Valid File Operations

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table

20. Valid File Operations for Keyed Processing Methods (Random by Key,

Sequential

by

Key,

Sequential

within Limits)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

File-Description

 

 

 

 

 

 

 

 

Calculation

Specifications

Positions

 

 

 

 

 

Specifications

Positions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

17

 

18

 

20

28

1

 

2

 

 

26-35

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

34

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

I

 

P/S

 

 

 

 

 

K/A/P/G/

 

CLOSE,

FEOD,

FORCE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

I

 

P/S

 

A

 

 

 

K/A/P/G/

 

WRITE,

CLOSE,

FEOD,

FORCE

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

I

 

P/S

 

 

 

L

 

K/A/P/G/

 

CLOSE,

FEOD,

FORCE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

U

 

P/S

 

 

 

 

 

K/A/P/G/

 

UPDATE,

DELETE,

CLOSE,

FEOD,

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

FORCE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

U

 

P/S

 

A

 

 

 

K/A/P/G/

 

UPDATE,

DELETE,

WRITE,

CLOSE,

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

FEOD,

FORCE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

U

 

P/S

 

 

 

L

 

K/A/P/G/

 

UPDATE,

DELETE,

CLOSE,

FEOD,

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

FORCE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

I

 

F

 

 

 

 

 

K/A/P/G/

 

READ,

READE,

READPE,

READP,

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

SETLL,

SETGT,

CHAIN,

 

OPEN,

CLOSE,

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

I

 

F

 

A

 

 

 

K/A/P/G/

 

WRITE,

READ,

READPE, READE,

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

READP,

 

SETLL,

SETGT,

CHAIN,

OPEN,

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CLOSE,

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

I

 

F

 

 

 

L

 

K/A/P/G/

 

READ,

OPEN,

CLOSE,

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

U

 

F

 

 

 

 

 

K/A/P/G/

 

READ,

READE,

READPE,

READP,

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

SETLL,

SETGT,

CHAIN,

 

UPDATE,

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

DELETE,

 

OPEN,

CLOSE,

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

U

 

F

 

A

 

 

 

K/A/P/G/

 

WRITE,

UPDATE,

DELETE,

READ,

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

READE,

 

READPE,

READP,

SETLL,

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SETGT,

CHAIN,

OPEN,

CLOSE,

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

U

 

F

 

 

 

L

 

K/A/P/G/

 

READ,

UPDATE,

DELETE,

OPEN,

 

 

 

 

 

 

 

 

 

 

 

 

 

D/T/Z/F

 

CLOSE,

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

O

 

Blank

A

 

 

 

K/A/P/G/

 

WRITE

 

(add

new

records

to

a

 

file),

 

 

 

 

 

 

 

 

D/T/Z/F

 

OPEN, CLOSE,

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

O

 

Blank

 

 

 

 

K/A/P/G/

 

WRITE

 

(initial

 

load

of

3,a

OPEN,new

file)

 

 

 

 

 

 

 

 

D/T/Z/F

 

CLOSE,

FEOD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Notes:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1. An L

must

be

specified

in

position

 

28

to

specify sequential-within-limits

a record-address file for

an input or an update file.

 

 

 

2. Externally

described

filesK

inrequirepositiona 34;

program-described

files requir

an A,P,G,D,T,Z,

orF

in

position

34 I andin

 

anposition

35.

 

 

 

 

 

 

3. An A

in

position

20

is

not

required

 

for

the

initial

loading A of records

is specified in positionADD must20,be specified

on

the

output

specifications.

file

must

have

been

created with

the

OS/400

CREATE

FILE

command.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Chapter 16. Accessing Database 305Files

Page 329
Image 329
IBM AS/400 manual Z/F

AS/400 specifications

The IBM AS/400, now known as the IBM iSeries, is a midrange computer system that has been a cornerstone of enterprise computing since its introduction in 1988. Designed to provide a robust platform for business applications, the AS/400 is celebrated for its reliability, scalability, and integrated database capabilities.

One of the key features of the AS/400 is its Integrated Operating Environment, which blends hardware and software resources seamlessly. This integration allows businesses to execute diverse workloads, ranging from traditional applications to modern web-based services, all on a single platform. The operating system, OS/400 (now IBM i), offers a rich set of APIs and tools for developers, simplifying application development and management.

Another standout characteristic of the AS/400 is its built-in database, DB2 for i. This powerful relational database management system allows for efficient data handling and provides advanced features such as support for SQL, XML, and JSON, making it easier for businesses to manage their data and integrate it with other systems. The database's tight integration with the operating system enables high performance and security.

In terms of scalability, the AS/400 can accommodate small businesses as well as large enterprises, with the ability to support hundreds of users simultaneously. Its architecture allows for easy upgrades in hardware, meaning that organizations can scale their systems without replacing the entire infrastructure.

Security is another critical attribute of the AS/400. With a sophisticated security model, it offers built-in user authentication, access control, encryption, and auditing capabilities to protect data and applications from unauthorized access.

The AS/400 also supports multiple programming languages, including RPG, COBOL, Java, and PHP, giving organizations the flexibility to choose the development tools that best fit their needs. This diversity helps maintain legacy applications while also developing new ones that leverage modern technologies.

Moreover, the platform supports both traditional green-screen interfaces and modern graphical user interfaces, allowing organizations to transition smoothly into contemporary user experience paradigms.

Overall, the IBM AS/400 stands out as a resilient, flexible, and secure computing platform that enables organizations to effectively manage their business operations, streamline processes, and adapt to changing market demands. Its unique combination of integrated features and capabilities ensures that it remains relevant in today's fast-paced technology landscape.