describing messageprocessing concepts. It then shows how to write aprogram that uses messages to communicate with aworkstation user or another program. You will seehow to send a message to a workstation user, howto send a message to another program orprocedure, and how to receive a message. Thecourse then shows how to monitor messages in aprogram and how to handle the exception and errorconditions those messages represent.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Describe the difference between an impromptuand a predefined message
Describe the format of a message identifier
Identify and describe the different types ofmessages that a CL program can send andreceive
Identify and describe the different types ofmessage queues to which a CL program cansend messages and from which a CL programcan receive messages
Use the SNDUSRMSG command in a CLprogram to send an informational message to aworkstation user
Use the SNDUSRMSG command in a CLprogram to send an inquiry message to aworkstation user and receive its reply
Use the SNDPGMMSG command in a CLprogram to send a message to another programor procedure
Use the RCVMSG command in a CL programto receive a message
Use the MONMSG command in a CL programto monitor for messages
Topic Outline
Message Concepts
Sending Messages
Receiving Messages
Monitoring Messages
Audience
This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
The course also assumes that you have a basicunderstanding of CL programming concepts, knowhow to declare and use variables in a CL program,and know how to control the flow of execution in aCL program. You can satisfy these prerequisites bysuccessfully completing the first two courses in thisseries:
Introduction to CL Programming
Controlling Command and Program Flow
Manta Using Structured Query Language (SQL)
Technologies Inc. 176
Accessing Database Files, Data Queues, and Data Areas
Order Number: PCLP06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course shows how to access a database file, adata queue, and a data area from a CL program.
The course first describes the database fileprocessing capabilities supported for CL programs.In particular, you will see the limitations imposed onCL programs that process a database file. Thecourse then describes the coding requirements of aCL program that accesses a database file. You willsee how to declare a database file, how to readrecords sequentially, and how to simulate randomaccess.
The course next discusses data queues. You willsee how to create a data queue; how to add an entryto a data queue; how to retrieve an entry from a dataqueue; and how to clear a data queue, deleting all ofits entries. The course ends with discussion of dataareas. It describes the data areas createdautomatically by the system and shows how tocreate a user data area. In addition, you will seehow to access and change the contents of a dataarea.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Code a CL program that sequentially processesa database file
Code a CL program that opens and closes adatabase file to be processed by otherprograms or procedures
Code the command to override database fileattributes
Code a CL program that, given a relative recordnumber, reads the corresponding record
Code a CL program that, given a record key,reads the corresponding record
Create a data queue
Add an entry to a data queue
Retrieve an entry from a data queue
Create a user data area
Access the contents of a data area
Change the contents of a data area
Topic Outline
Performing Database Processing in a CL Program
Simulating Random Access
Using Data Queues
Using Data Areas
Audience
This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.
Prerequisites
This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:
Introduction to the IBM i Environment
The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
The course also assumes that you have a basicunderstanding of CL programming concepts, knowhow to declare and use variables in a CL program,and know how to control the flow of execution in aCL program. You can satisfy these prerequisites bysuccessfully completing the first two courses in thisseries:
Introduction to CL Programming
Controlling Command and Program Flow
Manta Using Structured Query Language (SQL)
Technologies Inc. 177
Control Language Programming Competency ExamOrder Number: PCLP99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the ControlLanguage Programming series:
Introduction to CL Programming
Controlling Command and Program Flow
Interactive CL Applications
Message Processing in a CL Program
Accessing Database Files, Data Queues, andData Areas
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to effectively code CLprograms.
Approximate time to complete all parts of the exam: 90 minutes
Recommended Uses
This Competency Exam was designed as a masterytest for the Control Language Programmingseries. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The Control Language Programming series,including this exam, should be taken by anyone whowill be writing CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.
Prerequisites
All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:
Introduction to the IBM i Environment
The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:
The IBM i Programming Environment
Manta eBusiness for IBM i Programmers
Technologies Inc. 178
eBusiness for IBM i Programmers Order Number: EBUS00
Max.Users
FirstYear
SecondYear
Later Years
1 $864 $432 $2165 $1,296 $648 $324
Each add’l $86 $43 $22
Overview
The eBusiness for IBM i Programmers seriescovers the skills required to create an ebusinessapplication on an IBM i system.
This series contains the following courses:
eBusiness: From HTML to WebSphere
Coding HTML and XHTML: Basic Elements
Coding HTML and XHTML: Advanced Elements
Coding JavaScript
Using JavaScript to Enhance Web Pages
Writing a CGI Program in RPG
Developing Web Applications UsingNet.Data
Ajax Programming
eBusiness for IBM i Programmers Competency Exam
Descriptions of the individual courses follow.
Approximate Study Time for the Entire Series: 17-21 hours
Audience
The eBusiness for IBM i Programmers seriesshould be taken by the individuals responsible forimplementing an organization's web site. Theaudience includes webmasters, content developers,application programmers, and systemadministrators.
Prerequisites
This series assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.
Writing a CGI Program in RPG assumes that youhave a working knowledge of RPG programming inthe ILE environment. You can satisfy thisprerequisite by successfully completing the MantaRPG Programming series.
Reference Materials
A Student Reference Guide is available for thisseries.
Manta eBusiness for IBM i Programmers
Technologies Inc. 179
eBusiness: From HTML to WebSphereOrder Number: EBUS01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
The problem with the term "ebusiness" is that thereseems to be as many definitions as there aresoftware vendors. This course starts with a simpledefinition, "doing business over the Web." As thisdefinition is refined and expanded, you'll see thatebusiness encompasses a continuum of options,from simple web hosting to ecommerce, internal andexternal business integration, and web services. Thecourse describes the multiple options that areavailable and provides examples designed to helpyou place your organization's ebusiness goals onthe spectrum of available options.
As you will see, various ebusiness implementationsuse a complex array of technologies. To theuninitiated, these technologies seem like analphabet soup of options, including HTTP, HTML,CGI, URL, JSP, EJB, WAS, XML, XSL, UDDI,WSDL, SOAP, and others. This course introducesthese technologies, placing them on the ebusinesscontinuum according to how they satisfy businessrequirements.
The purpose of this course is twofold. For ITmanagers and others interested in ebusinessconcepts, it provides an overview of the availabletechnologies. You will see the role of eachtechnology and how they fit together in a typicalebusiness implementation. For IBM i programmers,the course provides the background informationneeded to understand the remaining courses of thisseries.
Approximate Study Time: 2-3 hours
Objectives
After completing this course, you should be ableto:
Arrange potential ebusiness activities by theirimplementation complexity
Identify the technologies required for differentlevels of ebusiness implementations
Define TCP/IP terms
Match TCP/IP protocols with their functions
Order the events that take place during thedisplay of a typical web page
Identify the role of HTML in a Web application
Identify the sequence of events that occur whena web page invokes a CGI program
Name and describe two ways in which data froma web user can be passed to a CGI program
Interpret a Uniform Resource Indicator (URI)that invokes a CGI program and passes a datastring to it
Describe methods that can be used to simulatea dialog between a web user and a server
Identify the roles of Net.Data and PHP in a webapplication
Describe the purpose of a scripting language
Describe the differences between a CGIprogram and a servlet
Describe the primary functions of an applicationserver
Describe the difference between the WebFacingtool and a typical screen scraper
Define the following terms related to the use ofJava: applet, servlet, JavaBean, JSP, EJB
Identify the application servers that aresupported in the IBM i environment
Identify the parts of an XML element
Determine whether a document consists of wellformed XML statements
Describe the purpose of XML, DOM, SAX,XSLT, DTDs, and schemas
Describe the difference between HTML andXHTML
Define what is meant by a web service
Match UDDI, WSDL, and SOAP withdescriptions of their purposes
Manta eBusiness for IBM i Programmers
Technologies Inc. 180
Topic Outline
Defining eBusiness
Web Publishing
eCommerce
Business Integration
Communicating with Business Partners
Web Services
Audience
This course should be taken by individualsresponsible for planning, implementing, and/ormanaging an organization's web site and otherebusiness activities. This audience includes ITmanagers, webmasters, content developers,application programmers, and systemadministrators.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.
Coding HTML and XHTML: Basic ElementsOrder Number: EBUS02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
HTML, the Hypertext Markup Language, is the basisfor communication between a web server and abrowser. It is through HTML documents that youdetermine what a user sees when visiting your website. Because of this, every web developer needs abasic understanding of HTML coding, even if youuse tools to create most of your HTML pages.
The eXtensible HyperText Markup Language(XHTML) is a successor to HTML that follows therules of XML. In today's web environment,developers need to know both languages.
The course begins by describing the syntax rules forXHTML and how they differ from those of HTML. Asyou will see, you can develop documents thatconform to both. You will learn strategies fordeveloping reusable web documents and see thetools available for creating them.
The course then introduces XHTML by describingthe structure of a basic web document and the typesof elements you will encounter. After learning aboutthe most commonly used elements, you will see howCascading Style Sheets can be used to control howthese elements are displayed by a browser. Thecourse wraps up basic HTML and XHTML elementswith a discussion of hypertext links.
Approximate Study Time: 2 hours
Manta eBusiness for IBM i Programmers
Technologies Inc. 181
Objectives
After completing this course, you should be ableto:
Describe the differences between HTML andXHTML
Determine whether a document conforms toXHTML syntax rules
Identify the elements that must be present inevery XHTML document
Identify tools that can be used to create XHTMLdocuments
Identify the XHTML element used to define aspecified document component
Code the XHTML elements to identify thefollowing document components:
o Headings
o Paragraphs
o Line breaks
o Preformatted text
o Boldface and italic text
o Superscripts and subscripts
o Special characters
o Internal and external links
o Mail-to links
Define a Cascading Style Sheet
Specify the CSS rule to be applied to a givenelement
Define CSS rules that apply to all elements of agiven type or only to selected elements
Given a display formatting requirement for aspecified XHTML element, identify the CSSproperty that can be used to achieve the desiredresult
Use the <div> and <span> elements to apply astyle rule to a group of elements
Topic Outline
Getting Started with XHTML
XHTML Basics
Cascading Style Sheets
CSS Properties
Linking Web Pages
Audience
This course should be taken by the individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.
In addition, you should have an understanding of therole of HTML, XML, and HTML in an ebusinessenvironment. This prerequisite can be satisfied bycompleting the first course of this series, eBusiness:From HTML to WebSphere. You may also haveobtained these skills by taking other courses orthrough relevant work experience.
Reference Materials
All of the major XHTML examples that are discussedin this course are provided as separate htm files onthe Manta CD. Once the course has been installed,they are available to you in the directory\ebus\ebus02\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.
Manta eBusiness for IBM i Programmers
Technologies Inc. 182
Coding HTML and XHTML: Advanced ElementsOrder Number: EBUS03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course builds upon the previous course of thisseries to cover the remaining HTML/XHTMLelements that are used within most web pages.These include lists, tables, frames, and forms. Youwill also see how to include images, applets, audio,and other objects in a web page.
By the end of the course, you will have the skills youneed to develop the XHTML pages and forms thatare used in typical ebusiness web sites.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be ableto:
Code the XHTML elements to identify thefollowing document components:
o Ordered or unordered lists
o Tables
o Frames
o Images
o Horizontal rules
o Forms
Given a display formatting requirement for aspecified XHTML element, identify the CSSproperty that can be used to achieve the desiredresult
Code the XHTML elements to support thefollowing field types within an online form:
o Text boxes
o Radio buttons
o Check boxes
o Text areas
o Buttons
o Passwords
o Hidden fields
Topic Outline
Lists
Tables
Frames
Graphics, Applets, and Multimedia
Forms
Audience
This course should be taken by the individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.
Prerequisites
This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.
In addition, you should have an understanding of therole of HTML, JavaScript, Java applets, Javaservlets, and CGI programs in an ebusinessenvironment. This prerequisite can be satisfied bycompleting the first course of this series, eBusiness:From HTML to WebSphere. You should also beable to code the basic HTML/XHTML elements andCascading Style Sheets covered in the previouscourse of this series, Coding HTML and XHTML:Basic Elements.
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
All of the major XHTML examples that are discussedin this course are provided as separate htm files onthe Manta CD. Once the course has been installed,they are available to you in the directory\ebus\ebus03\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.
Manta eBusiness for IBM i Programmers
Technologies Inc. 183
Coding JavaScriptOrder Number: EBUS04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
JavaScript is a scripting language that a webdeveloper can use within an HTML or XHTMLdocument to perform functions on the user'smachine. Using JavaScript, you can develop client-side routines to validate input, store data on theuser's PC, and perform related tasks that areintegral to a typical ebusiness application.
The course begins by describing the role ofJavaScript in an ebusiness application. It thendescribes the format of a JavaScript program and itsrelationship to the HTML or XHTML document inwhich it is coded. The remainder of the coursecovers the syntax of the key JavaScript statementsthat are common to all standard implementations.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be ableto:
Define JavaScript terms, including method,object, property, event, identifier, keyword, andliteral
Code the HTML/XHTML element to identify aJavaScript program that is stored within thesame document or in a separate file
Describe the basic syntax rules for codingJavaScript statements
Code comments in a JavaScript program
Name and describe the JavaScript-supporteddata types
Declare a JavaScript variable
Assign a value to a JavaScript variable
Perform common arithmetic operations,including addition, subtraction, multiplication,and division
Concatenate string variables
Convert data from one type to another
Declare and use an array
Use common JavaScript string methods,including toUpperCase, toLowerCase,indexOf, charAt, subst, and substring
Use common JavaScript Math methods,including max, min, sqrt, and round
Use JavaScript Date methods to determine thecurrent date and time
Implement the following control structures in aJavaScript program:o Ifo If/Elseo Caseo Do Whileo Do Untilo For
Define a JavaScript function
Topic Outline
Introduction to JavaScript
JavaScript Syntax
Basic Operations
Properties and Methods
Conditional Processing
Functions
Audience
This course should be taken by individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.
Prerequisites
This course assumes that you understand of the roleof HTML, JavaScript, Java servlets, and CGIprograms in an ebusiness environment. Thisprerequisite can be satisfied by completing the firstcourse of this series, eBusiness: From HTML toWebSphere. In addition, you should be able to codeHTML. This prerequisite is covered in the secondand third courses of this series:
Coding HTML and XHTML: Basic Elements
Coding HTML and XHTML: Advanced Elements
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta eBusiness for IBM i Programmers
Technologies Inc. 184
Using JavaScript to Enhance Web PagesOrder Number: EBUS05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
The previous course of this series, CodingJavaScript, describes the generic JavaScriptlanguage that is defined by the internationallyaccepted ECMA standard. This course expands onthis knowledge to show you how to use JavaScriptstatements to manipulate the HTML/XHTMLelements that make up a web page.
The course begins by describing how a browserevent can cause a JavaScript function to be invoked.It then covers the properties and methods used tomanipulate window, document, and form objects.The remainder of the course presents JavaScriptexamples that you can use in your own ebusinessapplications. In particular, you will learn how tovalidate form data and manage cookies.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Cause a JavaScript function to be invoked asthe result of a browser event
Code JavaScript statements to perform thefollowing tasks: o Reference an object within the same
window, a subwindow, the parent window, ora frame
o Display a message in an independentbrowser window
o Create, write to, and close a subwindow o Replace the document displayed in the
browser window o Prompt the user for an input value or a
confirmation
Reference form components from a JavaScriptprogram
Check user-supplied form data for validity
Identify the advantages and disadvantages ofthe various ways to display error messages
Modify an HTML form to invoke a JavaScriptfunction
Code JavaScript functions to create, retrieve,update, or delete a cookie
Topic Outline
Handling Events
Manipulating Window Objects
Manipulating Document Objects
Referencing Form Data
Editing Input Data
Using Cookies
Audience
This course should be taken by individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.
Prerequisites
This course assumes that you understand of the roleof HTML, JavaScript, Java servlets, and CGIprograms in an ebusiness environment and that youcan code HTML/XHTML and basic JavaScriptstatements. These prerequisites can be satisfied bycompleting the previous courses of this series:
eBusiness: From HTML to WebSphere
Coding HTML and XHTML: Basic Elements
Coding HTML and XHTML: Advanced Elements
Coding JavaScript
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
All of the major JavaScript examples that arediscussed in this course are provided on the MantaCD. Once the course has been installed, they areavailable to you in the directory\ebus\ebus05\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.
Manta eBusiness for IBM i Programmers
Technologies Inc. 185
Writing a CGI Program in RPGOrder Number: EBUS06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
For an ebusiness application to be useful to mostorganizations, it must be able to display and/orupdate data stored on the organization's productionsystem. This course shows you how to develop fullyfunctional ebusiness solutions using nothing morethan your existing knowledge of RPG and the webfacilities already included in IBM i.
The course begins by describing the structure of aCGI program and the application programminginterfaces (APIs) that allow an IBM i program tocommunicate with the HTTP server. You will thensee how to incorporate these APIs into an RPGprogram to receive data from and pass data to aweb browser. The RPG code that is developedduring this course is then combined into a completeapplication. The course ends by presenting tips andtechniques for setting up the RPG CGI programmingenvironment.
Approximate Study Time: 2-3 hours
Objectives
After completing this course, you should be able to:
Identify the environment information that isavailable to a CGI program
Name and describe two ways in which data froma web user can be passed to a CGI program
Interpret the data string that is passed from anHTML form to a CGI program
Order the major steps performed by a CGIprogram
Code the CALLB and PARM statements toinvoke the APIs used to read input from or writeoutput to a browser
Code the CALLP statement to invoke the APIsused to read input from or write output to abrowser using a prototyped call
Describe ways in which the calls to an API canbe packaged for easier use within an RPGprogram
Identify special considerations for generatingHTML statements from within a CGI program
Describe the steps needed to retrieve data froma form that was passed using either the GET orPOST methods
Identify the API and parameters used to writestandard output, retrieve environment variables,read standard input, or convert the data stringsent by a browser into RPG data items
Describe the process used by QtmhCvtDb toconvert the data string sent by a browser intoRPG data items
Describe situations in which additional work maybe necessary to prepare form data for use by anRPG program
Describe the reasons for specific HTMLattributes, RPG keywords, and RPG statementsin a given CGI application
Identify the IBM i commands used to set up theCGI programming environment
Identify the user profile that must be grantedauthority to call a CGI program
Code the H-spec keywords to bind a serviceprogram with an ILE RPG program
Describe how the use of a named activationgroup improves the performance of a CGIprogram
Create a service program that includesprocedures which use the CGI APIs
Topic Outline
The Structure of a CGI Program
Creating HTML Output
Getting the Input Data
Parsing the Input String
Putting it All Together
Setting Up the CGI Program Environment
Audience
This course should be taken by RPG programmersresponsible for creating CGI programs.
Manta eBusiness for IBM i Programmers
Technologies Inc. 186
Prerequisites
This course assumes that you have a workingknowledge of RPG programming in the ILEenvironment. You can satisfy this prerequisite bysuccessfully completing the Manta RPGProgramming series.
In addition, you should have an understanding of therole of HTML, JavaScript, and CGI programs in anebusiness environment and how forms are definedand used in an HTML/XHTML document. Theseprerequisites can be satisfied by completing theprevious courses of this series:
eBusiness: From HTML to WebSphere
Coding HTML and XHTML: Basic Elements
Coding HTML and XHTML: Advanced Elements
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
All of the major examples that are discussed in thiscourse are provided as separate files on the MantaCD. Once the course has been installed, they areavailable to you in the directory\ebus\ebus06\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.
Manta eBusiness for IBM i Programmers
Technologies Inc. 187
Developing Web Applications Using Net.DataOrder Number: EBUS07
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
IBM's Net.Data is a server-side scripting languagethat you can use to dynamically create HTMLdocuments for display by a user's browser. Net.Datais an excellent interface between a browser and aCGI program, such as an RPG application executingon the server. In addition, Net.Data's SQL and flatfile interfaces can be used to access IBM i datadirectly, without the need for a high-level language.As a result, Net.Data has become a popular tool forthe fast implementation of web-based applicationson IBM i systems.
This course begins by describing the role ofNet.Data in an ebusiness application. You will seehow Net.Data is distributed and installed and how toinvoke a Net.Data program, called a macro, from anHTML form. The course then describes thestructure and syntax of a Net.Data macro. You willsee how to define and reference variables and howto use Net.Data statements and blocks. Specialemphasis is given to control structures and macrofunctions.
Net.Data uses the concept of a languageenvironment to provide interfaces with otherprogramming languages. Using the appropriatelanguage environment, you can execute SQLstatements, REXX procedures, or IBM i commands.You can also call a program written in high-levellanguage, such as RPG, COBOL, C/C++, CL, orJava. The course provides examples illustrating theuse of each of these environments. One ofNet.Data's greatest advantages is its ability toprocess the variable output of a typical SQLdatabase query. You will see how to controlNet.Data's handling of table output and how tosupplement the default processing with your ownenhancements. The course ends with a survey ofNet.Data's extensive collection of built-in functions.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Describe the role of Net.Data in a typicalebusiness application
Identify the major advantages of using Net.Data
Identify the location of the Net.Data initializationfile
Code the URL to invoke a Net.Data macro
Describe the syntax of a Net.Data macro
Code a Net.Data comment block
Code a Net.Data %INCLUDE statement toinclude a separately stored group of statementswithin a macro
Define a Net.Data variable
Incorporate the contents of a variable into anHTML string
Change the value of a variable
Retrieve and display the value of anenvironment variable
Implement the following control structures in aNet.Data macro:
o If
o If/Else
o Case
o Do While
Define a conditional variable
Define and call a macro function
Invoke a Net.Data function
Define a Net.Data function to:
Execute a REXX program
Run an IBM i command
Call an external program
Invoke a Java class
Execute a set of SQL statements
Invoke an SQL stored procedure
Describe how the results of an SQL query arereturned to Net.Data for processing
Identify Net.Data variables that control theprinting of reports
Create a custom report using %REPORT and%ROW blocks
Manta eBusiness for IBM i Programmers
Technologies Inc. 188
Define a Net.Data table and use it to store theresults of a function call
Use Net.Data built-in functions to generateHTML elements from a table
Define a list variable
Use a %MESSAGE block to display messagesin response to specified return codes
Describe the naming conventions used forNet.Data built-in functions
Identify the Net.Data built-in function to performa specified task
Topic Outline
The Role of Net.Data in an eBusinessApplication
Net.Data Variables
Net.Data Control Structures
Macro Functions
Net.Data Language Environments
The SQL Language Environment
Built-In Functions
Audience
This course should be taken by programmersresponsible for creating web applications in the IBM ienvironment.
Prerequisites
This course assumes that you have anunderstanding of the role of HTML, JavaScript, andCGI programs in an ebusiness environment and howforms are defined and used in an HTML/XHTMLdocument. These prerequisites can be satisfied bycompleting the first three courses of this series:
eBusiness: From HTML to WebSphere
Coding HTML and XHTML: Basic Elements
Coding HTML and XHTML: Advanced Elements
You may also have obtained these skills by takingother courses or through relevant work experience.
Reference Materials
All of the major examples that are discussed in thiscourse are provided as separate files on the MantaCD. Once the course has been installed, they areavailable to you in the directory\ebus\ebus07\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.
Manta eBusiness for IBM i Programmers
Technologies Inc. 189
Ajax ProgrammingOrder Number: EBUS08
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Many organizations now offer web-basedapplications that rival local applications in theirfunctionality and user interface. Ajax plays a key rolein most of these applications. Ajax is not a specifictechnology as much as a collection of techniquesthat allows a web developer to dynamically updatethe currently displayed page with data retrieved fromthe server. This example-driven course will give youthe tools you need to implement your first Ajaxapplication.
The course begins by describing the short history ofAjax and showing examples of the types of thingsyou can do with Ajax, from Google maps to Manta'scourse presentation system. It then describes theone new technology that makes Ajax possible,JavaScript control of the HTTP request object.
The course then shows multiple, increasinglycomplex examples of Ajax in action. You will seehow to pass parameters to a server and receive datain the form of character strings, HTML fragments, orXML. You will also see how to incorporate data intoa web page dynamically, adding elements like tablesand pull-down lists that are built from data retrievedfrom the server. Several special situations arecovered, including encoding parameters, passingdata as XML, and using XML DOM methods to buildHTML elements dynamically.
The course ends with a comprehensive example thatuses what you have learned to implement "autocompletion" for an input field.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Describe the key technologies and techniquesthat comprise Ajax programming
Identify potential Ajax applications
Identify the benefits of receiving server data inXML format
Order the steps involved in making an Ajaxrequest
Code the JavaScript statements to make anAjax request
Identify the methods and properties availablewith an XMLHttpRequest object
Replace the contents of a displayed HTMLobject
Identify the HTML events used to invoke aJavaScript function when a form field has beenchanged or selected by the user
Receive an XML object in an HTTP request
Parse an XML object to create HTML
Identify the XML methods and properties used tocreate a new HTML object
Describe how frameworks can dramaticallyreduce the effort required to code an Ajaxprogram
Describe the potential role of XSLT intransforming the server response into HTML
Identify the changes that must be made to anAjax program to use POST rather than GET toretrieve data
Describe why parameters may need to beencoded before transmission
Pass parameters to a server program as XML
Describe how to force a browser to make a newserver request rather than to use an obsoletepage from its cache
Code the JavaScript statements and CSSattributes to position an HTML element at aparticular location
Manta eBusiness for IBM i Programmers
Technologies Inc. 190
Audience
This course should be taken by individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.
Prerequisites
This course assumes that you understand of the roleof HTML, JavaScript, Java servlets, and CGIprograms in an ebusiness environment and that youcan code HTML/XHTML and basic JavaScriptstatements. These prerequisites can be satisfied bycompleting the previous courses of this series:
eBusiness: From HTML to WebSphere
Coding HTML and XHTML: Basic Elements
Coding HTML and XHTML: Advanced Elements
Coding JavaScript
Using JavaScript to Enhance Web Pages
The course also assumes you know how a CGIprogram or servlet creates HTML or XML output thatis returned to a browser. This prerequisite can besatisfied by completing either of the previouscourses of this series:
Writing a CGI Program in RPG
Developing Web Applications Using Net.Data
You may also have obtained these skills by takingother courses (such as the Java Fundamentalsseries) or through relevant work experience.
Reference Materials
All of the major JavaScript examples that arediscussed in this course are provided on the MantaCD. Once the course has been installed, they areavailable to you in the directory \examples under theManta base directory. If you are taking this courseonline, you can find the sample files atwww.mantanow.com/examples/.
Manta eBusiness for IBM i Programmers
Technologies Inc. 191
eBusiness for IBM i Programmers Competency Exam Order Number: EBUS99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up theeBusiness for IBM i Programmers series:
eBusiness: From HTML to WebSphere
Coding HTML and XHTML: Basic Elements
Coding HTML and XHTML: Advanced Elements
Coding JavaScript
Using JavaScript to Enhance Web Pages
Writing a CGI Program in RPG
Developing Web Applications Using Net.Data
Ajax Programming
The exam is divided into separate parts. Each partcorresponds to either one or two courses.Successfully completing all parts of the examdemonstrates your proficiency in the basic skillsrequired to create an ebusiness application.
Approximate time to complete for all parts of the exam: 90-150 minutes
Recommended Uses
This Competency Exam was designed as a masterytest for the eBusiness for IBM i Programmersseries. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course or pair of courses.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriatecourse(s) for review.
Audience
The eBusiness for IBM i Programmers series,including this exam, should be taken by theindividuals responsible for implementing anorganization's web site. The audience includeswebmasters, content developers, applicationprogrammers, and system administrators.
Prerequisites
This series assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.
Writing a CGI Program in RPG assumes that youhave a working knowledge of RPG programming inthe ILE environment. You can satisfy thisprerequisite by successfully completing the MantaRPG Programming series.
Manta Using Rational Developer for i (RDi)
Technologies Inc. 192
Using Rational Developer for i (RDi)
Order Number: PRDP00
Max.Users
FirstYear
SecondYear
Later Years
1 $324 $162 $815 $486 $243 $122
Each add’l $32 $16 $8
Overview
An Integrated Development Environment (IDE) is acollection of tools — including editors, compilers,and debuggers — that are available to aprogrammer through a common interface. Thisseries covers the most popular IDE for IBM iapplication development, IBM's Rational Developerfor i (RDi). You will see how to use RDi to write,compile, and debug IBM i programs from your PC.
This series contains the following courses:
Introduction to RDi
Using the Remote System Explorer (RSE)
Using the Integrated i Debugger
Using Rational Developer for i (RDi)Competency Exam
Approximate Study Time for the Entire Series: 7-10 hours
Audience
This series is intended for programmers, webdesigners, and other personnel who will use RDi forapplication development.
Prerequisites
This series assumes that you have an understandingof basic IBM i program development concepts andfacilities. This prerequisite can be satisfied bycompleting The IBM i Programming Environmentseries. You may also have obtained these skills bytaking other courses or through relevant workexperience.
Reference Materials
A Student Reference Guide is available for thisseries.
Related Products
This series is contained in both the ProgramDevelopment Combination Pack and the WebDevelopment Combination Pack.
Manta Using Rational Developer for i (RDi)
Technologies Inc. 193
Introduction to RDi
Order Number: PRDP01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
An Integrated Development Environment (IDE) is acollection of tools — including editors, compilers,and debuggers — that are available to aprogrammer through a common interface. Thiscourse provides an introduction to the most popularIDE for IBM i application development, the RationalDeveloper for Power Systems (RDi).
The course begins with a basic description of RDi,including a description of Eclipse, the building blockon which RDi was built. The course then introducesyou to the RDi workbench, the primary interface toRDi tools. You will learn RDi terminology, such asperspective, view, workspace, and editor.
Next, the course takes a detailed look at views. Youwill see the various ways that views can bemanipulated in a perspective. The course ends bydescribing how to access RDi's extensive helpfacility.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
Describe the function of RDi
Describe the relationship between RDi andEclipse
Start RDi
Define the following RDi terms:
o Workbench
o Workspace
o View
o Editor
o Perspective
Open a new perspective
Switch between open perspectives
Open a view
Close a view
Maximize a view
Switch between the views in a stack
Display a fast view
Convert a standard view to a fast view and viceversa
Open the Welcome view
Access the RDi Help facility
Topic Outline
RDi Overview
The RDi Workbench
Working with Views
Getting Help with RDi
Audience
This course is intended for programmers, webdesigners, and other personnel who will use RDi forapplication development.
PrerequisitesThere are no prerequisites for this course.
Manta Using Rational Developer for i (RDi)
Technologies Inc. 194
Using the Remote System Explorer (RSE)
Order Number: PRDP02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
The Remote System Explorer (RSE) is a RDicomponent that provides a variety of tools fordeveloping and working with programs and sourcefiles stored on a remote IBM i system. This coursedescribes how to use these tools.
The course begins with an introduction to RSE,showing you how to define an RSE connection to aremote IBM i system, and how to manage yourconnection definitions. Next, you will see the waysin which you can work with IBM i objects using theRSE. You will see how to create and manipulatelibraries, objects, and source members. The coursethen introduces you to the Live Parsing Extensible(LPEX) editor. In addition to learning the basiccapabilities of this editor, you will see the functions itsupports specifically for editing IBM i sourcemembers. These capabilities include sourcelanguage syntax checking, source language helpcapabilities, and the ability to display the fielddefinitions for a database file. Next, you will seehow to compile, bind, and execute programs usingthe RSE.
The course then shows you how to use commandsets to execute CL commands on a remote IBM isystem, and how to manage IBM i jobs using theRSE. The course ends by showing how to use theRSE to access and manipulate IFS files and folders.
Approximate Study Time: 3 hours
Objectives
After completing this course, you should be able to:
Define and manage RSE connections
Name and describe the five RSE subsystems
Create a filter that defines a list of libraries,objects, or source file members
Create a library, an object in a library, or amember in a source physical file
Use filters to manage libraries, objects, andsource members on a remote IBM i system
Use the LPEX editor to create and edit IBM isource members
Use RSE facilities to:
o Compile a source program
o Compile and bind a source program
o Bind a module
o Execute a program
Run a command set
Create a command set
Manage your command sets
Work with jobs running on a remote IBM isystem
Display the job log for an IBM i job
Use the RSE to navigate the IFS on a remoteIBM i system
Open an IFS file
Manage IFS files and folders
Topic Outline
Introduction to the RSE
Managing IBM i Objects
Editing Source Members
Compiling, Binding, and Executing Programs
Using Command Sets
Working with IBM i Jobs
Accessing the IFS
Audience
This course is intended for programmers who willuse RDi for IBM i application development.
Prerequisites
This course assumes that you are familiar with thegeneral concepts and capabilities of RDi. Thisprerequisite can be satisfied by completing the firstcourse in this series, Introduction to RDi. Thecourse also assumes that you have anunderstanding of basic IBM i program developmentconcepts and facilities. This prerequisite can besatisfied by completing The IBM i ProgrammingEnvironment series. You may also have obtainedthese skills by taking other courses or throughrelevant work experience.
Manta Using Rational Developer for i (RDi)
Technologies Inc. 195
Using the Integrated i Debugger
Order Number: PRDP03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
RDi includes a variety of debuggers that help youdebug programs written in a specific language ormixed languages. This course describes how to useone of those debuggers, the Integrated i Debugger.This debugger enables you use a RDi interfacerunning on your workstation to interactively debugapplications that are running on an IBM i systemhost.
The course begins by describing the tasks you needto perform in preparing to debug a program. You willlearn how to launch the debugger and how to createand save a launch configuration.
Next, the course takes a detailed look at the variousviews that make up the RDi Debug perspective. Thecourse then shows you how to use the debugger tointeractively debug a program. You will see how toset breakpoints, how to examine and change thecontents of a data item, and how to step through theprogram one line at a time.
The course ends by showing how to debug amultiple-program application. In particular, itdescribes how to add programs and serviceprograms to a debugging session.
Approximate Study Time: 2 hours
Objectives
After completing this course, you should be able to:
Define and use the terms related to theIntegrated i Debugger, including debug mode,debug data, and debug view
Name and describe the different debug viewsthat can be generated when creating a module
Launch the Integrated i Debugger
Create a launch configuration
Identify the functions supported by the variousviews that make up the Debug perspective
Customize the Debug perspective
Set and remove both conditional andunconditional breakpoints
Start a program executing under the control ofthe debugger
Terminate a program executing under thecontrol of the debugger
Display the current contents of a data item oncea breakpoint has been encountered
Change the contents of a data item
Use a watch breakpoint to stop programexecution when the value of a data item ischanged
Step through a program one statement at a time
Add a program or service program to adebugging session
Topic Outline
Introduction to the Integrated i Debugger
The Debug Perspective
Using Breakpoints
Displaying and Changing Data Items
Stepping Through a Program
Adding Programs to Your Debugging Session
Audience
This course is intended for programmers who willuse RDi for IBM i application development.
Prerequisites
This course assumes that you are familiar with thegeneral concepts and capabilities of both RDi andthe Remote System Explorer (RSE). Thisprerequisite can be satisfied by completing the firsttwo courses in this series, i and Using the RemoteSystem Explorer (RSE).
The course also assumes that you have anunderstanding of basic IBM i program developmentconcepts and facilities. This prerequisite can besatisfied by completing The IBM i ProgrammingEnvironment series.
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta Using Rational Developer for i (RDi)
Technologies Inc. 196
Using Rational Developer for i (RDi) Competency Exam Order Number: PRDP99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the UsingRational Developer for i (RDi) series:
Introduction to RDi
Using the Remote System Explorer (RSE)
Using the Integrated i Debugger
The exam is divided into separate parts. Each partcorresponds to a course in the series. Successfullycompleting all parts of the exam demonstrates yourproficiency in the basic skills required to use RDi.
Approximate Study Time: 90 minutes
Recommended Uses:
This Competency Exam was designed as a masterytest for the Using Rational Developer for i (RDi)series. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.
Audience
The Using Rational Developer for Power Systems(RDi) series, including this exam, is intended forprogrammers, web designers, and other personnelwho will use RDi for application development.
Prerequisites
This series assumes that you have an understandingof basic System i program development conceptsand facilities. This prerequisite can be satisfied bycompleting The IBM i Programming Environmentseries.
You may also have obtained these skills by takingother courses or through relevant work experience.
Manta COBOL Programming
Technologies Inc. 197
COBOL Programming Order Number: PCOB00
Max.Users
FirstYear
SecondYear
Later Years
1 $756 $378 $1905 $1,134 $567 $285
Each add’l $76 $38 $19
Overview
The COBOL Programming series covers thedevelopment of ILE COBOL applications on an IBM isystem.
This series contains the following courses:
Developing a COBOL Program
COBOL Output Programming
COBOL Input Programming
Performing Arithmetic in COBOL
COBOL Table Processing
COBOL File Processing
Writing Subprograms in COBOL
COBOL Programming Competency Exam
Approximate Study Time for the Entire Series:40-60 hours
Audience
This series is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Prerequisites
All courses in this series assume that you knowbasic programming concepts and are acquaintedwith structured programming design techniques. Inparticular, you will be expected to understandprogram logic that is documented using pseudocodeor structured flowcharts. You may have gained thisknowledge from attending classes or from relevantwork experience.
This series also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the Introduction to theIBM i Environment series.
Finally, the series also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in The IBM i ProgrammingEnvironment series.
Reference Materials
A Student Reference Guide is available for thisseries.
Related Products
This series is contained in both the ProgramDevelopment Combination Pack and the COBOLProgramming Combination Pack.
Manta COBOL Programming
Technologies Inc. 198
Developing a COBOL Program
Order Number: PCOB01
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course introduces you COBOL programming.
The course first describes the basic structure of aCOBOL program, using a complete program as anexample. It then describes the rules for namingvarious types of COBOL objects and how todescribe external files and internal data items. Next,the course covers the coding of common imperativestatements and the basic control structures. By theend of this course, you will be able to code acomplete COBOL program to read an input file,reformat records, and create an output file.
Approximate Study Time: 5 hours
Objectives
After completing this course, you should be able to:
Code the four divisions of a COBOL program
Find and correct simple syntax errors in asample COBOL program listing
Code valid COBOL names for programs, files,paragraphs, and data items
Code the SELECT and FD statements todescribe a file
Code the COBOL record description when giventhe record layout of a file
Code the COBOL data descriptions whenrequired variable and constant data items aredescribed
Code the COBOL statements to define, set, andtest a program flag, given a description ofprogram requirements
Code simple ADD, SUBTRACT, and MOVEstatements when given a description of thedesired result
Code simple OPEN, READ, WRITE, andCLOSE statements when given a description ofthe desired result
Code an in-line PERFORM statement todelineate a block of COBOL code
Code an out-of-line PERFORM statement toexecute a precoded paragraph
Code an IF statement to implement a simpleselection structure
Code a PERFORM statement to implement aniteration, testing the controlling condition eitherbefore or after each iteration
Predict the results of move and comparisonoperations when the source and target fields areof the same or different lengths
Code the corresponding data descriptions whengiven a description of required constant dataitems
Code INITIALIZE and MOVE statements usingliterals and/or figurative constants
Identify coding techniques that can improve theperformance of a COBOL program
Write COBOL statements using the DISPLAY orWRITE verbs to report on program execution orunexpected situations
Code a MOVE CORRESPONDING statement,to move corresponding fields of one group itemto another, when given the descriptions of twogroup items containing matching subordinateitems
Write COBOL statements using the ACCEPTverb to obtain data from the TIME, DAY, DAY-OF-WEEK, and/or DATE special registers
Define a date, time, or timestamp data item
Predict the result of move and comparisonoperations involving dates, times, andtimestamp data items
Code a COPY statement to insert COBOL codeinto a program from a source file member or anIFS file
Code a REPLACING option to modify a sourceprogram being copied
Code a REPLACE statement to globally changea word or group of words in a source program
Code a COPY statement to create datadescription entries using an external databasefile
Modify the appearance of a source programlisting by using the / (slash), TITLE, EJECT,*CONTROL, and SKIP statements
Use the COBOL Language Reference manual todetermine the proper syntax of a COBOLstatement
Identify the manual in which the answer to aquestion about COBOL programming can befound
Manta COBOL Programming
Technologies Inc. 199
Topic Outline
A Sample COBOL Program
Selecting Name
Defining Data Items
Coding Procedure Division Statementss
Basic Control Structures
Using Literals and Figurative Constants
Enhancing the Sample Program
Defining and Using Dates
Using the COBOL Copy Facility
Using Reference Manuals
Audience
The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Prerequisites
Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.
This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the Introduction to theIBM i Environment series.
Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in The IBM i ProgrammingEnvironment series.
Manta COBOL Programming
Technologies Inc. 200
COBOL Output Programming
Order Number: PCOB02
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course expands upon the fundamental COBOLprogramming skills taught in the previous course ofthis series, Developing a COBOL Program. Thecourse first describes general report concepts andthe differences between program-described andexternally described report files. It then shows howCOBOL facilities can be used to enhance thereadability of program output by formatting numericfields. The techniques covered here will applywhether the output is in the form of a printed reportor a display on a terminal screen. Next the coursedescribes how to improve the appearance of printedreports by adding headings and footings andcontrolling vertical spacing. Finally, the coursediscusses a somewhat more complex examplerequiring the use of multiple control breaks toproduce a report containing totals and subtotals.
Approximate Study Time: 4 hours
Objectives
After completing this course, you should be able to:
Identify the various components of typicalbusiness reports
Describe common report types and theirassociated business uses
Code the SELECT and ASSIGN clauses toidentify a printer file that uses either anexternally described report format or a program-described report format
Code the COBOL statements to perform outputediting, including character insertion, zerosuppression, check protection, and characterreplacement, given a description of the desiredresults
Code COBOL data definition statements toimplement a given report layout
Code WRITE statements to vary the verticalspacing of a report or to start a new page
Design and code a COBOL program to create asimple report, including headings, pagenumbers, and footings, given a problemstatement, the input data description for asequential file, and a report layout
Design and code a COBOL program to create areport using the COBOL automatic page controlfacility, given a problem statement, the inputdata description for a sequential file, and areport layout
Design and code a COBOL program to create areport requiring multiple levels of group totals(multiple control breaks), given a problemstatement, the input data description for asequential file containing records with multiplecontrol fields, and a desired report layout
Topic Outline
Introduction to Output Formatting
Report Programming
Field Editing Basics
Advanced Field Editing
A COBOL Report Program – Part 1
A COBOL Report Program – Part 2
Using the Automatic Page Control Facility
Handling Control Breaks
Handling Multiple-Level Control Breaks
Audience
The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Prerequisites
Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.
This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:
Introduction to the IBM i Environment
The IBM i Programming Environment
Finally, the course assumes that you havecompleted the previous course of this series:
Developing a COBOL Program
Manta COBOL Programming
Technologies Inc. 201
COBOL Input Programming
Order Number: PCOB03
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course describes the COBOL programmingtechniques you will use to process input for typicalbusiness applications.
The course begins by describing methods forhandling input files that contain multiple recordtypes. You will see then how to detect and processinput errors. You will also find out how to control theprocessing each input record receives. In addition,you will see various techniques for selectingspecified records from a file, processing combinedconditions, and using case structures. This courseends by explaining how to manipulate characterstrings.
Approximate Study Time: 5 hours
Objectives
After completing this course, you should be able to:
Code the COBOL statements necessary todescribe the input data for a file containingrecords with multiple descriptions
Construct the edit tests required to validategiven input data
Design and code the COBOL statementsnecessary to process rejected transactions,given a description of edits to be performed
Design and code the COBOL statementsneeded to select the specified records (usingcombined conditions and/or nested IFstatements), given a problem descriptionspecifying multiple selection criteria
Design and code a COBOL program solutiongiven a problem statement requiring the use of acase structure
Design and code COBOL program segmentsthat use INSPECT, reference modification,STRING, and UNSTRING to manipulatecharacter data
Topic Outline
Handling Multiple Data Descriptions for a SingleArea
Basic Input Editing
Detecting Other Input Errors
Processing Input Errors
Controlling Record Processing
Processing Case Structures
Processing Character Strings
Audience
The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Prerequisites
Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.
This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:
Introduction to the IBM i Environment
The IBM i Programming Environment
Finally, the course assumes that you havecompleted the previous courses of this series:
Developing a COBOL Program
COBOL Output Programming
Related Products
A Student Reference Guide is available for theseries that contains this course.
This course is contained in the COBOLProgramming series.
This course is contained in the following combinationpacks:
Program Development Combination Pack
COBOL Programming Combination Pack
Manta COBOL Programming
Technologies Inc. 202
Performing Arithmetic in COBOL
Order Number: PCOB04
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course discusses in detail the definition and useof numeric fields in COBOL. It describes how tocode the Data Division statements necessary todefine each type of numeric field, how to initializenumeric fields, and how to use them efficiently in theProcedure Division. All types of arithmetic operationsare covered. Upon completion of the course, youshould have a strong working knowledge ofarithmetic programming techniques in COBOL.
Approximate Study Time: 5 hours
Objectives
After completing this course, you should be able to:
Code the COBOL statements (ADD,SUBTRACT, MULTIPLY, DIVIDE, andCOMPUTE) to perform arithmetic operations onexternal decimal (display), packed decimal,binary, and floating-point fields
Convert numbers from one to another amongthe available numeric formats
Add and subtract hexadecimal numbers
Code the Data Division statements necessary todefine external decimal, binary, packed decimal,and floating-point fields
Convert numbers from one to another amongthe external decimal, packed decimal, andbinary formats
Predict the results of a MOVE operationbetween numeric fields of different types andunequal length
Predict the results of a comparison of numericfields
Code the COBOL statements necessary toinitialize numeric fields to specified values
Predict the results of an ADDCORRESPONDING or SUBTRACTCORRESPONDING operation
Identify common errors resulting from invalidarithmetic operations
Compute the length of a record containingexternal decimal, binary, packed decimal and/orfloating-point fields
Define work fields and output fields of sufficientsize to hold all possible results, given adescription of input fields and the arithmeticoperations to be performed
Round arithmetic results using the ROUNDEDphrase, and use the ON SIZE ERROR phrase tocatch truncation errors
Recognize arithmetic inefficiencies in a givenCOBOL program segment
Select data types, data field lengths, sign, anddecimal position options to maximize programperformance
Use decimal scale factors in a PICTURE clauseto cause scaling of a numeric item
Identify the COBOL intrinsic function to performa specified task
Invoke an intrinsic function, given a descriptionof the input data and the function desired
Topic Outline
Arithmetic Operations
Computer Numbering Systems (Optional)
Binary, Packed Decimal, and Floating-PointNumbers
Arithmetic Programming Techniques
Accuracy and Length Considerations
Efficiency Considerations
Using Scale Factors
Intrinsic Functions
Audience
The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Manta COBOL Programming
Technologies Inc. 203
Prerequisites
Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.
This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:
Introduction to the IBM i Environment
The IBM i Programming Environment
Finally, the course assumes that you havecompleted the previous courses of this series:
Developing a COBOL Program
COBOL Output Programming
COBOL Input Programming
Related Products
A Student Reference Guide is available for theseries that contains this course.
This course is contained in the COBOLProgramming series.
This course is contained in the following combinationpacks:
Program Development Combination Pack
COBOL Programming Combination Pack
COBOL Table Processing
Order Number: PCOB05
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
Table usage is an important element of manyprograms. COBOL Table Processing discusseshow to define, maintain, and use tables in aCOBOL program.
The course begins with a discussion of commontable applications. It then reviews the COBOLstatements that are used to define a table and toaccess table elements. Next the course describestechniques for loading, updating, and searching atable. A discussion of COBOL statements designedto simplify common table operations is next, followedby an introduction to tables of two and threedimensions.
Approximate Study Time: 6 hours
Objectives
After completing this course, you should be able to:
Code the Data Division entries to define andinitialize a one-dimensional table
Code a COBOL routine to retrieve a particularargument from a table, using one of thefollowing techniques, as appropriate:
o Sequential search
o Progressive search
o Direct retrieval
o Key transformation
Code COBOL routines to perform commonoperations using a variable-length table
Code the Data Division entries to define andinitialize a multi-dimensional table
Code a COBOL routine to perform the followingtable operations:
o Load the table from a sequential file
o Directly access a particular element of thetable
o Serially access each element of the table orof a specified row or column
Code the COBOL statements required toassociate an index (or indexes) with a table
Manta COBOL Programming
Technologies Inc. 204
Code the COBOL SEARCH verb to locate aspecified entry in a table
Code the COBOL SEARCH ALL verb to locatea specified entry in a sorted table
Reorder the elements in a table to reduce theaverage time required for a sequential search,given the description of a table and table lookupstatistics
Code a COBOL routine to keep track of andreport on the number of times each element isaccessed
Estimate the number of comparisons required tolocate a typical element in a table, given adescription of the table and a proposed searchstrategy
Select the optimal table organization and searchtechnique for a given table depending onwhether the objective is faster execution speed,reduced memory requirements, or fastestprogramming implementation
Topic Outline
Table Concepts and Terminology
Basic Table Operations
Useful Table Operations
Using Indexes
The Binary Search Technique
Multi-Dimensional Tables
Selecting a Table-Handling Technique
Audience
The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Prerequisites
Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.
This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:
Introduction to the IBM i Environment
The IBM i Programming Environment
Finally, the course assumes that you havecompleted the previous courses of this series:
Developing a COBOL Program
COBOL Output Programming
COBOL Input Programming
Performing Arithmetic in COBOL
Related Products
A Student Reference Guide is available for theseries that contains this course.
This course is contained in the COBOLProgramming series.
This course is contained in the following combinationpacks:
Program Development Combination Pack
COBOL Programming Combination Pack
Manta COBOL Programming
Technologies Inc. 205
COBOL File Processing
Order Number: PCOB06
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the statements and techniquesused by a COBOL programmer to process IBM ifiles.
The course begins with a review of Db2 concepts,file types, and processing. It then shows how toaccess a physical or logical data file sequentially ineither arrival sequence or key sequence. Directaccess is then covered. You will see how to accessrecords using either a record key or a relative recordnumber. In addition to learning the relevant COBOLstatements, you will also learn programmingtechniques for handling file in these ways. Thecourse ends with a discussion of I/O error detectionand handling in a COBOL program.
Approximate Study Time: 6 hours
Objectives
After completing this course, you should be able to:
Identify the processing capabilities andlimitations of the three types of COBOL files
Identify a sequential, indexed, or relative file in aCOBOL program
Code a COBOL program to load, access,update, or extend a database file using anarrival sequence access path
Code a COBOL program to access an indexedor a relative file sequentially, randomly, anddynamically, including the addition, replacement,and deletion of records
Perform generic key processing with an indexedfile
Code a COBOL program to process an indexedfile through an alternate key
Code a COBOL program that uses commitmentcontrol
Given the description of a relative file, select andcode a randomizing algorithm and an overflowtechnique for optimal performance
Code the COBOL statements to diagnose andrespond to I/O errors
Topic Outline
Db2 Review
Accessing a File Sequentially
Keyed Access
Keyed Access Enhancements
Relative Access
Relative Access Enhancements
Error Handling
Audience
The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Prerequisites
Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.
This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:
Introduction to the IBM i Environment
The IBM i Programming Environment
Finally, the course assumes that you havecompleted the previous courses of this series:
Developing a COBOL Program
COBOL Output Programming
COBOL Input Programming
Performing Arithmetic in COBOL
COBOL Table Processing
Manta COBOL Programming
Technologies Inc. 206
Related Products
A Student Reference Guide is available for theseries that contains this course.
This course is contained in the COBOLProgramming series.
This course is contained in the following combinationpacks:
Program Development Combination Pack
COBOL Programming Combination Pack
Writing Subprograms in COBOLOrder Number: PCOB07
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This course covers the creation and use ofsubprograms. The course begins by describing theconcepts that are common to all subprograms. Itthen discusses appropriate applications forsubprograms. Following this, the course illustrateshow external subprograms affect the executionprocess and examines subprogram linkage.
Next, the course discusses subprogram usage inCOBOL, beginning with how to call a subprogramfrom a COBOL program. You will then see how towrite a subprogram in COBOL. The course alsodiscusses design and testing considerations whenusing subprograms, as well as several advancedsubprogramming techniques. Finally, the coursedemonstrates how to use dynamic subprogram calls.
Objectives
After completing this course, you should be able to:
Identify the ways in which a subprogram may becalled from a COBOL program
Describe the ways in which data can be sharedbetween a subprogram and its caller
Write a COBOL program that uses asubprogram
Design and code a COBOL subprogram
Use the RETURN-CODE special register in asubprogram and a calling program to determinethe success of a subprogram
Code a COBOL subprogram which, in turn,invokes another subprogram
Code a COBOL main program that acceptsparameter information from the operatingsystem
Modify a COBOL subprogram so that it can beused in a wider variety of situations
Write a program stub to replace a COBOLsubprogram during the testing of its callingprograms
Manta COBOL Programming
Technologies Inc. 207
Write a COBOL driver program to test asubprogram
Code the COBOL statements to accomplishdynamic subprogram linkage
Topic Outline
Subprogram Concepts and Applications
External Subprogram Execution and Linkage
Invoking Subprograms in COBOL
Writing COBOL Subprograms
Advanced Subprogram Considerations
Designing and Testing in a SubprogramEnvironment
Using Programs and Procedures Written inOther Languages
Dynamic Subprogram Linkage
Audience
The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.
Prerequisites
Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.
This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:
Introduction to the IBM i Environment
The IBM i Programming Environment
Finally, the course assumes that you havecompleted the previous courses of this series:
Developing a COBOL Program
COBOL Output Programming
COBOL Input Programming
Performing Arithmetic in COBOL
COBOL Table Processing
COBOL File Processing
Related Products
A Student Reference Guide is available for theseries that contains this course.
This course is contained in the COBOLProgramming series.
This course is contained in the following combinationpacks:
Program Development Combination Pack
COBOL Programming Combination Pack
Manta COBOL Programming
Technologies Inc. 208
COBOL Programming Competency Exam Order Number: PCOB99
Max.Users
FirstYear
SecondYear
Later Years
1 $120 $60 $305 $180 $90 $45
Each add’l $12 $6 $3
Overview
This Competency Exam tests your mastery of theobjectives for the courses that make up the COBOLProgramming series. The following exams areavailable now:
Developing a COBOL Program
COBOL Output Programming
COBOL Input Programming
Performing Arithmetic in COBOL
COBOL Table Processing
COBOL File Processing
Writing Subprograms in COBOL
The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to develop ILE COBOLapplications.
Approximate time to complete all parts of theexam: 4 hours
Recommended Uses
This Competency Exam was designed as a masterytest for the COBOL Programming series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.
Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.
Evaluation
The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate sessionfor review.
Audience
The COBOL Programming series, including thisexam, is intended for programmers new to theCOBOL programming language. It can also be takenby COBOL/400 programmers who want to learn ILECOBOL.
Prerequisites
All courses in this series assume that you knowbasic programming concepts and are acquaintedwith structured programming design techniques. Inparticular, you will be expected to understandprogram logic that is documented using pseudocodeor structured flowcharts. You may have gained thisknowledge from attending classes or from relevantwork experience.
This series also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the Introduction to theIBM i Environment series.
Finally, the series also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in The IBM i ProgrammingEnvironment series.