216
Course Catalog

Course Catalog - Manta Technologies

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Course Catalog

December, 2018 Edition.

Manta Technologies Inc.6850 Vista Lodge LoopCastle Pines, CO 80108

Copyright Manta Technologies Inc. 1994-2019. All rights reserved.

Manta courses are presented using EasyTutor, a trademark of Hansen Training Systems, Inc.

Ethernet is a trademark of the Xerox Corporation

UNIX is a trademark of the X/Open Company Ltd.

Linux is a trademark of Linus Torvalds

Apache and Tomcat are trademarks of the Apache Software Foundation.

Microsoft, JScript, Microsoft Access, Microsoft Excel, Microsoft Office, Microsoft Windows, and Microsoft Wordare trademarks of the Microsoft Corporation.

Sun, Sun Microsystems, Java, and JavaServer Pages are trademarks of Sun Microsystems, Inc.

The following are trademarks of International Business Machines Corporation:

Db2

IBM

IBM i

ILE

Integrated Language Environment

System i Access

Navigator for i

Net.Data

Operational Assistant

System i Navigator

PC5250

PDM

Personal Communications 5250

PowerVM

ILE RPG

SEU

System i

WebSphere

Printed in the United States of America.

Table of Contents Table of Contents .............................................................................................................................................III

The IBM i Training Library..................................................................................................................................1

Features..........................................................................................................................................................1

The Manta Experience....................................................................................................................................2

Manta Offerings..............................................................................................................................................3

System Requirements....................................................................................................................................3

Licensing.........................................................................................................................................................3

Keep Track of Your Students’ Progress.........................................................................................................4

Special Introductory Price: Free!....................................................................................................................4

Ordering Courses............................................................................................................................................4

Money-Back Guarantee..................................................................................................................................4

Legal Stuff.......................................................................................................................................................4

Combination Packs.............................................................................................................................................5

Curriculum Recommendations...........................................................................................................................7

System Users and IT Managers.....................................................................................................................7

Programmers and Analysts............................................................................................................................7

System Operators...........................................................................................................................................8

System Administrators....................................................................................................................................8

Course Descriptions...........................................................................................................................................9

Introduction to the IBM i Environment .............................................................................................................10

Getting Started on IBM i...............................................................................................................................11

Integrated File System Concepts..................................................................................................................12

Using IBM i Commands................................................................................................................................13

Using Navigator for i.....................................................................................................................................15

Introduction to the IBM i Environment Competency Exam...........................................................................16

Using Query Manager......................................................................................................................................17

Using Query for i...............................................................................................................................................18

Getting Started with Db2 Web Query...............................................................................................................19

Fundamentals of IBM i Operations...................................................................................................................20

Work Management Concepts.......................................................................................................................21

Submitting and Managing Batch Jobs..........................................................................................................22

Controlling Printer Output.............................................................................................................................23

Controlling Users, Queues, Printers, and Subsystems................................................................................24

Monitoring an IBM i System..........................................................................................................................25

Using Tapes..................................................................................................................................................26

Fundamentals of IBM i Operations Competency Exam...............................................................................27

Fundamentals of Operations Using Navigator for i..........................................................................................28

Work Management Concepts.......................................................................................................................29

Basic Operations Using Navigator for i.........................................................................................................30

Work Management Using Navigator for i......................................................................................................32

Tape Management Using Navigator for i......................................................................................................33

Fundamentals of Operations Using Navigator for i Competency Exam.......................................................34

IBM i System Management..............................................................................................................................35

Starting and Stopping the System................................................................................................................36

Managing Devices........................................................................................................................................37

Backing Up Your System.............................................................................................................................38

Checking Storage Utilization.........................................................................................................................39

Cleaning Up System Storage.......................................................................................................................40

Software Maintenance..................................................................................................................................41

Using Virtual Media.......................................................................................................................................42

Handling Problems........................................................................................................................................43

System Management Using System i Navigator..........................................................................................44

IBM i System Management Competency Exam...........................................................................................46

PowerVM Concepts..........................................................................................................................................47

System i Access for Windows..........................................................................................................................49

Introduction toSystem i Access for Windows.......................................................................................................................50

Using PC5250...............................................................................................................................................51

Transferring Files Between Your PC and an IBM i System.........................................................................52

Using the Directory Update Function............................................................................................................53

Installing System i Access for Windows.......................................................................................................54

System i Access for Windows Competency Exam.......................................................................................56

IBM i Security...................................................................................................................................................57

Introduction to IBM i Security........................................................................................................................58

Granting Object Authority.............................................................................................................................59

Controlling Application Security....................................................................................................................60

System Security Considerations...................................................................................................................61

Creating an Application Environment...........................................................................................................63

Creating and Maintaining User Profiles........................................................................................................64

Security-Related System Values..................................................................................................................65

IBM i Security Using System i Navigator......................................................................................................66

IBM i Security Competency Exam................................................................................................................68

IBM Navigator for i............................................................................................................................................69

Using Navigator for i.....................................................................................................................................70

Basic Operations Using Navigator for i.........................................................................................................71

Work Management Using Navigator for i......................................................................................................72

Tape Management Using Navigator for i......................................................................................................73

IBM Navigator for i Competency Exam........................................................................................................74

System i Navigator...........................................................................................................................................75

Using System i Navigator ............................................................................................................................75

IBM i Operations Using System i Navigator ................................................................................................76

System Management Using System i Navigator..........................................................................................78

IBM i Security Using System i Navigator......................................................................................................79

Managing TCP/IP Using System i Navigator................................................................................................80

System i Navigator Competency Exam........................................................................................................82

Work Management for System Administrators.................................................................................................83

Work Management Concepts.......................................................................................................................84

Working with System Values........................................................................................................................85

Managing Subsystems.................................................................................................................................86

Subsystem Workflow and Job Control..........................................................................................................87

Streamlining IBM i Operations......................................................................................................................88

Job Accounting.............................................................................................................................................90

Performance Tuning.....................................................................................................................................91

Work Management for System Administrators Competency Exam.............................................................92

TCP/IP in the IBM i Environment......................................................................................................................93

TCP/IP Fundamentals..................................................................................................................................94

TCP/IP Applications......................................................................................................................................95

Configuring and Managing TCP/IP...............................................................................................................96

Managing TCP/IP Using System i Navigator................................................................................................98

TCP/IP in the IBM i Environment Competency Exam................................................................................100

Using the Advanced Job Scheduler...............................................................................................................101

Advanced Job Scheduler Concepts...........................................................................................................102

The AJS Text-Based Interface....................................................................................................................103

The AJS Web-Based Interface...................................................................................................................105

Using the Advanced Job Scheduler Competency Exam............................................................................107

The Integrated File System............................................................................................................................108

IFS Security....................................................................................................................................................109

PowerVM Concepts........................................................................................................................................111

Implementing Single Sign-On.........................................................................................................................113

Configuring the HTTP Server.........................................................................................................................115

The IBM i Programming Environment............................................................................................................117

IBM i Application Programming Concepts..................................................................................................118

IBM i Programming Tools...........................................................................................................................119

ILE Program Development.........................................................................................................................121

The IBM i Programming Environment Competency Exam.........................................................................122

Java Fundamentals........................................................................................................................................123

Introduction to Java....................................................................................................................................124

The Basics of Java Programming...............................................................................................................125

Java Fundamentals Competency Exam.....................................................................................................127

Free-Form RPG Programming.......................................................................................................................128

Fundamentals of Free-Form RPG..............................................................................................................129

File Processing with Free-Form RPG.........................................................................................................130

Rounding Out the Essentials of Free-Form RPG.......................................................................................131

Working with Complex Data Types in Free-Form RPG..............................................................................132

Developing a Modular Application in Free-Form RPG...............................................................................133

Developing an Interactive Program in Free-Form RPG.............................................................................134

Advanced Free-Form RPG Programming..................................................................................................136

Free-Form RPG Programming Competency Exam....................................................................................137

RPG Programming.........................................................................................................................................138

RPG Fundamentals....................................................................................................................................139

RPG File Processing..................................................................................................................................140

Rounding Out the Essentials of RPG.........................................................................................................141

Working with Complex Data Types............................................................................................................143

Developing a Modular RPG Application.....................................................................................................144

Developing an Interactive RPG Program...................................................................................................145

Advanced RPG Programming....................................................................................................................147

RPG Programming Competency Exam......................................................................................................148

Coding Free-Form RPG.................................................................................................................................149

Using Screen Design Aid (SDA).....................................................................................................................150

Using the ILE Source-Level Debugger...........................................................................................................151

Working with Db2 Databases.........................................................................................................................152

Introduction to Db2 ....................................................................................................................................153

Creating and Managing Physical Files ......................................................................................................154

Creating and Managing Logical Files ........................................................................................................155

Processing a Db2 Database ......................................................................................................................156

Using Triggers.............................................................................................................................................157

Using Referential Integrity..........................................................................................................................158

Working with Db2 Databases Competency Exam......................................................................................159

Using Structured Query Language (SQL)......................................................................................................160

SQL Fundamentals.....................................................................................................................................161

Coding SQL Statements in a Free-Form RPG Program............................................................................162

Coding SQL Statements in an RPG Program............................................................................................163

Coding SQL Statements in a COBOL Program.........................................................................................164

SQL Stored Procedures..............................................................................................................................165

Implementing Business Rules Using Constraints and Triggers.................................................................167

Using Structured Query Language (SQL) Competency Exam...................................................................169

.......................................................................................................................................................................169

Control Language Programming....................................................................................................................170

Introduction to CL Programming.................................................................................................................171

Controlling Command and Program Flow..................................................................................................173

Interactive CL Applications.........................................................................................................................174

Message Processing in a CL Program.......................................................................................................175

Accessing Database Files, Data Queues, and Data Areas........................................................................176

Control Language Programming Competency Exam.................................................................................177

eBusiness for IBM i Programmers ................................................................................................................178

eBusiness: From HTML to WebSphere......................................................................................................179

Coding HTML and XHTML: Basic Elements..............................................................................................180

Coding HTML and XHTML: Advanced Elements.......................................................................................182

Coding JavaScript.......................................................................................................................................183

Using JavaScript to Enhance Web Pages..................................................................................................184

Writing a CGI Program in RPG...................................................................................................................185

Developing Web Applications Using Net.Data...........................................................................................187

Ajax Programming......................................................................................................................................189

eBusiness for IBM i Programmers Competency Exam .............................................................................191

Using Rational Developer for i (RDi) .............................................................................................................192

Introduction to RDi......................................................................................................................................193

Using the Remote System Explorer (RSE).................................................................................................194

Using the Integrated i Debugger.................................................................................................................195

Using Rational Developer for i (RDi) Competency Exam ..........................................................................196

COBOL Programming ...................................................................................................................................197

Developing a COBOL Program..................................................................................................................198

COBOL Output Programming.....................................................................................................................200

COBOL Input Programming........................................................................................................................201

Performing Arithmetic in COBOL................................................................................................................202

COBOL Table Processing..........................................................................................................................203

COBOL File Processing..............................................................................................................................205

Writing Subprograms in COBOL................................................................................................................206

COBOL Programming Competency Exam ................................................................................................208

The IBM i Training LibraryKeeping yourself and your staff up to date on the latest IBM i technologies is vital tosustaining your company’s productivity and profits. And there’s no better way to acquire theskills you need than web-based training (WBT) from Manta Technologies. Manta trainingoffers you and your staff the maximum in training effectiveness with the minimum of programadministration and cost.

Manta Technologies’ IBM i Training Library is an integrated collection of courses forprogrammers, operators, system administrators, and users of the IBM i operating system. Allcourses use interactive training sessions that run in all popular browsers.

Features Manta is the premier company in the IBM i

training and education business. We arecelebrating our 23rd anniversary this year.

Manta has more IBM i courses than anyone,with over 130 courses currently available.

All courses use self-contained, interactivesessions.

Students can train anywhere: at the office, athome, or on the road.

Because all courses are online, students cantrain anytime: 24/7/365.

Every course can be taken from any PC ortablet that can run a standard browser.

Manta’s exclusive IBM i simulator lets studentspractice IBM i procedures on a PC or tablet.When they move to a real system, they will havethe confidence and skills to perform systemtasks correctly the first time.

Manta’s student-paced courses are easy toschedule, averaging two hours in length. Youcan finish a complete course in a morning or anafternoon or at home in the evening.

Manta’s flexible licensing provides low-costtraining for one student or hundreds.

The low price of Manta courses will typically letyou train an entire department for the cost ofsending one student to a traditional class.

Because training is delivered from the Mantaweb site, course updates are immediatelyavailable. This means that you receive free,immediate maintenance.

If we add a course to a product you purchased(such as a combination pack), you haveimmediate access to the new course at noextra charge.

A Manta Competency Exam is available forevery course. Not only do the exams help youdetermine whether you have mastered thematerial covered, they are also an excellent wayto test whether a new employee has the skillsyou need.

Manta's exercises and exams are built aroundrealistic, on-the-job situations in which thestudent must enter commands, select menuoptions, write code, and perform other system-related tasks using Manta's exclusive IBM isimulator.

At the end of each exam, the student is directedto remedial training, if needed, and the resultsare logged for reporting via our built-in StudentAdministration function.

Manta courses make an excellent onlinereference when students are back on the job. Inaddition, a complementary PDF StudentReference Guide is provided with each Mantaseries or stand-alone courses.

This catalog and the Manta web site,www.mantatech.com, offer detailed coursedescriptions and curriculumrecommendations for common job functions.

Manta The IBM i Training Library Technologies Inc. 2

The Manta ExperienceWhat makes taking a Manta course a unique learning experience? High on anyone’s list would be Manta’sexclusive training delivery system. This system was designed for the sole purpose of providing the besttraining for the IBM i environment. Unique to the system are built-in simulators of both 5250 workstations andPC-based graphical user interfaces (GUIs), such as those used by RDi and RSE. Equally important is Manta’sdesign philosophy: to tailor courses and exercises around the student’s job requirements. For example, ratherthan having students answer multiple-choice questions about RPG statements, our RPG courses requirestudents to actually enter statements as they would on the job.

Student Control Functions

Manta screen includes the following options:

All courses that are available to the studentare reached from a single Menu.

Navigation buttons let the student proceedas fast or as slow as desired.

When a break is needed, a student can seta Bookmark and then use the GoTofunction to return to that point at a later time.

Students can often receive a Hint to directthem towards the correct answer. If this is

not enough, the Answer button will provide boththe correct answer and an explanation.

Sound effects can be turned on and off with theAudio Control. Most course also have a soundtrack that can be turned off or on as desired.

The Help Topics provide detailed instructions forall student activities.

The Handy Links menu includes links to Manta’sweb site and online curriculum planner, as wellas to the IBM i Knowledge Center.

.A complete IBM i Glossary is never more than aclick away.

Manta Curriculum Recommendations Technologies Inc. 3

Manta Offerings

The Manta IBM i Training Library

The Manta IBM i Training Library is a collection ofcourses for programmers, operators, systemadministrators, and users. Each course takes 2-6hours to complete. The library is designed as anintegrated curriculum. Students can progress fromentry-level courses to advanced topics that preparethem for professional certifications.

Related courses are combined into a series. Anexample is the 7-course Free-Form RPGProgramming series. Similarly, related series arecombined into a combination pack. An example isthe RPG Development Combination Pack, whichincludes not only the RPG Programming series, butalso 38 other courses that cover everything that anRPG programmer needs to be productive.

When a course is not contained within a series, wecall it a stand-alone course. An example is UsingScreen Design Aid (SDA), which is also in the RPGDevelopment Combination Pack.

Our largest combination pack is the complete IBM iTraining Library. This package includes all of our130+ courses.

Every course has a corresponding CompetencyExam, which tests the student's mastery of thecourse objectives. At the end of each exam is areport that shows the student's results and, if theyare not satisfactory, points the student to theappropriate session for review. For stand-alonecourses, the exam is packaged at the end of thecourse. For courses within a series, the exams arepackaged together and offered as a separateproduct. (Some customers use the exams as apretest because, if you pass the exam, there is noneed to take the course.) If you purchase the entireseries, the exams are included at no additional cost.

Student Reference Guides are available in PDFformat for all Manta series and stand-alone courses.These can be downloaded from each student's mainmenu. Each Student Reference Guide (SRG)includes a summary of all major topics. As a result,the guides make an excellent reference whenstudents have finished their studies and are back onthe job.

System Requirements

The Manta courseware can run in the current releaseof all popular browsers, including Internet Explorer,Firefox, Chrome, Opera, and Safari. (We currentlyrecommend Chrome.)

The Manta courseware automatically checks yourbrowser’s configuration to ensure that it is set up asrequired to run the training. A quick way todetermine whether any configuration changes areneeded is to take a sample session from the Mantaweb site.

Licensing

All courses have a concurrent-user license. Thelicense does not limit the number of students whocan use a product, only the number who can beusing it at the same time. The base term is oneyear.

Individuals and most small organizations prefer thesingle-user license. With formal scheduling (forexample, by assigning a morning or an afternoon toeach student), we find that up to ten students canshare a single-user license.

If your organization prefers to train students ingroups, rather than one at a time, consider amultiple-user license. Unlike the single-userlicense, the multiple-user license lets multiplestudents use the same product simultaneously.

The user limit applies to whatever product(s) youorder. If you buy a one-user license for the entirelibrary, for example, only one student can use thelibrary at a time. To increase the number of studentswho can train simultaneously, you can move to afive-user license for the library or buy additional usercapabilities for only those products used by multiplestudents. A popular combination is a single-userlicense for the library and a five-user license for theProgram Development Combination Pack.

For any product, moving from a single-user licenseto a 5-user license increases the price by only 50%.Each additional student over 5 increases the price by10% of the single-user price.

Renewals

The month before your license expires, we will sendyou an invoice to renew the license. The renewalrate for the second year is 50% of the list price. Foreach subsequent year, the renewal rate is 25% ofthe list price. This percentage reflects how much ofthe Manta IBM i Training Library is typically updatedor replaced each year. This price automaticallyincludes any courses added to a series, combinationpackage, or the complete library.

Manta Curriculum Recommendations Technologies Inc. 4

Keep Track of Your Students’ ProgressManta’s Student Administration support isincluded with all course orders at no additionalcharge. It allows a training administrator to monitorand control the use of the Manta IBM i TrainingLibrary courseware. This feature lets you:

Grant course access only to registered students

Create custom student menus

Print reports detailing student course usage

Print reports detailing students’ CompetencyExam results

Check your license status

Special Introductory Price: Free!A typical Manta course consists of six to eightsessions, each 15 to 20 minutes long. You can visitour web site (www.mantatech.com) to take the firstsession of any course in the IBM i Training Libraryfor free. These are not the “bait-and-switch” demosprovided by some vendors, but the actual trainingprovided by MantaNow!, our Internet deliverysystem. In all, approximately 40 hours of trainingare available for free, out of the hundreds of hoursavailable via MantaNow! Directions for taking asample session are available from the CourseOptions menu at www.mantatech.com.

Ordering CoursesYou can place orders by phone, by e-mail, by U.S.Mail, or online.

We recommend that you start the order process byvisiting our web site, which will guide you throughthe order process and make sure that you get allavailable discounts.

Mail orders:

Manta Technologies Inc. 8234 Blue Ridge Avenue

Littleton, CO 80125

Phone orders: 1-800-40-MANTA (1-800-406-2682)

Orders outside the U.S. and Canada: 1-847-528-2114

Web site: www.mantatech.com

Major credit cards (American Express, VISA,MasterCard) and corporate purchase orders areaccepted. You may also use PayPal.

Prices listed throughout this catalog are in U.S.currency. All prices are subject to change withoutnotice.

Money-Back GuaranteeWe want you to be happy with your Manta purchase.If, after reviewing your order, you are not satisfied forany reason, you may cancel your purchase within 15calendar days for a full refund minus, at Manta’sdiscretion, any bank charges for credit cardpurchases and refunds.

If you are not sure whether you will like Manta'straining approach, be sure to view a samplesession. (You can view the first session of anycourse from our web site, www.mantatech.com.)Because the sample sessions use the actual Mantasoftware, your ability to view a session verifies thatall Manta courses will run successfully on your PC.

If you are interested in a particular topic, check thecourse description in this catalog. For every course,the catalog describes in detail the course objectives,recommended audience, and prerequisites. Weguarantee that the course teaches the skills listed inthe catalog. In fact, built into our coursedevelopment procedure is a quality assurance checkto verify that every objective is not only covered indetail, but also is sufficiently tested in thecorresponding Competency Exam.

If you like the sample session and the catalogdescription matches your training requirements, youshould be pretty confident that the course will meetyour needs. If you are considering multiple courses,such as a combination pack or the entire library,there is one more step you can take to minimize yourrisk. Rather than buying everything at once, buy asingle course or take a course online. If you laterupgrade to a larger product (like a Combination Packor the entire library) that contains what you havealready purchased, we will prorate the amount ofyour license that has been used and apply 100% ofthe remainder to the new purchase.

Legal StuffManta's sale Terms and Conditions and License areavailable for downloading atwww.mantatech.com/manta/legal.

Manta Curriculum Recommendations Technologies Inc. 5

Combination PacksCombination packs offer an additional savingsof 10% off the individual series prices.

Operations Combination Pack

Combo order number: OPRCUR One-year, single-user license: $2,430

This package includes the 24 courses and examsintended for operators, system administrators, andadvanced users: Introduction to the IBM i Environment series Fundamentals of IBM i Operations series Fundamentals of Operations Using Navigator for

i series IBM i System Management series Using the Advanced Job Scheduler series PowerVM Concepts The IBM Navigator for i series

System Administration Combination Pack

Combo order number: ADMCUR One-year, single-user license: $4,670

This package includes the 47 System Administrationcourses and exams: Introduction to the IBM i Environment series Fundamentals of IBM i Operations series Fundamentals of Operations Using Navigator for

i series IBM i System Management series Using the Advanced Job Scheduler series IBM i Security series Work Management for System Administrators

series TCP/IP in the IBM i Environment series The IBM Navigator for i series System i Navigator series The Integrated File System IFS Security PowerVM Concepts Implementing Single Sign-On Configuring the HTTP Server

Manta Curriculum Recommendations Technologies Inc. 6

Programming Combination Packs

Manta offers three ways to save on combinations ofour popular programming courses.

Program Development Combination Pack

Combo order number: PGMCUR One-year, single-user license: $4,760

Includes all 64 programming courses and exams: Introduction to the IBM i Environment series The IBM i Programming Environment series Using Rational Developer for i (RDi) series Free-Form RPG Programming series RPG Programming series Coding Free-Form RPG COBOL Programming series Java Fundamentals series Control Language Programming series Working with Db2 Databases series Using Structured Query Language (SQL) series eBusiness for IBM i Programmers series Using the ILE Source-Level Debugger Using Screen Design Aid (SDA) Using Query Manager Using Query for i5/OS Getting Started with Db2 Web Query

RPG Development Combination Pack

Combo order number: RPGCUR One-year, single-user license: $3,790

Includes the 47 courses and exams needed by atraditional RPG programmer: Introduction to the IBM i Environment series The IBM i Programming Environment series Using Rational Developer for i (RDi) series Free-Form RPG Programming series RPG Programming series Coding Free-Form RPG Control Language Programming series Working with Db2 Databases series Using Structured Query Language (SQL) series Using the ILE Source-Level Debugger Using Screen Design Aid (SDA) Using Query Manager Using Query for i5/OS Getting Started with Db2 Web Query

COBOL Development Combination Pack

Combo order number: COBCUR One-year, single-user license: $3,690

Includes the 39 courses and exams needed by aCOBOL programmer:

Introduction to the IBM i Environment series The IBM i Programming Environment series Using Rational Developer for i (RDi) series COBOL Programming series Control Language Programming series Working with Db2 Databases series Using Structured Query Language (SQL) series Using the ILE Source-Level Debugger Using Screen Design Aid (SDA) Using Query Manager Using Query for i5/OS Getting Started with Db2 Web Query

Manta Curriculum Recommendations Technologies Inc. 7

Curriculum RecommendationsThis section identifies required and recommended training for the following audiences:

System users and IT managers

Programmers and analysts

System operators

System administrators

System Users and IT Managers

Required

The Introduction to the IBM i Environment series

Recommended

The System i Access for Windows series

Work Management Concepts

Introduction to Db2

Introduction to System i Security

Using Query Manager or Using Query for i or Getting Started with Db2 Web Query

TCP/IP Fundamentals

TCP/IP Applications

eBusiness: From HTML to WebSphere

Programmers and Analysts

Required

The Introduction to the IBM i Environment series

The IBM i Programming Environment series

The Using Rational Developer for i (RDi) series

The Free-Form RPG Programming series or

The RPG Programming series and Coding a Free-Form RPG Program or

The COBOL Programming series or

The Java Fundamentals series

The Control Language Programming series

The Working with Db2 Databases series

The Using Structured Query Language (SQL) series

Using Screen Design Aid (SDA)

Using the ILE Source-Level Debugger

Recommended

The System i Access for Windows series

The Fundamentals of IBM i Operations series and/or the Fundamentals of Operations Using Navigator for i series

The IBM i Security series

Using Query Manager or Using Query for i or GettingStarted with Db2 Web Query

TCP/IP Fundamentals

TCP/IP Applications

The eBusiness for IBM i Programmers series

Configuring the HTTP Server

Manta Curriculum Recommendations Technologies Inc. 8

System OperatorsRequired

The Introduction to the IBM i Environment series

The Fundamentals of IBM i Operations series and/orthe Fundamentals of Operations Using Navigator fori series

The IBM i System Management series

Recommended

The System i Access for Windows series

Introduction to IBM i Security

Introduction to Db2

Introduction to CL Programming

Controlling Command and Program Flow

TCP/IP Fundamentals

TCP/IP Applications

PowerVM Concepts or Introduction to Logical Partitioning

Note: Depending on your installation’s policies and procedures, operators may also be required to take courses from the system administrators’ curriculum.

System AdministratorsRequired

The Introduction to the IBM i Environment series

The Fundamentals of IBM i Operations series and/or the Fundamentals of Operations Using Navigator for i series

The IBM i System Management series

The IBM i Security series

Creating and Maintaining User Profiles

The Work Management for System Administrators series

The TCP/IP in the IBM i Environment series

The Using the Advanced Job Scheduler series

PowerVM Concepts or Introduction to Logical Partitioning

Implementing Single Sign-On

Configuring the HTTP Server

Recommended

The System i Access for Windows series

Introduction to Db2

The Integrated File System

IFS Security

The CL Programming Series

Using Query Manager or Using Query for i or GettingStarted with Db2 Web Query

eBusiness: From HTML to WebSphere

Manta Introduction to the IBM i Environment Technologies Inc. 9

Course DescriptionsThe remainder of this catalog lists detailed course descriptions. The following information is provided for eachcourse:

Order number

Price

Overview

Approximate study time

Objectives

Topic outline

Audience

Prerequisites

Reference materials

Similar information is provided for each series and competency exam.

Manta Introduction to the IBM i Environment Technologies Inc. 10

Introduction to the IBM i Environment

Order Number: UINT00

Max.Users

FirstYear

SecondYear

Later Years

1 $432 $216 $1085 $648 $324 $162

Each add’l $44 $22 $11

Overview

The Introduction to the IBM i Environment seriesdescribes the basic skills needed to use an IBM isystem. The series describes how to sign on,navigate the IBM i menu structure, enter data, usecommands, and perform other common tasks. Asyou learn the basic skills, you will also learn IBM iconcepts. You will learn how to access an IBM isystem using both a traditional 5250 workstation anda personal computer.

This series contains the following courses:

Getting Started on IBM i

Integrated File System Concepts

Using IBM i Commands

Using Navigator for i

Introduction to the IBM i Environment Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 10-16 hours

Audience

This series should be taken by anyone who will beusing an IBM i system. This audience includesmanagers, programmers, operators, end users, andother personnel.

Prerequisites

While this is an "introductory" series, we do notassume that you are ignorant about computers andinformation technology. On the contrary, we assumeyou have experience using a personal computer(PC). You know how to use a keyboard and youunderstand basic computer concepts. In fact, youmay even be a PC guru. By making theseassumptions, we can compare what you don't knowin the IBM i environment with what you have alreadymastered in the PC world.

Manta Introduction to the IBM i Environment Technologies Inc. 11

Getting Started on IBM i

Order Number: UINT01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the basic skills needed to use anIBM i system. As you will see, most users can easilyselect the functions they require by using a hierarchyof menus and other panels.

The course begins by showing you how to sign onan IBM i system. It then discusses the four types ofIBM i panels: menus, data entry panels, lists, andinformation panels. You will see the general rulesfor navigating through the menu structure, forentering data, and for performing operations on theobjects in a list. As part of this discussion, you willsee how to send messages to other users and howto sign off the system.

Next, the course describes how you can change thelevel of assistance provided to you by the system.

This course then describes IBM i message types.You will see how to review the messages sent toyou, how to delete the messages you have read,and how to respond to messages that require ananswer.

The remainder of the course covers the IBM i helpfacilities. These facilities let you ask for helpinformation about a specific message, panel, inputfield, column, or menu option. You can also locateinformation about tasks or procedures and aboutgeneral topics.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Sign on an IBM i system

Navigate through the IBM i menu structure

Sign off the system either permanently ortemporarily

Fill in fields on a data entry panel

Select objects from a list

Identify the various types of IBM i panels andmessages

Use system functions to perform the followingtasks:

o Display the Operational Assistant menu

o Change your password

o Send a message to another user

o Change the level of assistance provided toyou by IBM i

o Display messages sent to you

o Respond to messages that require ananswer

o Delete messages that you have read

o Ask for system help information about aspecific message, panel, input field, column,or menu option

Topic Outline

Signing on an IBM i System

Using Menus

Data Entry

Assistance Levels

Messages

Help Facilities

Audience

The course is intended for anyone who will use anIBM i system. This audience includes managers,programmers, operators, end users, and otherpersonnel.

Prerequisites

While this course has no formal prerequisites, aminimal knowledge of computer fundamentals isassumed.

Manta Introduction to the IBM i Environment Technologies Inc. 12

Integrated File System Concepts

Order Number: UINT02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

A unique advantage of an IBM i system is its abilityto store data in a variety of formats, including thoseformats used by Windows, Linux, and Unix systems.This capability is provided by the integrated filesystem (IFS), which provides a single mechanism forstoring and retrieving all objects on an IBM i system.

In describing the IFS, the course first reviews filesystems with which you may be familiar. It thendescribes the structure of the IBM i root file system.During this discussion, you will learn how to create anew directory and change your current directory.

The library file system is covered next, including thekey concepts of objects and libraries. You will seehow the system locates objects in multiple librariesand how to change your current library.

The course then discusses storage managementconcepts, including virtual storage, external storagepools, and single-level storage.

Once you have studied these various file systems,you will be ready to see how the integrated filesystem supports them all within a commonframework. You will see how objects can beaccessed using the facilities of their native filesystems or by using IFS facilities. Finally, thecourse covers the other file systems supportedwithin the IFS. These include the document libraryservices file system, the open systems file system,the NetClient file system, the optical file system, andothers.

Approximate Study Time: 4 hours

Objectives

After completing this course, you should be able to:

Describe the purpose of a file system

Describe the organization and naming rules forthe Windows and Unix (or AIX or Linux) filesystems

Describe the structure of the root file system

Specify the name required to locate an object inthe root file system using either an absolute or arelative path name

Display or change your current directory

Create or remove a directory

Identify the differences between a hard link anda symbolic link

Identify the symbolic link needed to support agiven processing requirement

Define IBM i terms, including memory, auxiliarystorage pool, page, virtual storage, single-levelstorage, object, type, attribute, database file,member, record, and journal

Identify valid IBM i object names

Describe the circumstances under which aqualified object name is required

Match IBM i library types with their descriptions

Identify the library that will contain a newlycreated object

Given the name of an object and a library list,identify the library in which the object will befound

Display and change a job's library list

List the objects in a library

Describe the purpose of the integrated filesystem

Describe how objects from the library filesystem, the document library services filesystem, and the open systems file system arestored within the integrated file system

Specify the root file system name of an objectstored in the library file system

Describe the purpose of a coded character setidentifier (CCSID)

Identify the file systems supported by theintegrated file system

Identify root file system facilities that cannot beused for objects in other file systems

Manta Introduction to the IBM i Environment Technologies Inc. 13

Topic Outline

File Systems

The Root File System

The Library File System

Computer Storage

The Integrated File System

Support for Other File Systems

Audience

The course is intended for anyone who will use anIBM i system. This audience includes managers,programmers, operators, end users, and otherpersonnel.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous course of this series:

Getting Started on IBM i

Related Courses

This course is similar to The Integrated File Systemcourse. While Integrated File System Concepts isintended for the general user, The Integrated FileSystem is designed for system administrators andothers who need to know all of the commands andmenus available for manipulating IFS objects.

Using IBM i Commands

Order Number: UINT03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

The first course of this series, Getting Started onIBM i, covered the basic skills required by all IBM iusers. This course, Using IBM i Commands, goesbeyond the basics to cover the role of jobs,commands, and programs in an IBM i environment.

The course begins by looking at jobs. You will followa typical batch job as it moves through the system.Then, you will see how this process differs for aninteractive job.

The course then addresses IBM i commands,covering the basic rules for command names andthe rules for command formatting. You will see thevarious ways in which you can enter commands, andyou will have the opportunity to practice eachtechnique. You will see how to enter commands in afree-form format, how to use the command promptfacility, and how to use the Command Entry panel.You will also learn how to enter Unix-typecommands using the Qshell command interpreter.

Finally, you will see how frequently used commandscan be put into the form of a CL program or REXXprocedure. The course describes the IBM i programdevelopment process and the programminglanguages used on an IBM i system. During thisdiscussion, it also introduces a unique feature of theIBM i architecture, the technology-independentmachine interface.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Define IBM i work management terms

List the steps performed by the IBM i operatingsystem when running a batch or interactive job

Describe the relationship between IBM i menusand CL commands

Use your knowledge of IBM i command syntaxto match the names of commands with theirfunctions

Identify common ways in which objects can bemanipulated

Manta Introduction to the IBM i Environment Technologies Inc. 14

Predict the result of given object operationswhen performed on a library

Identify improperly coded IBM i commands

Identify the action that IBM i performs when youleave out a required command parameter

Identify the types of access permitted by thevarious IBM i security levels

Use IBM i facilities to display a detaileddescription of a command

Enter IBM i commands using the commandprompt facility

Control the destination of command output

Use IBM i facilities to determine the name of thecommand that performs a given function

Repeat and optionally modify a previouslyentered command

Invoke the Command Entry panel

Start and stop the Qshell command interpreter

Enter Qshell commands

List the steps required to create an executableprogram

Identify differences between IBM i controllanguage (CL) programs and REXX procedures

Describe the difference between the originalprogram model (OPM) development processand the integrated language environment (ILE)development process

Identify differences between Java and traditionalprogramming languages

Describe the purpose of the IBM i technology-independent machine interface

Topic Outline

Jobs

Commands

Entering Commands

Repeating Previous Commands

Using Qshell

Programs

Audience

The course is intended for anyone who will use anIBM i system. This audience includes managers,programmers, operators, end users, and otherpersonnel.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous courses of this series:

Getting Started on IBM i

Integrated File System Concepts

Manta Introduction to the IBM i Environment Technologies Inc. 15

Using Navigator for i

Order Number: UINT06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes IBM Navigator for i. Becausethis product is a browser-based interface to the IBM ioperating system, it is more commonly known as theweb console. If you have used System i Navigator,you will see that the web console provides similarcapabilities. The major difference is that System iNavigator requires special software to be installedon the user's PC, while the web console uses astandard browser.

The course begins with an introduction to the webconsole. You will first see how it differs fromprevious IBM i interfaces. Then, you will see how tostart and stop it.

Basic use of the web console is discussed next. Youwill learn how to use the controls provided by theweb console to locate and invoke individualfunctions. You will also see how to use the webconsole's help facilities.

The course then considers two of the tasks for whichgeneral users most often use Navigator for i. Thecourse first covers accessing IBM i messages.Among other things, you will see how to view themessages that have been sent to you and how tosend a message to another user. More advancedcontrols are also covered, including how to filter andsort the data displayed by the console.

Next, the course shows you how to access theintegrated file system using Navigator for i. You willsee how to create directories and move filesbetween your PC and the IBM i system.

The course ends by describing how to enter IBM icommands using the web console and how to invokethe web console's built-in 5250 terminal emulator.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Start the web console

Close individual web console pages

End a web console session

Navigate the web console window to locate aspecified task

Access the web console help facilities

Select an action for an item in a web consoledisplay

Use web console controls to determine thelayout of a list display

Add a web console page to your list of favorites

Use the web console to perform the followingtasks:

o Work with messages

o Create or remove an IFS directory

o Work with files in IFS directories

o Enter IBM i commands

o Use the built-in 5250 emulator

Topic Outline

Introduction to System i Navigator

Working with Messages

Using System i Navigator for File Access

Working with Connection Definitions

Power Techniques

Audience

This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous courses of this series:

Getting Started on IBM i

Integrated File System Concepts

Using IBM i Commands

Related Courses

This course is identical to course NAVI01.

Manta Introduction to the IBM i Environment Technologies Inc. 16

Introduction to the IBM i EnvironmentCompetency ExamOrder Number: UINT99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up theIntroduction to the IBM i Environment series:

Getting Started on IBM i

Integrated File System Concepts

Using IBM i Commands

Using Navigator for i

The exam is divided into four parts, one for eachcourse in the series. Successfully completing allparts of the exam demonstrates your proficiency inthe basic skills required to use an IBM i system.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the Introduction to the IBM i Environmentseries. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The Introduction to the IBM i Environment series,including this exam, should be taken by anyone whowill be using an IBM i system. This audienceincludes managers, programmers, operators, endusers, and other personnel.

Prerequisites

While this series has no formal prerequisites, aminimal knowledge of computer fundamentals isassumed.

Manta Using Query Manager Technologies Inc. 17

Using Query Manager

Order Number: UUQM01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

If you are like many IBM i users, you frequently needto get information from a Db2 database. Thisrequest for information, or query, can be easilydescribed and run using the IBM Query Managerproduct.

This course begins with an introduction to QueryManager terminology and facilities. It then describeshow to start and end a Query Manager session, andhow to examine and change your Query Managerprofile settings. You will then see how to define andrun queries. Starting with very basic queries, youwill proceed to more advanced queries, such as aquery that generates summary data and a query thatjoins two files. The course ends by describing howto generate a report from the data returned by aquery.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Identify the uses for Query Manager

Use and define Query Manager terminology

Start and end a Query Manager session

Examine and/or modify your Query Managerprofile settings

Define a query that:

o Returns all records and all fields in a file

o Returns records from a file in a specifiedorder

o Returns only selected fields from eachrecord in a file

o Returns only selected records from a file

o Creates a new field that is derived fromexisting fields

o Generates summary data

o Joins two files

Run a query

Define a report form that:

o Changes the format of the data returned bya query

o Specifies column headers for the datareturned by a query

o Uses a control break

o Prints page headers and/or footers

o Prints report headers and/or footers

Topic Outline

Introduction to Query Manager

Query Manager Sessions

Defining and Running a Basic Query

Advanced Querying Capabilities

Creating a Report Form

Audience

This course is intended for anyone interested inusing Query Manager to query a Db2 database.

Prerequisites

This course assumes that you have a basicknowledge of IBM i concepts, terminology, and use.You can satisfy this prerequisite by successfullycompleting the Manta series Introduction to the IBMi Environment.

Reference Materials

A Student Reference Guide is available for thiscourse.

Manta Using Query for i

Technologies Inc. 18

Using Query for i

Order Number: UUQR01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

If you are like many IBM i users, you frequently needto get information from a Db2 database. Thisrequest for information, or query, can be easilydescribed and run using the IBM Query for i product.

This course begins with an introduction to relationaldatabase terminology and Query facilities. You willsee how to access the displays from which youdefine and manipulate queries.

You will then see how to define and run queries.Starting with very basic queries, you will proceed tomore advanced queries, such as a query thatgenerates summary data and a query that joins twofiles. The course ends by describing Query's reportformatting capabilities.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Use and define relational database terminology

Display the Work with Queries display

Define a query that:

o Returns all records and all fields in a file

o Returns records from a file in a specifiedorder

o Returns only selected fields from eachrecord in a file

o Returns only selected records from a file

o Creates a new field that is derived fromexisting fields

o Joins two files

Run a query

Use Query report formatting capabilities to:

o Edit numeric data

o Specify column headings for the datareturned by a query

o Generate a query report that includessummary data

o Create a report that uses control breaks

Specify whether the data returned by a query isdisplayed at your workstation, routed to aprinter, or written to another file

Define the printer and report characteristics fora printed report

Topic Outline

Introduction to Query for i

Defining and Running a Basic Query

Advanced Querying Capabilities

Customizing a Query Report

Audience

This course is intended for anyone interested inusing Query for i to query a Db2 database.

Prerequisites

This course assumes that you have a basicknowledge of IBM i concepts, terminology, and use.You can satisfy this prerequisite by successfullycompleting the Manta series, Introduction to the IBMi Environment.

Reference Materials

A Student Reference Guide is available for thiscourse.

Manta Getting Started with Db2 Web Query Technologies Inc. 19

Getting Started with Db2 Web Query

Order Number: UUWQ01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

If you are like many IBM i users, you frequently needto get information from a Db2 database. Thisrequest for information, or query, can be easilydescribed and run using the IBM Db2 Web Query fori product (more frequently referred to as simply Db2Web Query).

This course begins with an introduction to relationaldatabase terminology and Db2 Web Query facilities.You will see how to access and log into Db2 WebQuery, and how to access the Db2 Web Query helpfacility.

You will then see how to define and run queries.Starting with very basic queries, you will proceed tomore advanced queries, such as a query thatgenerates summary data and a query that joins twofiles.

The course ends by describing Db2 Web Query'sreport formatting capabilities.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Use and define relational database terminology

Log into Db2 Web Query

Create a Db2 Web Query synonym for a Db2 file

Access the Db2 Web Query help facility

Log off Db2 Web Query

Select the fields that are included for eachrecord returned by a query

Select the records that are returned by a query

Return records from a file in a specified order

Run a query

Save a query

Define a query that creates a new field, thecontents of which are derived from existing fields

Define a query that joins two files

Define a query that returns only summary data

Define a query that generates a detail report thatincludes totals and/or subtotals

Create metadata for a Query for i query

Use Db2 Web Query to run a Query for i query

Hide a field in a report

Define your own column headings in a report

Define a report heading and footing for a report

Have Db2 Web Query edit numeric data

Use Report Assistant Report Options to changethe look of a report

Topic Outline

Introduction to Db2 Web Query

Defining and Running a Basic Query

Deriving a New Field from Existing Fields

Joining Records from Two or More Files

Generating Summary Data

Working with Query for i Queries

Enhancing Your Reports

Audience

This course is intended for anyone interested inusing Db2 Web Query to create and run queries.

Prerequisites

This course assumes that you have a basicknowledge of IBM i concepts, terminology, and use.You can satisfy this prerequisite by successfullycompleting the Manta series, Introduction to the IBMi Environment.

Reference Materials

A Student Reference Guide is available for thiscourse.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 20

Fundamentals of IBM i Operations

Order Number: OPER00

Max.Users

FirstYear

SecondYear

Later Years

1 $756 $378 $1905 $1,134 $568 $284

Each add’l $76 $38 $19

Overview

The Fundamentals of IBM i Operations seriesdescribes the job processing environment on anIBM i system and the common tasks performed byan IBM i operator. The series describes how tosubmit batch jobs, monitor and control theirexecution, and manage the printer output theycreate. It also shows how to perform variousmanagement tasks for interactive jobs. Globaloperational tasks, such as managing subsystems,controlling tape devices, and determining jobswaiting for operator intervention, are also covered.

This series contains the following courses:

Work Management Concepts

Submitting and Managing Batch Jobs

Controlling Printer Output

Controlling Users, Queues, Printers, and Subsystems

Monitoring an IBM i system

Using Tapes

Fundamentals of IBM i Operations Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 10-14 hours

Audience

This series should be taken by anyone who will beusing IBM i work management facilities. Thisaudience includes users who submit and monitorthe execution of their own batch jobs, users whocontrol the printing of their output, and operatorswho are responsible for monitoring and controllingjob processing.

Prerequisites

All courses in this series assume that you canperform basic IBM i operations. In particular, you

should know how to sign on the system anddisplay the Operational Assistant Menu. Inaddition, you should know how to start System iNavigator from a PC.

You can satisfy this prerequisite by successfullycompleting the courses from the Introduction tothe IBM i Environment series. If you feel youalready have the necessary skills, you can verifyyour belief by successfully completing theCompetency Exam for this series.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 21

Work Management Concepts

Order Number: OPER01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the concepts you must befamiliar with in order to submit and monitor jobs onan IBM i system.

The course begins by discussing interactive jobs.These are the sessions that are started whenusers sign on the system. It then describes howbatch jobs are executed in the system. Next, thecourse considers the role three components of theIBM i system — subsystems, job descriptions, andjob queues — play in the processing of batch jobs.The course then discusses spooling, the processused to store printer output, and describes howspooled output is managed by the IBM i system.The course ends by illustrating the flow of aninteractive job and a batch job through the system.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Name the types of IBM i jobs and identify howeach is begun

Name the IBM i objects used to support jobprocessing, and identify the functionsperformed by each

Name the IBM i components used to managethe output created by jobs, and identify thefunctions performed by each

List the steps performed by the IBM i operatingsystem when running a batch or interactive job

Topic Outline

Job Types

Subsystems and Job Descriptions

Job Queues

Spooled Files and Output Queues

Job Flow

Audience

This course is intended for anyone who will beusing IBM i work management facilities. Thisaudience includes users who submit and monitorthe execution of their own batch jobs, users whocontrol the printing of their output, and operatorswho are responsible for monitoring and controllingjob processing. The course is also recommendedfor anyone who wants to learn how work ismanaged on an IBM i system.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 22

Submitting and Managing Batch Jobs

Order Number: OPER02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

The previous course in this series, WorkManagement Concepts, introduced job processingconcepts. It described how a submitted job isplaced in a job queue where it is selected forexecution. This course, Submitting and ManagingBatch Jobs, shows you how to submit batch jobsand control their execution.

The course begins by describing how to submit abatch job. It then describes the Work with UserJobs display used to manage batch jobs. Adiscussion of how to interpret this display and howto use it to hold, release, or delete jobs is next.The course ends by showing how to changecertain attributes of a job.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Submit a batch job

Have a job executed automatically based on apredefined schedule

Display the status of a batch job

Hold, release, or cancel a job

Change the priority of a job in a job queue

Move a job from one job queue to another

Topic Outline

Executing Batch Jobs

Displaying Job Status

Holding, Releasing, and Canceling Jobs

Changing a Job

Audience

This course is intended for anyone who isresponsible for monitoring and controlling jobprocessing on an IBM i system. It should also betaken by users who submit and monitor theexecution of their own batch jobs.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i facilities. In particular,you should know how to sign on the system anddisplay the Operational Assistant Menu. You cansatisfy this prerequisite by successfully completingthe courses from the Introduction to the IBM iEnvironment series.

In addition, you should have an understanding ofIBM i work management concepts. You can satisfythis prerequisite by successfully completing thefirst course of this series, Work ManagementConcepts.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 23

Controlling Printer Output

Order Number: OPER03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course discusses how to manage and controlthe printer output created by IBM i jobs.

The course begins by describing how to invokeIBM i displays to see the spooled files in thesystem. It then describes the various operationsthat can be performed from these displays. Thecourse covers how to examine the contents of aspooled file, how to hold and release a spooled file,how to delete a spooled file from an output queue,how to change the attributes of a spooled file, andhow to send a spooled file to another user. Inaddition, you will see how to examine and respondto messages sent by the printer writer, and how toreceive more detailed information on the status ofa spooled file.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Display the spooled files currently in thesystem

Examine the contents of a spooled file

Hold, release, or delete a spooled file

Examine and respond to printer messages

Display detailed information about the status ofa spooled file

Change the attributes of a spooled file

Send a spooled file to a user on anothersystem

Topic Outline

Displaying Spooled Files

Holding, Releasing, and Deleting SpooledFiles

Learning More About the Status of a SpooledFile

Changing Spooled File Attributes

Sending a Spooled File to Another User

Audience

This course is intended for anyone who isresponsible for monitoring and controlling jobprocessing on an IBM i system. It should also betaken by users who control the printing of thespooled files produced by their own jobs.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i facilities. In particular,you should know how to sign on the system anddisplay the Operational Assistant Menu. You cansatisfy this prerequisite by successfully completingthe courses from the Introduction to the IBM iEnvironment series.

In addition, you should have an understanding ofIBM i work management concepts. You can satisfythis prerequisite by successfully completing thefirst course of this series, Work ManagementConcepts.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 24

Controlling Users, Queues, Printers,and Subsystems

Order Number: OPER04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Previous courses of the Fundamentals of IBM iOperations series have described tasks that mightbe performed by any user who submits batch jobsand controls job output. This course describesadditional work management tasks that aretypically reserved for the IBM i operator.

The course begins by describing how to manageinteractive jobs, the sessions in which systemusers are involved. You will see how to invoke theWork with Signed-On Users display, which is a listof all signed-on users. Various ways to manipulatethe list — such as sorting it on different fields andchanging the information displayed for each user— are described. The course then describesseveral operations that can be performed from thisdisplay. You will see how to send a message to auser or group of users and how to sign a user offthe system.

Next, the course describes how to manage jobqueues. You will see how to display informationabout the job queues in your system and how tohold and release job queues. The course showshow to display detailed information about a job inthe system, and explains how to view the job logfor a job.

Printer writers are considered next: how to start aprinter writer, stop a printer writer, respond toprinter writer messages, and hold and release aprinter. You will also see how assign a printerwriter to a different output queue. Finally, thecourse describes how to start and stop asubsystem.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Display a list of all signed-on users, usingavailable functions to control the order andcontents of the list

Locate a specified user in the Work withSigned-On Users display

Display additional information about aspecified user or job, including the jobdescription, run attributes, and job log

Send a message to a single user, a group ofusers, or all users

Sign a user off the system

Display a list of the job queues and theirstatus

Display the contents of a job queue

Hold, release, or clear a job queue

Display detailed information about a job

Start or stop a writer

Respond to writer messages

Display detailed status information about awriter

Display the output queue associated with awriter

Assign a writer to a specific output queue

Start and stop a subsystem

Topic Outline

Displaying Signed-On Users

Managing Signed-On Users

Managing Job Queues

Displaying Job Information

Managing Printers and Writers

Starting and Stopping Subsystems

Audience

This course is intended for anyone who isresponsible for monitoring and controlling jobprocessing on an IBM i system.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i facilities. In particular,you should know how to sign on the system anddisplay the Operational Assistant Menu. You cansatisfy this prerequisite by successfully completingthe courses from the Introduction to the IBM iEnvironment series.

In addition, you should have an understanding ofIBM i work management concepts and facilities.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:

Work Management Concepts

Submitting and Managing Batch Jobs

Controlling Printer Output

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 25

Monitoring an IBM i System

Order Number: OPER05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

As the central operator of an IBM i system, youshould periodically check how the system isrunning. This course describes the tools availableto you for examining the system's status and whatyou should look for to spot potential problems.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Identify the IBM i displays that you should useto check on jobs, output, printers, devices,communications, and system status

Specify what operator intervention, if any, isrequired when given a system display ormessage

Display and respond to messages directed tothe system operator

Locate additional information about an errormessage

Display the system history log

Topic Outline

Why Monitoring the System is Important

Checking the System Status

Checking on Jobs

Checking on Output

Checking Devices

Checking for Messages

Checking the System Clock

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses fromfollowing Manta series:

The Introduction to the IBM i Environmentseries

In addition, you should have completed theprevious courses of this series:

Work Management Concepts

Submitting and Managing Batch Jobs

Controlling Printer Output

Controlling Users, Queues, Printers, and Subsystems

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 26

Using Tapes

Order Number: OPER06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the operational procedures forhandling and maintaining tape volumes on an IBM isystem.

The course begins by describing the terms andconcepts associated with magnetic tape volumesand devices. You will see how data is recorded ona tape and the purpose of tape labels. The coursethen discusses the proper handling of tapevolumes and how you should respond to commontape messages.

Next, the course covers the IBM i commands anddisplays used to work with tape volumes anddevices. You will see how to create a backup of anIBM i library, display and change the status of atape device, initialize tapes, copy tapes, andperform other tape-related tasks.

Finally, the course covers how to display or printtape information, including the contents of tapelabels and the data recorded on a tape.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Define tape-related terms, including block,inter-block gap, read/write head, label, andtape mark

Describe the format of a standard-labeled tape

Identify the contents of volume and file labels

Identify the proper procedures for handlingtape reels and cartridges

Identify the IBM i command to perform a giventape

Identify the purpose of the write-protect tab ontape cartridges and the write-enable ring ontape reels, and determine whether a given reelor cartridge can be used for output

Create a backup of an IBM i library

Properly respond to tape-related messages

Verify that a tape device is operating properly

Display the status of a tape device

Vary a tape device online or offline

Initialize one tape or a series of tapes

Display tape labels

Print the contents of a tape

Make a copy of a tape

Topic Outline

Tape Concepts

Tape Handling

Controlling the Status of Tape Devices

Initializing Tapes

Displaying Tape Information

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses fromfollowing series:

The Introduction to the IBM i Environmentseries

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 27

Fundamentals of IBM i Operations Competency ExamOrder Number: OPER99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up theFundamentals of IBM i Operations series:

Work Management Concepts

Submitting and Managing Batch Jobs

Controlling Printer Output

Controlling Users, Queues, Printers, and Subsystems

Monitoring an IBM i system

Using Tapes

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the operational skills required to control jobs inan IBM i system.

Approximate time to complete all parts of the exam: 60-90 minutes

Recommended Uses

This Competency Exam was designed as amastery test for the Fundamentals of IBM iOperations series. We recommend that you takethe exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.

Evaluation

The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.

Audience

The Fundamentals of IBM i Operations series,including this exam, should be taken anyone whowill be using IBM i work management facilities.This audience includes users who submit andmonitor the execution of their own batch jobs,users who control the printing of their output, andoperators who are responsible for monitoring andcontrolling job processing.

Prerequisites

All courses in this series assume that you canperform basic IBM i operations. In particular, youshould know how to sign on the system anddisplay the Operational Assistant Menu. Inaddition, you should know how to start System iNavigator from a PC.

You can satisfy this prerequisite by successfullycompleting the courses from the Introduction tothe IBM i Environment series. If you feel youalready have the necessary skills, you can verifyyour belief by successfully completing theCompetency Exam for this series.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 28

Fundamentals of Operations Using Navigator for i

Order Number: ONAV00

Max.Users

FirstYear

SecondYear

Later Years

1 $432 $216 $1085 $648 $324 $162

Each add’l $44 $22 $11

Overview

The Fundamentals of Operations UsingNavigator for i series describes the job processingenvironment on an IBM i system and the commontasks performed by an IBM i operator. The seriesdescribes how to submit batch jobs, monitor andcontrol their execution, and manage the printeroutput they create. It also shows how to performvarious management tasks for interactive jobs.Global operational tasks, such as managingsubsystems, controlling devices, and determiningjobs waiting for operator intervention, are alsocovered.

Rather than using the green-screen, text-basedinterface (as does the Manta series Fundamentalsof IBM i Operations), this series covers how toperform all tasks using IBM Navigator for i (alsoknown as the web console), a browser-basedinterface to the IBM i operating system.

This series contains the following courses:

Work Management Concepts

Basic Operations Using Navigator for i

Work Management Using Navigator for i

Tape Management Using Navigator for i

Fundamentals of Operations Using Navigatorfor i Competency Exam

Approximate Study Time for the Entire Series: 8-12 hours

Audience

This series should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.

The first two courses are also recommended forprogrammers and users who submit and monitorthe execution of their own batch jobs and/or whocontrol the printing of their output.

Prerequisites

This series assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series. If you feel you alreadyhave the necessary skills, you can verify yourbelief by successfully completing the CompetencyExam for that series.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 29

Work Management Concepts

Order Number: ONAV01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the concepts you must befamiliar with in order to submit and monitor jobs onan IBM i system.

The course begins by discussing interactive jobs.These are the sessions that are started whenusers sign on the system. It then describes howbatch jobs are executed in the system. Next, thecourse considers the role three components of theIBM i system — subsystems, job descriptions, andjob queues — play in the processing of batch jobs.The course then discusses spooling, the processused to store printer output, and describes howspooled output is managed by the IBM i system.The course ends by illustrating the flow of aninteractive job and a batch job through the system.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Name the types of IBM i jobs and identify howeach is begun

Name the IBM i objects used to support jobprocessing, and identify the functionsperformed by each

Name the IBM i components used to managethe output created by jobs, and identify thefunctions performed by each

List the steps performed by the IBM i operatingsystem when running a batch or interactive job

Topic Outline

Job Types

Subsystems and Job Descriptions

Job Queues

Spooled Files and Output Queues

Job Flow

Audience

This course is intended for anyone who will beusing IBM i work management facilities. Thisaudience includes users who submit and monitorthe execution of their own batch jobs, users whocontrol the printing of their output, and operatorswho are responsible for monitoring and controllingjob processing. The course is also recommendedfor anyone who wants to learn how work ismanaged on an IBM i system.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 30

Basic Operations Using Navigator for i

Order Number: ONAV02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to use Navigator for i toperform basic IBM i operator tasks. The coursebegins by expanding upon topics that wereintroduced in Using Navigator for i. You will firstsee how to use the Run Command function tosubmit batch jobs and how to view and sendmessages as the system operator.

You will then see how to manage batch jobs thatyou submit for execution. Tasks covered includeholding, releasing, and deleting jobs, changing thepriority of a job, and displaying detailed informationabout a job. You will then see how to performthese tasks for other types of jobs and jobsbelonging to other users.

Navigator facilities for managing spooled files arecovered next. You will see how hold, release, view,and delete spooled files, change their attributes,display spooled files in PDF format, and sendspooled files to users on other systems. Finally, thecourse covers the Navigator for i functions formanaging printers and their associated printerwriters.

Approximate Study Time: 2 hours

Objectives

After completing this topic, you should be able touse Navigator for i to perform the following tasks:

Submit a batch job

Display and respond to messages directed tothe system operator

Send a message to a single user, a group ofusers, or all users

Display the system history log

Display the status of a job

Hold, release, or delete a job

Reply to a job-related message

Move a batch job from one job queue toanother

Display detailed information about a job

Change the priority of a job in a job queue

Select the columns shown in the User Jobsdisplay

Tailor the User Jobs display to show all batchjobs, all interactive jobs, or all jobs

Filter the User Jobs display to locate aspecified job

Sign an interactive user off the system

Display the spooled files currently in thesystem

Examine the contents of a spooled file

Hold, release, or delete a spooled file

Display or change the properties of a spooledfile

Move a spooled file to another output queue

Cause a spooled file to print next

Examine and respond to printer messages

Send a spooled file to a user on anothersystem

Display the spooled files waiting to print on aspecified printer

Determine the status of a printer

Start, stop, or restart a printer writer

Hold or release a printer writer

Respond to writer messages

Change the description of a printer device

Display or change the output queue associatedwith a writer

Vary a printer device online or offline

Topic Outline

Using Navigator for System Operation

Controlling Batch Jobs

Controlling Other Jobs

Controlling Printer Output

Managing Printers and Writers

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 31

Audience

This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.

It is also recommended for programmers and userswho submit and monitor the execution of their ownbatch jobs and/or who control the printing of theiroutput.

Prerequisites

This course assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series and the previous courseof this series, Work Management Concepts.

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 32

Work ManagementUsing Navigator for i

Order Number: ONAV03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to use Navigator for i toperform common IBM i operator tasks involvingwork management. The course begins by showingyou how to control job and output queues. You willsee how to hold, release, and clear these queuesand display their properties. Controllingsubsystems is covered next, including how to startand stop a subsystem, display its properties, andview the job queues and memory pools it isassigned.

The course then describes Navigator for i facilitiesfor monitoring your system. First you will see howto display execution statistics for a job, including itsCPU usage. Then you will see how to displaydetailed system status information, including theweb console dashboard.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Display the contents of a job or an outputqueue

Hold, release, or clear a job or an outputqueue

Display the properties of a job or an outputqueue

Display a list of the writers using an outputqueue

Display a list of the subsystems and theirstatus

Display a list of the jobs running in asubsystem

Display the properties of a subsystem

Display a list of the job queues associated witha subsystem

Start and stop a subsystem

Display detailed information and performancestatistics about active jobs

Determine the allocation of system memorypools and list the job or subsystems usingeach pool

Identify the purpose of each system memorypool

Display comprehensive system statusinformation

Examine the status of the disk devicesattached to your system

Display a chart showing basic health indicatorsfor key system resources

Topic Outline

Managing Job Queues

Managing Output Queues

Controlling Subsystems

Displaying Job Information

Displaying Memory Pool Information

Displaying System Status Information

Audience

This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.

Prerequisites

This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series.You should have also completed the previouscourses of this series:

Work Management Concepts

Basic Operations Using Navigator for i

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 33

Tape ManagementUsing Navigator for i

Order Number: ONAV04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the operational procedures forhandling and maintaining tape volumes anddevices on an IBM i system. This discussionincludes both physical tape volumes and virtualtape volumes that are stored on disk.

The course begins by describing the terms andconcepts associated with magnetic tape volumesand devices. You will see how data is recorded ona tape and the purpose of tape labels. The coursethen introduces virtual tape volumes, imagecatalogs, and virtual devices.

Next, the course covers the IBM Navigator for itasks used to work with physical and virtual tapevolumes and devices. You will see how to displayand change the status of a tape device, respond totape-related messages, and initialize a tapevolume.

Finally, the course covers how to display or printtape information, including the contents of tapelabels and the data recorded on a tape. You willalso see how to duplicate a tape volume.

Approximate Study Time: 3-4 hours

Objectives

After completing this course, you should be able to:

Define tape-related terms, including block,inter-block gap, read/write head, label, andtape mark

Describe the format of a standard-labeled tape

Identify the contents of volume and file labels

Describe the purpose of the write-protect tabor knob on a tape cartridge

Identify the proper procedures for handlingtape cartridges

Define terms relating to virtual media, includingvirtual volume, image catalog,and virtualdevice

Describe the procedures for creating and usingvirtual tapes

Identify applications for virtual tapes

Display the status of a tape device

Vary a tape device online or offline

Reset a tape device

Identify the job that is currently using a tapedevice

Display a tape device's properties

Load or unload an image catalog in a virtualdevice

Mount, load, or unload a specified virtualvolume

Write-protect a virtual volume

Delete a virtual volume or a complete imagecatalog

List all image catalogs or the volumes in aparticular catalog

Respond properly to tape volume- and tapedevice-related message

Initialize a tape volume

Display tape labels

Print the contents of a tape

Duplicate a tape

Topic Outline

Tape Concepts

Virtual Tapes

Working with Tape Devices

Managing Virtual Tape Volumes and ImageCatalogs

Responding to Tape Messages

Displaying Tape Information

Audience

This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, asystem administrator, or a designated user.

Prerequisites

This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series.You should have also completed the previouscourses of this series:

Work Management Concepts

Basic Operations Using Navigator for i

Manta Fundamentals of Operations Using Navigator for i Technologies Inc. 34

Fundamentals of Operations Using Navigator for i Competency ExamOrder Number: ONAV99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up theFundamentals of Operations Using Navigatorfor i series:

Using Navigator for i

Basic Operations Using Navigator for i

Work Management Using Navigator for i

Tape Management Using Navigator for i

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to use System i Navigator.

Approximate time to complete all parts of the exam: 90 minutes

Recommended Uses

This Competency Exam was designed as amastery test for the Fundamentals ofOperations Using Navigator for i series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.

Evaluation

The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.

Audience

The Fundamentals of Operations UsingNavigator for i series, including this exam, shouldbe taken by the person responsible for theoperation of an IBM i system. This person may bea dedicated operator, a system administrator, or adesignated user.

The first two courses and their exams are alsorecommended for programmers and users whosubmit and monitor the execution of their ownbatch jobs and/or who control the printing of theiroutput.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.

Manta IBM i System Management Technologies Inc. 35

IBM i System ManagementOrder Number: OSYS00

Max.Users

FirstYear

SecondYear

Later Years

1 $972 $486 $2445 $1,458 $729 $366

Each add’l $97 $49 $24

Overview

The IBM i System Management series isdesigned for the person responsible for the day-to-day operation of an IBM i system. It covers thosetasks relating to the overall management of thesystem.

This series contains the following courses:

Starting and Stopping the System

Managing Devices

Backing Up Your System

Checking Storage Utilization

Cleaning Up System Storage

Software Maintenance

Using Virtual Media

Handling Problems

System Management Using System i Navigator

IBM i System Management Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 14-18 hours

Audience

This series should be taken by any personresponsible for the physical operation of an IBM isystem. This person may be a system operator, adesignated user, or a system administrator.

While most of the tasks described in this series canbe performed by any system operator (someonewith a user class of *SYSOPR), some tasks can beperformed only by personnel with a user class of*SECADM or *SECOFR.

Prerequisites

All courses in this series assume that you canperform basic IBM i operations. You can satisfythis prerequisite by successfully completing thecourses from the following Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

If you feel you already have the necessary skills,you can verify your belief by successfullycompleting the Competency Exams for theseseries.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta IBM i System Management Technologies Inc. 36

Starting and Stopping the System

Order Number: OSYS01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the operational procedures forstarting and stopping an IBM i system. You willlearn how to perform both manual (assisted) andautomatic (unassisted) IPLs. You will also learnhow to tell the system to power itself on and off atspecified times.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Describe the major events that take placeduring a system initial program load (IPL)operation

Perform an unattended IPL, an attended IPL,a remote IPL, or a timed IPL and describewhen each should be used

Change IPL options under the direction ofyour system administrator

Power off the system using a systemcommand, the system control panel powerswitch, or an emergency power switch

Restart an active system

Define an automatic power on and power offschedule

Topic Outline

The IPL Process

The System Control Panel

Performing an Unattended IPL

Performing an Attended IPL

Shutting Down or Restarting the System

Setting Up an Automatic Power On and OffSchedule

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator, a system administrator, or a designateduser.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

Manta IBM i System Management Technologies Inc. 37

Managing Devices

Order Number: OSYS02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the operational proceduresfor creating, changing, and deleting the IBM iconfiguration objects that describe devices, lines,and controllers.

The course begins by describing the relationshipbetween devices, lines, controllers, and theircorresponding configuration objects. It thenreviews how to display, interpret, and change thestatus of these objects on an IBM i system.

The course then shows how to display deviceattributes and how to modify or rename existingconfiguration objects. Procedures for adding newdevices are covered next. As you will see, thereare two different techniques for adding a newdevice. You can have the system create thenecessary configuration objects automatically, oryou can create these objects manually.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should beable to:

Determine the current status of a device

Determine the controller to which a device isattached

Display a list of all devices attached to acontroller and a list of all controllers attachedto a line

Vary a device or controller online or offline

Reset the corresponding I/O processor whenvarying a device or controller online

Change the name or text description of aconfiguration object

Display the details of a device or controllerdescription

Print a chart showing a system's deviceconfiguration

Enable and disable the system's automaticconfiguration features

Identify the configuration object required todefine a specified device

Create, change, or delete a configurationobject under the direction of your systemadministrator

Topic Outline

Introduction to Configuration Objects

Changing the Status of Configuration Objects

Modifying Configuration Objects

Using Automatic Configuration

Creating Configuration Objects

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator, a system administrator, or a designateduser.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

Manta IBM i System Management Technologies Inc. 38

Backing Up Your System

Order Number: OSYS03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the basic operationalprocedures for backing up an IBM i system andrestoring objects after a failure. The course beginsby describing the save and restore operations thatare supported by IBM i and suggests strategies fordeveloping a backup plan. The backup strategyimplemented by the IBM i Operational Assistant isdescribed in detail. You will see how to set upautomatic backups and how to tailor the backupplan to meet your installation's requirements. Thecourse then shows you how to perform backupoperations to cover situations that are notperformed automatically. Finally, you will see howto restore a damaged library and its objects.

Approximate Study Time: 120 minutes

Objectives

After completing this course, you should be able to:

Identify the IBM i commands used to save orrecover specified types of objects

Describe the advantages and disadvantagesof various backup strategies

Describe the backup strategy that is providedby the IBM i Operational Assistant

Identify and initialize the tapes needed tosupport a given backup plan

Set up a schedule to perform daily, weekly,and monthly backups automatically

Set automatic backup parameters to controlthe objects that are copied during a daily,weekly, or monthly backup operation

Modify the library and folder lists that are usedby the automatic backup facility

Print the automatic backup schedule

Back up IBM-supplied objects or the entiresystem

Initiate an unscheduled backup run

Determine the tape that contains the mostrecent copy of an object

Restore a damaged library from a backuptape

Restore changed objects into a library

Topic Outline

Save and Restore Operations

Preparing a Backup Plan

Preparing the Backup Tapes

Setting Up Automatic Backups

Changing the Library and Folder Lists

Special Backup Operations

Restoring Libraries and Objects

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a senioroperator or a system administrator.

To perform all of the tasks described in this courseon a real IBM i system, your user profile mustspecify a user class of *SECADM and you musthave *SAVSYS authority.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy theseprerequisite by successfully completing thecourses from the following Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

Although not absolutely required, we recommendthat you take the previous courses of this seriesbefore you start this one:

Starting and Stopping the System

Managing Devices

Manta IBM i System Management Technologies Inc. 39

Checking Storage Utilization

Order Number: OSYS04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

One aspect of managing an IBM i system ischecking on how system storage is being used.This course describes the operational proceduresfor collecting disk storage utilization data andprinting this information in a variety of usefulreports. The discussion includes techniques forspotting and responding to potential storageproblems.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Describe the tools provided by IBM i to helpyou determine how storage is being used onyour system

Schedule a weekly or monthly batch job tocollect disk space utilization data

Identify the disk space utilization report thatprovides the information you need to respondto a suspected space problem

Use IBM i facilities to generate a disk spaceutilization report that satisfies specifiedinformation requirements

Topic Outline

The Need for Storage Management

Collecting Disk Space Utilization Data

Printing Disk Space Utilization Reports

Selecting a Report Type

Audience

This course should be taken by the personresponsible for managing the disk storage of anIBM i system. This person may be a senioroperator or a system administrator.

To perform the tasks described in this course on areal IBM i system, your user profile must specify auser class of *SECOFR and you must have*ALLOBJ authority.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy theseprerequisite by successfully completing thecourses from the following Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

Manta IBM i System Management Technologies Inc. 40

Cleaning Up System Storage

Order Number: OSYS05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the operational proceduresfor cleaning up the storage of an IBM i system.The discussion is divided into four major parts.After describing the need for installation standardsregarding storage use, the course describes thetasks that can be performed by each user to assistin system cleanup. It then describes how you candelete unneeded objects by scheduling IBM i'sautomatic cleanup facility. Finally, the coursedescribes additional techniques that you can use tominimize the amount of storage that is not beingput to active use.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Identify tasks that can be performed by eachuser to assist in system cleanup

Identify the IBM i commands available to auser to manage his or her use of systemstorage

Set up a schedule to have the system performcleanup tasks automatically

Initiate a system cleanup operation when anautomatic schedule has not been established

Identify the events that take place duringautomatic system cleanup

Identify tasks that can be performed by thesystem administrator to reclaim systemstorage

Determine whether an IPL should beperformed to help relieve a storage or addressshortage

Clear a message queue to reset its size backto its original value

Recover storage that is currently unavailable

Topic Outline

Establishing System Cleanup Standards

Cleaning Up User Objects

Performing Automatic Cleanup

Other Cleanup Tasks

Audience

This course should be taken by the personresponsible for managing the disk storage of anIBM i system. This person may be a senioroperator or a system administrator.

To perform the tasks described in this course on areal IBM i system, your user profile must specify auser class of *SECADM or *SECOFR and youmust have *ALLOBJ authority.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy theseprerequisite by successfully completing thecourses from the following Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

Although not absolutely required, we recommendthat you take the previous courses of this seriesbefore you start this one:

Starting and Stopping an IBM i System

Managing Devices

Backing Up Your System

Checking Storage Utilization

Manta IBM i System Management Technologies Inc. 41

Software Maintenance

Order Number: OSYS06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the maintenance of systemsoftware, particularly the IBM i operating systemand the IBM i Licensed Internal Code.

The course first discusses the procedures fordetermining the current release levels of installedprogram products. The remainder of the coursecovers the procedures for handling programtemporary fixes (PTFs).

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Determine the current release level ofinstalled program products

Define terms that relate to the management ofPTFs

Determine which version of the LicensedInternal Code is currently in use and which willbe used for the next IPL

Display and interpret the status of a PTF

Order a PTF, a cumulative PTF package, aPTF summary, or PSP information

Print and interpret a PTF cover letter

Install a PTF package

Verify that the application of a PTF wassuccessful

Permanently apply a PTF that was appliedtemporarily

Topic Outline

Identifying System Software

PTF Concepts

Ordering PTFs

Preparing for PTF Installation

Installing PTFs

Audience

This course should be taken by the personresponsible for managing the software installed onan IBM i system. This person may be a senioroperator or a system administrator.

To perform the tasks described in this course on areal IBM i system, your user profile must specify asecurity officer (*SECOFR) user class.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

Although not absolutely required, we alsorecommend that you take the previous courses ofthis series before you start this one:

Starting and Stopping the System

Managing Devices

Backing Up Your System

Checking Storage Utilization

Cleaning Up System Storage

Manta IBM i System Management Technologies Inc. 42

Using Virtual Media

Order Number: OSYS09

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Virtual media, including virtual tape volumes andvirtual optical volumes, are IBM i objects thatreside in system storage. Nevertheless, theybehave exactly like their physical counterparts,tape cartridges and CD/DVD platters. This coursebegins by explaining virtual media concepts anddiscussing common applications for virtual tapeand virtual optical volumes.

The course then covers the commands used to setup virtual media. As you will see, this involvescreating virtual tape devices, virtual opticaldevices, and image catalogs. You will see how tocopy data from a physical volume to a virtualvolume and how to create and initialize blankvirtual tapes. You will also see how to load avirtual image catalog into a virtual device for use.

Catalog shadowing is covered next. This is amethod for sharing virtual images among morethat one virtual device. As a result, multipleprograms can use the same image catalog orvirtual volume at the same time.

The course then describes the remainingcommands for working with image catalogs andvirtual volumes. The course ends with adiscussion of errors that are commonlyencountered when using virtual media, how toavoid them, and how to respond when avoidanceis not possible.

Approximate Study Time: 2 hours

Objectives

After completing this topic, you should be able touse System i Navigator to perform the followingtasks:

Define virtual media terms

Describe the procedures for creating and usingvirtual media

Identify applications for virtual tape and opticalvolumes

Create virtual tape and optical devices

Display the status of virtual devices

Create an image catalog

Add a virtual tape or virtual optical volume toan image catalog

Load or unload an image catalog in a virtualdevice

Mount, load, or unload a specified virtualvolume

Identify the advantages and limitations of usingdependent image catalogs

Create a dependent catalog

Display a menu of all image catalogcommands

Match image catalog commands with theirfunctions

Write-protect a virtual volume

Release unused space from virtual tapevolumes

Delete a virtual volume or a complete imagecatalog

Verify that an optical image catalog containsvalid upgrade or PTF images

List all image catalogs or the volumes in aparticular catalog

Identify the causes of common virtual mediaand device errors, the best way to respond tothem, and steps you can take to avoid them

Manta IBM i System Management Technologies Inc. 43

Topic Outline

Virtual Media Concepts and Applications

Creating Virtual Devices

Creating Image Catalogs

Catalog Shadowing

Working with Image Catalogs

Handling Errors

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a senioroperator or a system administrator.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operations series

This course also assumes that you are familiar withbasic IBM i system management, including devicemanagement, taking backups, and applying PTFs.You can satisfy this prerequisite by successfullycompleting previous courses of this series.

Managing Devices

Backing Up Your System

Software Maintenance

An understanding of logical partitioning is alsorecommended, but not absolutely required. Youcan satisfy this prerequisite by successfullycompleting either of the following Manta courses:

PowerVM Concepts

Introduction to Logical Partitioning

Handling Problems

Order Number: OSYS07

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces the operator to the topic ofIBM i problem management. It describes andexpands upon the detailed problem-analysisprocedure that is recommended by IBM.

The course begins with a description of the toolsand information sources available to help youdiagnose a system-related problem. It then detailsthe procedures for displaying message information,performing automatic problem analysis, andworking with entries in the problem log. Finally, thecourse covers the procedures for displayingSystem Reference Codes.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Identify the ways in which IBM i may notifyyou of a problem it detected

Identify the tools and sources of informationavailable to you when diagnosing a systemproblem

Display all available information about aproblem reported in a message

Recognize messages for which additionalproblem analysis is available

Initiate problem analysis from the DisplayMessage panel, from the Work with Problemspanel, or with the Analyze Problem command

Create a problem record when problemanalysis is not available

Interpret the status of a problem record

Invoke the Work with Problems panel and useit to display the status and history of aproblem

Transmit a problem report to the IBM servicesupport center

Query IBM about the status of a reportedproblem

Mark a problem record as verified or closed

Display the current settings of the systemservice attributes

Manta IBM i System Management Technologies Inc. 44

Determine whether a System Reference Codehas been displayed

Topic Outline

Problem-Solving Tools

Handling System Problems

Automatic Problem Analysis

Working with Problems

Service Attributes

System Reference Codes

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator, a system administrator, or a designateduser.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

Although not absolutely required, we alsorecommend that you take the previous courses ofthis series before you start this one:

Starting and Stopping the System

Managing Devices

Backing Up Your System

Checking Storage Utilization

Cleaning Up System Storage

Software Maintenance

System ManagementUsing System i Navigator

Order Number: OSYS08

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to use System i Navigatorto perform common IBM i system managementtasks.

The course begins by showing you how to restartan IBM i system and how to specify restart options.The course then describes how to manage thedevices attached to your system. You will see howto determine the current status of a device andhow to display a list of all of your system'shardware resources. The course then describeshow to work with system software. You will seehow to display a list of the installed software onyour system and how to determine the currentrelease level of installed program products.

Next, the course covers how to back up yoursystem. Specifically, you will see how to set up aschedule to perform daily, weekly, and monthlybackups automatically, how to modify the libraryand folder lists that are used by the automaticbackup facility, and how to initialize the tapesneeded for a backup operation.

The course then covers system values. You willsee how to both display and change the currentsetting of a system value. Finally, the coursecovers using virtual media. Specifically, you willsee how to manage virtual tape devices, virtualtape volumes, and their image catalogs.

Approximate Study Time: 90 minutes

Manta IBM i System Management Technologies Inc. 45

Objectives

After completing this topic, you should be able touse System i Navigator to perform the followingtasks:

Restart an IBM i system

Specify restart options

Determine the current status of a device

Display a list of your system's hardwareresources

Determine the current release level of installedIBM i program products

Set up a schedule to perform daily, weekly,and monthly backups automatically

Modify the library and folder lists that are usedby the automatic backup facility

Initialize the tapes needed for a backupoperation

Display the current setting of a system value

Change the setting of a system value

Create a virtual tape device

Create an image catalog

Add a virtual tape volume to an image catalog

Load or unload an image catalog in a virtualtape device

Mount, load, or unload a specified virtualvolume

Change the attributes of a virtual tape volume

Delete a virtual tape volume or a completeimage catalog

List all tape image catalogs or the volumes in aparticular catalog

Topic Outline

Restarting the System

Managing Devices

Working with System Software

Backing Up Your System

Working with System Values

Working with Virtual Tapes

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicated

operator, a system administrator, or a designateduser.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisiteby successfully completing the courses from thefollowing series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operations series

This course also assumes that you are familiar withbasic IBM i system management. You can satisfythis prerequisite by successfully completingprevious courses of this series.

Starting and Stopping the System

Managing Devices

Backing Up Your System

Software Maintenance

Using Virtual Media

Related Courses

This course is identical to course INAV03.

Manta IBM i System Management Technologies Inc. 46

IBM i System Management Competency ExamOrder Number: OSYS99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the IBM iSystem Management series:

Starting and Stopping the System

Managing Devices

Backing Up Your System

Checking Storage Utilization

Cleaning Up System Storage

Software Maintenance

Using Virtual Media

Handling Problems

System Management Using System iNavigator

The exam is divided into separate parts, one foreach course in the IBM i System Managementseries. Successfully completing all parts of theexam demonstrates your proficiency in theoperational skills required to manage an IBM isystem.

Approximate time to complete all parts of the exam: 150 minutes

Recommended Uses

This Competency Exam was designed as amastery test for the IBM i System Managementseries. We recommend that you take the examafter you complete the series. Alternatively, youcan take the corresponding portion of the examwhen you complete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.

Evaluation

The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.

Audience

The IBM i System Management series, includingthis exam, should be taken by any personresponsible for the physical operation of thecomputer system. This person may be a systemoperator, a designated user, or a systemadministrator.

While most of the tasks described in this series canbe performed by any system operator (someonewith a user class of *SYSOPR), some tasks can beperformed only by personnel with a user class of*SECADM or *SECOFR.

Prerequisites

All courses in this series assume that you canperform basic IBM i operations. You can satisfythis prerequisite by successfully completing thecourses from the following Manta series:

The Introduction to the IBM i Environmentseries

The Fundamentals of IBM i Operationsseries

If you feel you already have the necessary skills,you can verify your belief by successfullycompleting the Competency Exams for theseseries.

Manta PowerVM Concepts Technologies Inc. 47

PowerVM ConceptsOrder Number: LPAR02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

PowerVM is IBM's umbrella term for the collectionof virtualization technologies that are available withits Power Systems family. The most important ofthese technologies is logical partitioning, or LPAR,which lets one physical system run multipleoperating systems concurrently, including one ormore copies of IBM i, AIX, and/or Linux.

The course begins with an overview of logicalpartitioning concepts and applications. You willlearn the basic terminology and see how LPAR hasevolved. The course then goes into greater detailon how specific resources are shared amongpartitions, including processors, memory, and I/Odevices. Ways in which partitions cancommunicate with each other are also discussed.

Special considerations for sharing resource amongpartitions are covered next. In particular, partitionscan use both direct I/O, in which physical devicesare owned by the partition, and virtual I/O, in whichresources are supplied by a host partition. VirtualI/O is particularly useful in allocating storage to apartition from DASD owned by another partition.

The last session of the course covers thetechniques that are used to create and managepartitions. Two separate approaches are used byPower Systems. On smaller systems, partitionmanagement tasks are performed using theIntegrated Virtualization Manager (IVM). Largersystems use a separate Hardware ManagementConsole (HMC).

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Identify the advantages of using logicalpartitioning rather than independent systems ora single system image

Distinguish between physical and logicalpartitioning

Define logical partitioning terms

Describe the major tasks performed by thePower Systems hypervisor

Identify the operating systems that can run inhost and client partitions

Describe the purpose of the IntegratedVirtualization Manager (IVM) and HardwareManagement Console (HMC)

Describe how the resources of a sharedprocessor pool are allocated among partitions

Describe the difference between using cappedand uncapped processors in a partition

Describe the benefit of using multiple sharedprocessor pools

Given the performance rating of a system andits partition definitions, compute theperformance to be expected for a givenpartition

Specify whether a proposed dynamic memorychange is valid

Describe how the resources of a sharedmemory pool are allocated among partitions

Distinguish between logically overcommittedand physically overcommitted shared memory

Describe the relationship between an IOP andan IOA

Describe the restrictions concerning themovement of I/O resources between partitions

Identify the ways in which a partition can beprovided with a console

Describe the purpose of virtual I/O, virtual LAN,virtual Fibre Channel, and virtual OptiConnectin an LPARed system

Given a description of which partitions need tocommunicate, determine the number of virtualLANs and virtual adaptors that need to becreated

Distinguish between dedicated I/O and virtualI/O devices

Describe how a host partition can providevirtual disks, a virtual console, a virtual opticaldevice, and/or a virtual tape drive to a clientpartition

Identify ways in which IBM i, AIX, Linux, andWindows can share files and printers across anetwork

Describe the purpose of a partition profile on aPower System

Describe how fixes to the hypervisor code aredistributed

Manta PowerVM Concepts Technologies Inc. 48

Describe how system administration andoperations personnel create and changepartition definitions

Identify the security authority needed toperform specified LPAR operations

Describe how power-related IBM i systemvalues are handled in an LPAR environment

Describe how software and hardware errorsare reported to IBM in an LPAR environment

Topic Outline

LPAR Applications

Partitioning Processor Resources

Active Memory Sharing

Partitioning I/O Resources

InterPartition Communications

VIOS and Client Partitions

Partition Management

Audience

This course is intended for IT personnel who willoperate, administer, or plan for the installation ofan IBM Power System or BladeCenter server.

PrerequisitesThis course assumes that you are familiar withbasic computer concepts and terminology. Somefamiliarity with IBM i, AIX, and Linux is desired, butnot absolutely required. In particular, if yourinstallation uses AIX and/or Linux but not IBM i (orvice versa), you may skip sections that do notapply to your environment.

Reference Materials

No other materials are required to take this course.

A Student Reference Guide is available for thiscourse and LPAR01.

Related Products

Students should take this course of theirorganization uses a Power System or Bladeserver.

If the organization uses older iSeries or System ihardware, students should take Introduction toLogical Partitioning instead.

Manta System i Access for Windows Technologies Inc. 49

System i Access for Windows

Order Number: CIAW00

Max.Users

FirstYear

SecondYear

Later Years

1 $540 $270 $1365 $810 $405 $204

Each add’l $54 $27 $14

Overview

System i Access for Windows is a series of coursesthat cover the use of IBM's System i Access forWindows product. This series contains the followingcourses:

Introduction to System i Access for Windows

Using PC5250

Transferring Files Between Your PC and anIBM i System

Using the Directory Update Function

Installing System i Access for Windows

System i Access for Windows CompetencyExam

Approximate Study Time for the Entire Series: 10-12 hours

Audience

This series should be taken anyone who will beSystem i Access for Windows to access an IBM isystem host system via a personal computer.

Prerequisites

All courses in this series assume that you arefamiliar with both the Windows and IBM ienvironments. The IBM i-related prerequisites arecovered in the Manta series Introduction to theIBM i Environment.

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta System i Access for Windows Technologies Inc. 50

Introduction toSystem i Access for Windows

Order Number: CIAW01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course provides an introduction to System iAccess for Windows for Windows.

The course begins by describing the key differencesbetween System i Access for Windows and othermembers of the System i Access family. It thenintroduces the primary System i Accesscomponents, including PC5250, Data Transfer,System i Navigator, and the AFP WorkbenchViewer. You will see how to invoke System i Accessfunctions from either the System i Access forWindows folder or the Windows Start menu. Thecourse then describes the remaining services andfunctions provided by System i Access for Windowsand its various components.

Next, the course describes how to keep your copy ofSystem i Access for Windows up to date. Finally,you will see how to obtain online directions forperforming various tasks using System i Access forWindows, and how to obtain additional informationon System i Access for Windows screens.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Describe the function and capabilities ofPC5250, Data Transfer, System i Navigator, theAFP Workbench Viewer, and System i Accessmiddleware

Start System i Access functions using theWindows Start menu or desktop icons

Create a desktop icon to represent PC5250 orthe System i Navigator

Identify the services and facilities provided bySystem i Access for Windows

Describe the methods available for specifyingthe user ID and password for a System iAccess for Windows connection

Check the service level of the installed copy ofSystem i Access for Windows

Define a service schedule

Use the online System i Access for WindowsUser's Guide

Use System i Access help facilities to learnmore about a screen area

Topic Outline

The Primary System i Access Functions

Starting System i Access

The System i Access for Windows Folder

Keeping System i Access Up to Date

Getting Help

Audience

This course should be taken by anyone who will beSystem i Access for Windows to access an IBM isystem host via a personal computer.

Prerequisites

This course assumes you are familiar with both theWindows and IBM i environments. The IBM i-related prerequisites are covered in the Mantaseries Introduction to the IBM i Environment.

Manta System i Access for Windows Technologies Inc. 51

Using PC5250

Order Number: CIAW02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes Personal Communications5250 (PC5250), the emulator program that allowsyour PC to emulate both a 5250 terminal and an IBMi printer.

The course begins by describing the basic servicesprovided by PC5250. You will see how to initiate andterminate a PC5250 session. The course thendescribes how PC5250 uses keyboard mapping tomap PC keys to the special-purpose 5250 keys.You will see how to determine which PC key(s) aremapped to a specified 5250 key and how to modifythe default keyboard map. Next, the coursedescribes the various ways in which PC5250provides mouse support. You will see how to enablethe various types of hotspots and how to use andcreate popup keypads.

The course then describes the more advancedPC5250 features. You will see the various ways inwhich you can customize your PC5250 environment,how to use PC5250 for printer emulation, how tosave changes to your PC5250 session configuration,and how to create and use PC5250 macros.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should beable to:

Initiate and terminate a PC5250 session

Display the 5250 key to which a specified PCkey is mapped and the PC key(s) mapped to aspecified 5250 key

Create and use your own keyboard map

Use your mouse to position the text cursor

Use PC5250 hotspots

Display, use, and define a popup keypad

Customize your PC5250 session by modifyingthe PC5250 tool bar, changing the colors of thePC5250 window, and changing the format ofthe PC5250 window

Start and terminate a PC5250 printer session

Move a spooled file from one output queue toanother

Respond as required to expected printer writermessages

Save your PC5250 session configuration in aprofile

Initiate a PC5250 session using a profile

Use the Multiple Session feature to startmultiple PC5250 sessions with a singleoperation

Create a PC5250 macro

Use the Play tool bar button to execute a macro

Assign a PC5250 macro to any of the following:

o A tool bar button

o A hotspot

o A popup keypad button

o A mouse button

o A keyboard key

Topic Outline

Introduction to Personal Communications 5250

Displaying and Changing the Keyboard Map

PC5250 Mouse Support

Customizing PC5250

Printer Sessions

Using Profiles

Creating and Using Macros

Audience

This course should be taken by anyone who will beusing PC5250 for display station and/or printeremulation.

Manta System i Access for Windows Technologies Inc. 52

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM i-relatedprerequisites are covered in the Manta seriesIntroduction to the IBM i Environment.

This course also assumes you are familiar with basicSystem i Access for Windows functions andterminology

You can satisfy this prerequisite by successfullycompleting the first course of this series:

Introduction to System i Access for Windows

You may also have obtained these skills by takingother courses or through relevant work experience.

Transferring Files Between Your PC and an IBM i System

Order Number: CIAW03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to perform data transfersusing System i Access for Windows.

You will see how to download IBM i data to your PCand how to upload data from your PC to an IBM isystem. The course describes the various optionsthat control and affect a data transfer, and it showshow to execute a previously saved data transferrequest.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should beable to:

Define and use data transfer terminology

Perform a data download operation

Perform a data download operation that usesmultiple IBM i files as input

Manipulate a file being downloaded in thefollowing ways:

o Extract specified fields from each record

o Extract specified records from the file

o Create summary records from the file

o Change the order of records

Perform a data upload operation

Save a data transfer request

Execute a previously saved data transferrequest

Create a desktop icon for a data transferrequest

Display and change data transfer properties

Use commands to execute batch transferrequests

Manta System i Access for Windows Technologies Inc. 53

Topic Outline

Introduction to File Transfers

Performing a Basic Download Operation

Advanced Options for Download Operations

Uploading Files to an IBM i System

Saving and Executing File Transfer Requests

Audience

This course should be taken by anyone who wantsto use System i Access for Windows to transfer databetween a PC and an IBM i system.

Prerequisites

This course assumes that you are familiar with boththe Windows and IBM i environments. The IBM i-related prerequisites are covered in the Mantaseries Introduction to the IBM i Environment.

This course also assumes you are familiar with basicSystem i Access for Windows functions andterminology. You can satisfy this prerequisite bysuccessfully completing the first course of thisseries:

Introduction to System i Access for Windows

You may also have obtained these skills by takingother courses or through relevant work experience.

Using the Directory Update Function

Order Number: CIAW04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the Directory Update function ofSystem i Access for Windows. You will see how touse this function to distribute application updates toall personal computers connected to your IBM isystem.

The course begins with a discussion of the DirectoryUpdate function from a user's perspective. You willsee how to invoke the Directory Update functionmanually and how to have it invoked automaticallywhen Windows is started.

The course then describes how to configure theDirectory Update function to update PC applications.Included in this discussion is a description of thelogic used by the Directory Update function when itcompares source and target directories.

Finally, the course covers the creation and use of anupdate package. The use of a package file canimprove the performance of update processing foran application.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Invoke the System i Access Directory Updatefunction

Determine the amount of space required for anupdate

Determine which files need to be updated

Cause the Directory Update function to beinvoked automatically when Windows is started

Describe the operation of a file-driven updateversus a package-driven update

Add an application to the System i AccessDirectory Update configuration

Change the Directory Update entry for anapplication

Create an application package file for use bythe System i Access Directory Update function

Manta System i Access for Windows Technologies Inc. 54

Identify the steps required to refresh a targetdirectory when a file is accidentally deleted orreplaced

Topic Outline

Running the Update Function

Configuring the Update Function

Creating Update Packages

Audience

This course is intended for technical staff memberswho are responsible for managing personalcomputers that are connected to an IBM i system.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM i-relatedprerequisites are covered in the Manta seriesIntroduction to the IBM i Environment.

The course also assumes you are already familiarwith the basic use of System i Access for Windows.These prerequisites can be satisfied by successfullycompleting the first course of this series:

Introduction to System i Access for Windows

You may also have obtained these skills by takingother courses or through relevant work experience.

Installing System i Access for Windows

Order Number: CIAW05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the steps required to installSystem i Access for Windows on a personalcomputer. It also covers procedures that you willfind useful in the day-to-day administration ofSystem i Access for Windows.

The course begins with a description of the variousways in which System i Access for Windows can beinstalled on a personal computer. These includeinstalling from an IBM i system, another file server,and the IBM-supplied DVD.

The course then walks through the installationprocess, showing you how to configure System iAccess for Windows and control which componentsare installed. You will also see how to create an IBMi system connection definition and verify that all IBMi servers that will be needed by the user areavailable.

The course then shows you how to control whichSystem i Access for Windows functions are availableto the user. Two control mechanisms are available:Windows policies and the System i NavigatorApplication Administration function.

Next, the course describes the maintenance ofSystem i Access for Windows using service packs. .Finally, the course shows how to solve severalpotential problems related to how virtual devices areassigned to System i Access for Windows users.

Approximate Study Time: 2 hours

Manta System i Access for Windows Technologies Inc. 55

Objectives

After completing this course, you should beable to:

Identify the ways in which System i Access forWindows can be installed on a personalcomputer

Install System i Access for Windows on apersonal computer

Describe how System i Access for Windowsfunctions can be added or removed

Use System i Navigator to create a connectiondefinition, verify a connection, and display aconnection's properties

Identify the recommended backup method forvarious objects making up the System i Accessfor Windows configuration

Use the System i Navigator ApplicationAdministration function to prohibit a user fromaccessing selected System i Navigator orSystem i Access for Windows functions

Identify the differences between Windowspolicies, Application Administration localsettings, and Application Administration centralsettings in controlling the functions available toa user

Describe the service method used by System iAccess for Windows

Determine the current service level of aninstalled copy of System i Access for Windows

Install a System i Access for Windows servicepack

Limit the number of emulation sessions that canbe started by a PC5250 user

Describe how to avoid the proliferation of virtualdevice descriptions for System i Access forWindows users

Describe how to route a PC5250 user's outputto his or her PC

Topic Outline

Installation Options

Installing System i Access for Windows

Defining a Connection

Security Considerations

Updating System i Access for Windows

Controlling Sessions, Output, and Virtual Devices

Audience

This course is intended for technical staff memberswho will be responsible for connecting one or morepersonal computers to an IBM i system usingSystem i Access for Windows.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM i-relatedprerequisites are covered in the Manta seriesIntroduction to the IBM i Environment.

The course also assumes you are already familiarwith the basic use of System i Access for Windows.This prerequisite can be satisfied by successfullycompleting the Manta course, Introduction toSystem i Access for Windows.

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta System i Access for Windows Technologies Inc. 56

System i Access for Windows Competency ExamOrder Number: CIAW99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the Systemi Access for Windows series:

Introduction to System i Access for Windows

Using PC5250

Transferring Files Between Your PC and anIBM i System

Using the Directory Update Function

Installing System i Access for Windows

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to effectively use System iAccess for Windows.

Approximate time to complete all parts of the exam: 90 minutes

Recommended Uses

This Competency Exam was designed as a masterytest for the System i Access for Windows series.We recommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The System i Access for Windows series,including this exam, should be taken by anyone whowill be System i Access for Windows to access anIBM i system via a personal computer.

Prerequisites

This exam, like all courses in this series, assumesthat you are familiar with the Windows and IBM ienvironments. The IBM i-related prerequisites arecovered in the Manta series Introduction to theIBM i Environment.

Manta System i Access for Windows Technologies Inc. 57

IBM i Security

Order Number: ASEC00

Max.Users

FirstYear

SecondYear

Later Years

1 $864 $432 $2165 $1,296 $648 $324

Each add’l $86 $43 $22

Overview

The IBM i Security series describes the securityfacilities that are built into the IBM i operatingsystem. It also covers the IBM i commands andsystem values for controlling resource security.

The series describes IBM i security at three levels:physical security, user profile security, and resourcesecurity. Physical security controls who can accessthe hardware, including the system unit and devicessuch as workstations and printers. Under the topicof user profile security, you will see how the securityofficer can control system access through the use ofsystem values and user profile options. Under thetopic of resource security, you will see how to restrictaccess to system resources and secure sensitivedata.

IBM i resource security consists of a variety ofsecurity concepts and mechanisms, including objectownership, public authority, private authority, groupprofiles, primary group authority, authorization lists,and adopted authority. You will see how these areused and how to select the best security mechanismfor a given security requirement. You will also learnto use IBM i commands and panels to establish andmodify your security plan and to create an executionenvironment for an application system.

This series contains the following courses:

Introduction to IBM i Security

Granting Object Authority

Controlling Application Security

System Security Considerations

Creating an Application Environment

Security-Related System Values

Creating and Maintaining User Profiles

IBM i Security Using System i Navigator

IBM i Security Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 14-20 hours

Audience

This series should be taken by security officers andother personnel who are responsible for designingand implementing a system security plan. Theaudience also includes system administrators,programmers, managers, and users who willparticipate in security planning for the system as awhole or for one or more applications.

Prerequisites

All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. You can satisfy these prerequisitesby successfully completing the courses in thefollowing series:

Introduction to the IBM i Environment

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta System i Access for Windows Technologies Inc. 58

Introduction to IBM i Security

Order Number: ASEC01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces IBM i security.

The course begins with a discussion of the physicalsecurity of an IBM i system. Physical securitycontrols who can access the hardware, including thesystem unit and devices such as workstations andprinters. In the next session, on user profilesecurity, you will see how the security officer cancontrol system access through the use of systemvalues and user profile options. Then, in a sessionon resource security, you will see how the securityofficer and object owners can restrict access tosystem resources and secure sensitive data whileallowing authorized users to perform their jobs.

The course then covers the IBM i commands thatallow you to determine the objects that can beaccessed by a given user and the users who canaccess a given object. The course ends with adiscussion of the security issues related to IBM-supplied profiles and the Dedicated Service Toolspassword.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Identify the operating mode setting that isrequired to achieve a given security result

Identify the types of access permitted by eachof the IBM i security levels

Display a specified user profile

Identify ways in which user profile options canhelp establish security rules

Identify the powers granted to a user by his orher user class and special authority

Identify the authorities needed for a user toaccess libraries, directories, and objects inspecified ways

Use IBM i commands to determine the objectsthat can be accessed by a given user and todetermine the users who can access a givenobject

Explain the importance of changing the defaultpasswords for IBM-supplied user profiles andthe Dedicated Service Tools

Topic Outline

Physical Security

User Profile Security

Resource Security

Checking Access Authorities

IBM-Supplied User Profiles

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta System i Access for Windows Technologies Inc. 59

Granting Object Authority

Order Number: ASEC02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

In this course, you will see how to grant users theauthority to access the objects that you own orcontrol.

The first session covers public authority, the rightthat any user has to an object. As you will see,public authority is specified for an object when it iscreated and can be changed later by the object'sowner.

In the second and third sessions, you will see how togrant private authority to an object. Private authorityallows a user to access an object in ways notavailable to a general user. Objects stored in bothlibraries and directories are discussed.

The final session of this course covers how totransfer the ownership of an object to another user.

You will be able to use the commands covered inthis course if you are the owner of the object or ifyou have sufficient authority. For example, youmight be the security officer with *ALLOBJ authority.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able touse IBM i facilities to perform the following tasks:

Specify the public authority for a new object

Determine which users can access an objectand their respective levels of authority

Grant a user the authority to access an object

Revoke the authority of a user to access anobject

Change the level of authority a user has to anobject

Pass the ownership of an object to another user

Document the authority and ownership changesyou made during an interactive session byprinting your job log

Where appropriate, you will see how to performthese tasks for objects in both the library and root filesystems.

Topic Outline

Defining Public Authority

Granting Private Authority

Securing IFS Objects

Changing Object Ownership

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Finally, the course assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe first course of this series:

Introduction to IBM i Security

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta System i Access for Windows Technologies Inc. 60

Controlling Application Security

Order Number: ASEC03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

If you took the previous courses in this series, yousaw that a user can gain an authority to an object inany of three ways:

Via a special authority

Through the object's public authority

By receiving a private authority to the object

This course describes three additional ways a usercan gain authority to access an object:

By membership in a group

Through an authorization list

Via an adopted authority

These methods are often employed to grant a userthe necessary authorities to access the programs,database files, and other objects that make up anapplication system.

Each method is covered in a separate interactivesession.

The first session of this course covers group profiles.A group profile can be used to give object authorityto a collection of users with common accessrequirements.

An authorization list is used to control access to acollection of objects. The second session of thiscourse discusses the application securityrequirement that is satisfied by authorization lists. Italso covers the IBM i facilities for creating andmaintaining such lists.

Adopted authority is covered in the third session.Adopted authority grants a user the temporaryauthority needed to execute a program. You will seehow to set up adopted authority for an applicationand the considerations that you must keep in mind toavoid potential security exposures.

The course ends with a discussion of authorityholders. These are objects that can be used toprovide IBM i security for System/36 applications.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Order the steps required to set up a groupprofile and member profiles

Identify the authorities granted to a user bybeing a member of a group

Describe how user profile parameters can beused to control the ownership and authoritiesfor objects created by group members

Compare the advantages of using anauthorization list to those of using a groupprofile

Identify the authorities granted to a user via agiven authorization list

Identify the steps required to use adoptedauthority

Describe the purpose of authority holders

Use IBM i facilities to

o Create, edit, display, or delete anauthorization list

o Add, change, or remove a user entry in anauthorization list

o Put an object under the control of anauthorization list

o Remove an object from the control of anauthorization list

o Display the objects under the control of anauthorization list

o Determine the users who can access anobject as a result of adopted authority

Topic Outline

Group Profiles

Authorization Lists

Adopted Authority

Authority Holders

Manta System i Access for Windows Technologies Inc. 61

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Finally, the course assumes that you have anunderstanding of IBM i security concepts and knowhow to grant object authorities. You can satisfy thisprerequisite by successfully completing the previouscourses of this series:

Introduction to IBM i Security

Granting Object Authority

You may also have obtained these skills by takingother courses or through relevant work experience.

System Security Considerations

Order Number: ASEC04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Other courses in this series describe all the ways inwhich an object can be protected and the ways inwhich authority to an object can be granted to auser. They also show the related IBM i commandsand panels. This course shows how the varioussecurity mechanisms can be used together to satisfya given security requirement.

The course begins with a review of the IBM i securitymechanisms that are covered in other courses in thisseries. While you should now understand how eachmechanism works by itself, the situation can getcomplicated when two or more techniques are usedtogether.

The second session describes the logic followed byIBM i to determine whether a user has the necessaryauthority to access an object in a specified manner.In addition, the session offers recommendations forsetting up a security plan that makes use of this logicto improve system performance.

The course then describes a security feature thatwas introduced in the third course of this series,primary groups. As described in ControllingApplication Security, a primary group is a groupprofile that provides improved performance for groupmembers who access objects owned by anothergroup member. You will see how to set up andmaintain primary groups using IBM i commands.

The remaining topics of the course are directed tothe security officer and other personnel who areresponsible for the overall security plan for yourorganization's IBM i system. Your need tounderstand these issues depends on your jobfunctions and your installation's security level.Following are the topics covered:

Security audit journaling

Security levels 40 and 50

Backup and recovery

Approximate Study Time: 90 minutes

Manta System i Access for Windows Technologies Inc. 62

Objectives

After completing this course, you should be able to:

Select the optimal security mechanism toimplement a given application requirement

Determine the authority of a user to access anobject, given the description of an applicationthat uses a variety of security mechanisms

Determine the primary group, if any, associatedwith an object

Designate a primary group for an object

Change the primary group for an object

Identify the types of security events that can beidentified using IBM i security auditing facilities

Identify the events that are treated as securityviolations by security levels 40 and 50, but notby level 30

Identify the location of IBM i security informationand how this affects an installation's backup/recovery plan

Topic Outline

Security Review

Authority Checking

Using Primary Groups

Security Auditing

Security Levels 40 and 50

Backup and Recovery

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Finally, the course assumes that you have anunderstanding of IBM i security concepts, includinggroup profiles, authorization lists, and adoptedauthority. You can satisfy this prerequisite bysuccessfully completing the previous courses of thisseries:

Introduction to IBM i Security

Granting Object Authority

Controlling Application Security

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta System i Access for Windows Technologies Inc. 63

Creating an Application Environment

Order Number: ASEC05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the objects that make up atypical application environment. In particular, itdetails the security-related tasks that should beperformed when installing a new application system.

The course begins with a discussion of applicationlibraries. You will see common library organizationstrategies and how to define a library for a group ofusers. The discussion is then repeated forintegrated file system directories.

Next, the course describes how you can provideadditional protection by creating dedicated message,output, and job queues for an application. Then, youwill see how to control access to devices: inparticular, how to limit access to a workstation tothose users who are members of a specified group.

The course then describes the role of the jobdescription in establishing the user's environment.Special consideration is given to eliminating securityexposures made possible by the creative use of ajob description.

The course ends with a summary of therecommended sequence of tasks to set up anapplication.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Identify the security issues that need to beconsidered when defining each object thatmakes up an application’s environment

Create a library, a directory, an output queue,and a job description for use by an application

Change the current library and home directoryof a user

Restrict access to workstations and otherdevices

Specify the recommended sequence of tasks toset up an application

Topic Outline

Creating Libraries

Creating Directories

Creating Queues

Controlling Device Access

Creating a Job Description

Setting Up an Application System

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Finally, the course assumes that you have anunderstanding of IBM i security concepts, includinggroup profiles, authorization lists, and adoptedauthority. You can satisfy this prerequisite bysuccessfully completing the previous courses of thisseries:

Introduction to IBM i Security

Granting Object Authority

Controlling Application Security

System Security Considerations

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta System i Access for Windows Technologies Inc. 64

Creating and Maintaining User Profiles

Order Number: ASEC06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes user profiles, the key elementin establishing a user environment. The coursebegins with five interactive sessions, each of whichdiscusses a collection of user profile options:

Basic profile options

Security options

Group member options

Job, message, and output options

Environment options

You will see the purpose of each user profile fieldand the options available to you as the securityadministrator.

The course then describes the IBM i commandsused to create and maintain user profiles. This partof the course begins with an introduction to thecommands associated with user profiles and theauthorities required to perform various user profilefunctions. You will then practice creating profiles ina simulated IBM i session. Next, you will practicedisplaying, changing, and deleting profiles. Finally,the course describes how to test a profile that youhave created.

Approximate Study Time: 2.5 hours

Objectives

After completing this course, you should be able to:

Predict the result of a sign-on attempt, given thecurrent values of the appropriate fields in theuser's profile

Identify the differences between a group profileand the profile for a group member

Identify the authority required to perform agiven function on a user profile

Code the user profile parameter to satisfy agiven requirement

Create, display, change, and delete a userprofile

Identify the steps you should perform to test aprofile that you have created

Topic Outline

Basic User Profile Options

Security Options

Group Member Options

Job, Message, and Output Options

Environment Options

Commands for Working with User Profiles

Creating User Profiles

Using Profile Commands

Testing the Profiles You Have Created

Audience

The course is intended for the security officer oradministrator who is responsible for enrolling newusers on the system. It is also valuable formanagers and other personnel who will participate insystem security decisions.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Finally, the course assumes that you have anunderstanding of IBM i security. You can satisfy thisprerequisite by successfully completing the previouscourses of this series:

Introduction to IBM i Security

Granting Object Authority

Controlling Application Security

System Security Considerations

Manta System i Access for Windows Technologies Inc. 65

Security-Related System Values

Order Number: ASEC07

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the security-related systemvalues. These control the sign-on and password-change processes.

The course is divided into three interactive sessions.The course begins by reviewing the purpose ofsystem values and the commands you can use todisplay or change the settings of system values.You can skip this session if you are already familiarwith these tasks.

The second session covers those system values thatcontrol the sign-on process. You will see how tocontrol the number of attempts the user will be givento sign on and the action the system should take inresponse to a sign-on failure. You will also see howto control the actions taken by the system when itdetects that a workstation has been left unattended.

The third session discusses those system valuesthat are password related. You will see how to forcepasswords to expire after a specified number of daysand how to control the types of passwords that auser may enter.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Change IBM i system values to controlpassword selection and system access

Predict the result of a sign-on attempt orpassword change, given the current settings ofthe appropriate system values

Identify the two ways that password rules canbe specified

Code the appropriate system values to rejectpasswords meeting specified criteria

Topic Outline

Changing System Values

System Values that Control the Sign-OnProcess

Password-Related System Values

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe first course of this series:

Introduction to IBM i Security

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta System i Access for Windows Technologies Inc. 66

IBM i Security Using System i Navigator

Order Number: ASEC08

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to perform security-related tasks using System i Navigator.

The course begins by describing how to work withobject authority. You will see how to specify thepublic authority for a new object, determine whichusers can access an object and their respectivelevels of authority, and grant a user the authority toaccess an object.

You will then see how to work with user and groupprofiles. You will see how to create, display,change, and delete both user and group profiles.The course then covers authorization lists. You willsee how to display the contents of an authorizationlist, add, change, or remove a user from anauthorization list, display the objects under control ofan authorization list, and how to create and deleteauthorization lists.

Next, you will see how to perform the tasks neededto prepare for the installation of an applicationsystem. This includes how to create a library, createa directory, and change the current library and homedirectory of a user. The course ends by showingyou how to display and change security-relatedsystem values.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able touse System i Navigator to perform the followingtasks:

Specify the public authority for a new object

Determine which users can access an objectand their respective levels of authority

Grant a user the authority to access an object

Revoke the authority of a user to access anobject

Change the level of authority a user has to anobject

Pass the ownership of an object to another user

Display the attributes of a user profile

Create, change, and delete user profiles

Display the attributes of a group profile

Create, change, and delete group profiles

Identify the authorities granted to a user bybeing a member of a group

Determine the primary group, if any, associatedwith an object

Designate a primary group for an object, changethe primary group for an object, or remove theprimary group associated with an object

Display the contents of an authorization list

Add, change, or remove a user from anauthorization list

Display the objects under control of anauthorization list

Create and delete authorization lists

Put an object under the control of, or remove anobject from under the control of, an authorizationlist

Create a library

Create a directory

Change the current library and home directory ofa user

Display and change security-related systemvalues

Use the System i Navigator Security Wizard toset up the security-related system values onyour system.

Topic Outline

Granting Object Authority

Creating and Maintaining User Profiles

Working with Group Profiles

Working with Authorization Lists

Creating an Application Environment

Working with Security-Related System Values

Manta System i Access for Windows Technologies Inc. 67

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course also assumes that you are familiar withthe concepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe previous courses of this series:

Introduction to IBM i Security

Granting Object Authority

Controlling Application Security

System Security Considerations

Creating an Application Environment

Creating and Maintaining User Profiles

Security-Related System Values

You may also have obtained these skills by takingother courses or through relevant work experience.

Related Courses

This course is identical to course INAV04.

Manta System i Access for Windows Technologies Inc. 68

IBM i Security Competency ExamOrder Number: ASEC99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the IBM iSecurity series:

Introduction to IBM i Security

Granting Object Authority

Controlling Application Security

System Security Considerations

Creating an Application Environment

Creating and Maintaining User Profiles

Security-Related System Values

IBM i Security Using System i Navigator

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the operational skills required to develop asecurity plan for your IBM i system.

Approximate time to complete all parts of the exam: 2.5 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the IBM i Security series. We recommendthat you take the exam after you complete theseries. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The IBM i Security series, including this exam,should be taken by security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. You can satisfy these prerequisitesby successfully completing the courses in thefollowing series:

Introduction to the IBM i Environment

The courses in this series also assume that youhave some knowledge of security issues as theyapply to a computer installation. You may also haveobtained these skills by taking other courses orthrough relevant work experience.

Manta IBM Navigator for i Technologies Inc. 69

IBM Navigator for i

Order Number: NAVI00

Max.Users

FirstYear

SecondYear

Later Years

1 $432 $216 $1085 $648 $324 $162

Each add’l $44 $22 $11

Overview

IBM Navigator for i, also known as the web console,is a browser-based interface to the IBM i operatingsystem. If you have used System i Navigator, youwill see that the web console provides similarcapabilities. The major difference is that System iNavigator requires special software to be installedon the user's PC, while the web console uses astandard browser. IBM has announced that IBMNavigator for i is its strategic graphical interface,meaning that future enhancements will be made toNavigator for i rather than to System i Navigator.

This series currently contains the following courses:

Using IBM Navigator for i

Basic Operations Using Navigator for i

Work Management Using Navigator for i

Tape Management Using Navigator for i

IBM Navigator for i Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 8-12 hours

Audience

This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.

Prerequisites

This series assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series. If you feel you alreadyhave the necessary skills, you can verify your beliefby successfully completing the Competency Examfor that series.

Manta IBM Navigator for i Technologies Inc. 70

Using Navigator for i

Order Number: NAVI01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes IBM Navigator for i. Becausethis product is a browser-based interface to the IBM ioperating system, it is more commonly known as theweb console. If you have used System i Navigator,you will see that the web console provides similarcapabilities. The major difference is that System iNavigator requires special software to be installedon the user's PC, while the web console uses astandard browser.

The course begins with an introduction to the webconsole. You will first see how it differs fromprevious IBM i interfaces. Then, you will see how tostart and stop it.

Basic use of the web console is discussed next. Youwill learn how to use the controls provided by theweb console to locate and invoke individualfunctions. You will also see how to use the webconsole's help facilities.

The course then considers two of the tasks for whichgeneral users most often use Navigator for i. Thecourse first covers accessing IBM i messages.Among other things, you will see how to view themessages that have been sent to you and how tosend a message to another user. More advancedcontrols are also covered, including how to filter andsort the data displayed by the console.

Next, the course shows you how to access theintegrated file system using Navigator for i. You willsee how to create directories and move filesbetween your PC and the IBM i system.

The course ends by describing how to enter IBM icommands using the web console and how to invokethe web console's built-in 5250 terminal emulator.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Start the web console

Close individual web console pages

End a web console session

Navigate the web console window to locate aspecified task

Access the web console help facilities

Select an action for an item in a web consoledisplay

Use web console controls to determine thelayout of a list display

Add a web console page to your list of favorites

Use the web console to perform the followingtasks:

o Work with messages

o Create or remove an IFS directory

o Work with files in IFS directories

o Enter IBM i commands

o Use the built-in 5250 emulator

Topic Outline

Introduction to System i Navigator

Working with Messages

Using System i Navigator for File Access

Working with Connection Definitions

Power Techniques

Audience

This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the previous courses of this series:

Getting Started on IBM i

Integrated File System Concepts

Using IBM i Commands

Related Courses

This course is identical to course UINT06.

Manta IBM Navigator for i Technologies Inc. 71

Basic Operations Using Navigator for i

Order Number: NAVI02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to use Navigator for i toperform basic IBM i operator tasks. The coursebegins by expanding upon topics that wereintroduced in Using Navigator for i. You will first seehow to use the Run Command function to submitbatch jobs and how to view and send messages asthe system operator.

You will then see how to manage batch jobs that yousubmit for execution. Tasks covered include holding,releasing, and deleting jobs, changing the priority ofa job, and displaying detailed information about ajob. You will then see how to perform these tasks forother types of jobs and jobs belonging to otherusers.

Navigator facilities for managing spooled files arecovered next. You will see how hold, release, view,and delete spooled files, change their attributes,display spooled files in PDF format, and sendspooled files to users on other systems. Finally, thecourse covers the Navigator for i functions formanaging printers and their associated printerwriters.

Approximate Study Time: 2 hours

Objectives

After completing this topic, you should be able to useNavigator for i to perform the following tasks:

Submit a batch job

Display and respond to messages directed tothe system operator

Send a message to a single user, a group ofusers, or all users

Display the system history log

Display the status of a job

Hold, release, or delete a job

Reply to a job-related message

Move a batch job from one job queue to another

Display detailed information about a job

Change the priority of a job in a job queue

Select the columns shown in the User Jobsdisplay

Tailor the User Jobs display to show all batchjobs, all interactive jobs, or all jobs

Filter the User Jobs display to locate a specifiedjob

Sign an interactive user off the system

Display the spooled files currently in the system

Examine the contents of a spooled file

Hold, release, or delete a spooled file

Display or change the properties of a spooledfile

Move a spooled file to another output queue

Cause a spooled file to print next

Examine and respond to printer messages

Send a spooled file to a user on another system

Display the spooled files waiting to print on aspecified printer

Determine the status of a printer

Start, stop, or restart a printer writer

Hold or release a printer writer

Respond to writer messages

Change the description of a printer device

Display or change the output queue associatedwith a writer

Vary a printer device online or offline

Topic Outline

Using Navigator for System Operation

Controlling Batch Jobs

Controlling Other Jobs

Controlling Printer Output

Managing Printers and Writers

Audience

This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, a systemadministrator, or a designated user.

Prerequisites

This course assumes that you understand IBM iconcepts and can perform basic tasks using IBMNavigator for i. You can satisfy these prerequisitesby successfully completing the Introduction to theIBM i Environment series (including UsingNavigator for i) and the Work ManagementConcepts course.

Manta IBM Navigator for i Technologies Inc. 72

Work ManagementUsing Navigator for i

Order Number: NAVI03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to use Navigator for i toperform common IBM i operator tasks involving workmanagement. The course begins by showing youhow to control job and output queues. You will seehow to hold, release, and clear these queues anddisplay their properties. Controlling subsystems iscovered next, including how to start and stop asubsystem, display its properties, and view the jobqueues and memory pools it is assigned.

The course then describes Navigator for i facilitiesfor monitoring your system. First you will see how todisplay execution statistics for a job, including itsCPU usage. Then you will see how to displaydetailed system status information, including the webconsole dashboard.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Display the contents of a job or an output queue

Hold, release, or clear a job or an output queue

Display the properties of a job or an outputqueue

Display a list of the writers using an outputqueue

Display a list of the subsystems and their status

Display a list of the jobs running in a subsystem

Display the properties of a subsystem

Display a list of the job queues associated with asubsystem

Start and stop a subsystem

Display detailed information and performancestatistics about active jobs

Determine the allocation of system memorypools and list the job or subsystems using eachpool

Identify the purpose of each system memorypool

Display comprehensive system statusinformation

Examine the status of the disk devices attachedto your system

Display a chart showing basic health indicatorsfor key system resources

Topic Outline

Managing Job Queues

Managing Output Queues

Controlling Subsystems

Displaying Job Information

Displaying Memory Pool Information

Displaying System Status Information

Audience

This course is intended for anyone who will use theweb console to access an IBM i system. Thisaudience includes system administrators, operators,programmers, and other personnel.

Prerequisites

This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series(including Using Navigator for i), the WorkManagement Concepts course, and BasicOperations Using Navigator for i.

Manta IBM Navigator for i Technologies Inc. 73

Tape ManagementUsing Navigator for i

Order Number: NAVI04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the operational procedures forhandling and maintaining tape volumes and deviceson an IBM i system. This discussion includes bothphysical tape volumes and virtual tape volumes thatare stored on disk.

The course begins by describing the terms andconcepts associated with magnetic tape volumesand devices. You will see how data is recorded on atape and the purpose of tape labels. The coursethen introduces virtual tape volumes, imagecatalogs, and virtual devices.

Next, the course covers the IBM Navigator for i tasksused to work with physical and virtual tape volumesand devices. You will see how to display andchange the status of a tape device, respond to tape-related messages, and initialize a tape volume.

Finally, the course covers how to display or printtape information, including the contents of tapelabels and the data recorded on a tape. You willalso see how to duplicate a tape volume.

Approximate Study Time: 3-4 hours

Objectives

After completing this course, you should be able to:

Define tape-related terms, including block, inter-block gap, read/write head, label, and tape mark

Describe the format of a standard-labeled tape

Identify the contents of volume and file labels

Describe the purpose of the write-protect tab orknob on a tape cartridge

Identify the proper procedures for handling tapecartridges

Define terms relating to virtual media, includingvirtual volume, image catalog,and virtual device

Describe the procedures for creating and usingvirtual tapes

Identify applications for virtual tapes

Display the status of a tape device

Vary a tape device online or offline

Reset a tape device

Identify the job that is currently using a tapedevice

Display a tape device's properties

Load or unload an image catalog in a virtualdevice

Mount, load, or unload a specified virtual volume

Write-protect a virtual volume

Delete a virtual volume or a complete imagecatalog

List all image catalogs or the volumes in aparticular catalog

Respond properly to tape volume- and tapedevice-related message

Initialize a tape volume

Display tape labels

Print the contents of a tape

Duplicate a tape

Topic Outline

Tape Concepts

Virtual Tapes

Working with Tape Devices

Managing Virtual Tape Volumes and ImageCatalogs

Responding to Tape Messages

Displaying Tape Information

Audience

This course should be taken by the personresponsible for the operation of an IBM i system.This person may be a dedicated operator, a systemadministrator, or a designated user.

Prerequisites

This course assumes that you understand IBM iconcepts and can perform basic operational tasksusing IBM Navigator for i. You can satisfy theseprerequisites by successfully completing theIntroduction to the IBM i Environment series.You should have also completed the previouscourses of this series:

Work Management Concepts

Basic Operations Using Navigator for i

Manta IBM Navigator for i Technologies Inc. 74

IBM Navigator for i Competency ExamOrder Number: NAVI99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the IBMNavigator for i series:

Using Navigator for i

Basic Operations Using Navigator for i

Work Management Using Navigator for i

Tape Management Using Navigator for i

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to use System i Navigator.

Approximate time to complete all parts of the exam: 90 minutes

Recommended Uses

This Competency Exam was designed as a masterytest for the IBM Navigator for i series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The IBM Navigator for i series, including this exam,should be taken by anyone who will be using Systemi Navigator. This audience is primarily operators and

system administrators, but may include end usersand other personnel.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.

Manta System i Navigator Technologies Inc. 75

System i NavigatorOrder Number: INAV00

Max.Users

FirstYear

SecondYear

Later Years

1 $540 $270 $1365 $810 $405 $204

Each add’l $54 $27 $14

Overview

System i Navigator is a graphical user interface(GUI) that provides an "explorer-like" view of IBM iresources. It has evolved over the years from aninteresting option to a required IBM i interface. Assystem administrators and operators become morecomfortable with System i Navigator, many are usingit for most of their day-to-day work. The courses inthis series cover different aspects of System iNavigator.

This series contains the following courses:

Using System i Navigator

IBM i Operations Using System i Navigator

System Management Using System i Navigator

IBM i Security Using System i Navigator

Managing TCP/IP Using System i Navigator

System i Navigator Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series:10-14 hours

Audience

This series should be taken by anyone who will beusing System i Navigator. This audience is primarilyoperators and system administrators, but mayinclude end users and other personnel.

Prerequisites

The prerequisites for each course in this series areunique. See the course description for a course tosee its prerequisites.

Using System i Navigator

Order Number: INAV01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes System i Navigator, agraphical user interface (GUI) that provides an"explorer-like" view of IBM i resources.

The course begins with an introduction to System iNavigator. You will see how to start it, how torequest System i Navigator services, and how to useits online help facility. The format of the System iNavigator window is also discussed.

The course then considers two of the tasks for whichgeneral users most often use System i Navigator.The course first covers accessing IBM i messages.Among other things, you will see how to view themessages that have been sent to you and how tosend a message to another user. Next, the courseshows you how to access the integrated file systemusing System i Navigator. You will see how tocreate directories and move files between your PCand an IBM i system.

The course then describes how to define andmanage connection definitions. The course ends bydescribing power techniques that you can employ tomore effectively use System i Navigator.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Start System i Navigator

Work with the objects in the System i Navigatormain window

Display a pop-up menu for an object in theSystem i Navigator main window

Change the appearance of the System iNavigator main window

Access the System i Navigator Help facility

Use System i Navigator to work with messages

Create or remove an IFS directory using Systemi Navigator

Work with files in IFS directories

Create a connection definition

Verify a connection

Manta System i Navigator Technologies Inc. 76

Change your IBM i password

Move and/or copy IBM i objects using drag anddrop mouse operations

Sort lists in the System i Navigator details panes

Use the System i Navigator Find function tolocate the next occurrence of a text string in adetails pane

Use the Include option in the Integrated FileSystem folder to list only certain files

Topic Outline

Introduction to System i Navigator

Working with Messages

Using System i Navigator for File Access

Working with Connection Definitions

Power Techniques

Audience

The course is intended for anyone who will useSystem i Navigator to access an IBM i system. Thisaudience includes managers, programmers,operators, end users, and other personnel.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the following courses of the Introductionto the IBM i Environment series:

Getting Started on IBM i

Integrated File System Concepts

Using IBM i Commands

Related Courses

This course is identical to course UINT04.

IBM i Operations Using System i Navigator

Order Number: INAV02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to use System i Navigator toperform common IBM i operator tasks.

The course begins by showing you how to submitand managing batch jobs. You will then see how towork with your printer output and the printer outputof other users. Next, the course covers managingsystem users. You will then see how to control jobqueues and subsystems. The course then describesthe System i Navigator facilities for monitoring yousystem. The course ends by covering the System iNavigator functions for managing tapes and tapedrives.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Enter a CL command

Submit a batch job

Display the status of a batch job

Hold, release, or cancel a job

Change the priority of a job in a job queue

Move a job from one job queue to another

Display a list of the spooled files currently in thesystem

Examine the contents of a spooled file

Hold, release, or delete a spooled file

Examine and respond to printer messages

Change the attributes of a spooled file

Send a spooled file to a user on another system

Display a list of all signed-on users

Send a message to a single user, a group ofusers, or all users

Sign a user off the system

Display a list of the job queues and their status

Manta System i Navigator Technologies Inc. 77

Display the contents of a job queue

Hold, release, or clear a job queue

Display a list of the subsystems and their status

Display a list of the jobs running in a subsystem

Display a list of the job queues associated with asubsystem

Start and stop a subsystem

Displayed detailed information and performancestatistics about a job

Examine the status of a printer

Start and stop a printer

Examine the status of hardware devicesattached to your system

Vary a tape device online or offline

Reset a tape device

Identify the job that is currently using a tapedevice

Initialize a tape

Display tape labels

Print the contents of a tape

Make a copy of a tape

Display a tape device's properties

Topic Outline

Submitting and Managing Batch Jobs

Controlling Printer Output

Controlling System Users

Controlling Job Queues

Controlling Subsystems

Monitoring an IBM i system

Using Tapes

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisite bysuccessfully completing the Introduction to the IBMi Environment series and the first six courses of theFundamentals of IBM i Operations series.

Related Courses

This course is identical to course OPER07.

Manta System i Navigator Technologies Inc. 78

System Management Using System i Navigator

Order Number: INAV03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to use System i Navigator toperform common IBM i system management tasks.

The course begins by showing you how to restart anIBM i system and how to specify restart options. Thecourse then describes how to manage the devicesattached to your system. You will see how todetermine the current status of a device and how todisplay a list of all of your system's hardwareresources. The course then describes how to workwith system software. You will see how to display alist of the installed software on your system and howto determine the current release level of installedprogram products.

Next, the course covers how to back up yoursystem. Specifically, you will see how to set up aschedule to perform daily, weekly, and monthlybackups automatically, how to modify the library andfolder lists that are used by the automatic backupfacility, and how to initialize the tapes needed for abackup operation.

Finally, the course covers system values. You willsee how to both display and change the currentsetting of a system value.

Approximate Study Time: 90 minutes

Objectives

After completing this topic, you should be able to useSystem i Navigator to perform the following tasks:

Restart an IBM i system

Specify restart options

Determine the current status of a device

Display a list of your system's hardware resources

Determine the current release level of installed IBM iprogram products

Set up a schedule to perform daily, weekly, andmonthly backups automatically

Modify the library and folder lists that are used bythe automatic backup facility

Initialize the tapes needed for a backup operation

Display the current setting of a system value

Change the setting of a system value

Topic Outline

Restarting an IBM i system

Managing Devices

Working with System Software

Backing Up Your System

Working with System Values

Audience

This course should be taken by the personresponsible for the physical operation of thecomputer system. This person may be a dedicatedoperator or a designated user.

Prerequisites

This course assumes that you can perform basicIBM i operations. You can satisfy this prerequisite bysuccessfully completing the courses from thefollowing series:

The Introduction to the IBM i Environment series

The Fundamentals of IBM i Operations series

This course also assumes that you are familiar withbasic IBM i system management. You can satisfythis prerequisite by successfully completing thefollowing courses of the IBM i System Managementseries.

Starting and Stopping the System

Managing Devices

Backing Up Your System

Software Maintenance

Related Courses

This course is identical to course OSYS08.

Manta System i Navigator Technologies Inc. 79

IBM i Security Using System i Navigator

Order Number: INAV04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to perform security-related tasks using System i Navigator.

The course begins by describing how to work withobject authority. You will see how to specify thepublic authority for a new object, determine whichusers can access an object and their respectivelevels of authority, and grant a user the authority toaccess an object.

You will then see how to work with user and groupprofiles. You will see how to create, display,change, and delete both user and group profiles.The course then covers authorization lists. You willsee how to display the contents of an authorizationlist, add, change, or remove a user from anauthorization list, display the objects under control ofan authorization list, and how to create and deleteauthorization lists.

Next, you will see how to perform the tasks neededto prepare for the installation of an applicationsystem. This includes how to create a library, createa directory, and change the current library and homedirectory of a user. The course ends by showingyou how to display and change security-relatedsystem values.

Approximate Study Time: 120 minutes

Objectives

After completing this course, you should be able touse System i Navigator to perform the followingtasks:

Specify the public authority for a new object

Determine which users can access an objectand their respective levels of authority

Grant a user the authority to access an object

Revoke the authority of a user to access anobject

Change the level of authority a user has to anobject

Pass the ownership of an object to another user

Display the attributes of a user profile

Create, change, and delete user profiles

Display the attributes of a group profile

Create, change, and delete group profiles

Identify the authorities granted to a user bybeing a member of a group

Determine the primary group, if any, associatedwith an object

Designate a primary group for an object, changethe primary group for an object, or remove theprimary group associated with an object

Display the contents of an authorization list

Add, change, or remove a user from anauthorization list

Display the objects under control of anauthorization list

Create and delete authorization lists

Put an object under the control of, or remove anobject from under the control of, an authorizationlist

Create a library

Create a directory

Change the current library and home directory ofa user

Display and change security-related systemvalues

Use the System i Navigator Security Wizard toset up the security-related system values onyour system.

Topic Outline

Granting Object Authority

Creating and Maintaining User Profiles

Working with Group Profiles

Working with Authorization Lists

Creating an Application Environment

Working with Security-Related System Values

Manta System i Navigator Technologies Inc. 80

Audience

The course is intended for security officers and otherpersonnel who are responsible for designing andimplementing a system security plan. The audiencealso includes system administrators, programmers,managers, and users who will participate in securityplanning for the system as a whole or for one ormore applications.

Prerequisites

This course also assumes that you are familiar withthe concepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes that you have anunderstanding of IBM i security concepts. You cansatisfy this prerequisite by successfully completingthe following courses of the IBM i Security series:

Introduction to IBM i Security

Granting Object Authority

Controlling Application Security

System Security Considerations

Creating an Application Environment

Creating and Maintaining User Profiles

Security-Related System Values

You may also have obtained these skills by takingother courses or through relevant work experience.

Related Courses

This course is identical to course ASEC08.

Managing TCP/IP Using System i NavigatorOrder Number: INAV05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers how to use System iNavigator to configure and manage TCP/IP onan IBM i system. TCP/IP is unlike most IBM icomponents in that some TCP/IP functions canonly be configured using System i Navigator —no equivalent commands exist.

The course begins by discussing the basicconfiguration tasks that can be performed usingeither the text-based (green-screen) interface orSystem i Navigator. You will see how to useSystem i Navigator to confirm that all TCP/IPcomponents are installed, to check the status oflines, to create a new TCP/IP interface, and tospecify TCP/IP route information.

The course then shows how to identify thedomain name servers to be used and how toupdate the local host table. You will also seehow to modify global TCP/IP settings, includingport restrictions and the servers to be startedautomatically.

Basic TCP/IP troubleshooting is covered next.You will see the System i Navigator equivalentsof PING, NETSTAT, and TRACERT, as well asother displays that are unique to System iNavigator.

TCP/IP application servers are discussed next.You will see how to start and end individualservers and how to set common configurationoptions, including whether a server is startedautomatically when TCP/IP is started and thenumber of server tasks to be used initially. Thecourse then shows how to configure two serversthat can only be set up using System iNavigator: DHCP and DNS.

The course ends by showing how to configure adial-up line that uses the TCP/IP Point-to-PointProtocol (PPP).

Approximate Study Time: 3 hours

Manta System i Navigator Technologies Inc. 81

Objectives

After completing this course, you should be able to:

Determine whether the TCP/IP software hasbeen installed on an IBM i system

Display the status of the lines used for TCP/IPcommunication

Configure a TCP/IP interface for an IBM isystem

Specify routing information for hosts not withinthe local subnetwork

Specify the full local domain name for an IBM isystem

Identify a remote system to be used as a domainname server

Restrict access to the TCP/IP ports

Control which TCP/IP application servers arestarted automatically when TCP/IP is started

Update the local host table to identify otherhosts in the network

Display the status of all active TCP/IPconnections

Use PING to test whether a particular host canbe reached from your system

Display the route used for a connection

Display the IP address associated with a givendomain name or vice versa

Display the status all active TCP/IP connections

Start and end TCP/IP application servers

Specify configuration options for commonly usedTCP/IP application servers, including LDP, FTP,Telnet, and SNTP

Describe how the HTTP server is configured

Describe the function of the System i Accessservers

Configure a DHCP server to have an IBM isystem assign IP addresses for the localnetwork

Identify the trade-offs involved in setting theDHCP lease duration

Change the DHCP configuration for a subnet

Configure a TCP/IP point-to-point connection

Configure a DNS server to have an IBM i systemact as the local domain name server

Start or end a TCP/IP point-to-point connection

Topic Outline

Configuring Interfaces and Routes

Identifying Hosts

Testing Connections

Configuring Application Servers

Configuring DHCP

Configuring a Domain Name Server

Defining a Point-to-Point Connection

Audience

This course is intended for IBM i professionals whowill install and maintain TCP/IP on an IBM i system.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.

The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the following courses of the TCP/IP inthe IBM i Environment series:

TCP/IP Fundamentals

TCP/IP Applications

Configuring and Managing TCP/IP

You may also have obtained these skills bytaking other courses or through relevant workexperience.

Related Courses

This course is identical to course CTCP04.

Manta System i Navigator Technologies Inc. 82

System i Navigator Competency ExamOrder Number: INAV99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the System iNavigator series:

Using System i Navigator

IBM i Operations Using System i Navigator

System Management Using System i Navigator

IBM i Security Using System i Navigator

Managing TCP/IP Using IBM i Navigator

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to use System i Navigator.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the System i Navigator series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The System i Navigator series, including this exam,should be taken by anyone who will be using Systemi Navigator. This audience is primarily operators andsystem administrators, but may include end usersand other personnel.

Prerequisites

The prerequisites for each course in this series areunique. See the course description for a course tosee its prerequisites.

Manta Work Management for System Administrators Technologies Inc. 83

Work Management for System Administrators

Order Number: AWRK00

Max.Users

FirstYear

SecondYear

Later Years

1 $756 $378 $1905 $1,134 $567 $285

Each add’l $76 $38 $19

Overview

The Work Management for SystemAdministrators series describes how to performmany of the work management tasks required for anIBM i system. The series describes how to createand manage subsystems, job descriptions, classes,and output queues. It also shows how to changesystem values and enable the job accountingcapabilities of your IBM i system. You will learntechniques for streamlining IBM i operations,including scheduling jobs automatically, having thesystem automatically respond to selected messages,having commands entered automatically at IPL, andcreating simplified versions of IBM i commands. Theseries also describes how to monitor and tune theperformance of your system.

This series contains the following courses:

Work Management Concepts

Working with System Values

Managing Subsystems

Subsystem Workflow and Job Control

Streamlining IBM i Operations

Job Accounting

Performance Tuning

Work Management for System AdministratorsCompetency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 11-15 hours

Audience

This series is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.

Prerequisites

All courses in this series assume that you have abasic knowledge of IBM i facilities. You can satisfythis prerequisite by successfully completing thecourses in the Introduction to the IBM iEnvironment series.

Reference Materials

A Student Reference Guide is available for thisseries.

Related Courses

For a complete understanding of IBM i workmanagement, you should also take the courses inthe Fundamentals of IBM i Operations series.That series covers the work management tasksrelated to the routine operation of the system, suchas submitting batch jobs, controlling jobs, andcontrolling spooled files and printers.

Manta Work Management for System Administrators Technologies Inc. 84

Work Management Concepts

Order Number: AWRK01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes basic work managementconcepts.

The course begins by discussing interactive jobs.These are the sessions that are started when userssign on the system. It then describes how batchjobs are executed in the system. Next, the courseconsiders the role three components of the IBM isystem — subsystems, job descriptions, and jobqueues — play in the processing of batch jobs. Thecourse then discusses spooling, the process used tostore printer output, and describes how spooledoutput is managed by the IBM i system. The courseends by illustrating the flow of an interactive job anda batch job through the system.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Name the types of IBM i jobs and identify howeach is begun

Name the objects used to support jobprocessing, and identify the functionsperformed by each

Name the IBM i components used to managethe output created by jobs, and identify thefunctions performed by each

List the steps performed by the IBM i operatingsystem when running a batch or interactive job

Topic Outline

Job Types

Subsystems and Job Descriptions

Job Queues

Spooled Files and Output Queues

Job Flow

Audience

This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.

Manta Work Management for System Administrators Technologies Inc. 85

Working with System Values

Order Number: AWRK02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

The IBM i operating system uses a set of variables,called system values, to control the overall operationof your computer system. If your system is part of anetwork, another set of values, called networkattributes, is used to control networking andcommunications. This course describes how systemvalues and network attributes are used and how youcan manipulate them.

The course begins by describing one tool fordisplaying and changing the contents of selectedsystem values and network attributes, the ChangeSystem Options display. This display is sufficient formany system administrators, particularly those withnew systems. However, most system administratorseventually want to know what functions they cancontrol via system values and what settings mightimprove the performance of their systems. Becauseof this, subsequent sessions of the course describethe purpose of each system value, with emphasis onthose system values that are most frequentlychanged by system administrators.

In addition to learning the purpose of each systemvalue, you will see how to display or change thecontents of system values using the DSPSYSVAL,CHGSYSVAL, and WRKSYSVAL commands. Youwill also see how to copy the contents of a systemvalue into a CL program variable.

Finally, the course describes how to display orchange the contents of network attributes.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Identify the system value responsible forcontrolling a specified system function

Display or change the contents of a systemvalue

Code the command to copy the contents of asystem value into a CL program variable

Code the command to change the contents of asystem value

Display or change the value of a networkattribute

Code the command to copy the value of anetwork attribute into a CL program variable

Topic Outline

Changing System Options

Displaying and Changing System Values

Basic System Values

Manipulating System Values in a CL Program

System Control System Values

Advanced System Values

Network Attributes

Audience

The course should be taken by any personresponsible for managing an IBM i system. Thisperson may be a system administrator, a systemprogrammer, or a system operator.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.

You should also have an understanding of IBM iwork management and security concepts. You cansatisfy this prerequisite by successfully completingthe following courses:

Work Management Concepts

Introduction to IBM i Security

Manta Work Management for System Administrators Technologies Inc. 86

Related Courses

Because system values control so many aspects ofsystem operation, the ability to display and changetheir contents is a prerequisite skill for many of thecourses in the Manta system administrationcurriculum. While this course describes eachsystem value, it does not discuss the associatedsystem functions in detail. For a completeunderstanding of such functions, you need to takeadditional courses. Following is a partial list ofManta courses that cover specific system values andtheir effect on system functions:

Security-Related System Values Starting and Stopping an IBM i system Managing Subsystems Subsystem Workflow and Job Control Performance Tuning

Managing Subsystems

Order Number: AWRK03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Every job executes in a subsystem. Therefore, theway in which subsystems are defined and used onyour system greatly affects how your systemperforms.

This course describes how to manage thesubsystems on your IBM i system. The course firstpresents the commands used to start and stop asubsystem. It then takes a detailed look at thecontents of a subsystem description. You will seenot only the attributes that define a subsystem, butalso the contents of a routing entry and each type ofwork entry.

The course then shows different methods you canuse to create a subsystem description. Next, youwill see how to modify the attributes of a subsystemdescription and how to add, modify, and deleterouting and work entries. The course ends byshowing how to delete a subsystem description.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Start and stop a subsystem

Examine a subsystem description

Name and describe the values that are storedin a subsystem description

Use the CRTDUPOBJ command to create acopy of a subsystem description

Use the Work with Objects display to create acopy of a subsystem description

Use the CRTSBSD command to define a newsubsystem description

Alter the attributes of a subsystem

Add a new workstation, job queue, or routingentry to a subsystem description

Change or remove a workstation, job queue, orrouting entry

Delete a subsystem description

Manta Work Management for System Administrators Technologies Inc. 87

Topic Outline

Starting and Ending a Subsystem

Examining a Subsystem Description

Creating a Subsystem Description

Modifying a Subsystem Description

Deleting a Subsystem Description

Audience

This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.

In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first two course of thisseries:

Work Management Concepts

Working with System Values

Subsystem Workflow and Job Control

Order Number: AWRK04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to manage several objecttypes that play an important role in workmanagement: job descriptions, job classes, jobqueues, and output queues.

The course begins by describing various tasks youcan perform in managing job descriptions. You seehow to create, display, change, and delete a jobdescription. The course then shows how to performthese same tasks for job classes. The course endsby describing how to create job queues and outputqueues.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Name and describe the values that are storedin a job description

Create, copy, display, modify, and delete a jobdescription

Name and describe the values that are storedin a job class

Create, copy, display, modify, and delete a jobclass

Create and delete a job queue

Name and describe the attributes that define anoutput queue

Create, copy, modify, and delete an outputqueue

Topic Outline

Working with Job Descriptions

Working with Job Classes

Working with Job Queues

Working with Output Queues

Manta Work Management for System Administrators Technologies Inc. 88

Audience

This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.

In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first two course of thisseries:

Work Management Concepts

Working with System Values

Related Courses

See Creating an Application Environment (ASEC05),in the IBM i Security series, for another perspectiveon creating job descriptions and output queues. Thatcourse describes how to create a secureenvironment for a new application, including thesecurity aspects of job descriptions, output queues,message queues, libraries, directories, and devicedescriptions. In contrast, Subsystem Workflow andJob Control discusses the available options for jobsdescriptions and output queues in greater detail. Italso covers classes and job queues and thecommands used to manipulate these objects.

Streamlining IBM i Operations

Order Number: AWRK05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

More and more IBM i shops are moving towards"lights out" operation, in which the system runswithout a full-time operator in attendance. Othershops still have full-time operators, but are reducingthe hours during which the computer room is staffed.To automate operations-related tasks, you can turnto several program products available from majorsoftware vendors.

Alternatively, you can begin a move towardsautomated operations using the free tools that aredescribed in this course. All of these tools are builtinto IBM i. Because they are poorly documentedand not well advertised, however, you may not knowthey exist.

For most IBM i installations, the first step inautomating operations is to submit batch productionjobs for execution on a predetermined schedule.The course begins by showing you how toaccomplish this using the job scheduler that comeswith IBM i.

Once a shop's batch jobs are being submittedautomatically, the next step towards automatedoperations is preprogramming responses to systemmessages. In the second session of this course,you will see how to reduce operator interactions byusing the system reply list to have the system replyautomatically to specified messages.

Next, you will see how to modify the system startupprogram. This program is executed automatically atthe end of the IPL process. By modifying it, you canautomatically enter commands to start jobs, servers,or subsystems and perform other tasks withoutoperator intervention. As you will see, a commonreason to modify the startup program is to startTCP/IP automatically after each IPL.

The remainder of the course covers ways to modifythe commands provided with IBM i. First you willsee how to change the default value of a commandparameter. Then you will see how to createsimplified versions of IBM i commands.

Manta Work Management for System Administrators Technologies Inc. 89

Approximate Study Time: 2 hours

Objectives

After completing this course, you should beable to:

Submit a job to run at a predetermined time

Have a job executed automatically based on apredefined schedule

Create the system message queue

Have the system respond automatically to aspecified inquiry message

Modify the system startup program

Copy an IBM i command

Change the default value for an IBM i commandparameter

Create a CL program to reapply changes youhave made to IBM i commands

Create simple commands that invoke one ormore IBM i commands

Topic Outline

Scheduling Jobs

Automatic Message Response

Modifying the Startup Program

Changing Command Defaults

Creating Commands

Audience

This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.

The course also assumes you have a detailedknowledge of IBM i work management. You cansatisfy this prerequisite by successfully courses ofthis series:

Work Management Concepts

Working with System Values

Managing Subsystems

Subsystem Workflow and Job Control

Finally, you should have basic knowledge of IBM iCL programming. You can satisfy this prerequisiteby successfully completing the IBM i ApplicationProgramming Concepts and Facilities series and thefirst three courses of Manta's CL Programmingseries:

Introduction to CL Programming

Variables and Built-In Functions

Controlling Command and Program Flow

Manta Work Management for System Administrators Technologies Inc. 90

Job Accounting

Order Number: AWRK06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to implement jobaccounting on your system.

The course begins by describing the generalconcepts of job accounting. You will see how jobaccounting information can be used and whatinformation is recorded for each job. The coursenext describes how to enable job accounting on yoursystem. This discussion includes an overview ofjournal management. The course ends bydescribing how to examine the job accounting data.

Approximate Study Time: 60 minutes

Objectives

After completing this course, you should be able to:

Describe the function of job accounting

List the steps the system uses in determiningthe accounting code for a job

List the steps required to set up job accounting

Create a journal receiver for the accountingjournal

Create the accounting journal

Enable job accounting

Create a database file to which job accountingdata can be copied

Copy data from the accounting journal to adatabase file

Topic Outline

Job Accounting Overview

Setting Up Job Accounting

Processing Job Accounting Data

Audience

This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.

In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first two course of thisseries:

Work Management Concepts

Working with System Values

Manta Work Management for System Administrators Technologies Inc. 91

Performance Tuning

Order Number: AWRK07

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to monitor systemperformance and how to tune your system to reachoptimal performance.

The course begins by describing the conceptsbehind performance tuning. You will then see howto enable both automatic system tuning and theexpert cache function to have the system doperformance tuning for you. Next, the coursedescribes how to define your own storage poolconfiguration. You will then see the various panelsthat include system performance data, and how tointerpret the data on these panels. The course endswith a discussion on how to manually tune yoursystem.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Use and define the terms related toperformance tuning on an IBM i system

Describe how the performance of a program orgroup of programs can be affected bycontrolling processor and main storage usage

Identify the factors that affect the page fault ratein a storage pool

Determine whether automatic performancetuning is currently enabled on your system

Enable automatic performance tuning on yoursystem

Display, and optionally change, the currentstorage pool configuration

Enable the expert cache function for a sharedstorage pool

Describe the effect of changing automaticperformance tuning guidelines

Use the following panels to monitor systemperformance:

o Work with System Status

o Work with Disk Status

o Work with Active Jobs

Adjust your system's storage pool configurationto achieve optimum system performance

Topic Outline

Introduction to Performance Tuning

Automatic System Tuning

Defining a Storage Pool Configuration

Monitoring System Performance

Tuning Your System

Audience

This course is intended for anyone responsible formanaging the system activity of an IBM i system.System administrators, system programmers, andsystem operators would be personnel operating inthis job capacity.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the coursesin the Introduction to the IBM i Environmentseries.

In addition, you should have an understanding ofIBM i work management concepts and systemvalues. You can satisfy these prerequisites bysuccessfully completing the first four course of thisseries:

Work Management Concepts

Working with System Values

Managing Subsystems

Subsystem Workflow and Job Control

Manta Work Management for System Administrators Technologies Inc. 92

Work Management for System Administrators Competency ExamOrder Number: AWRK99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the WorkManagement for System Administrators series:

Work Management Concepts

Working with System Values

Managing Subsystems

Subsystem Workflow and Job Control

Streamlining IBM i Operations

Job Accounting

Performance Tuning

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to manage system activity on anIBM i system.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the Work Management for SystemAdministrators series. We recommend that youtake the exam after you complete the series.Alternatively, you can take the corresponding portionof the exam when you complete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The Work Management for SystemAdministrators series, including this exam, isintended for anyone responsible for managing thesystem activity of an IBM i system. Systemadministrators, system programmers, and systemoperators would be personnel operating in this jobcapacity.

Prerequisites

All courses in this series assume that you have abasic knowledge of IBM i facilities. You can satisfythis prerequisite by successfully completing thecourses in the Introduction to the IBM iEnvironment series.

Manta TCP/IP in the IBM i Environment Technologies Inc. 93

TCP/IP in the IBM i EnvironmentOrder Number: CTCP00

Max.Users

FirstYear

SecondYear

Later Years

1 $432 $216 $1085 $648 $324 $162

Each add’l $43 $22 $11

Overview

The TCP/IP in the IBM i Environment series coversthe configuration and use of TCP/IP on an IBM isystem.

This series contains the following courses:

TCP/IP Fundamentals

TCP/IP Applications

Configuring and Managing TCP/IP

Managing TCP/IP Using System i Navigator

TCP/IP in the IBM i Environment CompetencyExam

The first course in the series provides anintroduction to TCP/IP for the IBM i professional. Itdescribes how TCP/IP is actually a suite ofprotocols that are arranged in a layeredarchitecture. It then covers all but the topmostlayer in detail, giving special attention to the TCPand IP protocols.

The second course describes the major servicesand protocols that make up the TCP/IP applicationlayer. The use of common TCP/IP applications inan IBM i environment is covered.

The third course covers the steps you mustperform to configure and run TCP/IP on an IBM isystem.

The fourth course shows you how to set up andmanage TCP/IP using System i Navigator. As youwill see, some TCP/IP applications, includingDHCP and DNS, can only be set up in this way.

Approximate Study Time for the Entire Series: 10-14 hours

Audience

The first two courses of this series should be takenby all IBM i professionals who will be using TCP/IPprotocols, applications, or related products. Theremaining courses are intended for the systemadministrator responsible for configuring andmanaging TCP/IP on an IBM i system.

Prerequisites

All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. This prerequisite can be satisfiedby successfully completing the Introduction to theIBM i Environment series. A basic knowledge ofdata communications is also required.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta TCP/IP in the IBM i Environment Technologies Inc. 94

TCP/IP FundamentalsOrder Number: CTCP01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course provides an introduction to TCP/IP forIBM i professionals.

The course begins by describing the role of TCP/IPin allowing users with dissimilar networks,computer hardware, and operating systems tocommunicate over a virtual internetwork. It thendescribes the structure and overall administrationof the worldwide Internet.

Next, the course describes the addressingstructures used for a TCP/IP internetwork and therelationship between IP addresses and domainnames. You will see the functional layers thatmake up the TCP/IP architecture and the majorprotocols defined within each layer.

The remainder of the course describes the networkinterface layer, the internet layer, and the transportlayer in greater detail. The application layer iscovered in the next course of this series, TCP/IPApplications.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should beable to:

Define the key terms related to the TCP/IPprotocol suite

Identify the components of a TCP/IP internet

Describe the structure of the Internet

Identify the organizations involved inmaintaining and administering the Internet

Identify the differences between IPv4 and IPv6addresses

Identify the components of an internet address

Convert an IPv4 address to dotted-decimalnotation

Define an IPv4 subnet mask, given adescription of a network and its addressingscheme

Convert IPv6 addresses between their shortand long form

Identify the types of IP addresses

Describe how the relationship between adomain name and an IP address isdetermined

Identify the functional layers of the TCP/IParchitecture

Describe the IBM i implementation of theTCP/IP protocol suite

Distinguish between a local area network anda wide area network

Identify the local area and wide area networktypes supported by the IBM i implementationof TCP/IP

Describe the process used by the InternetProtocol (IP) in routing data to a remotesystem

Match the major TCP/IP internet layerprotocols with their functions

Describe the differences between aconnection-oriented and a connectionlesscommunications protocol

Identify the major differences between theTCP/IP transport layer protocols, TCP andUDP

Describe the processes used by TCP andUDP in transmitting a message from onesystem to another

Topic Outline

Internetworks

TCP/IP Addressing

Host Names and Domains

The TCP/IP Protocol Suite

The Data-Link Layer

The Internet Layer

The Transport Layer

Manta TCP/IP in the IBM i Environment Technologies Inc. 95

Audience

This course is intended for IBM i professionals whowill be installing or using TCP/IP protocols,applications, or related products.

Prerequisites

This course assumes that you are familiar with IBMi concepts and terminology. A basic knowledge ofdata communications is also required.

TCP/IP ApplicationsOrder Number: CTCP02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course provides an introduction to TCP/IPapplication services.

The course begins by describing the client/servermodel that is used by the TCP/IP application layer.As you will see, the services provided by theapplication layer can be divided into three groups:end-user services, support services, andapplication programming interfaces. The ways toinvoke TCP/IP applications on an IBM i system arealso discussed.

Next, the course describes two of the mostcommonly used TCP/IP applications: TELNET andFTP. TELNET is a terminal emulation program.You will see how to use TELNET to sign ontoanother host, regardless of whether your host andthe remote host are System i servers, System zservers, PCs, or UNIX-based systems. You willalso see how to use FTP (the File TransferProtocol) to transfer files between your system andanother host.

Then you will see how the Line Printer Requester(LPR) and Line Printer Deamon (LPD) allow you toroute spooled files between systems in a network.

The course ends with a discussion of how IBM isystems can be used as Internet servers.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Describe the method used by TCP/IP toimplement typical application services

Use the PING (VFYTCPCNN) command totest whether a particular host can be reachedfrom your system

Identify the applications that are supported bymost TCP/IP implementations

Use TELNET to initiate an IBM i session froma remote system

Use FTP to transfer files between your systemand a remote host

Send a spooled file to a remote system forprinting

Manta TCP/IP in the IBM i Environment Technologies Inc. 96

Configure an IBM i output queue to routespooled files to a remote system automatically

Identify the three protocols that define theWorld Wide Web

Identify the IBM i programs that provide webservices

Topic Outline

The Client/Server Model

Using TELNET

Using FTP

Remote Printing

The World Wide Web

Audience

This course is intended for IBM i professionals whowill be installing or using TCP/IP protocols,applications, or related products.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.

The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the first course of this series, TCP/IPFundamentals.

Configuring and Managing TCP/IPOrder Number: CTCP03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the steps you must perform toconfigure and run TCP/IP on an IBM i system.

The course begins with a review of the hardwareand software required to support TCP/IP on anIBM i system. It then introduces a sample intranetthat is used as a case study example throughoutthe remainder of the course.

Next, the course shows you how to configure aTCP/IP interface, start TCP/IP, and test thenetwork connection. For complex networks, youwill see how to specify routing information for hostsnot within the local subnetwork.

TCP/IP application servers are discussed next.You will see how to start and end individual serversand control whether a server is startedautomatically when TCP/IP is started.

The course then describes the ways in which thedomain names that are used on your system canbe translated into their corresponding IPaddresses. These methods include defining alocal host table, using a remote domain nameserver, and using the IBM i system as a domainname server.

Depending on its release level, your IBM i systemmay also support TCP/IP over various types ofpoint-to-point connections. You will see how toconfigure connections that use the Point to PointProtocol (PPP).

Finally, the course discusses IBM i securityconsiderations, listing steps that you can take toenhance the security of an IBM i system in aTCP/IP environment.

Approximate Study Time: 2 hours

Manta TCP/IP in the IBM i Environment Technologies Inc. 97

Objectives

After completing this course, you should be able to:

Determine whether the TCP/IP software hasbeen installed on an IBM i system

Identify the IBM i authority needed toconfigure TCP/IP

Interpret an intranet addressing diagram

Configure a TCP/IP interface for an IBM isystem

Specify routing information for hosts not withinthe local subnetwork

Display the status of the TCP/IP network

Start and end TCP/IP

Start and end TCP/IP application servers

Control whether a TCP/IP application server isstarted automatically when TCP/IP is started

Specify the full local domain name for an IBMi system

Update IBM i's local host table to identify otherhosts in the network

Identify a remote system to be used as adomain name server

Configure a TCP/IP point-to-point connection

Start or end a TCP/IP point-to-pointconnection

Identify steps you can take to enhance thesecurity of an IBM i system in a TCP/IPenvironment

Restrict access to the TCP/IP ports

Prevent a TCP/IP user from signing on as thesecurity officer

Topic Outline

TCP/IP Requirements

Configuring TCP/IP

Configuring Application Servers

Identifying Hosts

Defining a Point to Point Connection

Security Considerations

Audience

This course is intended for IBM i professionals whowill install and maintain TCP/IP on an IBM isystem.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.

The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the previous courses of this series:

TCP/IP Fundamentals

TCP/IP Applications

Manta TCP/IP in the IBM i Environment Technologies Inc. 98

Managing TCP/IP Using System i NavigatorOrder Number: CTCP04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers how to use System iNavigator to configure and manage TCP/IP onan IBM i system. TCP/IP is unlike most IBM icomponents in that some TCP/IP functions canonly be configured using System i Navigator— no equivalent commands exist.

The course begins by discussing the basicconfiguration tasks that can be performedusing either the text-based (green-screen)interface or System i Navigator. You will seehow to use System i Navigator to confirm thatall TCP/IP components are installed, to checkthe status of lines, to create a new TCP/IPinterface, and to specify TCP/IP routeinformation.

The course then shows how to identify thedomain name servers to be used and how toupdate the local host table. You will also seehow to modify global TCP/IP settings, includingport restrictions and the servers to be startedautomatically.

Basic TCP/IP troubleshooting is covered next.You will see the System i Navigatorequivalents of PING, NETSTAT, andTRACERT, as well as other displays that areunique to System i Navigator.

TCP/IP application servers are discussed next.You will see how to start and end individualservers and how to set common configurationoptions, including whether a server is startedautomatically when TCP/IP is started and thenumber of server tasks to be used initially.The course then shows how to configure twoservers that can only be set up using System iNavigator: DHCP and DNS.

The course ends by showing how to configurea dial-up line that uses the TCP/IP Point-to-Point Protocol (PPP).

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Determine whether the TCP/IP software hasbeen installed on an IBM i system

Display the status of the lines used for TCP/IPcommunication

Configure a TCP/IP interface for an IBM isystem

Specify routing information for hosts not withinthe local subnetwork

Specify the full local domain name for an IBM isystem

Identify a remote system to be used as adomain name server

Restrict access to the TCP/IP ports

Control which TCP/IP application servers arestarted automatically when TCP/IP is started

Update the local host table to identify otherhosts in the network

Display the status of all active TCP/IPconnections

Use PING to test whether a particular host canbe reached from your system

Display the route used for a connection

Display the IP address associated with a givendomain name or vice versa

Display the status all active TCP/IPconnections

Start and end TCP/IP application servers

Specify configuration options for commonlyused TCP/IP application servers, includingLDP, FTP, Telnet, and SNTP

Describe how the HTTP server is configured

Describe the function of the System i Accessservers

Configure a DHCP server to have an IBM isystem assign IP addresses for the localnetwork

Identify the trade-offs involved in setting theDHCP lease duration

Change the DHCP configuration for a subnet

Configure a TCP/IP point-to-point connection

Configure a DNS server to have an IBM isystem act as the local domain name server

Start or end a TCP/IP point-to-point connection

Manta TCP/IP in the IBM i Environment Technologies Inc. 99

Topic Outline

Configuring Interfaces and Routes

Identifying Hosts

Testing Connections

Configuring Application Servers

Configuring DHCP

Configuring a Domain Name Server

Defining a Point-to-Point Connection

Audience

This course is intended for IBM i professionals whowill install and maintain TCP/IP on an IBM isystem.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Introduction to the IBM iEnvironment series. A basic knowledge of datacommunications is also required.

The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the previous courses of this series:

TCP/IP Fundamentals

TCP/IP Applications

Configuring and Managing TCP/IP

You may also have obtained these skills bytaking other courses or through relevant workexperience.

Related Courses

This course is identical to course INAV05.

Manta TCP/IP in the IBM i Environment Technologies Inc. 100

TCP/IP in the IBM i Environment Competency ExamOrder Number: CTCP99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the TCP/IPin the IBM i Environment series:

TCP/IP Fundamentals

TCP/IP Applications

Configuring and Managing TCP/IP

Managing TCP/IP Using System i Navigator

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to configure TCP/IP on an IBMi system and use common TCP/IP applications.

Approximate time to complete all parts of the exam: 90 minutes

Recommended Uses

This Competency Exam was designed as amastery test for the TCP/IP in the IBM iEnvironment series. We recommend that youtake the exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.

Evaluation

The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate session for review.

Audience

The TCP/IP in the IBM i Environment series,including this exam, should be taken by all IBM iprofessionals who will be using TCP/IP protocols,applications, or related products. You can skip thethird and fourth courses and their correspondingexams unless you are responsible for configuringand managing TCP/IP on an IBM i system.

Prerequisites

All courses in this series assume that you arefamiliar with the concepts and basic operations ofIBM i systems. This prerequisite can be satisfiedby successfully completing the Introduction to theIBM i Environment series. A basic knowledge ofdata communications is also required.

Manta Using the Advanced Job Scheduler Technologies Inc. 101

Using the Advanced Job Scheduler

Order Number: AAJS00

Max.Users

FirstYear

SecondYear

Later Years

1 $324 $162 $825 $486 $243 $123

Each add’l $32 $16 $8

Overview

This three-course series covers the IBM AdvancedJob Scheduler for i. The first course, AdvancedJob Scheduler Concepts, provides the conceptsthat everyone will need, including users,managers, operators, and system administrators.The remaining courses are for the operators andsystem administrators responsible for setting upand managing the Advanced Job Scheduler.

The second course, The AJS Text-BasedInterface, covers the traditional, text-based (green-screen) interface to the job scheduler, as well asthe AJS commands. The third course, The AJSWeb-Based Interface, covers the graphicalinterfaces supported by System i Navigator andIBM Navigator for i.

Approximate Study Time for the Entire Series: 10-14 hours

Topic Outline

This series contains the following courses:

Advanced Job Scheduler Concepts

The AJS Text-Based Interface

The AJS Web-Based Interface

Using the Advanced Job Scheduler Competency Exam

Audience

This series is for everyone who will be using theIBM Advanced Job Scheduler for i. The firstcourse, Advanced Job Scheduler Concepts, isdesigned for users, managers, operators, andsystem administrators. The remaining courses are forthe operators and system administrators responsible forsetting up and managing the Advanced Job Scheduler.

Prerequisites

Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing the

courses in the Manta Introduction to the IBM iEnvironment series.

Certain topics within the second and third coursesassume you also have a detailed understanding ofIBM i security and work management. You cansatisfy these prerequisites by successfullycompleting the courses in the following Mantaseries:

IBM i Security

Work Management for System Administrators

The third course also assumes you are familiarwith IBM's Navigator for i product, including how tosign onto your IBM i system using a browser andnavigate the menu structure. You can satisfy thisprerequisite by successfully completing the Mantacourse Using IBM Navigator for i.

You may also have gained this knowledge fromattending classes or from relevant workexperience.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta Using the Advanced Job Scheduler Technologies Inc. 102

Advanced Job Scheduler Concepts

Order Number: AAJS01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces the IBM Advanced JobScheduler for i, a batch scheduling facility that isavailable with IBM i. You will see how the job schedulercan be used to automate the submission and tracking ofthe batch jobs that are run in your installation.

The course begins by describing the advantages that theAdvanced Job Scheduler provides compared to previousjob scheduling methods. It then dives into the mechanicsof job scheduling, describing the options available forspecifying job attributes, defining a schedule, andidentifying the relationships between the programs andmanual processes that make up an application system.You will see how to provide notifications to users andsupport personnel concerning a job's status. Other topicscovered include establishing job default settings, routingreports to users, controlling security, and setting up thejob scheduler.

This information is needed not only by systemsadministrators and operators who will set up andmanage the job scheduler, but also by users andmanagers who will participate in scheduling decisions.

Approximate Study Time: 3.5 hours

Objectives

After completing this course, you should be able to:

Describe the purpose of a job scheduler

Identify the features offered by the IBMAdvanced Job Scheduler for i

Distinguish between the five interfacessupported by the Advanced Job Scheduler

Define terms relating to the Advanced JobScheduler

Describe the basic information that must besupplied to schedule a job for repeated,automatic execution

Describe the ways in which parameters can bepassed to a program that is called by ascheduled job

Describe the operations that can be performedon an AJS job

Describe how a desired job schedule shouldbe specified to the Advanced Job Scheduler

Distinguish between a predefined schedule, ascheduling calendar, a reference calendar, afiscal calendar, and a holiday calendar

Distinguish between job dependency, objectdependency, and active dependency

Describe the various reasons why the jobscheduler may postpone the execution of a job

Describe how the job scheduler can accountfor both manual and automated steps in ascheduled process

Identify the various ways in which job attributescan be specified

Describe the facilities available to restrict theuse of job schedule functions

Identify the purpose of various job schedulerglobal properties

Identify the types of notifications that the jobscheduler can send to a user

Describe the purpose of an escalation list

Describe the options for routing job output tousers

Describe the purpose of an output queuemonitor

Distinguish between the job history and activitylog information that is maintained by the jobscheduler

Describe reasons for using a multiplescheduling environment

Identify additional AJS considerations thatapply when using a multiple schedulingenvironment

Manta Using the Advanced Job Scheduler Technologies Inc. 103

Topic Outline

Job Scheduling

Defining a Job to AJS

Scheduling Options

Job Dependencies

Applications and Job Controls

Notifications and Report Distribution

Multiple Scheduling Environments

Audience

The course serves as an introduction to everyone whowill be using the IBM Advanced Job Scheduler for i.This includes users, managers, operators, and systemadministrators. Later courses in this series teach thehands-on skills needed to set up and manage the jobscheduler.

Prerequisites

Before you begin your study of the material, you shouldhave a working knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the MantaIntroduction to the IBM i Environment series.

You may also have gained this knowledge fromattending classes or from relevant workexperience.

The AJS Text-Based Interface

Order Number: AAJS02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course teaches the hands-on skills needed toset up and manage the IBM Advanced JobScheduler for i using the traditional text-based(green-screen) interface. You can skip this course(or take it later) if you will be using IBM Navigatorfor i to set up and manage the job scheduler.

The course begins by showing you where theAdvanced Job Scheduling functions are locatedand how to use them to schedule a job forrepeated execution. You will learn how to identifythe commands making up the job, provideparameter information, specify job attributes,define a schedule, identify dependencies, providenotifications to users, initialize the job's local dataarea, and specify recovery procedures to be usedin the case of job failure. Subsequent sessions ofthe course cover the creation of supporting itemsincluding calendars and report distribution lists.

As you progress from session to session, thediscussion moves from scheduling an individual jobto the creation of job groups and applications. Thefinal session of the course covers those tasksrelated to the setup and management of the jobscheduler as a whole. Tasks include starting andstopping the scheduler, defining global defaults,and controlling the permissions of users to performjob scheduling tasks.

Approximate Study Time: 2.5 hours

Objectives

After completing this course, you should be able to:

Schedule a job for repeated, automaticexecution

Provide job attributes for a single job, for alljobs within an application, or for all jobs run bythe job scheduler

Display, change, print, or delete theinformation defining a job to the scheduler

Implement a desired job schedule

Create a scheduling calendar, a holidaycalendar, and a fiscal calendar

Manta Using the Advanced Job Scheduler Technologies Inc. 104

Define a job as part of a job group

Specify the action to be taken in case of a jobfailure

Restart a failed job group at a specified job

Identify job, active, and resource dependenciesto the job scheduler

Associate a job with an application

Create a library list to be used by the jobscheduler

Define command variables that can be used tosupply common parameter information tomultiple programs and jobs

Route job reports to the output queues ofspecified users

Notify specified users concerning a job's status

Display a job's scheduling history and job log

Display the log of job scheduler activity

Delete history and log entries that are nolonger needed

Print the job schedule for a specified timeperiod

Start and stop the job monitor

Reset the schedule for one or all jobs

Set up the job scheduler by specifying itsglobal properties

Control the permissions of users to perform jobscheduling tasks

Topic Outline

Defining a Job

Scheduling a Job

Defining Job Dependencies

Applications and Job Controls

Report Distribution

Notifications and Logs

System Controls

Audience

This course teaches the hands-on skills needed toset up and manage the Advanced Job Schedulerusing the traditional text-based (green-screen)interface. It should be taken by all operators andsystem administrators responsible for performingthose tasks.

Prerequisites

Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing thecourses in the Manta Introduction to the IBM iEnvironment series.

Certain topics within this course assume you alsohave a detailed understanding of IBM i securityand work management. You can satisfy theseprerequisites by successfully completing thecourses in the following Manta series:

IBM i Security

Work Management for System Administrators

You may also have gained this knowledge fromattending classes or from relevant workexperience.

Finally, the course also assumes you have takenthe first course of this series, Advanced JobScheduler Concepts.

Manta Using the Advanced Job Scheduler Technologies Inc. 105

The AJS Web-Based Interface

Order Number: AAJS03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course teaches the hands-on skills needed toset up and manage the IBM Advanced JobScheduler for i using the web-based IBM Navigatorfor i. This is IBM's strategic product for IBM isystem management. Because the screens aresimilar, students can also take this course to learnhow to use the older System i Navigator product toperform many of the same tasks. You should beaware, however, that newer features of theAdvanced Job Scheduler are available onlythrough the Navigator for i interface.

The course begins by showing you where theAdvanced Job Scheduling functions are locatedand how to use them to schedule a job forrepeated execution. You will learn how to identifythe commands making up the job, provideparameter information, specify job attributes,define a schedule, identify dependencies, providenotifications to users, initialize the job's local dataarea, and specify recovery procedures to be usedin the case of job failure. Subsequent sessions ofthe course cover the creation of supporting itemsincluding calendars, job queue monitors, reportdistribution lists, and escalation lists.

As you progress from session to session, thediscussion moves from scheduling an individual jobto the creation of job groups and applications. Thefinal session of the course covers those tasksrelated to the set-up and management of the jobscheduler as a whole. Tasks include starting andstopping the scheduler, defining global defaults,and controlling the permissions of users to performjob scheduling tasks.

Approximate Study Time: 3.5 hours

Objectives

After completing this course, you should be able touse the Advanced Job Scheduler's web-basedinterface to:

Schedule a job for repeated, automaticexecution

Provide job attributes for a single job, for alljobs within an application, or for all jobs run bythe job scheduler

Submit a job for immediate execution

Display, change, or delete the informationdefining a job to the scheduler

Implement a desired job schedule

Create and change the following job scheduleritems:

o Scheduling calendars, holiday calendars, and fiscal calendars

o Job groups

o Applications

o Library lists

o Job queue monitors

o Report distribution lists

o Escalation lists

Add a job to a job group

Identify job, active, and resource dependencies

Create a work flow

Indicate that a work flow has started or that awork flow step is complete

Define command variables that can be used tosupply common parameter information tomultiple programs and jobs

Create a recipient to hold user addressinformation

Stop the escalation of a message

Use AJS facilities to send an e-mail to a user

Route job reports to specified users, either bycopying spooled files to specified outputqueues or by sending reports as PDFattachments

Monitor an output queue, causing spooled filesplaced in the queue to be sent to specifiedusers

Control the format of banner pages added torouted reports

Manta Using the Advanced Job Scheduler Technologies Inc. 106

Display a job's scheduling history and the logof job scheduler activity

Specify a retention period for history and logentries

Set up the job scheduler by specifying itsglobal properties

Reset all scheduled jobs

Control the permissions of users to perform jobscheduling tasks

Start and stop the job monitor

Topic Outline

Defining a Job

Scheduling a Job

Defining Job Dependencies

Applications and Job Controls

Notifications

Report Distribution

Job History and Activity Logs

System Controls

Audience

This course teaches the hands-on skills needed toset up and manage the job scheduler using theweb-based IBM Navigator for i or the PC client-based System i Navigator. As a result, it should betaken by all operators and system administratorsresponsible for performing those tasks.

Prerequisites

Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing thecourses in the Manta Introduction to the IBM iEnvironment series.

Certain topics within this course assume you alsohave a detailed understanding of IBM i securityand work management. You can satisfy theseprerequisites by successfully completing thecourses in the following Manta series:

IBM i Security

Work Management for System Administrators

This course also assumes you are familiar withIBM's Navigator for i product, including how to signonto your IBM i system using a browser andnavigate the menu structure. You can satisfy thisprerequisite by successfully completing the Mantacourse Using IBM Navigator for i.

You may also have gained this knowledge fromattending classes or from relevant workexperience.

Finally, the course also assumes you have takenthe first course of this series, Advanced JobScheduler Concepts.

Manta Using the Advanced Job Scheduler Technologies Inc. 107

Using the Advanced Job Scheduler Competency ExamOrder Number: AAJS99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the Usingthe Advanced Job Scheduler series:

Advanced Job Scheduler Concepts

The AJS Text-Based Interface

The AJS Web-Based Interface

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to set up and manage theAdvanced Job Scheduler.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as amastery test for the Using the Advanced JobScheduler series. We recommend that you takethe exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.

Evaluation

The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. If youscore less than 80%, you will be directed to theappropriate course for review.

Audience

This series is for everyone who will be using theIBM Advanced Job Scheduler for i. The firstcourse, Advanced Job Scheduler Concepts, isdesigned for users, managers, operators, andsystem administrators. The remaining courses arefor the operators and system administratorsresponsible for setting up and managing theAdvanced Job Scheduler.

Prerequisites

Before you begin your study of the material, youshould have a working knowledge of basic IBM iconcepts and facilities. You can satisfy thisprerequisite by successfully completing thecourses in the Manta Introduction to the IBM iEnvironment series.

Certain topics within the second and third coursesassume you also have a detailed understanding ofIBM i security and work management. You cansatisfy these prerequisites by successfullycompleting the courses in the following Mantaseries:

IBM i Security

Work Management for System Administrators

The third course also assumes you are familiarwith IBM's Navigator for i product, including how tosign onto your IBM i system using a browser andnavigate the menu structure. You can satisfy thisprerequisite by successfully completing the Mantacourse Using IBM Navigator for i.

You may also have gained this knowledge fromattending classes or from relevant workexperience.

Manta The Integrated File System Technologies Inc. 108

The Integrated File System

Order Number: FIFS01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

The integrated file system (IFS) provides a singlemechanism for storing and retrieving all objects onan IBM i system.

This course first reviews file systems with whichyou may be familiar, including the IBM i library filesystem, the document library services file system,the PC file system, and the UNIX file system. Itthen describes the structure of the integrated filesystem and how it provides support for the otherfile systems. You will see how objects can beaccessed using the facilities of their native filesystems or using IFS facilities. The course thencovers IFS commands, menus, and applicationprogramming interfaces.

Approximate Study Time: 120 minutes

Objectives

After completing this course, you should be able to:

Describe the structure of the integrated filesystem

Specify the name required to locate an objectin the integrated file system using either anabsolute or a relative path name

Identify the differences between a hard linkand a symbolic link

Identify the symbolic link needed to support agiven processing requirement

Describe how multiple links and symbolic linksprovide additional ways to access an object

Describe how objects from the IBM i libraryfile system, the document library services filesystem, the open systems file system, and theWindows server file system are stored withinthe integrated file system

Identify integrated file system facilities thatcannot be used for objects in other filesystems

Use IBM i commands to:

o Display or change your current directory

o Create, rename, or remove directories,hard links, and symbolic links

o Display the links in a directory and follow adirectory link to a lower level

o Copy, move, check out, check in, save, orrestore an object in the integrated filesystem

Topic Outline

File Systems

Integrated File System Structure

Support for Other File Systems

IFS Directory and Object Manipulation Commands

IFS Link and Security Commands

Audience

This course is intended for all IBM i users who willdefine, manipulate, or use objects stored in theIBM i integrated file system.

Prerequisites

This course assumes that you have anunderstanding of basic IBM i concepts andfacilities.

Manta IFS Security Technologies Inc. 109

Related Courses

This course is similar to Integrated File SystemConcepts, a course in the Introduction to the IBMi Environment series. Integrated File SystemConcept is intended for the general user, TheIntegrated File System is designed for systemadministrators and others who need to know all ofthe commands and menus available formanipulating IFS objects.

In addition to the topics covered in this course, IBMi system administrators need to learn how tocontrol the security of IFS directories and theobjects they contain. This subject is covered intwo places in the Manta curriculum. If you arealready familiar with IBM i security, you can takethe IFS Security course (AIFS02). If you areunfamiliar with IBM i security, you should take theIBM i Security series (ASEC00). This seriesdiscusses security for all objects, including thosestored in directories.

IFS Security

Order Number: AIFS02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the IBM i commands used tocontrol the security of integrated file system (IFS)directories and the objects they contain.

The course begins by relating the security of IFSobjects to what you already know, the security oflibraries and traditional IBM i objects. As you willsee, the concepts of object ownership, publicauthority, private authority, group profiles,authorization lists, and adopted authority carry overto the IFS environment with little change.

The course then describes the commands andpanels used to grant a user private authority to anIFS object. You will also see how to transfer theownership of an IFS object to another user.

Next, the course describes the concept of primarygroup authority. While primary group authority isnot limited to files and directories, this concept wasintroduced to IBM i at the same time as theintegrated file system. You will see how to assignprimary group authority for an IFS object.

Finally, the course describes a security problemthat is introduced by the combined use of System iAccess and the integrated file system. Afterunderstanding why the problem exists, you willlearn how to implement IBM's recommendedsolution.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Identify the authorities needed for a user toaccess directories and files in specified ways

Identify the default value that is used when nopublic authority is specified for an IFS object

Specify the public authority for a new directory

Change the home directory of a user

Determine which users can access an IFSobject and their respective authorities

Grant a user the authority to access an IFSobject

Manta IFS Security Technologies Inc. 110

Revoke the authority of a user to access anIFS object

Change the level of authority a user has to anIFS object

Put an IFS object under the control of anauthorization list

Pass the ownership of an IFS object toanother user

Determine the primary group, if any,associated with an IFS object

Designate a primary group for an IFS object

Change the primary group for an IFS object

Describe the security problem introduced bythe combined use of System i Access and theintegrated file system

Use an authorization list to limit the ability ofSystem i Access users to view library objects

Topic Outline

File and Directory Authorities

Securing IFS Objects

Changing Object Ownership

Using Primary Group Authority

Restricting System i Access Users

Audience

The course is intended for security officers andother personnel who are responsible for designingand implementing a system security plan. Theaudience also includes system administrators,programmers, managers, and users who willparticipate in security planning for the system as awhole or for one or more applications.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.You can satisfy these prerequisites by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

You should also understand the structure and useof the integrated file system. You can satisfy thisprerequisite by successfully completing thefollowing course:

The Integrated File System

Finally, the course assumes that you have anunderstanding of IBM i security concepts andcommands. It is assumed that you obtained thisunderstanding through relevant work experience orby taking other courses. If you are unfamiliar withIBM i security, you should not take this course.Instead, you should take the courses in the IBM iSecurity series. That series includes all of thetopics covered by this course.

Reference Materials

A Student Reference Guide is available for thiscourse.

Manta PowerVM Concepts Technologies Inc. 111

PowerVM ConceptsOrder Number: LPAR02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

PowerVM is IBM's umbrella term for the collectionof virtualization technologies that are available withits Power Systems family. The most important ofthese technologies is logical partitioning, or LPAR,which lets one physical system run multipleoperating systems concurrently, including one ormore copies of IBM i, AIX, and/or Linux.

The course begins with an overview of logicalpartitioning concepts and applications. You willlearn the basic terminology and see how LPAR hasevolved. The course then goes into greater detailon how specific resources are shared amongpartitions, including processors, memory, and I/Odevices. Ways in which partitions cancommunicate with each other are also discussed.

Special considerations for sharing resource amongpartitions are covered next. In particular, partitionscan use both direct I/O, in which physical devicesare owned by the partition, and virtual I/O, in whichresources are supplied by a host partition. VirtualI/O is particularly useful in allocating storage to apartition from DASD owned by another partition.

The last session of the course covers thetechniques that are used to create and managepartitions. Two separate approaches are used byPower Systems. On smaller systems, partitionmanagement tasks are performed using theIntegrated Virtualization Manager (IVM). Largersystems use a separate Hardware ManagementConsole (HMC).

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Identify the advantages of using logicalpartitioning rather than independent systems ora single system image

Distinguish between physical and logicalpartitioning

Define logical partitioning terms

Describe the major tasks performed by thePower Systems hypervisor

Identify the operating systems that can run inhost and client partitions

Describe the purpose of the IntegratedVirtualization Manager (IVM) and HardwareManagement Console (HMC)

Describe how the resources of a sharedprocessor pool are allocated among partitions

Describe the difference between using cappedand uncapped processors in a partition

Describe the benefit of using multiple sharedprocessor pools

Given the performance rating of a system andits partition definitions, compute theperformance to be expected for a givenpartition

Specify whether a proposed dynamic memorychange is valid

Describe how the resources of a sharedmemory pool are allocated among partitions

Distinguish between logically overcommittedand physically overcommitted shared memory

Describe the relationship between an IOP andan IOA

Describe the restrictions concerning themovement of I/O resources between partitions

Identify the ways in which a partition can beprovided with a console

Describe the purpose of virtual I/O, virtual LAN,virtual Fibre Channel, and virtual OptiConnectin an LPARed system

Given a description of which partitions need tocommunicate, determine the number of virtualLANs and virtual adaptors that need to becreated

Distinguish between dedicated I/O and virtualI/O devices

Describe how a host partition can providevirtual disks, a virtual console, a virtual opticaldevice, and/or a virtual tape drive to a clientpartition

Identify ways in which IBM i, AIX, Linux, andWindows can share files and printers across anetwork

Describe the purpose of a partition profile on aPower System

Describe how fixes to the hypervisor code aredistributed

Manta PowerVM Concepts Technologies Inc. 112

Describe how system administration andoperations personnel create and changepartition definitions

Identify the security authority needed toperform specified LPAR operations

Describe how power-related IBM i systemvalues are handled in an LPAR environment

Describe how software and hardware errorsare reported to IBM in an LPAR environment

Topic Outline

LPAR Applications

Partitioning Processor Resources

Active Memory Sharing

Partitioning I/O Resources

InterPartition Communications

VIOS and Client Partitions

Partition Management

Audience

This course is intended for IT personnel who willoperate, administer, or plan for the installation ofan IBM Power System or BladeCenter server.

PrerequisitesThis course assumes that you are familiar withbasic computer concepts and terminology. Somefamiliarity with IBM i, AIX, and Linux is desired, butnot absolutely required. In particular, if yourinstallation uses AIX and/or Linux but not IBM i (orvice versa), you may skip sections that do notapply to your environment.

Reference Materials

No other materials are required to take this course.

A Student Reference Guide is available for thiscourse and LPAR01

Related Products

Students should take this course of theirorganization uses a Power System or Bladeserver.

If the organization uses older iSeries or System ihardware, students should take Introduction toLogical Partitioning instead.

Manta Implementing Single Sign-On Technologies Inc. 113

Implementing Single Sign-On

Order Number: AISS01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

We use the term single sign-on to mean the abilityto access multiple computer systems within anorganization after signing on only once. Thiscourse will show you how to implement a singlesign-on for a network containing systems runningboth Windows and IBM i.

The course begins with a definition of the singlesign-on problem. You will see why solutions suchas using the same ID and password on all systemshave failed. It then describes, in detail, the twotools used to implement single sign-on in the IBM ienvironment: the Kerberos protocol and EnterpriseIdentify Mapping (EIM).

After the concepts and operation of Kerberos andEIM have been covered, the course goes into thedetails of setting up Kerberos and EIM on an IBM isystem. While wizards are available to help youperform these tasks, a thorough understanding ofthe process will help you avoid potential pitfalls.

The course ends by showing you how to enableKerberos authentication for common PC-to-IBM iapplications, including System i Navigator, Systemi Access, and NetServer. Common problems arealso discussed.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Describe why using the same user ID andpassword on all systems in a network is not apractical solution to the single sign-on problem

Distinguish between authentication andauthorization

Describe the key difference in the tasksperformed by the Kerberos protocol andEnterprise Identity Mapping

Define Kerberos terms, including principalname, realm, Key Distribution Center, TicketGranting Ticket, and Service Ticket

Order the steps used by the Kerberos protocolto authenticate a user to a network server

Identify security risks that Kerberos eliminates

Identify security risks that Kerberos does noteliminate

Describe potential Kerberos problems that canresult from a poorly designed DNS process

Describe the purpose of Enterprise IdentityMapping

Describe how the use of Kerberos and EIMeliminates the need for most passwords

Distinguish between an EIM domain and aregistry

Describe the relationship between EIM andLDAP

Use the Network Authentication Service (NAS)wizard to configure Kerberos on an IBM isystem

Describe the function of a keytab file

Use System i Navigator facilities to maintainthe keytab file

Use System i Navigator to create an EIMdomain and a registry

Define EIM associations to relate a Kerberosprincipal name to an IBM i user profile

Create an EIM policy association that maps allusers in a registry to a specific user ID ofanother registry

Set up System i Navigator to use Kerberosauthentication

Describe how System i Access and NetServerare enabled for Kerberos authentication

Manta Implementing Single Sign-On Technologies Inc. 114

Identify potential difficulties in setting upKerberos and EIM

Topic Outline

The Quest for a Single Sign-0n

Kerberos Concepts

Enterprise Identity Mapping Concepts

Adding an IBM i System to a WindowsNetwork

Activating EIM on the IBM i System

Using Kerberos-Enabled Applications

Audience

The course is intended for system administratorswho will implement the Kerberos protocol andEnterprise Identity Mapping (EIM) on an IBM isystem.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of IBM i systems.This prerequisite can be satisfied by successfullycompleting the Manta series Introduction to theIBM i Environment.

The course also assumes you have a basicunderstanding of TCP/IP concepts and facilities.This prerequisite can be satisfied by successfullycompleting the TCP/IP in the IBM i Environmentseries.

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

A Student Reference Guide is available for thiscourse.

Manta The IBM i Programming Environment Technologies Inc. 115

Configuring the HTTP Server

Order Number: CWEB01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Every IBM i system comes with a server programcalled the IBM HTTP Server for i (powered byApache). An HTTP server is the TCP/IPapplication-level component that delivers HTMLdocuments and other objects upon request to abrowser or other client application. This courseshows you how to configure the HTTP server todeliver both static and dynamic content to Internetusers within your own organization or around theworld.

The course begins with an introduction to HTTP.You will see the data flow in both static webrequests (which retrieve existing objects) anddynamic requests (in which the resulting responseis created by a server-side program). The Apacheserver and its relationship to the IBM HTTP Serverfor i is also discussed.

The course then shows you how to access thegraphical control panel for the HTTP server andhow to use it to create a new server instance. Youwill learn how to start the server and check yourwork. You will also see how to specify the locationof your web documents and control access tothem.

Dynamic web applications are covered next. Firstyou will see how to configure the HTTP server tosupport server-side includes. These arecommands for the server that can be embeddedwithin HTML documents to perform such actionsas including the current date or the contents of aspecified HTML document. Then you will see howto configure a CGI program and control its use.

The course ends with a tour of other functions thatare available from the HTTP server control panel.In particular, you will see how the wizards andforms of the control panel are used to createApache server directives. You will see how todisplay and edit these directives directly and whereyou can find additional information about theoptions available.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Identify the three protocols used by basic webapplications

Describe the major functions of an HTTPserver

Describe how a web page invokes a CGIprogram and passes data to it

Interpret an HTTP message header

Identify the roles of server-side includes,Net.Data, and PHP in web applications

Describe the relationship between the IBMHTTP Server for i and Apache servers

Define Apache terms

Access the Web Administration control page

Create an HTTP server instance

Start or stop an HTTP server

Verify that a newly created HTTP serverinstance is working correctly

Identify the effect that a web application'sstructure will have on its performance

Describe the security options that are availablewhen setting up a web application

Add a directory to a web application byassociating the directory's physical name withan alias

Specify the action that the server should takewhen no index.html file is available

Configure the HTTP server to process server-side includes

Code server-side include commands

Identify important considerations when writinga CGI program

Configure the HTTP server to invoke CGIprograms

Configure the HTTP server to supportpersistent CGI transactions

Identify optional server settings that control thebehavior of a CGI program

Select the HTTP Web Administration wizard orform to change a specified server setting

Display and edit the HTTP server configurationfile

Display the Web Administration form for aspecified Apache server directive

Manta The IBM i Programming Environment Technologies Inc. 116

Topic Outline

HTTP Concepts

Configuring a Server

Adding Your Web Documents

Server-Side Includes

Using CGI Programs

Exploring Apache

Audience

This course should be taken by individualsresponsible for managing an organization's website. This audience may include webmasters,developers, and system administrators.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems. The IBM iprerequisites can be satisfied by completed thefollowing Manta series:

Introduction to the IBM i Environment

It also assumes you are familiar with TCP/IPconcepts and common applications, including FTP,DNS, and HTTP. This latter prerequisite can besatisfied by completing the following Mantacourses:

TCP/IP Fundamentals

eBusiness: From HTML to WebSphere

Reference Materials

No other materials are required to take this course.

A Student Reference Guide is available for thiscourse.

Manta The IBM i Programming Environment Technologies Inc. 117

The IBM i Programming Environment

Order Number: PIPE00

Max.Users

FirstYear

SecondYear

Later Years

1 $324 $162 $825 $486 $243 $123

Each add’l $32 $16 $8

Overview

The IBM i Programming Environment seriesintroduces you to application development on anIBM i system. The series describes theprogramming languages that are commonly usedto develop applications in the IBM i environment,as well as the tools available for developingprograms.

Emphasis is placed on the development of ILEprograms using modern tools such as RationalDeveloper for i (RDi) and the Remote SystemsExplorer (RSE). However, the legacy developmenttools PDM and SEU are also covered.

A major part of program development in the IBM ienvironment is working with Db2 for i, the databasemanagement system that is on every IBM i system.The series covers Db2 concepts and describeshow to create a database file using both SQL andDDS. You will also see the tools available forentering SQL statements and performing databasequeries.

This series also describes the advanced featuresand capabilities of ILE. The described featuresand capabilities allow you to:

More easily manage ILE programs

Write more sophisticated applications

Improve the performance of your ILEapplications

This series contains the following courses:

IBM i Application Programming Concepts

IBM i Programming Tools

ILE Program Management

IBM i Programming Environment CompetencyExam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 9-11 hours

Audience

This series is intended for application developersand programmers who are new to the IBM ienvironment. However, it can be taken by anyoneinterested in learning about the tools used todevelop programs in the IBM i environment.

Prerequisites

This series assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta The IBM i Programming Environment Technologies Inc. 118

IBM i Application Programming Concepts

Order Number: PIPE01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to applicationdevelopment on an IBM i system. The coursebegins by identifying and describing theprogramming languages that are commonly usedto develop applications in the IBM i environment,followed by a more detailed look at CL programs.Next, the course describes the ILE programdevelopment process.

The course then provides an overview of Db2 for i,the database management system that is on everyIBM i system. Next is a discussion on thedifferences between external data and programdescribed data. The course ends by describinghow to create a database file using both SQL andDDS, and how to perform a database query usingthe SQL SELECT statement.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Identify and describe the programminglanguages that are commonly used forapplication development in the IBM ienvironment

Describe how a program written in a particularprogramming language is invoked

List the advantages of packaging CLcommands into a CL program

Identify the CL statements that are commonlyused in a CL program

List the advantages offered by the ILE programdevelopment process

Describe the difference between the originalprogram model (OPM) development processand the integrated language environment (ILE)development process

List the steps required to create an executableILE program

Describe the structure of an ILE program

Identify the types of objects that can be usedas input to a bind operation

List the steps the binder performs in resolvingthe symbols referenced by a module

Identify the advantages database managementsystems offer over a traditional file system

Describe the structure of a relational databaseand use relational database terminology

Describe the Db2 implementation of arelational database

Define and use the terms related to distributeddatabase processing

Describe the processing capabilities in adistributed database environment

Identify the function and capabilities of atrigger program

Use and define referential integrity terminology

Describe the difference between external dataand program described data

Describe the characteristics of a table, giventhe SQL CREATE TABLE statement used todefine it

Describe the characteristics of a physical file,given the DDS source statements used todefine it

Describe the general structure of the SQLSELECT statement

Name and describe the most commonly usedSELECT statement clauses

Describe the results of a query, given an SQLSELECT statement

Topic Outline

Programming Languages

CL Programs

Introduction to ILE

Db2 for i

Defining a Database

SQL Queries

Manta The IBM i Programming Environment Technologies Inc. 119

Audience

This course is intended for application developersand programmers who are new to the IBM ienvironment. However, it can be taken by anyoneinterested in learning about applicationdevelopment in the IBM i environment.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

A Student Reference Guide is available for theseries that contains this course.

IBM i Programming Tools

Order Number: PIPE02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to the tools commonlyused for program and application development inthe IBM i environment.

The first two tools that are described are theRemote System Explorer (RSE) component ofRational Developer for i (RDi) and the LPEX editor,which can be launched from the RSE. You will seehow to use the RSE to work with libraries, objects,and source members on a remote IBM i system,how to use the LPEX editor to create and edit IBM isource members, and how to compile, bind, andexecute programs using the RSE.

The next two tools the course covers are theSource Entry Utility (SEU) and ProgramDevelopment Manager (PDM) components of theApplication Development Toolset (ADTS). You willsee how to use PDM to work with libraries, objects,and source members, how to use the SEU tocreate and edit IBM i source members, and how tocompile, bind, and execute programs using PDM.

Next, the course shows how to use both System iNavigator and Interactive SQL to enter andexecute SQL statements. The course ends byshowing how to use additional tools to query adatabase. These tools include Db2 Web Query fori, Query Manager, and Query for i.

Approximate Study Time: 3 hours

Manta The IBM i Programming Environment Technologies Inc. 120

Objectives

After completing this course, you should be able to:

Start RDi

Define the following RDi terms:

o Workbench

o View

o Editor

o Perspective

Access the RDI Help facility

Use the RSE to work with libraries, objects,and source members on a remote IBM isystem

Launch the RSE LPEX Editor

Use the LPEX editor to create and edit IBM isource members

Use the RSE to:

o Compile a source program

o Bind a module

o Execute a program

Use the Source Entry Utility (SEU) to createand edit IBM i source members

Use PDM to:

o Compile a source program

o Bind a module

o Execute a program

Use System i Navigator to enter and executean SQL statement

Use Interactive SQL to enter and execute anSQL statement

Use the following tools to create and run abasic query:

o Db2 Web Query for i

o Query Manager

o Query for i

Topic Outline

Introduction to RDi and the RSE

Using the LPEX Editor

Program Development using the RSE

Using the Legacy Toolset (PDM and SEU)

Creating and Running SQL Statements

Query Tools

Audience

This course is intended for application developersand programmers who are new to the IBM ienvironment. However, it can be taken by anyoneinterested in learning about the tools used todevelop programs in the IBM i environment.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.

It also assumes you are familiar with the basicconcepts of IBM i application programming. Youcan satisfy this prerequisite by successfullycompleting the previous course in this series, IBM iApplication Programming Concepts.

Reference Materials

A Student Reference Guide is available forthe series that contains this course.

Manta The IBM i Programming Environment Technologies Inc. 121

ILE Program Development

Order Number: PIPE03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the advanced features andcapabilities of the Integrated LanguageEnvironment (ILE). The features and capabilitiesdescribed in this course allow you to:

More easily manage ILE programs

Write more sophisticated applications

Improve the performance of your ILEapplications

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Use the CRTPGM command to create anexecutable program

Use the CRTSRVPGM command to bind ILEmodules into a service program

Use RSE to generate a CRTSRVPGMcommand>

Use PDM to generate a CRTSRVPGMcommand

Use binder language to define a serviceprogram with hidden procedures and/or dataitems

Use binder language to define a serviceprogram with multiple signatures

Use the UPDPGM and UPDSRVPGMcommands to replace modules in an ILEprogram without repeating a bind operation

Create a binding directory

Add an entry to a binding directory

Delete an entry from a binding directory

Describe the role that activation groups play inthe execution of an ILE application

Specify the activation group in which aprogram or service program is to run

Develop an activation group managementstrategy for an application

Topic Outline

The CRTPGM Command

Creating a Service Program

Using Binder language

Performing Updates on an ILE Program

Working with Binding Directories

Activation Group Management

Audience

This course is intended for programmers andapplication developers who would like to use themore advanced features and capabilities of theIntegrated Language Environment.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i programming conceptsand facilities. You can satisfy this prerequisite bysuccessfully completing the first two courses in thisseries:

IBM i Application Programming Concepts

IBM i Programming Tools

Manta The IBM i Programming Environment Technologies Inc. 122

The IBM i Programming EnvironmentCompetency ExamOrder Number: PIPE99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the IBM iProgramming Environment series:

IBM i Application Programming Concepts

IBM i Programming Tools

ILE Program Development

The exam is divided into two parts, one for eachcourse in the series. Successfully completing bothparts of the exam demonstrates your proficiency inthe basic skills required to develop programs in anIBM i environment.

Approximate time to complete all parts of the exam: 1 hour

Recommended Uses

This Competency Exam was designed as amastery test for the IBM i ProgrammingEnvironment series. We recommend that youtake the exam after you complete the series.Alternatively, you can take the correspondingportion of the exam when you complete eachcourse.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already knowthe material covered by a given course. If this isthe case, you should take the exam correspondingto that course. If you successfully complete theexam, you can skip the course, confident that youhave already mastered the skills it teaches.

Evaluation

The exam automatically evaluates yourperformance and reports how you did. To "pass"the exam, you must successfully work at least 80%of the exercises corresponding to each topic. Ifyou score less than 80%, you will be directed tothe appropriate course for review.

Audience

The IBM i Programming Environment series,including this exam, is intended for applicationdevelopers and programmers who are new to theIBM i environment. However, it can be taken byanyone interested in learning about the tools usedto develop programs in the IBM i environment.

Prerequisites

This series assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing the Mantaseries Introduction to the IBM i Environment.

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta Java Fundamentals Technologies Inc. 123

Java Fundamentals

Order Number: PJAV00

Max.Users

FirstYear

SecondYear

Later Years

1 $216 $108 $545 $324 $162 $81

Each add’l $22 $11 $5

Overview

The Java Fundamentals series introduces you tothe Java programming language. It describes thebasic skills needed to write, compile, and execute asimple Java program in both the IBM i and theWindows environments.

This series contains the following courses:

Introduction to Java

The Basics of Java Programming

Java Fundamentals Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 5-6 hours

Audience

This course is intended for IBM i programmers newto the Java programming language. It is alsoappropriate for anyone wanting a basic introductionto Java.

Prerequisites

This series assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.

The series course also assumes that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

Introduction to the IBM i Environment

Reference Materials

A Student Reference Guide is available for thisseries.

Manta Java Fundamentals Technologies Inc. 124

Introduction to Java

Order Number: PJAV01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to the Java programminglanguage and the Java environment.

The course begins with a brief history of Java. You willsee the features that make Java unique amongprogramming languages and learn the terms that areunique to the Java environment. The course then gives adetailed description of the Java Development Kit (JDK). Itdescribes how to download the JDK and shows how touse several of the tools that the kit provides. You will seehow to compile a Java program, execute a class, andcreate a jar file.

Next, the course describes IBM i's support for Java. Youwill see the various ways to create a Java source file in anIBM i directory. The course then describes how to startQshell, the alternative IBM i command interpreterdesigned to accept and process Java commands. You willlearn how to use a CL command to execute a class. Youwill also be introduced to the IBM Toolbox for Java, acollection of classes to assist you in writing Java programsthat access IBM i resources.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Identify the differences between Java and otherprogramming languages

Give a brief history of Java

Use and define common Java terms

Name and describe the major features of Java

Compile a Java program

Execute a Java program

Create a jar file

Use the EDTF command to create a Javasource program in an IFS directory

Start the Qshell command interpreter

Use Java Platform, SE tools on an IBM i system

Execute a class using a CL command

Describe the contents of the IBM Toolbox forJava

Topic Outline

What is Java?

The Java Development Kit

Java and IBM i

Audience

This course is intended for IBM i programmers newto the Java programming language. It is alsoappropriate for anyone wanting a basic introductionto Java.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Manta Java Fundamentals Technologies Inc. 125

The Basics of Java Programming

Order Number: PJAV02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to the Java programminglanguage. The course begins by describing basicJava syntax. In addition to learning the basic syntaxrules for coding Java statements and the basicorganization of every Java program, you will seehow to include comments in a Java program, how todeclare a class, how to code the import andpackage statements, and how to declare and invokea method. The course then takes a look at Javavariables. You will see the various data types thatJava supports and learn how to declare a Javavariable and assign a value to a Java variable.

The course next looks at the conditional executioncontrol structures — such as If/Else and Do While —that Java supports. This is followed by anintroduction to object oriented programming. Thisdiscussion uses easy-to-understand Java examplesto illustrate the concepts of encapsulation,instantiation, inheritance, and polymorphism. Next,the course looks at some of the slightly moresophisticated data structures supported by Java.These include arrays, vectors, and mutable(modifiable) strings. The course ends with adiscussion of how to work with and manipulatedates.

Approximate Study Time: 3.5 hours

Objectives

After completing this course, you should be able to:

Describe the basic syntax rules for coding Javastatements

Code comments in a Java program

Describe the basic organization of a Java sourceprogram

Declare a class

Code the import and package statements

Declare a method

Invoke a method

Name and describe the Java-supported datatypes

Declare a Java variable

Assign a value to a Java variable

Implement the following control structures in aJava program:

o If

o If/Else

o Case

o Do While

o Do Until

o For

Define the following object-oriented programming terms:

o Encapsulation

o Instantiation

o Inheritance

o Polymorphism

Code the Java statements to create an object

Code a class that can be used as an object

Use the methods in a class to manipulate acorresponding object

Define the following Java-related terms:

o Constructor

o Method overloading

o Method overriding

Declare, instantiate, and manipulate an array, avector, a mutable string, and/or a Date object

Topic Outline

Java Syntax

The Basics of Java Variables

Conditional Processing

Introduction to Object-Oriented Programming

Arrays, Vectors, and Mutable Strings

Working with Dates

Manta Java Fundamentals Technologies Inc. 126

Audience

This course is intended for IBM i programmers newto the Java programming language. It is alsoappropriate for anyone wanting a basic introductionto Java.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Finally, the course assumes you have a basicunderstanding of Java concepts and the Javaenvironment. You can satisfy this prerequisite bysuccessfully completing the first course in thisseries:

Introduction to Java

Manta Java Fundamentals Technologies Inc. 127

Java FundamentalsCompetency Exam

Order Number: PJAV99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the JavaFundamentals series:

Introduction to Java

The Basics of Java Programming

The exam is divided into two parts, one for eachcourse in the series. Successfully completing bothparts of the exam demonstrates your proficiency inthe basic skills required to write Java programs.

Approximate time to complete all parts of the exam: 40 minutes

Recommended Uses

This Competency Exam was designed as a masterytest for the Java Fundamentals series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The Java Fundamentals series, including thisexam, is intended for IBM i programmers new to theJava programming language. It is also appropriatefor anyone wanting a basic introduction to Java.

Prerequisites

This series assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have some experiencewith another programming language.

The series also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Manta Free-Form RPG Programming Technologies Inc. 128

Free-Form RPG Programming

Order Number: PFFR00

Max.Users

FirstYear

SecondYear

Later Years

1 $756 $378 $1905 $1,134 $567 $285

Each add’l $76 $38 $19

Overview

RPG IV is unique among programming languages inthat it supports two ways to enter statements. Olderversions of RPG use a fixed-format syntax, in whichthe components of a statement must be entered inspecific columns. The current version of RPGsupports this traditional syntax as well as a free-formsyntax that is similar to that used by most modernprogramming languages. It is this free-form syntaxthat is taught in this series.

The Free-Form RPG Programming series containsthe following courses:

Fundamentals of Free-Form RPG

File Processing with Free-Form RPG

Rounding Out the Essentials of Free-Form RPG

Working with Complex Data Types in Free-FormRPG

Developing a Modular Free-Form RPG Application

Developing an Interactive Program in Free-FormRPG

Advanced Free-Form RPG Programming

Free-Form RPG Programming Competency Exam

Approximate Study Time for the Entire Series: 19-25 hours

Audience

This series is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Prerequisites

All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Related Products

The Free-Form RPG Programming series isintended for new programmers who need to learnonly the free-form RPG statements. Students whoneed to learn the older, fixed-format statementsshould take the Manta RPG Programming seriesinstead. That series also discusses key differencesbetween RPG III and RPG IV.

Students who have completed the RPGProgramming series (or who already know RPG,including the free-form C specs introduced in 2001)can take the Programming Free-Form RPG courseto learn the free-form H, F, D, and P specsintroduced in 2014.

IBM has announced that the free-form RPGstatements will never be supported in SEU, theSource Entry Utility. We recommend that RPGdevelopers use Rational Developer for i (RDi),which is covered in the Manta series of the samename. RDi contains prompting and help facilitiesexpressly designed for the free-form RPGprogrammer.

This series covers the standard, record-oriented I/Othat is supported by RPG. Today, mostorganizations use embedded SQL statements inaddition to – or instead of – the RPG I/O op codes.Using embedded SQL is covered in the MantaUsing Structured Query Language (SQL) series.

Both Rational Developer for i (RDi) and UsingStructured Query Language (SQL) can be takenbefore, during, or after the Free-Form RPGProgramming series. The IBM i ProgrammingEnvironment series, which is a prerequisite to thisone, introduces both RDi and SQL at a levelsufficient to complete this series.

Manta Free-Form RPG Programming Technologies Inc. 129

Fundamentals of Free-Form RPG

Order Number: PFFR01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to the RPG IVprogramming language.

The course begins by describing the general codingrequirements of an RPG program. In doing so, itdiscusses the different types of RPG statements anddefines common RPG terms. A sample RPGprogram is illustrated.

The course then takes a detailed look at thestatements used to define various types of dataitems. Next, it examines the statements used toassign a value to a data item, perform arithmeticoperations, and perform character-stringmanipulation. The statements used to implementstructured programming control structures arecovered next. The course ends by describing thedirectives available to control the behavior of the ILERPG compiler.

Approximate Study Time: 3.5 hours

Objectives

After completing this course, you should be able to:

Use RPG terminology

Name the seven RPG specification types anddescribe the function of each

Describe the format rules for free-form RPGstatements

Identify the rules for RPG statement continuation

Code a cycle-main module and a linear-mainmodule

Code the definition specification for a stand-alone field, a named constant, and a datastructure

Name and use the RPG operation codes thatassign a value to a data item

Code the IF, IF/ELSE, DO UNTIL, DO WHILE,SELECT, and FOR structures in an RPGprogram

Code the RPG statements used to exit from aprogram

Name the most commonly used RPG compilerdirectives and describe the function of each

Topic Outline

Introduction to RPG

A Sample RPG Program

Definition Specifications

Manipulating Data Items

Conditional Processing

Compiler Directives

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

The course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Manta Free-Form RPG Programming Technologies Inc. 130

File Processing with Free-Form RPG

Order Number: PFFR02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to process database andprinter files in an RPG program.

The course first shows how to code the filespecification for a database file. The course thencovers the various RPG op codes that are used toprocess a database file. You will see how to performbasic file operations, such as how to read records(both sequentially and randomly), update a record,delete a record, and add a record to a file. You willalso see how to perform more advanced fileoperations, such as how to set the file positionwithout reading a record, how to use a compositekey, and how to release a locked record.

The course then describes the various ways for anRPG program to detect an error condition and theways to obtain information as to the cause of theerror. The course ends by showing you how to codean RPG program that uses commitment control.

Approximate Study Time: 2.5 hours

Objectives

After completing this course, you should be able to:

Code the file specification for both a databaseand printer file

Identify the F-spec keyword used to specify agiven database or printer file attribute

Detect an error condition in an RPG program

Obtain information pertaining to a file error

Code RPG programs that perform the followingfile processing:

o Reads records (either sequentially orrandomly) from a file

o Updates records in a file

o Deletes records from a file

o Adds records to a file

o Sets the file position without reading arecord

o Processes the group of records with thesame key value

o Uses a composite key to access records

o Releases a record previously locked forupdate

o Opens and closes a file

o Forces file changes to auxiliary storage

Code an RPG program that uses commitmentcontrol

Topic Outline

Coding File Specifications

Basic Database File Processing

Advanced Database File Processing

Error Processing

Using Commitment Control

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have a basicunderstanding of RPG programming concepts. Youcan satisfy this prerequisite by successfullycompleting the first course in this series:

RPG Fundamentals

Manta Free-Form RPG Programming Technologies Inc. 131

Rounding Out the Essentials of Free-Form RPG

Order Number: PFFR03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course rounds out your basic RPG coding skills.These skills, along with those you acquired by takingthe first two courses in the Free-Form RPGProgramming series, are the foundation on whichlater courses in the series will build.

The course begins by identifying the type ofinformation that can be provided on a control (orheader) specification and showing you how to codea CTL-OPT statement.

Next, the course considers built-in functions and thevarious operations they perform. It then describesthe date and time processing capabilities built intothe RPG IV language.

You will then see how to code a subroutine and howto call it from other routines. The course ends bydescribing how to detect error conditions, and how toobtain status information that indicates the cause ofan error.

Approximate Study Time: 2.5 hours

Objectives

After completing this course, you should be able to:

Code a control specification

Identify the control specification keyword used tospecify a given piece of information

Identify the RPG built-in function used toperform a specified operation

Code an RPG program that manipulates date ortime fields in the following ways:

o Compares two date or time fields

o Performs date or time arithmetic

o Converts a date or time field from one format to another

o Extracts a portion of a date, time, or timestamp field

o Verifies that the contents of a date, time, or timestamp field are valid

Call a subroutine in an RPG program

Code a subroutine in an RPG program

Detect an error condition in an RPG program

Obtain information that indicates the cause of anerror

Topic Outline

The Control (Header) Specification

RPG Built-In Functions

Working with Dates and Times

Using Subroutines

Program Error Processing

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

The course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

In addition, the course assumes that you have anunderstanding of basic RPG programming conceptsand RPG file processing capabilities. You cansatisfy this prerequisite by successfully completingthe first two courses in this series:

Fundamentals of Free-Form RPG

File Processing with Free-Form RPG

Manta Free-Form RPG Programming Technologies Inc. 132

Working with Complex Data Types in Free-Form RPG

Order Number: PFFR04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to define and work withthe more complex data types that RPG supports.

The course begins by describing how to define andwork with variable-length data items. Arrays arecovered next. You will see how to define, initialize,modify, search, and sort an array. The course thendescribes how to load a compile-time array byincluding the array data at the end of the sourcemodule. RPG tables are discussed next. As you willsee, tables are defined and processed differentlythan arrays. The course ends by describing arraydata structures and multiple-occurrence datastructures. You will see how to define each and howto reference the data that they contain.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Define variable-length data items

Code an RPG program that uses variable-lengthdata items

Define an array and a table

Define and load a compile-time array or table

Code an RPG program that processes an arrayor table

Define an array data structure and a multiple-occurrence data structure

Code an RPG program that processes an arraydata structure or a multiple-occurrence datastructure

Topic Outline

Using Variable-Length Data Items

Using Arrays

Using Compile-Time Arrays

Using Tables

Array and Multiple-Occurrence DataStructures

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This also course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:

Fundamentals of Free-Form RPG

File Processing with Free-Form RPG

Rounding Out the Essentials of Free-Form RPG

Manta Free-Form RPG Programming Technologies Inc. 133

Developing a Modular Application in Free-Form RPG

Order Number: PFFR05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers how to code and call proceduresand subprograms in RPG.

The course first describes the concepts related toprocedures and subprograms, including how theyshare data. Next, the course describes how to codeand to call a subprocedure. User-defined functionsare covered next, followed by external proceduresand subprograms.

You will then see how to make data items and filesavailable to other procedures by making themglobal. The course also describes how the differencebetween automatic and static storage determineswhat happens to data items and files when aprocedure is called repeatedly. Included in this topicis a discussion of RPG facilities for keeping suchresources in static storage.

Finally, the course covers advanced topics related toprocedures and subprograms. You will see how toaccept parameters in a main program, how to code aprocedure that accepts a variable number ofparameters or a variable-length parameter, and howto pass a file to a procedure.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Identify the advantages of modularizing anapplication

Identify and describe the methods that can beused to modularize an application

Describe the techniques that can be used toallow a calling program or

procedure to communicate with a subprogram orcalled procedure

Describe the requirements of a prototyped call

Code a prototype definition

Code a subprocedure, external procedure, orsubprogram

Call a subprocedure, external procedure, orsubprogram

Code a user-defined function

Invoke a user-defined function

Distinguish between local and global files anddata items

Export and import data items

Distinguish between static and automaticstorage

Define a local variable that is kept in staticstorage

Describe how an RPG program or procedurecontrols whether the value of a data item isretained between calls

Define a file whose control information is kept instatic storage

Code a main program that accepts parameters

Code a procedure that accepts a variablenumber of parameters, including no parameters

Code the keywords to trim and adjust parametervalues

Code a procedure that accepts a variable-lengthparameter

Pass a file to a procedure

Topic Outline

Developing a Modular Application

Coding and Using a Procedure

User-Defined Functions

External Procedures and Subprograms

Scope of Definitions

Advanced Parameter Considerations

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Manta Free-Form RPG Programming Technologies Inc. 134

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:

Fundamentals of Free-Form RPG

File Processing with Free-Form RPG

Rounding Out the Essentials of Free-Form RPG

Working with Complex Data Types in Free-FormRPG

Developing an Interactive Program inFree-Form RPG

Order Number: PFFR06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create an interactiveapplication, in which an RPG program gets datafrom, and displays results to, a user at a traditionalgreen-screen workstation. While such programs arerarely written from scratch any more, programmersneed to understand the logic of such programs inorder to maintain them or to covert them to web-based applications.

The course begins by describing the role a displayfile plays in an interactive application and how adisplay file is created. You will see the datadescription specifications (DDS) source statementsmost commonly used for a display file. The coursethen considers the requirements for an interactiveRPG program. You will see how to code the filespecification for a display file and how to displaydata at, and receive data from, a workstation.

The remainder of the course is devoted to the topicof subfiles. After being introduced to the conceptsrelated to subfiles, you will see the DDS statementsused to define a load-all subfile. You will then seehow to code an RPG program to load and display asubfile. The course next uses DDS and RPGprogram examples to illustrate the differencesbetween load-all, expanding, and single-pagesubfiles. You will also see how to code an RPGprogram that reads and updates the records in asubfile.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Interpret the DDS statements used to define adisplay file

Use the CRTDSPF command to create a displayfile from DDS source

Code the file specification for a display file

Use the EXFMT, READ, and WRITE op codesto send data to and receive data from aworkstation user

Manta Free-Form RPG Programming Technologies Inc. 135

Use indicators to determine if a special-purposekey, such as a function key, was pressed

Interpret the DDS statements used to define asubfile

Code the RPG statements to define, load, anddisplay a subfile

Describe the differences between a load-allsubfile, an expanding subfile, and a single-pagesubfile

Describe the differences between the DDS for aload-all subfile, an expanding subfile, and asingle-page subfile

Code the RPG statements to read subfilerecords

Code the RPG statement to update a subfilerecord

Topic Outline

Creating a Display File

Coding an Interactive Program

Introduction to Subfiles

Using Expanding and Single-Page Subfiles

Reading and Updating Subfile Records

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:

Fundamentals of Free-Form RPG

File Processing with Free-Form RPG

Rounding Out the Essentials of Free-Form RPG

Developing a Modular Free-Form RPGApplication

Manta Free-Form RPG Programming Technologies Inc. 136

Advanced Free-Form RPG Programming

Order Number: PFFR07

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes advanced RPG codingtechniques involving the use of data areas, pointers,dynamic storage, null-capable fields, and outputspecifications.

The course begins by describing how an RPGprogram can access and modify a data area. Next,you will see how to define and use pointers in anRPG program. The course then shows how an RPGprogram can acquire, use, and free dynamic storageand how to process null-capable fields within anRPG program. The course ends by describing howto code the output specifications for a program-described printer file.

Approximate Study Time: 2.5 hours

Objectives

After completing this course, you should be able to:

Access the contents of a data area

Change the contents of a data area

Define and use a basing pointer data item

Define and use a procedure pointer data item

Use the %ALLOC built-in function to acquiredynamic storage

Use the DEALLOC op code to free previouslyacquired dynamic storage

Use the %REALLOC built-in function to changethe length of previously acquired dynamicstorage

Use the ALWNULL control specification tocontrol whether a program can read from and/orwrite to files containing null-capable fields

Identify a data item as being null capable

Use the %NULLIND built-in function todetermine whether a null-capable field containsa null value

Pass a null-capable field and its null-byte map toa program or procedure

Identify and describe the F-spec keywords thatare used with printer files

Use the EXCEPT op code to write records to aprogram-described printer file

Code the output specifications for a program-described printer file

Topic Outline

Using Data Areas

Using Pointers

Acquiring and Using Dynamic Storage

Processing Null-Capable Fields

Using Program-Described Printer Files

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

In addition, the course assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the first five courses of this series:

Fundamentals of Free-Form RPG

File Processing with Free-Form RPG

Rounding Out the Essentials of Free-Form RPG

Working with Complex Data Types in Free-FormRPG

Developing a Modular Free-Form RPGApplication

Manta Free-Form RPG Programming Technologies Inc. 137

Free-Form RPG Programming Competency ExamOrder Number: PFFR99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the Free-Form RPG Programming series:

Fundamentals of Free-Form RPG

File Processing with Free-Form RPG

Rounding Out the Essentials of Free-Form RPG

Working with Complex Data Types in Free-FormRPG

Developing a Modular Free-Form RPGApplication

Developing an Interactive Program in Free-FormRPG

Advanced Free-Form RPG Programming

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to develop free-form RPGapplications.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the Free-Form RPG Programming series.We recommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than

80%, you will be directed to the appropriate sessionfor review.

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IVand by RPG IV programmers who want to learn thefree-form syntax.

Prerequisites

All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.

These courses also assume that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

Finally, the courses in this series also assume youfamiliar with IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

The IBM i Programming Environment

Reference Materials

While no other materials are required to take thisexam, you will be asked to do extensive RPGcoding. It is recommended that you have one of thefollowing reference sources available when takingthe exam:

The ILE RPG Language Reference manual

Access to the IBM i Knowledge Center

This Manta Student Reference Guide for theFree-Form RPG Programming series

Manta RPG Programming Technologies Inc. 138

RPG Programming

Order Number: PRPG00

Max.Users

FirstYear

SecondYear

Later Years

1 $756 $378 $1905 $1,134 $567 $285

Each add’l $76 $38 $19

Overview

The RPG Programming series covers thedevelopment of ILE RPG applications on an IBM isystem.

This series contains the following courses:

RPG Fundamentals

RPG File Processing

Rounding Out The Essentials of RPG

Working with Complex Data Types

Developing a Modular RPG Application

Developing an Interactive RPG Program

Advanced RPG Programming

RPG Programming Competency Exam

Approximate Study Time for the Entire Series: 17-24 hours

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.

Prerequisites

All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.

These courses also assume that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

Finally, the courses in this series also assume youfamiliar with IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

The IBM i Programming Environment

Reference Materials

A Student Reference Guide is available for thisseries.

Manta RPG Programming Technologies Inc. 139

RPG Fundamentals

Order Number: PRPG01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to the RPG IVprogramming language.

The course begins by describing the general codingrequirements of an RPG program. In doing so, itdiscusses the different specification types of RPGstatements and defines common RPG terms.

The course then shows how to use the Source EntryUtility (SEU). You will see how to use the SEUprompting facility to enter the source code for anRPG program. You will also see how the SEUsyntax checker works.

Next, the course takes a detailed look at thedefinition specification, which is used to definevarious types of data items. The course thenexamines the calculation specification in depth, andcovers the op codes used to assign a value to a dataitem, perform arithmetic operations, and performcharacter string manipulation. The op codes used toimplement IF, IF/ELSE, and DO WHILE logicstructures are covered next. The course ends bydescribing some additional coding considerations,such as how to continue an RPG statement and howto exit from an RPG program.

Approximate Study Time: 2.5 hours

Objectives

After completing this course, you should be able to:

Name the seven RPG specification types anddescribe the function of each

Use RPG terminology

Identify the rules for RPG statementcontinuation

Name the most commonly used RPG compilerdirectives and describe the function of each

Use the LPEX editor's prompting facility to enterRPG statements

Use the SEU's prompting facility to enter RPGstatements

Name and describe the various data typessupported by RPG

Code the definition specification for a stand-alone field, a named constant, and a datastructure

Name and use the RPG op codes that assign avalue to a data item

Code an IF structure in an RPG program

Code an IF/ELSE structure in an RPG program

Code a DO WHILE structure in an RPGprogram

Code the RPG statements used to exit from aprogram

Topic Outline

Introduction to RPG

Using the LPEX Editor and SEU PromptingFacilities

Definition Specifications

Manipulating Data Items

Conditional Processing

Additional RPG Coding Considerations

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Manta RPG Programming Technologies Inc. 140

RPG File Processing

Order Number: PRPG02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to process database andprinter files in an RPG program.

The course first shows how to code the filespecification for a database file. The course thencovers the various RPG op codes that are used toprocess a database file. You will see how to performbasic file operations, such as how to read records(both sequentially and randomly), update a record,delete a record, and add a record to a file. You willalso see how to perform more advanced fileoperations, such as how to set the file positionwithout reading a record, how to use a compositekey, and how to release a locked record.

The course then describes the various ways for anRPG program to detect an error condition and theways to obtain information as to the cause of theerror. Next, you will see how to code an RPGprogram that uses commitment control. The courseends by covering the coding requirements of aprogram that produces printed output.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Code the file specification for both a databaseand printer file

Identify the F-spec keyword used to specify agiven database or printer file attribute

Detect an error condition in an RPG program

Obtain information pertaining to a file error

Code RPG programs that perform the followingfile processing:

o Read records (either sequentially orrandomly) from a file

o Update records in a file

o Delete records from a file

o Add records to a file

o Set the file position without reading a record

o Process the group of records with the samekey value

o Use a composite key to access records

o Release a record previously locked forupdate

o Open and close a file

o Force file changes to auxiliary storage

o Write records to a program-described printerfile

Code an RPG program that uses commitmentcontrol

Code the output specifications for a program-described printer file

Topic Outline

Coding File Specifications

Basic Database File Processing

Advanced Database File Processing

Error Processing

Using Commitment Control

Producing Printed Output

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.

Manta RPG Programming Technologies Inc. 141

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have a basicunderstanding of RPG programming concepts. Youcan satisfy this prerequisite by successfullycompleting the first course in this series:

RPG Fundamentals

Rounding Out the Essentials of RPG

Order Number: PRPG03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course rounds out your basic RPG coding skills.These skills, along with those you acquired by takingthe first two courses in the RPG Programmingseries, are the foundation on which later courses inthe series will build.

The course begins by identifying the type ofinformation that can be provided on a headerspecification and showing you how to code an H-spec.

Next, the course shows how to use subroutines tomodularize a program. You will see how to code asubroutine and how to call it from other routines.The course then considers built-in functions and thevarious operations they perform.

Next, the course describes the date processingcapabilities built into the RPG IV language. Thecourse ends by describing the obsolete languagefeatures you are most likely to encounter whenmodifying and maintaining existing RPG programs.

Approximate Study Time: 2 hours

Manta RPG Programming Technologies Inc. 142

Objectives

After completing this course, you should be able to:

Code a header specification

Identify the header specification keyword usedto specify a given piece of information

Call a subroutine in an RPG program

Code a subroutine in an RPG program

Identify the RPG built-in function used toperform a specified operation

Code an RPG program that manipulates date ortime fields in the following ways:

Compares two date or time fields

Performs date or time arithmetic

Converts a date or time field from oneformat to another

Extracts a portion of a date, time, ortimestamp field

Verifies that the contents of a date, time, ortimestamp field are valid

Identify the coding differences between a fixed-format C-spec and a free-format C-spec

Describe how indicators are used to detectvarious exception and error conditions

Given an obsolete RPG op code, identify itsfunction

Topic Outline

The Header (Control) Specification

Using Subroutines

RPG Built-In Functions

Working with Dates and Times

Obsolete Language Elements and Op Codes

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who want to learn RPG IV.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have aunderstanding of basic RPG programming conceptsand RPG file processing capabilities. You cansatisfy this prerequisite by successfully completingthe first two course in this series:

RPG Fundamentals

RPG File Processing

Manta RPG Programming Technologies Inc. 143

Working with Complex Data Types

Order Number: PRPG04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to define and work withthe more complex data types that RPG supports.The course begins by describing how to define andwork with variable-length data items. Run-timearrays are covered next. You will see how todefine, initialize, modify, search, and sort a run-timearray. The course then describes how to define andload two other types of arrays: compile-time andprerun-time arrays. This is followed by a discussionof RPG tables. You will see how to both define andwork with tables. The course ends by describingmultiple-occurrence data structures. You will seehow to define a multiple-occurrence data structureand how to reference the data that it contains.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Define a variable-length data item

Code an RPG program that uses variable-length data items

Define a run-time array

Define a compile-time array

Define a prerun-time array

Code an RPG program that processes an array

Define a table

Code an RPG program that processes a table

Define a multiple-occurrence data structure

Code an RPG program that processes amultiple-occurrence data structure

Topic Outline

Using Variable-Length Data Items

Using Run-Time Array

Using Compile-Time and Prerun-Time Arrays

Using Tables

Using Multiple-Occurrence Data Structures

Audience

This course is intended for programmers new to theRPG programming language. It can also be takenby RPG III programmers who will be developing ILERPG applications.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses in this series:

RPG Fundamentals

RPG File Processing

Rounding Out the Essentials of RPG

Manta RPG Programming Technologies Inc. 144

Developing a Modular RPG Application

Order Number: PRPG05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers how to code and callsubprograms and procedures in RPG.

The course first describes the concepts related tosubprograms and procedures. You will beintroduced to the two types of procedures andsubprograms (prototyped and non-prototyped) andsee how programs and procedures share data.Next, the course describes how to code and to call aprototyped procedure or subprogram.Subprocedures and user-defined functions arecovered next.

The course then shows how to code and to call non-prototyped procedures and subprograms. Thisdiscussion includes how to define a parameter list topass and accept parameters.

You will then see the coding requirements for alinear-main module. A linear-main module is onethat includes a main procedure but does not includethe code for the program cycle. Finally, the coursecovers advanced topics related to procedures andsubprograms. You will see how to acceptparameters in a main program, how to code aprocedure that accepts a variable number ofparameters or a variable-length parameter, and howto export and import data items.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should beable to:

Identify the advantages of modularizing anapplication

Identify and describe the methods that can beused to modularize an application

Describe the techniques that can be used toallow a calling program or procedure tocommunicate with a subprogram or calledprocedure

Describe the differences between a prototypedand non-prototyped call

Code a prototype definition

Code a prototyped procedure or subprogram

Call a prototyped procedure or subprogram

Code a subprocedure

Code a user-defined function

Invoke a user-defined function

Identify the op codes used to:

o Call a non-prototyped subprogram

o Call a non-prototyped procedure

o Define a parameter list for a non-prototypedcall

Identify and describe the three types of RPGmodules

Identify and describe the coding requirementsfor a linear-main module

Code a main program that accepts parameters

Code a procedure that accepts a variablenumber of parameters

Code a procedure that accepts a variable-length parameter

Define a local variable that is stored in staticstorage

Export and import data items

Manta RPG Programming Technologies Inc. 145

Topic Outline

Using Subprograms and Procedures

Prototyped Procedures and Subprograms

Coding a Subprocedure

Non-Prototyped Subprograms and Procedures

Coding a Linear-Main Module

Advanced Topics

Audience

This course is intended for IBM i programmers newto the RPG programming language. It can also betaken by RPG III programmers who want to learnRPG IV.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:

RPG Fundamentals

RPG File Processing

Rounding Out the Essentials of RPG

Working with Complex Data Types

Developing an Interactive RPG Program

Order Number: PRPG06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create an interactiveapplication.

The course begins by describing the role a displayfile plays in an interactive application and how adisplay file is created. You will see the datadescription specifications (DDS) source statementsmost commonly used for a display file. The coursethen considers the requirements for an interactiveRPG program. You will see how to code the F-specfor a display file and how to display data at, andreceive data from, a workstation.

The remainder of the course is devoted to the topicof subfiles. After being introduced to the conceptsrelated to subfiles, you will see the DDS statementsused to define a load-all subfile. You will then seehow to code an RPG program to load and display asubfile. The course next uses DDS and RPGprogram examples to illustrate the differencesbetween load-all, expanding, and single-pagesubfiles. You will also see how to code an RPGprogram that reads and updates the records in asubfile.

Approximate Study Time: 2 hours

Manta RPG Programming Technologies Inc. 146

Objectives

After completing this course, you should beable to:

Interpret the DDS statements used to define adisplay file

Use the CRTDSPF command to create adisplay file from DDS source

Code the F-spec for a display file

Use the EXFMT, READ, and WRITE op codesto send data to and receive data from aworkstation user

Use indicators to determine if a special-purposekey, such as a function key, was pressed

Interpret the DDS statements used to define asubfile

Code the RPG statements to define, load, anddisplay a subfile

Describe how a load-all subfile, an expandingsubfile, and a single-page subfile differ

Describe how the DDS for a load-all subfile, anexpanding subfile, and a single-page subfilediffers

Code the RPG statements to read subfilerecords

Code the RPG statement to update a subfilerecord

Topic Outline

Creating a Display File

Coding an Interactive Program

Introduction to Subfiles

Using Expanding and Single-Page Subfiles

Reading and Updating Subfile Records

Audience

This course is intended for IBM i programmers newto the RPG programming language. It can also betaken by RPG III programmers who want to learnRPG IV.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the previous courses of this series:

RPG Fundamentals

RPG File Processing

Rounding Out the Essentials of RPG

Working with Complex Data Types

Developing a Modular RPG Application

Manta RPG Programming Technologies Inc. 147

Advanced RPG Programming

Order Number: PRPG07

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes advanced RPG codingtechniques.

The course begins by describing how an RPGprogram can access and modify a data area. Next,you will see how to detect error conditions, and howto obtain status information that indicates the causeof the error. The course then shows how to defineand use pointers in an RPG program. The courseends by describing how an RPG program canacquire, use, and free dynamic storage.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Access the contents of a data area

Change the contents of a data area

Detect an error condition in an RPG program

Obtain information that indicates the cause ofan error

Define and use a basing pointer data item

Define and use a procedure pointer data item

Use the %ALLOC built-in function to acquiredynamic storage

Use the DEALLOC statement to free previouslyacquired dynamic storage

Use the %REALLOC built-in function to changethe length of previously acquired dynamicstorage

Topic Outline

Using Data Areas

Error Processing

Using Pointers

Acquiring and Using Dynamic Storage

Audience

This course is intended for IBM i programmers newto the RPG programming language. It can also betaken by RPG III programmers who want to learnRPG IV.

Prerequisites

This course assumes that you are familiar withcomputer programming concepts. In order to satisfythis prerequisite, you should have someprogramming experience with another programminglanguage.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

In addition, the course also assumes you familiarwith IBM i programming concepts and facilities. Youcan satisfy this prerequisite by successfullycompleting the courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have anunderstanding of the basics of RPG programming.You can satisfy this prerequisite by successfullycompleting the first five courses of this series:

RPG Fundamentals

RPG File Processing

Rounding Out the Essentials of RPG

Working with Complex Data Types

Developing a Modular RPG Application

Manta RPG Programming Technologies Inc. 148

RPG Programming Competency ExamOrder Number: PRPG99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the RPGProgramming series:

RPG Fundamentals

RPG File Processing

Rounding Out The Essentials of RPG

Working with Complex Data Types

Developing a Modular RPG Application

Developing an Interactive RPG Program

Advanced RPG Programming

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to develop ILE RPGapplications.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the RPG Programming series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate sessionfor review.

Audience

The RPG Programming series, including this exam,is intended for programmers new to the RPGprogramming language. It can also be taken byRPG III programmers who want to learn RPG IV.

Prerequisites

All courses in this series assume that you arefamiliar with computer programming concepts. Inorder to satisfy this prerequisite, you should havesome programming experience with anotherprogramming language.

These courses also assume that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following Mantaseries:

Introduction to the IBM i Environment

Finally, the courses in this series also assume youfamiliar with IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

The IBM i Programming Environment

Manta Coding Free-Form RPG Technologies Inc. 149

Coding Free-Form RPG

Order Number: PRPG11

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

RPG has undergone numerous enhancementsduring the last fifty years. A major theme of theenhancements has been to make the languageeasier to learn and code. The most recent changes,called free-form RPG, continue this trend. In anutshell, free-form RPG removes the strict columnrequirements for most RPG statements. As withmany newer languages, statements can spanmultiple lines and begin in any column. In additionto making the language easier to use by existingRPG programmers, the enhancements make itpossible for programmers with experience in otherlanguages to become productive more readily,especially when performing maintenance work.

This course begins with an overview of free-formRPG and how the enhancements continue a trendthat has been going on for years. The coding detailsfor free-form H, F, D, and P specs are then covered.You will see how to code the new statements andhow they compare to those with which you arealready familiar. The course ends with a discussionof the tools available to write programs using thenew format and to convert existing programs to usethe free-form statements.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be ableto:

Describe the general rules for coding free-formRPG statements

Given an existing RPG IV statement, code theequivalent statement using free-form RPG

Given a description of a program's generalrequirements, code an H spec using free-formRPG

Given a description of a file to be used by aprogram, code the corresponding F spec usingfree-form RPG

Given a description of a stand-alone field, anamed constant, and a data structure to be usedby a program, code the corresponding D specsusing free-form RPG

Given a description of a procedure to be used bya program, code the procedure's P spec,procedure interface, and prototype definitionusing free-form RPG

Describe the support for free-form RPGstatements available in the Source-Entry Utility(SEU) and Rational Developer for i (RDi).

Identify software available to convert existingRPG programs to use free-form statementswhere possible.

Topic Outline

Introduction to Free-Form RPG

Free-Form H Specs

Free-Form F Specs

Free-Form D Specs

Free-Form P Specs and Procedure Prototypes

Programming Tools

Competency Exam

Audience

This course is intended for both experienced RPGprogrammers and those programmers who are newto the language.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities. Italso assumes that you can write and compile RPGIV programs on an IBM i system. You can satisfythese prerequisites by successfully completing thecourses in the following Manta series:

Introduction to the IBM i Environment

The IBM i Programming Environment

RPG Programming

Reference Materials

A Student Reference Guide is available for thiscourse.

Manta Using Screen Design Aid (ADA) Technologies Inc. 150

Using Screen Design Aid (SDA)

Order Number: PSDA01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to the Screen DesignAid (SDA), which is part of the ApplicationDevelopment Toolset program product.

The course begins with an introduction to displayfiles and the Data Description Specifications (DDS)used to create them. While you do not need anextensive knowledge of DDS in order to use SDA, abasic knowledge of DDS for display files makes iteasier to understand the choices you have whenusing SDA.

Next, the course walks you through the process ofusing SDA to design screens.

The course then describes how to use SDA to createa *MENU object, define a subfile, and associateonline help with a display or menu.

The course ends by describing some additionalfunctions and capabilities of SDA, including itsdisplay test function, and its support for definingwindows.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able touse SDA to:

Design a display

Create a display file

Define the fields on a display

Specify field-, record-, and file-level keywords

Assign indicators to fields

Make modifications to a screen design

Create a menu display

Create a *MENU object

Define a subfile

Generate help specifications

Create online help for a menu

Test a display file

Create a window display

Design a display that includes the current date,current time, system name, and/or user profilename for the current job

Topic Outline

Introduction to Display Files, DDS, and SDA

Creating a Basic Display File

Rounding Out the Essentials

Creating a Menu

Creating Subfiles

Online Help

Additional Capabilities

Audience

This course is intended primarily for programmersbut can be taken by anyone who will be using SDAto design screens and create display files.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities and programming in theIBM i environment. You can satisfy this prerequisiteby successfully completing the following Mantaseries:

Introduction to the IBM i Environment

The IBM i Programming Environment

Reference Materials

A Student Reference Guide is available for thiscourse.

Manta Using the ILE Source-Level Debugger

Technologies Inc. 151

Using the ILE Source-Level Debugger

Order Number: PILE06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to use the ILE source-level debugger to debug a program interactively. Itshows how to set breakpoints (both unconditionaland conditional), display the value of a data item,change the value of a data item, and step through aprogram one statement at a time. It covers all of thedebugging functions provided by the debugger, boththose implemented using debugging commands andthose implemented using function keys.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Define and use the terms related to the ILEsource-level debugger, such as debug mode,debug data, and debug view

Name and describe the different debug viewsthat can be generated when creating a module

Start the ILE source-level debugger by placingyour interactive job in debug mode

Set both unconditional and conditionalbreakpoints in a program

Display the current contents of a data item

Change the contents of a data item

Step through a program one statement at atime

Use a watch condition to stop programexecution when the value of a data item ischanged

Add programs to and remove programs fromdebug mode

Define and use abbreviations for a data itemname, an expression, or a debug commandwhile debugging a program

Topic Outline

Introduction to the ILE Source-Level Debugger

Sample Debugging Session

Using Breakpoints

Displaying and Changing Data Items

Stepping Through a Program

Additional Debugging Functions

Audience

This course is intended for anyone who will bedeveloping ILE programs in the IBM i environment.

Prerequisites

This course assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Manta Working with Db2 Databases

Technologies Inc. 152

Working with Db2 Databases

Order Number: PDBP00

Max.Users

FirstYear

SecondYear

Later Years

1 $648 $324 $1625 $972 $486 $243

Each add’l $65 $32 $16

Overview

The Working with Db2 Databases series coversDb2 for i, the relational database managementsystem that is part of every IBM i system. This seriescontains the following courses:

Introduction to Db2

Creating and Managing Physical Files

Creating and Managing Logical Files

Processing a Db2 Database

Using Triggers

Using Referential Integrity

Working with Db2 Databases CompetencyExam

The first course in the series describes basic Db2concepts. It also looks at the products and tools thatare used with a Db2 database, including those usedin a distributed database environment.

The next two courses in the series describe how todefine, create, and manage the physical and logicalfiles in a Db2 database. The fourth course describesthe capabilities of an application that processes filesin a Db2 database and, in doing so, takes a detailedlook at the OVRDBF, OPNDBF, and OPNQRYFcommands.

The last two courses cover two advanced databasetopics. You will see how to code and use triggerprograms and how to implement referential integrityin a Db2 database.

Approximate Study Time for the Entire Series: 10-14 hours

Audience

The first course in the series, Introduction to Db2,should be taken by everyone who needs anunderstanding of relational databases. Theremaining courses are for the programmer who willcreate, maintain, and develop applications thatprocess Db2 databases.

Prerequisites

All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the seriesIntroduction to the IBM i Environment.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta Working with Db2 Databases

Technologies Inc. 153

Introduction to Db2

Order Number: PDBP01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you to Db2, the relationaldatabase management system that is part of everyIBM i system. The course begins by describingbasic database concepts, focusing in particular onrelational databases. It then describes the Db2implementation of a relational database. The courseprovides a detailed description of physical files,logical files, and the products and tools that are usedwith a Db2 database. It ends with a description ofthe tools and products that are used in a distributeddatabase environment.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Identify the advantages database managementsystems offer over a traditional file system

Describe the structure of a relational databaseand use relational database terminology

Describe the Db2 implementation of a relationaldatabase

Name and describe the types of physical filesand logical files that IBM i supports

Describe the structure of a physical file and alogical file

Identify the different ways in which a physicalfile and a logical file can be defined and created

Identify and describe the tools available to auser for accessing a Db2 database

Identify and describe the different ways in whichan application program can access a Db2database

Describe the processing capabilities in adistributed database environment

Describe the functions and capabilities of thevarious tools and products available for adistributed database environment

Identify the function and capabilities of a triggerprogram

Topic Outline

Db2 Concepts

Physical Files

Logical Files

Accessing a Database

Database Tools and Products

Audience

This course is intended for anyone who will beworking with a Db2 database. This audienceincludes:

Programmers and application developers whowill be creating Db2 databases and developingapplications that process Db2 databases

System administrators who will be responsiblefor managing a Db2 database

Managers and other users who will be definingand running database queries

The course is also recommended for anyone whowants to learn Db2 concepts and capabilities.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series.

Manta Working with Db2 Databases

Technologies Inc. 154

Creating and Managing Physical Files

Order Number: PDBP02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create and managethe physical files in a Db2 database. The coursebegins by describing the basics of DDS coding andhow to create a DDS source member. It then covershow to define a physical file using DDS. Next, thecourse shows how to use the CRTPF command tocreate a physical file from DDS, and how to use theCRTSRCPF command to create a source physicalfile. The course then describes field reference files.It shows how to both create and use a fieldreference file. The course ends by showing how toperform various management and maintenancetasks on physical files.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Use the SEU to create a DDS source member

Code the DDS statements to define a dataphysical file

Use PDM to create a data physical file fromDDS source

Use the CRTPF command to create a dataphysical file from DDS source

Use the CRTSRCPF command to create asource physical file

Define and create a field reference file

Use field referencing when defining a physicalfile

Display the attributes of a physical file

Change the attributes of a physical file

Delete, copy, move, or rename a physical file

Reorganize a physical file

Add a member to a physical file

Remove a member from a physical file

Rename a member in a physical file

Topic Outline

DDS Basics

Defining a Data Physical File

Creating a Physical File

Using a Field Reference File

Working with Physical Files

Audience

This course is intended for programmers andapplication developers who will be creating Db2databases. It should also be taken by anyone whowill be creating and/or managing physical files.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2.

Manta Working with Db2 Databases

Technologies Inc. 155

Creating and Managing Logical Files

Order Number: PDBP03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create and managethe logical files in a Db2 database. The coursebegins by describing how to use DDS statementsdefine simple logical files. You will see how to:

Specify an alternative ordering to the records ina physical file

Allow access only to selected fields in eachrecord in a physical file

Extract selected records from a physical file

The course then describes how to define a joinlogical file and a multiple-format logical file usingDDS statements. The course ends by showing howto perform various management and maintenancetasks on logical files.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Code the DDS statements to define a simplelogical file that:

o Defines an alternative access path to aphysical file

o Allows access only to selected fields fromrecords in a physical file

o Allows access only to selected records in aphysical file

Define a field in a logical file that is aconcatenation of two fields from a physical file

Define a field in a logical file that is a substringof a field from a physical file

Code the DDS statements to define a joinlogical file

Code the DDS statements to define a multiple-format logical file

Use PDM to create a logical file from DDSsource

Use the CRTLF command to create a logicalfile from DDS source

Display the attributes of a logical file

Change the attributes of a logical file

Delete, copy, move, or rename a logical file

Add a member to a logical file

Topic Outline

Defining a Simple Logical File

Defining a Join Logical File

Defining a Multiple-Format Logical File

Creating a Logical File

Working with Logical Files

Audience

This course is intended for programmers andapplication developers who will be creating Db2databases. It should also be taken by anyone whowill be creating and/or managing logical files.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2 and DDS. In particular, you should know howto define a physical file using DDS. You can satisfythese prerequisites by successfully completing thefirst two courses in this series:

Introduction to Db2

Creating and Managing Physical Files

Manta Working with Db2 Databases

Technologies Inc. 156

Processing a Db2 Database

Order Number: PDBP04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the capabilities of anapplication that processes files in a Db2 database.The course begins by describing the basic fileoptions supported by Db2. It then shows how to usethe OVRDBF command to override the fileprocessing options in effect for a program. You willnext see how programs running in the same job canshare an open data path (ODP) to a Db2 file. Thisdiscussion includes descriptions of the OPNDBFand CLOF commands. The course ends by showinghow to use the OPNQRYF command to create analternative view of the data in a Db2 database.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Identify and describe the basic file operationssupported by Db2

Identify what operations set and change fileposition

Describe how Db2 indicates to an applicationprogram that an exception or error conditionexists

Use the OVRDBF command to override adatabase file's attributes and an applicationprogram's file processing options

List the benefits provided by a shared opendata path

Use the OPNDBF command to open a shareddatabase file

Use the CLOF command to close a shareddatabase file

Use the OPNQRYF command to define analternative view of the data in a database

Topic Outline

Processing Files in a High-Level LanguageProgram

Overriding Database File Processing Options

Sharing Database Files

Using the OPNQRYF Command

Audience

This course is intended for programmers andapplication developers who will be creatingapplications that process a Db2 database.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2.

Manta Working with Db2 Databases

Technologies Inc. 157

Using Triggers

Order Number: PDBP05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to code and use triggerprograms.

The course begins by describing trigger programconcepts and terminology. You will then see how tocode a trigger program. Next, the course covers theCL commands related to triggers. You will see howto assign a trigger to a file, display information aboutthe triggers assigned to a file, and remove a trigger.The course ends by discussing the design andperformance issues that are unique to triggerprograms.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Describe the function and capabilities of atrigger program

Identify the database events that can cause atrigger to fire

Identify appropriate applications for a trigger

Identify the different types of triggers that canbe assigned to a file

Describe the general format of the trigger bufferand the information it contains

Describe and use common trigger programcoding techniques

Assign a trigger to a file

Display information about the triggers that havebeen assigned to a file

Remove a trigger from a file

Define what is meant by cascading triggers andrecursive trigger firing

Identify situations in which a multiple-purposetrigger program is appropriate

Describe the techniques that can be used tolimit user access to trigger programs

Identify the issues related to error handling in atrigger program

Describe the effects of using commitmentcontrol with a trigger program

List the processing limitations of a triggerprogram

Topic Outline

Introduction to Triggers

Coding a Trigger Program

CL Commands for Working with Triggers

Trigger Program Design and PerformanceConsiderations

Audience

This course is intended for programmers andapplication developers who will be creating triggerprograms.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2. Finally, it assumes you have areading knowledge of either RPG IV or COBOL.

Manta Working with Db2 Databases

Technologies Inc. 158

Using Referential Integrity

Order Number: PDBP06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to implement referentialintegrity in a Db2 database. The course begins bydescribing the concept of referential integrity anddiscussing how it is implemented in a Db2 database.Next, you will see how to define a referentialconstraint, the set of rules that defines therelationship between two files. The course thendescribes how to work with referential constraintsand how to resolve a check pending situation.

The course ends by showing how an application candetect a constraint violation.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should beable to:

Use and define referential integrity terminology

Name and define the various referentialconstraint rules

Name and describe the different types ofphysical file constraints

List the steps required to implement referentialintegrity

Identify the various referential constraint states

Define a unique or primary key constraint

Define a referential constraint

Display the constraint information for a file

Display a list of the records that caused areferential constrain to be marked as checkpending

Change the status of a constraint

Delete a constraint

Describe the techniques that can be used in anRPG program to detect a constraint violation

Describe the techniques that can be used in aCOBOL program to detect a constraint violation

Topic Outline

Introduction to Referential Integrity

Defining Constraints

Working with Constraints

Detecting Constraint Violations in an Application

Audience

This course is intended for programmers andapplication developers who will be creating physicalfile constraints and working with files for whichconstraints have been defined.

Prerequisites

This course assumes that you have a basicknowledge of IBM i facilities. You can satisfy thisprerequisite by successfully completing theIntroduction to the IBM i Environment series. Italso assumes that you have a basic knowledge ofDb2. You can satisfy this prerequisite bysuccessfully completing the first course in the series,Introduction to Db2. Finally, it assumes you have areading knowledge of either RPG IV or COBOL.

Manta Working with Db2 Databases

Technologies Inc. 159

Working with Db2 Databases Competency ExamOrder Number: PDBP99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the Workingwith Db2 Databases series:

Introduction to Db2

Creating and Managing Physical Files

Creating and Managing Logical Files

Processing a Db2 Database

Using Triggers

Using Referential Integrity

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to create a Db2 database anddevelop applications that process that database.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the Working with Db2 Databases series.We recommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The Working with Db2 Databases series, includingthis exam, should be taken by anyone who willcreating Db2 databases and/or developingapplications that process a Db2 database.

Prerequisites

All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

Introduction to the IBM i Environment

Manta Using Structured Query Language (SQL)

Technologies Inc. 160

Using Structured Query Language (SQL)

Order Number: PSQL00

Max.Users

FirstYear

SecondYear

Later Years

1 $486 $243 $1225 $729 $365 $183

Each add’l $49 $25 $13

Overview

Using Structured Query Language (SQL) is aseries of courses that cover the programming anduse of Structured Query Language (SQL)statements in an IBM i Db2 environment.

This series contains the following courses:

SQL Fundamentals

Coding SQL Statements in a Free-Form RPGProgram

Coding SQL Statements in an RPG Program

Coding SQL Statements in a COBOL Program

SQL Stored Procedures

Implementing Business Rules UsingConstraints and Triggers

Using Structured Query Language (SQL)Competency Exam

Approximate Study Time for the Entire Series: 12-15 hours

Audience

This series is intended primarily for programmers,but can be taken by anyone interested in learninghow to use SQL to work with a Db2 database.

Prerequisites

All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

Introduction to the IBM i Environment

The courses also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

If you feel you already have the necessary skills, youcan verify your belief by successfully completing theCompetency Exams for these series.

In addition, the three courses that cover how toembed SQL statements within a high-level languageprogram also assume that you are an experiencedRPG or COBOL programmer. Of these courses, youneed to take only the single course that correspondsto your preferred programming language.

Manta Using Structured Query Language (SQL)

Technologies Inc. 161

SQL Fundamentals

Order Number: PSQL01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Structured Query Language (SQL) is a standardizedlanguage for defining and manipulating data in arelational database, such as the Db2 database foundon an IBM i system. This course provides anintroduction to SQL and describes the SQLstatements to:

Define queries

Change the contents of a file

Create and delete libraries and files

You will also see how to use Interactive SQL to enter and run SQL statements.

Approximate Study Time: 2 ½ hours

Objectives

After completing this course, you should be able to:

Identify the components of the Db2 QueryManager and SQL Development Kit

Use and define SQL terminology

Identify the Db2 objects to which SQL terms aremapped

Use Interactive SQL to execute an SQLstatement

Use the SQL SELECT statement to define aquery that

o Returns all records from a file and all fieldsfrom each record

o Returns only selected records from a file

o Returns only selected fields from returnedrecords

o Returns records from a file in a specifiedorder

o Generates and returns summary data

o Joins data from two or more files

o Uses a subquery

Code the SQL statements required to add,delete, and change the data in a database

Code the SQL statements required to createlibraries and files

Code the SQL statements required to deletelibraries and files

Topic Outline

Introduction to SQL

Defining and Running a Basic Query

Advanced Querying Capabilities

Making Changes to the Contents of a File

Creating and Deleted SQL Objects

Audience

This course is intended primarily for programmers,but can be taken by anyone interested in learninghow to use SQL to work with a Db2 database.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

If you feel you already have the necessary skills, youcan verify your belief by successfully completing theCompetency Exams for these series.

Manta Using Structured Query Language (SQL)

Technologies Inc. 162

Coding SQL Statements in a Free-Form RPG Program

Order Number: PSQL05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create an RPG SQLapplication using free-form RPG.

The course begins by describing the codingrequirements for embedding SQL statements in anRPG program. This includes a discussion on how todetect and handle errors that occur during theprocessing of an SQL statement. The course thendescribes the CL command used to compile an RPGprogram which includes embedded SQL statements.

Next, the course describes how to use an SQLcursor to access the records returned by a queryand how to develop an application that executesSQL statements dynamically. This is followed by adescription of the SQL statements used to supportcommitment control.

The course ends with a discussion of SQLapplication performance and optimization.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Code an RPG program with embedded SQLstatements

Detect and handle errors that occur during theprocessing of an SQL statement

Use the SQLRPGLE command to compile aprogram with embedded SQL statements

Code the SQL statements used to define andmanipulate an SQL cursor

Code an RPG program that executes adynamic SQL statement

Use SQL statements to perform commit androllback operations

Optimize an SQL application

Topic Outline

Embedding SQL Statements in a Free-FormRPG Program

Compiling a Program with Embedded SQLStatements

Using an SQL Cursor to Process MultipleRecords

Developing a Dynamic SQL Application

SQL and Commitment Control

Performance and Optimization Considerations

Audience

This course is intended for RPG programmers whowill be developing SQL applications in free-formRPG.

Prerequisites

This course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in the SQL Fundamentalsseries.

The course also assumes that you are anexperienced free-form RPG programmer. You cansatisfy this prerequisite by successfully completingthe Free-Form RPG Programming series.

Manta Using Structured Query Language (SQL)

Technologies Inc. 163

Coding SQL Statements in an RPG Program

Order Number: PSQL02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create an RPG SQLapplication.

The course begins by describing the codingrequirements for embedding SQL statements in anRPG program. This includes a discussion on how todetect and handle errors that occur during theprocessing of an SQL statement. The course thendescribes the CL commands used to compile anRPG program which includes embedded SQLstatements.

Next, the course describes how to use an SQLcursor to access the records returned by a queryand how to develop an application that executesSQL statements dynamically. This is followed by adescription of the SQL statements used to supportcommitment control.

The course ends with a discussion of SQLapplication performance and optimization.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Code an RPG program with embedded SQLstatements

Detect and handle errors that occur during theprocessing of an SQL statement

Use the SQLRPGLE and SQLRPG commandsto compile a program with embedded SQLstatements

Use Program Development Manager (PDM) tocompile a program with embedded SQLstatements

Code the SQL statements used to define andmanipulate an SQL cursor

Code an RPG program that executes adynamic SQL statement

Use SQL statements to perform commit androllback operations

Optimize an SQL application

Topic Outline

Embedding SQL Statements in an RPGProgram

Compiling a Program with Embedded SQLStatements

Using an SQL Cursor to Process MultipleRecords

Developing a Dynamic SQL Application

SQL and Commitment Control

Performance and Optimization Considerations

Audience

This course is intended for RPG programmers whowill be developing SQL applications.

Prerequisites

This course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in this series, SQLFundamentals.

The course also assumes that you are anexperienced RPG programmer. If you are notfamiliar with both OPM and ILE programdevelopment procedures, it is recommended thatyou also take The IBM i ProgrammingEnvironment series.

Manta Using Structured Query Language (SQL)

Technologies Inc. 164

Coding SQL Statements in a COBOLProgram

Order Number: PSQL03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create a COBOL SQLapplication.

The course begins by describing the codingrequirements for embedding SQL statements in aCOBOL program. This includes a discussion onhow to detect and handle errors that occur duringthe processing of an SQL statement. The coursethen describes the CL commands used to compile aCOBOL program which includes embedded SQLstatements.

Next, the course describes how to use an SQLcursor to access the records returned by a queryand how to develop an application that executesSQL statements dynamically. This is followed by adescription of the SQL statements used to supportcommitment control.

The course ends with a discussion of SQLapplication performance and optimization.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Code a COBOL program with embedded SQLstatements

Code the SQL statement to generate acommunications area in a program

Code the SQL statements to define a declaresection in your program

Detect and handle errors that occur during theprocessing of an SQL statement

Use the SQLCBLLE and SQLCBL commandsto compile a program with embedded SQLstatements

Use Program Development Manager (PDM) tocompile a program with embedded SQLstatements

Code the SQL statements used to define andmanipulate an SQL cursor

Code a COBOL program that executes adynamic SQL statement

Use SQL statements to perform commit androllback operations

Optimize an SQL application

Topic Outline

Embedding SQL Statements in a COBOLProgram

Compiling a Program with Embedded SQLStatements

Using an SQL Cursor to Process MultipleRecords

Developing a Dynamic SQL Application

SQL and Commitment Control

Performance and Optimization Considerations

Audience

This course is intended for COBOL programmerswho will be developing SQL applications.

Prerequisites

This course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in this series, SQLFundamentals.

The course also assumes that you are anexperienced COBOL programmer. If you are notfamiliar with both OPM and ILE programdevelopment procedures, it is recommended thatyou also take The IBM i ProgrammingEnvironment series.

Manta Using Structured Query Language (SQL)

Technologies Inc. 165

SQL Stored Procedures

Order Number: PSQL04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create, code, andexecute an SQL stored procedure.

The course begins by introducing the concepts ofstored procedures in general and SQL storedprocedures in particular. You will see theadvantages of using a stored procedure in adistributed environment and how a stored procedureis invoked. Next, the course describes how to createan SQL procedure. You will see how to create anSQL procedure using both the SQL CREATEPROCEDURE statement and System i Navigator.

The course then describes how to code thestatements in an SQL procedure. You will first seehow to code SQL control statements, which are usedto control the logic flow, declare variables and setthose variables. It then describes the SQLstatements used to detect and handle warnings andexceptions in an SQL procedure. You will then seehow to use an SQL cursor to access the rowsreturned by a query and how to develop anapplication that executes SQL statementsdynamically.

The course ends by describing the various ways inwhich you can work with stored procedures.

Objectives

Identify the two types of stored procedures anddescribe the differences between them

Identify the advantages of using a storedprocedure in a distributed environment

Describe the purpose of registering an SQLstored procedure, how this task is accomplished,and what effect registering a stored procedurehas on the system catalog

Given the specifications for a stored procedure,code the SQL statement to invoke it

Code the CREATE PROCEDURE statement tocreate an SQL procedure

Define a compound SQL statement

Declare a local variable in an SQL storedprocedure

Assign a value to a local variable or a parameter

Implement the following control structures in anSQL stored procedure:

o If

o If/Else

o Case

o Do While

o Do Until

Use the SQLSTATE and SQLCODE variablesto detect and handle errors.

Define and use a condition handler to detect andhandle errors

Code an SQL procedure that processes multiplerows returned by a query

Code the SQL statements used to define andmanipulate an SQL cursor

Code an SQL procedure that accepts an SQLstatement as a parameter and executes thatstatement

Code an SQL procedure that executes adynamic SQL statement which includes aparameter marker

Code the SQL DROP statement to delete anSQL procedure

Enter the CL RUNSQLSTM command toexecute an SQL script

Use System i Navigator to:

o Create a procedure

o Display a list of the stored procedures in aschema

o Delete an SQL procedure

o Recreate an SQL Procedure

o Display an SQL procedure's properties

Use RDi to:

o Create and execute an SQL script

o Display a list of the stored procedures in aschema

o Delete an SQL procedure

Manta Using Structured Query Language (SQL)

Technologies Inc. 166

Topic Outline

Introduction to Stored Procedures

Creating an SQL Procedure

Coding an SQL Procedure

Error Handling

Using a Cursor

Developing a Dynamic SQL Procedure

Working with SQL Procedures

Audience

This course is intended for programmers and otherswho will be coding and creating SQL storedprocedures.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have a basicknowledge of SQL and can code SQL statements.You can satisfy this prerequisite by successfullycompleting the first course in this series, SQLFundamentals.

Manta Using Structured Query Language (SQL)

Technologies Inc. 167

Implementing Business Rules Using Constraints and Triggers

Order Number: PSQL06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

All organizations have business rules that affect thecreation and storage of data. This course detailshow such rules can be built into a database so thatthey are enforced by the Db2 database managerrather than by individual application programs. Twomechanisms by which business rules can beenforced by Db2 are called constraints and triggers.

The course begins by describing the how constraintslimit the data that can be stored in a Db2 database.Primary key, unique, and check constraints arediscussed first, followed by referential constraints.With all four types of constraints, you will see how todefine a constraint when you create a table, how toadd a constraint later, how to alter a constraint, andhow to remove a constraint when it is no longerneeded. You will also see how an applicationprogram that uses a table can determine when aconstraint violation has occurred.

The effect of a constraint is to limit what can happento a table during an insert, an update, or a deleteoperation. In contrast, a trigger is a set of one ormore SQL statements that is executed automaticallywhen a specified database event occurs. You willsee common applications for triggers and learn theoptions available for defining them. The course thencovers the SQL statements for creating, enabling ordisabling, and dropping triggers. The course ends byshowing how to handle errors that occur during theexecution of a trigger.

Approximate Study Time: 3 hours

Objectives

Define and use relational database terminologyrelated to constraint and triggers

Create a table with a compound primary key

Create a table with a unique, check, orreferential constraint

Name and define the various referentialconstraint rules

Display the constraint and trigger information fora file

Describe the issues involved when adding aconstraint to an existing table

Alter a table to add a unique, check, orreferential constraint

Alter a table to remove a constraint

Identify the various referential constraint states

Describe how an RPG program, a COBOLprogram, or an SQL stored procedure candetermine whether a constraint violation hasoccurred

Describe the function and capabilities of atrigger

Identify the database events that can cause atrigger to fire

Identify appropriate applications for a trigger

Identify the different types of triggers that can beassigned to a table

Define what is meant by cascading triggers andrecursive trigger firing

Identify situations in which a multiple-purposetrigger is appropriate

Code the SQL statements to:

o Create a trigger

o Enable or disable a trigger

o Remove a trigger

Topic Outline

Using Constraints

Referential Integrity

Implementing Constraints

Trigger Concepts

Implementing Triggers

Audience

This course is intended for programmers andapplication designers who will be either creatingSQL constraints and triggers or working withapplications involving tables which use them.

Manta Using Structured Query Language (SQL)

Technologies Inc. 168

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Finally, the course assumes that you have a basicknowledge of SQL and can code SQL statementsand procedures. You can satisfy this prerequisite bysuccessfully completing the following courses in thisseries:

SQL Fundamentals

SQL Stored Procedures

In addition, if you will be taking any of the followingcourses on embedded SQL, we recommend that youdo so before beginning this one.

Coding SQL Statements in a Free-Form RPGProgram

Coding SQL Statements in an RPG Program

Coding SQL Statements in a COBOL Program

Manta Using Structured Query Language (SQL)

Technologies Inc. 169

Using Structured Query Language (SQL) Competency ExamOrder Number: PSQL99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the UsingStructured Query Language (SQL) series:

SQL Fundamentals

Coding SQL Statements in an RPG Program

Coding SQL Statements in a COBOL Program

SQL Stored Procedures

Implementing Business Rules UsingConstraints and Triggers

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to code SQL statements anddevelop SQL applications.

Approximate time to complete all parts of the exam: 2 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the Using Structured Query Language(SQL) series. We recommend that you take theexam after you complete the series. Alternatively,you can take the corresponding portion of the examwhen you complete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The Using Structured Query Language (SQL)series, including this exam, is intended forprogrammers who will code SQL statements and/ordevelop applications that include SQL statements.

Prerequisites

All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

Introduction to the IBM i Environment

The courses also assume you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

In addition, the three courses that cover how toembed SQL statements within a high-level languageprogram also assume that you are an experiencedRPG or COBOL programmer. Of these courses, youneed to take only the single course that correspondsto your preferred programming language.

Manta Using Structured Query Language (SQL)

Technologies Inc. 170

Control Language Programming

Order Number: PCLP00

Max.Users

FirstYear

SecondYear

Later Years

1 $540 $270 $1365 $810 $405 $204

Each add’l $54 $27 $14

Overview

The Control Language Programming series isintended for IBM i programmers, operators, andother personnel who will write CL programs.

The first course of the series presents an overviewof CL commands and CL programs. It also showshow variables are defined and used in a CLprogram. Subsequent courses show how toimplement logic structures such as IF, IF/ELSE, andloops; how to pass control and data betweenprograms; how to display screens at a user'sworkstation; and how to receive data from that user.The series covers the CL commands used to accessrecords from a database, how to send and receivemessages, and how to monitor messages to handleerrors in a CL program. You will also see how touse data queues and data areas to communicatewith other programs. This series contains thefollowing courses:

Introduction to CL Programming

Controlling Command and Program Flow

Interactive CL Applications

Message Processing in a CL Program

Accessing Database Files, Data Queues, andData Areas

Control Language Programming CompetencyExam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 10-12 hours

Audience

This series should be taken by anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.

Prerequisites

All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

Introduction to the IBM i Environment

The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Reference Materials

A Student Reference Guide is available for thisseries.

Manta Using Structured Query Language (SQL)

Technologies Inc. 171

Introduction to CL Programming

Order Number: PCLP01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces the IBM i control language(CL) and control language programs.

The course begins by discussing how CL commandsare used to communicate with the IBM i operatingsystem. It describes the structure and syntax of CLcommands and the command coding rules. Thecourse then presents the concept of a CL programand lists the CL commands most frequently used ina CL program.

This course next covers CL variables. It shows howto declare and initialize a variable and describes thevarious ways in which variables can be manipulated.The course ends with a discussion of the built-infunctions that can be used in a CL program tomodify the contents of a variable.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Identify the various components of a CLcommand

List the syntax rules for coding CL commands

Execute a CL program both in an interactiveand a batch environment

List the advantages of packaging CLcommands into a CL program

Code a simple CL source program

Identify the commands frequently used in a CLprogram

Continue a CL command on a new line in a CLprogram

Use comments to document a CL program

Name and describe the different types of CLvariables

Declare and initialize variables in a CL program

Use the CHGVAR command to alter thecontents of a variable

Code the RTVSYSVAL command required toaccept a specified system value into a variable

Code the RTVJOBA command required toaccept job information into a variable

Code the CVTDAT command to convert a datefrom one format to another

Define and use a defined variable

Define and use a pointer variable

Define and use a based variable

Use the %SWITCH function to test the settingsof the job switches

Use the %BINARY function to interpret thecontents of a character variable as a signedbinary integer and store the correspondingdecimal value in a decimal variable

Use the %BINARY function to convert adecimal value to its corresponding signedbinary value and store the result in a charactervariable

Use the %SUBSTRING function to obtain asubstring of a character variable

Use the %ADDRESS function to change or testthe contents of a pointer variable

Use the %OFFSET function to change or testthe contents of the offset value for a pointervariable

Topic Outline

Control Language Commands

Control Language Programs

Commands Commonly Used in a CL Program

Entering CL Source Statements

Introduction to CL Variables

CL Variables – The Rest of the Story

Built-In Functions

Audience

This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.

Manta Using Structured Query Language (SQL)

Technologies Inc. 172

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Manta Using Structured Query Language (SQL)

Technologies Inc. 173

Controlling Command and Program Flow

Order Number: PCLP03

Max.

Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows you how to control the flow ofcommand execution within a program and how topass control between programs and/or procedures.

The course first describes how to test conditions in aCL program and how to control the execution ofcommands based on the result of such a test. Thisdiscussion includes a description of the logicstructures used in conditional processing and CLprogram excerpts that illustrate the use ofconditional processing.

The course then describes how to modularize anapplication. You will see how to modularize anapplication using subroutines, procedures, andsubprograms.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Code CL commands to implement an IFstructure

Code CL commands to implement an IF/ELSEstructure

Code CL commands to implement an executionloop

Code CL commands to implement a nested IFstructure

Code the CL command to call a subroutine

Code a subroutine in a CL program

Code a CL subprogram or procedure to performa specified function

Code a CL program that calls a subprogram ora procedure

Use parameters to communicate betweenprograms

Topic Outline

Introduction to Conditional Processing

Coding an Execution Loop

Using Subroutines

Calling Programs and Procedures

Coding Subprograms and Called Procedures

Audience

This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

The course also assumes that you have a basicunderstanding of CL programming concepts andknow how to declare and use variables in a CLprogram. You can satisfy these prerequisites bysuccessfully completing the first course in thisseries:

Introduction to CL Programming

Manta Using Structured Query Language (SQL)

Technologies Inc. 174

Interactive CL Applications

Order Number: PCLP04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to create an interactiveapplication.

The course begins by describing the role a displayfile plays in an interactive application and how adisplay file is created. You will see the datadescription specifications (DDS) source statementsmost commonly used for a display file. The coursethen considers the requirements for an interactiveCL program. You will see how to declare a displayfile in a CL program and how to display data at andreceive data from a workstation.

You will also see the requirements for a multiplerequest terminal (MRT) program. An MRT programis one that communicates with multiple workstations.The course ends by describing how to overridecertain attributes in a display file.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Interpret the DDS statements used to define adisplay file

Code a CL program that uses a display file tocommunicate with a workstation user

Code a multiple request terminal (MRT) CLprogram

Override certain attributes specified in a displayfile

Topic Outline

Creating a Display File

Coding an Interactive Program

Working with Multiple Workstations

Overriding Display File Parameters

Audience

This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

The course also assumes that you have a basicunderstanding of CL programming concepts, knowhow to declare and use variables in a CL program,and know how to control the flow of execution in aCL program. You can satisfy these prerequisites bysuccessfully completing the first two courses in thisseries:

Introduction to CL Programming

Controlling Command and Program Flow

Manta Using Structured Query Language (SQL)

Technologies Inc. 175

Message Processing in a CL Program

Order Number: PCLP05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes how to send and receivemessages and how to detect and handle errors in aCL program.

The course begins by describing messageprocessing concepts. It then shows how to write aprogram that uses messages to communicate with aworkstation user or another program. You will seehow to send a message to a workstation user, howto send a message to another program orprocedure, and how to receive a message. Thecourse then shows how to monitor messages in aprogram and how to handle the exception and errorconditions those messages represent.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Describe the difference between an impromptuand a predefined message

Describe the format of a message identifier

Identify and describe the different types ofmessages that a CL program can send andreceive

Identify and describe the different types ofmessage queues to which a CL program cansend messages and from which a CL programcan receive messages

Use the SNDUSRMSG command in a CLprogram to send an informational message to aworkstation user

Use the SNDUSRMSG command in a CLprogram to send an inquiry message to aworkstation user and receive its reply

Use the SNDPGMMSG command in a CLprogram to send a message to another programor procedure

Use the RCVMSG command in a CL programto receive a message

Use the MONMSG command in a CL programto monitor for messages

Topic Outline

Message Concepts

Sending Messages

Receiving Messages

Monitoring Messages

Audience

This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

The course also assumes that you have a basicunderstanding of CL programming concepts, knowhow to declare and use variables in a CL program,and know how to control the flow of execution in aCL program. You can satisfy these prerequisites bysuccessfully completing the first two courses in thisseries:

Introduction to CL Programming

Controlling Command and Program Flow

Manta Using Structured Query Language (SQL)

Technologies Inc. 176

Accessing Database Files, Data Queues, and Data Areas

Order Number: PCLP06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course shows how to access a database file, adata queue, and a data area from a CL program.

The course first describes the database fileprocessing capabilities supported for CL programs.In particular, you will see the limitations imposed onCL programs that process a database file. Thecourse then describes the coding requirements of aCL program that accesses a database file. You willsee how to declare a database file, how to readrecords sequentially, and how to simulate randomaccess.

The course next discusses data queues. You willsee how to create a data queue; how to add an entryto a data queue; how to retrieve an entry from a dataqueue; and how to clear a data queue, deleting all ofits entries. The course ends with discussion of dataareas. It describes the data areas createdautomatically by the system and shows how tocreate a user data area. In addition, you will seehow to access and change the contents of a dataarea.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Code a CL program that sequentially processesa database file

Code a CL program that opens and closes adatabase file to be processed by otherprograms or procedures

Code the command to override database fileattributes

Code a CL program that, given a relative recordnumber, reads the corresponding record

Code a CL program that, given a record key,reads the corresponding record

Create a data queue

Add an entry to a data queue

Retrieve an entry from a data queue

Create a user data area

Access the contents of a data area

Change the contents of a data area

Topic Outline

Performing Database Processing in a CL Program

Simulating Random Access

Using Data Queues

Using Data Areas

Audience

This course is intended for anyone who will bewriting CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.

Prerequisites

This course assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the following series:

Introduction to the IBM i Environment

The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

The course also assumes that you have a basicunderstanding of CL programming concepts, knowhow to declare and use variables in a CL program,and know how to control the flow of execution in aCL program. You can satisfy these prerequisites bysuccessfully completing the first two courses in thisseries:

Introduction to CL Programming

Controlling Command and Program Flow

Manta Using Structured Query Language (SQL)

Technologies Inc. 177

Control Language Programming Competency ExamOrder Number: PCLP99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the ControlLanguage Programming series:

Introduction to CL Programming

Controlling Command and Program Flow

Interactive CL Applications

Message Processing in a CL Program

Accessing Database Files, Data Queues, andData Areas

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to effectively code CLprograms.

Approximate time to complete all parts of the exam: 90 minutes

Recommended Uses

This Competency Exam was designed as a masterytest for the Control Language Programmingseries. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The Control Language Programming series,including this exam, should be taken by anyone whowill be writing CL programs. This audience consistsprimarily of application programmers, but mayinclude other people who use CL commands, suchas system operators.

Prerequisites

All courses in this series assume that you have aworking knowledge of basic IBM i concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingseries:

Introduction to the IBM i Environment

The course also assumes you familiar with IBM iprogramming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in the following series:

The IBM i Programming Environment

Manta eBusiness for IBM i Programmers

Technologies Inc. 178

eBusiness for IBM i Programmers Order Number: EBUS00

Max.Users

FirstYear

SecondYear

Later Years

1 $864 $432 $2165 $1,296 $648 $324

Each add’l $86 $43 $22

Overview

The eBusiness for IBM i Programmers seriescovers the skills required to create an ebusinessapplication on an IBM i system.

This series contains the following courses:

eBusiness: From HTML to WebSphere

Coding HTML and XHTML: Basic Elements

Coding HTML and XHTML: Advanced Elements

Coding JavaScript

Using JavaScript to Enhance Web Pages

Writing a CGI Program in RPG

Developing Web Applications UsingNet.Data

Ajax Programming

eBusiness for IBM i Programmers Competency Exam

Descriptions of the individual courses follow.

Approximate Study Time for the Entire Series: 17-21 hours

Audience

The eBusiness for IBM i Programmers seriesshould be taken by the individuals responsible forimplementing an organization's web site. Theaudience includes webmasters, content developers,application programmers, and systemadministrators.

Prerequisites

This series assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.

Writing a CGI Program in RPG assumes that youhave a working knowledge of RPG programming inthe ILE environment. You can satisfy thisprerequisite by successfully completing the MantaRPG Programming series.

Reference Materials

A Student Reference Guide is available for thisseries.

Manta eBusiness for IBM i Programmers

Technologies Inc. 179

eBusiness: From HTML to WebSphereOrder Number: EBUS01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

The problem with the term "ebusiness" is that thereseems to be as many definitions as there aresoftware vendors. This course starts with a simpledefinition, "doing business over the Web." As thisdefinition is refined and expanded, you'll see thatebusiness encompasses a continuum of options,from simple web hosting to ecommerce, internal andexternal business integration, and web services. Thecourse describes the multiple options that areavailable and provides examples designed to helpyou place your organization's ebusiness goals onthe spectrum of available options.

As you will see, various ebusiness implementationsuse a complex array of technologies. To theuninitiated, these technologies seem like analphabet soup of options, including HTTP, HTML,CGI, URL, JSP, EJB, WAS, XML, XSL, UDDI,WSDL, SOAP, and others. This course introducesthese technologies, placing them on the ebusinesscontinuum according to how they satisfy businessrequirements.

The purpose of this course is twofold. For ITmanagers and others interested in ebusinessconcepts, it provides an overview of the availabletechnologies. You will see the role of eachtechnology and how they fit together in a typicalebusiness implementation. For IBM i programmers,the course provides the background informationneeded to understand the remaining courses of thisseries.

Approximate Study Time: 2-3 hours

Objectives

After completing this course, you should be ableto:

Arrange potential ebusiness activities by theirimplementation complexity

Identify the technologies required for differentlevels of ebusiness implementations

Define TCP/IP terms

Match TCP/IP protocols with their functions

Order the events that take place during thedisplay of a typical web page

Identify the role of HTML in a Web application

Identify the sequence of events that occur whena web page invokes a CGI program

Name and describe two ways in which data froma web user can be passed to a CGI program

Interpret a Uniform Resource Indicator (URI)that invokes a CGI program and passes a datastring to it

Describe methods that can be used to simulatea dialog between a web user and a server

Identify the roles of Net.Data and PHP in a webapplication

Describe the purpose of a scripting language

Describe the differences between a CGIprogram and a servlet

Describe the primary functions of an applicationserver

Describe the difference between the WebFacingtool and a typical screen scraper

Define the following terms related to the use ofJava: applet, servlet, JavaBean, JSP, EJB

Identify the application servers that aresupported in the IBM i environment

Identify the parts of an XML element

Determine whether a document consists of wellformed XML statements

Describe the purpose of XML, DOM, SAX,XSLT, DTDs, and schemas

Describe the difference between HTML andXHTML

Define what is meant by a web service

Match UDDI, WSDL, and SOAP withdescriptions of their purposes

Manta eBusiness for IBM i Programmers

Technologies Inc. 180

Topic Outline

Defining eBusiness

Web Publishing

eCommerce

Business Integration

Communicating with Business Partners

Web Services

Audience

This course should be taken by individualsresponsible for planning, implementing, and/ormanaging an organization's web site and otherebusiness activities. This audience includes ITmanagers, webmasters, content developers,application programmers, and systemadministrators.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.

Coding HTML and XHTML: Basic ElementsOrder Number: EBUS02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

HTML, the Hypertext Markup Language, is the basisfor communication between a web server and abrowser. It is through HTML documents that youdetermine what a user sees when visiting your website. Because of this, every web developer needs abasic understanding of HTML coding, even if youuse tools to create most of your HTML pages.

The eXtensible HyperText Markup Language(XHTML) is a successor to HTML that follows therules of XML. In today's web environment,developers need to know both languages.

The course begins by describing the syntax rules forXHTML and how they differ from those of HTML. Asyou will see, you can develop documents thatconform to both. You will learn strategies fordeveloping reusable web documents and see thetools available for creating them.

The course then introduces XHTML by describingthe structure of a basic web document and the typesof elements you will encounter. After learning aboutthe most commonly used elements, you will see howCascading Style Sheets can be used to control howthese elements are displayed by a browser. Thecourse wraps up basic HTML and XHTML elementswith a discussion of hypertext links.

Approximate Study Time: 2 hours

Manta eBusiness for IBM i Programmers

Technologies Inc. 181

Objectives

After completing this course, you should be ableto:

Describe the differences between HTML andXHTML

Determine whether a document conforms toXHTML syntax rules

Identify the elements that must be present inevery XHTML document

Identify tools that can be used to create XHTMLdocuments

Identify the XHTML element used to define aspecified document component

Code the XHTML elements to identify thefollowing document components:

o Headings

o Paragraphs

o Line breaks

o Preformatted text

o Boldface and italic text

o Superscripts and subscripts

o Special characters

o Internal and external links

o Mail-to links

Define a Cascading Style Sheet

Specify the CSS rule to be applied to a givenelement

Define CSS rules that apply to all elements of agiven type or only to selected elements

Given a display formatting requirement for aspecified XHTML element, identify the CSSproperty that can be used to achieve the desiredresult

Use the <div> and <span> elements to apply astyle rule to a group of elements

Topic Outline

Getting Started with XHTML

XHTML Basics

Cascading Style Sheets

CSS Properties

Linking Web Pages

Audience

This course should be taken by the individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.

In addition, you should have an understanding of therole of HTML, XML, and HTML in an ebusinessenvironment. This prerequisite can be satisfied bycompleting the first course of this series, eBusiness:From HTML to WebSphere. You may also haveobtained these skills by taking other courses orthrough relevant work experience.

Reference Materials

All of the major XHTML examples that are discussedin this course are provided as separate htm files onthe Manta CD. Once the course has been installed,they are available to you in the directory\ebus\ebus02\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.

Manta eBusiness for IBM i Programmers

Technologies Inc. 182

Coding HTML and XHTML: Advanced ElementsOrder Number: EBUS03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course builds upon the previous course of thisseries to cover the remaining HTML/XHTMLelements that are used within most web pages.These include lists, tables, frames, and forms. Youwill also see how to include images, applets, audio,and other objects in a web page.

By the end of the course, you will have the skills youneed to develop the XHTML pages and forms thatare used in typical ebusiness web sites.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be ableto:

Code the XHTML elements to identify thefollowing document components:

o Ordered or unordered lists

o Tables

o Frames

o Images

o Horizontal rules

o Forms

Given a display formatting requirement for aspecified XHTML element, identify the CSSproperty that can be used to achieve the desiredresult

Code the XHTML elements to support thefollowing field types within an online form:

o Text boxes

o Radio buttons

o Check boxes

o Text areas

o Buttons

o Passwords

o Hidden fields

Topic Outline

Lists

Tables

Frames

Graphics, Applets, and Multimedia

Forms

Audience

This course should be taken by the individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.

Prerequisites

This course assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.

In addition, you should have an understanding of therole of HTML, JavaScript, Java applets, Javaservlets, and CGI programs in an ebusinessenvironment. This prerequisite can be satisfied bycompleting the first course of this series, eBusiness:From HTML to WebSphere. You should also beable to code the basic HTML/XHTML elements andCascading Style Sheets covered in the previouscourse of this series, Coding HTML and XHTML:Basic Elements.

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

All of the major XHTML examples that are discussedin this course are provided as separate htm files onthe Manta CD. Once the course has been installed,they are available to you in the directory\ebus\ebus03\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.

Manta eBusiness for IBM i Programmers

Technologies Inc. 183

Coding JavaScriptOrder Number: EBUS04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

JavaScript is a scripting language that a webdeveloper can use within an HTML or XHTMLdocument to perform functions on the user'smachine. Using JavaScript, you can develop client-side routines to validate input, store data on theuser's PC, and perform related tasks that areintegral to a typical ebusiness application.

The course begins by describing the role ofJavaScript in an ebusiness application. It thendescribes the format of a JavaScript program and itsrelationship to the HTML or XHTML document inwhich it is coded. The remainder of the coursecovers the syntax of the key JavaScript statementsthat are common to all standard implementations.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be ableto:

Define JavaScript terms, including method,object, property, event, identifier, keyword, andliteral

Code the HTML/XHTML element to identify aJavaScript program that is stored within thesame document or in a separate file

Describe the basic syntax rules for codingJavaScript statements

Code comments in a JavaScript program

Name and describe the JavaScript-supporteddata types

Declare a JavaScript variable

Assign a value to a JavaScript variable

Perform common arithmetic operations,including addition, subtraction, multiplication,and division

Concatenate string variables

Convert data from one type to another

Declare and use an array

Use common JavaScript string methods,including toUpperCase, toLowerCase,indexOf, charAt, subst, and substring

Use common JavaScript Math methods,including max, min, sqrt, and round

Use JavaScript Date methods to determine thecurrent date and time

Implement the following control structures in aJavaScript program:o Ifo If/Elseo Caseo Do Whileo Do Untilo For

Define a JavaScript function

Topic Outline

Introduction to JavaScript

JavaScript Syntax

Basic Operations

Properties and Methods

Conditional Processing

Functions

Audience

This course should be taken by individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.

Prerequisites

This course assumes that you understand of the roleof HTML, JavaScript, Java servlets, and CGIprograms in an ebusiness environment. Thisprerequisite can be satisfied by completing the firstcourse of this series, eBusiness: From HTML toWebSphere. In addition, you should be able to codeHTML. This prerequisite is covered in the secondand third courses of this series:

Coding HTML and XHTML: Basic Elements

Coding HTML and XHTML: Advanced Elements

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta eBusiness for IBM i Programmers

Technologies Inc. 184

Using JavaScript to Enhance Web PagesOrder Number: EBUS05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

The previous course of this series, CodingJavaScript, describes the generic JavaScriptlanguage that is defined by the internationallyaccepted ECMA standard. This course expands onthis knowledge to show you how to use JavaScriptstatements to manipulate the HTML/XHTMLelements that make up a web page.

The course begins by describing how a browserevent can cause a JavaScript function to be invoked.It then covers the properties and methods used tomanipulate window, document, and form objects.The remainder of the course presents JavaScriptexamples that you can use in your own ebusinessapplications. In particular, you will learn how tovalidate form data and manage cookies.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Cause a JavaScript function to be invoked asthe result of a browser event

Code JavaScript statements to perform thefollowing tasks: o Reference an object within the same

window, a subwindow, the parent window, ora frame

o Display a message in an independentbrowser window

o Create, write to, and close a subwindow o Replace the document displayed in the

browser window o Prompt the user for an input value or a

confirmation

Reference form components from a JavaScriptprogram

Check user-supplied form data for validity

Identify the advantages and disadvantages ofthe various ways to display error messages

Modify an HTML form to invoke a JavaScriptfunction

Code JavaScript functions to create, retrieve,update, or delete a cookie

Topic Outline

Handling Events

Manipulating Window Objects

Manipulating Document Objects

Referencing Form Data

Editing Input Data

Using Cookies

Audience

This course should be taken by individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.

Prerequisites

This course assumes that you understand of the roleof HTML, JavaScript, Java servlets, and CGIprograms in an ebusiness environment and that youcan code HTML/XHTML and basic JavaScriptstatements. These prerequisites can be satisfied bycompleting the previous courses of this series:

eBusiness: From HTML to WebSphere

Coding HTML and XHTML: Basic Elements

Coding HTML and XHTML: Advanced Elements

Coding JavaScript

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

All of the major JavaScript examples that arediscussed in this course are provided on the MantaCD. Once the course has been installed, they areavailable to you in the directory\ebus\ebus05\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.

Manta eBusiness for IBM i Programmers

Technologies Inc. 185

Writing a CGI Program in RPGOrder Number: EBUS06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

For an ebusiness application to be useful to mostorganizations, it must be able to display and/orupdate data stored on the organization's productionsystem. This course shows you how to develop fullyfunctional ebusiness solutions using nothing morethan your existing knowledge of RPG and the webfacilities already included in IBM i.

The course begins by describing the structure of aCGI program and the application programminginterfaces (APIs) that allow an IBM i program tocommunicate with the HTTP server. You will thensee how to incorporate these APIs into an RPGprogram to receive data from and pass data to aweb browser. The RPG code that is developedduring this course is then combined into a completeapplication. The course ends by presenting tips andtechniques for setting up the RPG CGI programmingenvironment.

Approximate Study Time: 2-3 hours

Objectives

After completing this course, you should be able to:

Identify the environment information that isavailable to a CGI program

Name and describe two ways in which data froma web user can be passed to a CGI program

Interpret the data string that is passed from anHTML form to a CGI program

Order the major steps performed by a CGIprogram

Code the CALLB and PARM statements toinvoke the APIs used to read input from or writeoutput to a browser

Code the CALLP statement to invoke the APIsused to read input from or write output to abrowser using a prototyped call

Describe ways in which the calls to an API canbe packaged for easier use within an RPGprogram

Identify special considerations for generatingHTML statements from within a CGI program

Describe the steps needed to retrieve data froma form that was passed using either the GET orPOST methods

Identify the API and parameters used to writestandard output, retrieve environment variables,read standard input, or convert the data stringsent by a browser into RPG data items

Describe the process used by QtmhCvtDb toconvert the data string sent by a browser intoRPG data items

Describe situations in which additional work maybe necessary to prepare form data for use by anRPG program

Describe the reasons for specific HTMLattributes, RPG keywords, and RPG statementsin a given CGI application

Identify the IBM i commands used to set up theCGI programming environment

Identify the user profile that must be grantedauthority to call a CGI program

Code the H-spec keywords to bind a serviceprogram with an ILE RPG program

Describe how the use of a named activationgroup improves the performance of a CGIprogram

Create a service program that includesprocedures which use the CGI APIs

Topic Outline

The Structure of a CGI Program

Creating HTML Output

Getting the Input Data

Parsing the Input String

Putting it All Together

Setting Up the CGI Program Environment

Audience

This course should be taken by RPG programmersresponsible for creating CGI programs.

Manta eBusiness for IBM i Programmers

Technologies Inc. 186

Prerequisites

This course assumes that you have a workingknowledge of RPG programming in the ILEenvironment. You can satisfy this prerequisite bysuccessfully completing the Manta RPGProgramming series.

In addition, you should have an understanding of therole of HTML, JavaScript, and CGI programs in anebusiness environment and how forms are definedand used in an HTML/XHTML document. Theseprerequisites can be satisfied by completing theprevious courses of this series:

eBusiness: From HTML to WebSphere

Coding HTML and XHTML: Basic Elements

Coding HTML and XHTML: Advanced Elements

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

All of the major examples that are discussed in thiscourse are provided as separate files on the MantaCD. Once the course has been installed, they areavailable to you in the directory\ebus\ebus06\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.

Manta eBusiness for IBM i Programmers

Technologies Inc. 187

Developing Web Applications Using Net.DataOrder Number: EBUS07

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

IBM's Net.Data is a server-side scripting languagethat you can use to dynamically create HTMLdocuments for display by a user's browser. Net.Datais an excellent interface between a browser and aCGI program, such as an RPG application executingon the server. In addition, Net.Data's SQL and flatfile interfaces can be used to access IBM i datadirectly, without the need for a high-level language.As a result, Net.Data has become a popular tool forthe fast implementation of web-based applicationson IBM i systems.

This course begins by describing the role ofNet.Data in an ebusiness application. You will seehow Net.Data is distributed and installed and how toinvoke a Net.Data program, called a macro, from anHTML form. The course then describes thestructure and syntax of a Net.Data macro. You willsee how to define and reference variables and howto use Net.Data statements and blocks. Specialemphasis is given to control structures and macrofunctions.

Net.Data uses the concept of a languageenvironment to provide interfaces with otherprogramming languages. Using the appropriatelanguage environment, you can execute SQLstatements, REXX procedures, or IBM i commands.You can also call a program written in high-levellanguage, such as RPG, COBOL, C/C++, CL, orJava. The course provides examples illustrating theuse of each of these environments. One ofNet.Data's greatest advantages is its ability toprocess the variable output of a typical SQLdatabase query. You will see how to controlNet.Data's handling of table output and how tosupplement the default processing with your ownenhancements. The course ends with a survey ofNet.Data's extensive collection of built-in functions.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Describe the role of Net.Data in a typicalebusiness application

Identify the major advantages of using Net.Data

Identify the location of the Net.Data initializationfile

Code the URL to invoke a Net.Data macro

Describe the syntax of a Net.Data macro

Code a Net.Data comment block

Code a Net.Data %INCLUDE statement toinclude a separately stored group of statementswithin a macro

Define a Net.Data variable

Incorporate the contents of a variable into anHTML string

Change the value of a variable

Retrieve and display the value of anenvironment variable

Implement the following control structures in aNet.Data macro:

o If

o If/Else

o Case

o Do While

Define a conditional variable

Define and call a macro function

Invoke a Net.Data function

Define a Net.Data function to:

Execute a REXX program

Run an IBM i command

Call an external program

Invoke a Java class

Execute a set of SQL statements

Invoke an SQL stored procedure

Describe how the results of an SQL query arereturned to Net.Data for processing

Identify Net.Data variables that control theprinting of reports

Create a custom report using %REPORT and%ROW blocks

Manta eBusiness for IBM i Programmers

Technologies Inc. 188

Define a Net.Data table and use it to store theresults of a function call

Use Net.Data built-in functions to generateHTML elements from a table

Define a list variable

Use a %MESSAGE block to display messagesin response to specified return codes

Describe the naming conventions used forNet.Data built-in functions

Identify the Net.Data built-in function to performa specified task

Topic Outline

The Role of Net.Data in an eBusinessApplication

Net.Data Variables

Net.Data Control Structures

Macro Functions

Net.Data Language Environments

The SQL Language Environment

Built-In Functions

Audience

This course should be taken by programmersresponsible for creating web applications in the IBM ienvironment.

Prerequisites

This course assumes that you have anunderstanding of the role of HTML, JavaScript, andCGI programs in an ebusiness environment and howforms are defined and used in an HTML/XHTMLdocument. These prerequisites can be satisfied bycompleting the first three courses of this series:

eBusiness: From HTML to WebSphere

Coding HTML and XHTML: Basic Elements

Coding HTML and XHTML: Advanced Elements

You may also have obtained these skills by takingother courses or through relevant work experience.

Reference Materials

All of the major examples that are discussed in thiscourse are provided as separate files on the MantaCD. Once the course has been installed, they areavailable to you in the directory\ebus\ebus07\examples under the Manta basedirectory. If you are taking this course online, youcan find the sample files atwww.mantanow.com/examples/.

Manta eBusiness for IBM i Programmers

Technologies Inc. 189

Ajax ProgrammingOrder Number: EBUS08

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Many organizations now offer web-basedapplications that rival local applications in theirfunctionality and user interface. Ajax plays a key rolein most of these applications. Ajax is not a specifictechnology as much as a collection of techniquesthat allows a web developer to dynamically updatethe currently displayed page with data retrieved fromthe server. This example-driven course will give youthe tools you need to implement your first Ajaxapplication.

The course begins by describing the short history ofAjax and showing examples of the types of thingsyou can do with Ajax, from Google maps to Manta'scourse presentation system. It then describes theone new technology that makes Ajax possible,JavaScript control of the HTTP request object.

The course then shows multiple, increasinglycomplex examples of Ajax in action. You will seehow to pass parameters to a server and receive datain the form of character strings, HTML fragments, orXML. You will also see how to incorporate data intoa web page dynamically, adding elements like tablesand pull-down lists that are built from data retrievedfrom the server. Several special situations arecovered, including encoding parameters, passingdata as XML, and using XML DOM methods to buildHTML elements dynamically.

The course ends with a comprehensive example thatuses what you have learned to implement "autocompletion" for an input field.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Describe the key technologies and techniquesthat comprise Ajax programming

Identify potential Ajax applications

Identify the benefits of receiving server data inXML format

Order the steps involved in making an Ajaxrequest

Code the JavaScript statements to make anAjax request

Identify the methods and properties availablewith an XMLHttpRequest object

Replace the contents of a displayed HTMLobject

Identify the HTML events used to invoke aJavaScript function when a form field has beenchanged or selected by the user

Receive an XML object in an HTTP request

Parse an XML object to create HTML

Identify the XML methods and properties used tocreate a new HTML object

Describe how frameworks can dramaticallyreduce the effort required to code an Ajaxprogram

Describe the potential role of XSLT intransforming the server response into HTML

Identify the changes that must be made to anAjax program to use POST rather than GET toretrieve data

Describe why parameters may need to beencoded before transmission

Pass parameters to a server program as XML

Describe how to force a browser to make a newserver request rather than to use an obsoletepage from its cache

Code the JavaScript statements and CSSattributes to position an HTML element at aparticular location

Manta eBusiness for IBM i Programmers

Technologies Inc. 190

Audience

This course should be taken by individualsresponsible for implementing an organization's website. The audience includes webmasters, contentdevelopers, application programmers, and systemadministrators.

Prerequisites

This course assumes that you understand of the roleof HTML, JavaScript, Java servlets, and CGIprograms in an ebusiness environment and that youcan code HTML/XHTML and basic JavaScriptstatements. These prerequisites can be satisfied bycompleting the previous courses of this series:

eBusiness: From HTML to WebSphere

Coding HTML and XHTML: Basic Elements

Coding HTML and XHTML: Advanced Elements

Coding JavaScript

Using JavaScript to Enhance Web Pages

The course also assumes you know how a CGIprogram or servlet creates HTML or XML output thatis returned to a browser. This prerequisite can besatisfied by completing either of the previouscourses of this series:

Writing a CGI Program in RPG

Developing Web Applications Using Net.Data

You may also have obtained these skills by takingother courses (such as the Java Fundamentalsseries) or through relevant work experience.

Reference Materials

All of the major JavaScript examples that arediscussed in this course are provided on the MantaCD. Once the course has been installed, they areavailable to you in the directory \examples under theManta base directory. If you are taking this courseonline, you can find the sample files atwww.mantanow.com/examples/.

Manta eBusiness for IBM i Programmers

Technologies Inc. 191

eBusiness for IBM i Programmers Competency Exam Order Number: EBUS99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up theeBusiness for IBM i Programmers series:

eBusiness: From HTML to WebSphere

Coding HTML and XHTML: Basic Elements

Coding HTML and XHTML: Advanced Elements

Coding JavaScript

Using JavaScript to Enhance Web Pages

Writing a CGI Program in RPG

Developing Web Applications Using Net.Data

Ajax Programming

The exam is divided into separate parts. Each partcorresponds to either one or two courses.Successfully completing all parts of the examdemonstrates your proficiency in the basic skillsrequired to create an ebusiness application.

Approximate time to complete for all parts of the exam: 90-150 minutes

Recommended Uses

This Competency Exam was designed as a masterytest for the eBusiness for IBM i Programmersseries. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course or pair of courses.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriatecourse(s) for review.

Audience

The eBusiness for IBM i Programmers series,including this exam, should be taken by theindividuals responsible for implementing anorganization's web site. The audience includeswebmasters, content developers, applicationprogrammers, and system administrators.

Prerequisites

This series assumes that you are familiar with theconcepts and basic operations of both IBM i andpersonal computer systems.

Writing a CGI Program in RPG assumes that youhave a working knowledge of RPG programming inthe ILE environment. You can satisfy thisprerequisite by successfully completing the MantaRPG Programming series.

Manta Using Rational Developer for i (RDi)

Technologies Inc. 192

Using Rational Developer for i (RDi)

Order Number: PRDP00

Max.Users

FirstYear

SecondYear

Later Years

1 $324 $162 $815 $486 $243 $122

Each add’l $32 $16 $8

Overview

An Integrated Development Environment (IDE) is acollection of tools — including editors, compilers,and debuggers — that are available to aprogrammer through a common interface. Thisseries covers the most popular IDE for IBM iapplication development, IBM's Rational Developerfor i (RDi). You will see how to use RDi to write,compile, and debug IBM i programs from your PC.

This series contains the following courses:

Introduction to RDi

Using the Remote System Explorer (RSE)

Using the Integrated i Debugger

Using Rational Developer for i (RDi)Competency Exam

Approximate Study Time for the Entire Series: 7-10 hours

Audience

This series is intended for programmers, webdesigners, and other personnel who will use RDi forapplication development.

Prerequisites

This series assumes that you have an understandingof basic IBM i program development concepts andfacilities. This prerequisite can be satisfied bycompleting The IBM i Programming Environmentseries. You may also have obtained these skills bytaking other courses or through relevant workexperience.

Reference Materials

A Student Reference Guide is available for thisseries.

Related Products

This series is contained in both the ProgramDevelopment Combination Pack and the WebDevelopment Combination Pack.

Manta Using Rational Developer for i (RDi)

Technologies Inc. 193

Introduction to RDi

Order Number: PRDP01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

An Integrated Development Environment (IDE) is acollection of tools — including editors, compilers,and debuggers — that are available to aprogrammer through a common interface. Thiscourse provides an introduction to the most popularIDE for IBM i application development, the RationalDeveloper for Power Systems (RDi).

The course begins with a basic description of RDi,including a description of Eclipse, the building blockon which RDi was built. The course then introducesyou to the RDi workbench, the primary interface toRDi tools. You will learn RDi terminology, such asperspective, view, workspace, and editor.

Next, the course takes a detailed look at views. Youwill see the various ways that views can bemanipulated in a perspective. The course ends bydescribing how to access RDi's extensive helpfacility.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

Describe the function of RDi

Describe the relationship between RDi andEclipse

Start RDi

Define the following RDi terms:

o Workbench

o Workspace

o View

o Editor

o Perspective

Open a new perspective

Switch between open perspectives

Open a view

Close a view

Maximize a view

Switch between the views in a stack

Display a fast view

Convert a standard view to a fast view and viceversa

Open the Welcome view

Access the RDi Help facility

Topic Outline

RDi Overview

The RDi Workbench

Working with Views

Getting Help with RDi

Audience

This course is intended for programmers, webdesigners, and other personnel who will use RDi forapplication development.

PrerequisitesThere are no prerequisites for this course.

Manta Using Rational Developer for i (RDi)

Technologies Inc. 194

Using the Remote System Explorer (RSE)

Order Number: PRDP02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

The Remote System Explorer (RSE) is a RDicomponent that provides a variety of tools fordeveloping and working with programs and sourcefiles stored on a remote IBM i system. This coursedescribes how to use these tools.

The course begins with an introduction to RSE,showing you how to define an RSE connection to aremote IBM i system, and how to manage yourconnection definitions. Next, you will see the waysin which you can work with IBM i objects using theRSE. You will see how to create and manipulatelibraries, objects, and source members. The coursethen introduces you to the Live Parsing Extensible(LPEX) editor. In addition to learning the basiccapabilities of this editor, you will see the functions itsupports specifically for editing IBM i sourcemembers. These capabilities include sourcelanguage syntax checking, source language helpcapabilities, and the ability to display the fielddefinitions for a database file. Next, you will seehow to compile, bind, and execute programs usingthe RSE.

The course then shows you how to use commandsets to execute CL commands on a remote IBM isystem, and how to manage IBM i jobs using theRSE. The course ends by showing how to use theRSE to access and manipulate IFS files and folders.

Approximate Study Time: 3 hours

Objectives

After completing this course, you should be able to:

Define and manage RSE connections

Name and describe the five RSE subsystems

Create a filter that defines a list of libraries,objects, or source file members

Create a library, an object in a library, or amember in a source physical file

Use filters to manage libraries, objects, andsource members on a remote IBM i system

Use the LPEX editor to create and edit IBM isource members

Use RSE facilities to:

o Compile a source program

o Compile and bind a source program

o Bind a module

o Execute a program

Run a command set

Create a command set

Manage your command sets

Work with jobs running on a remote IBM isystem

Display the job log for an IBM i job

Use the RSE to navigate the IFS on a remoteIBM i system

Open an IFS file

Manage IFS files and folders

Topic Outline

Introduction to the RSE

Managing IBM i Objects

Editing Source Members

Compiling, Binding, and Executing Programs

Using Command Sets

Working with IBM i Jobs

Accessing the IFS

Audience

This course is intended for programmers who willuse RDi for IBM i application development.

Prerequisites

This course assumes that you are familiar with thegeneral concepts and capabilities of RDi. Thisprerequisite can be satisfied by completing the firstcourse in this series, Introduction to RDi. Thecourse also assumes that you have anunderstanding of basic IBM i program developmentconcepts and facilities. This prerequisite can besatisfied by completing The IBM i ProgrammingEnvironment series. You may also have obtainedthese skills by taking other courses or throughrelevant work experience.

Manta Using Rational Developer for i (RDi)

Technologies Inc. 195

Using the Integrated i Debugger

Order Number: PRDP03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

RDi includes a variety of debuggers that help youdebug programs written in a specific language ormixed languages. This course describes how to useone of those debuggers, the Integrated i Debugger.This debugger enables you use a RDi interfacerunning on your workstation to interactively debugapplications that are running on an IBM i systemhost.

The course begins by describing the tasks you needto perform in preparing to debug a program. You willlearn how to launch the debugger and how to createand save a launch configuration.

Next, the course takes a detailed look at the variousviews that make up the RDi Debug perspective. Thecourse then shows you how to use the debugger tointeractively debug a program. You will see how toset breakpoints, how to examine and change thecontents of a data item, and how to step through theprogram one line at a time.

The course ends by showing how to debug amultiple-program application. In particular, itdescribes how to add programs and serviceprograms to a debugging session.

Approximate Study Time: 2 hours

Objectives

After completing this course, you should be able to:

Define and use the terms related to theIntegrated i Debugger, including debug mode,debug data, and debug view

Name and describe the different debug viewsthat can be generated when creating a module

Launch the Integrated i Debugger

Create a launch configuration

Identify the functions supported by the variousviews that make up the Debug perspective

Customize the Debug perspective

Set and remove both conditional andunconditional breakpoints

Start a program executing under the control ofthe debugger

Terminate a program executing under thecontrol of the debugger

Display the current contents of a data item oncea breakpoint has been encountered

Change the contents of a data item

Use a watch breakpoint to stop programexecution when the value of a data item ischanged

Step through a program one statement at a time

Add a program or service program to adebugging session

Topic Outline

Introduction to the Integrated i Debugger

The Debug Perspective

Using Breakpoints

Displaying and Changing Data Items

Stepping Through a Program

Adding Programs to Your Debugging Session

Audience

This course is intended for programmers who willuse RDi for IBM i application development.

Prerequisites

This course assumes that you are familiar with thegeneral concepts and capabilities of both RDi andthe Remote System Explorer (RSE). Thisprerequisite can be satisfied by completing the firsttwo courses in this series, i and Using the RemoteSystem Explorer (RSE).

The course also assumes that you have anunderstanding of basic IBM i program developmentconcepts and facilities. This prerequisite can besatisfied by completing The IBM i ProgrammingEnvironment series.

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta Using Rational Developer for i (RDi)

Technologies Inc. 196

Using Rational Developer for i (RDi) Competency Exam Order Number: PRDP99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the UsingRational Developer for i (RDi) series:

Introduction to RDi

Using the Remote System Explorer (RSE)

Using the Integrated i Debugger

The exam is divided into separate parts. Each partcorresponds to a course in the series. Successfullycompleting all parts of the exam demonstrates yourproficiency in the basic skills required to use RDi.

Approximate Study Time: 90 minutes

Recommended Uses:

This Competency Exam was designed as a masterytest for the Using Rational Developer for i (RDi)series. We recommend that you take the exam afteryou complete the series. Alternatively, you can takethe corresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate coursefor review.

Audience

The Using Rational Developer for Power Systems(RDi) series, including this exam, is intended forprogrammers, web designers, and other personnelwho will use RDi for application development.

Prerequisites

This series assumes that you have an understandingof basic System i program development conceptsand facilities. This prerequisite can be satisfied bycompleting The IBM i Programming Environmentseries.

You may also have obtained these skills by takingother courses or through relevant work experience.

Manta COBOL Programming

Technologies Inc. 197

COBOL Programming Order Number: PCOB00

Max.Users

FirstYear

SecondYear

Later Years

1 $756 $378 $1905 $1,134 $567 $285

Each add’l $76 $38 $19

Overview

The COBOL Programming series covers thedevelopment of ILE COBOL applications on an IBM isystem.

This series contains the following courses:

Developing a COBOL Program

COBOL Output Programming

COBOL Input Programming

Performing Arithmetic in COBOL

COBOL Table Processing

COBOL File Processing

Writing Subprograms in COBOL

COBOL Programming Competency Exam

Approximate Study Time for the Entire Series:40-60 hours

Audience

This series is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Prerequisites

All courses in this series assume that you knowbasic programming concepts and are acquaintedwith structured programming design techniques. Inparticular, you will be expected to understandprogram logic that is documented using pseudocodeor structured flowcharts. You may have gained thisknowledge from attending classes or from relevantwork experience.

This series also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the Introduction to theIBM i Environment series.

Finally, the series also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in The IBM i ProgrammingEnvironment series.

Reference Materials

A Student Reference Guide is available for thisseries.

Related Products

This series is contained in both the ProgramDevelopment Combination Pack and the COBOLProgramming Combination Pack.

Manta COBOL Programming

Technologies Inc. 198

Developing a COBOL Program

Order Number: PCOB01

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course introduces you COBOL programming.

The course first describes the basic structure of aCOBOL program, using a complete program as anexample. It then describes the rules for namingvarious types of COBOL objects and how todescribe external files and internal data items. Next,the course covers the coding of common imperativestatements and the basic control structures. By theend of this course, you will be able to code acomplete COBOL program to read an input file,reformat records, and create an output file.

Approximate Study Time: 5 hours

Objectives

After completing this course, you should be able to:

Code the four divisions of a COBOL program

Find and correct simple syntax errors in asample COBOL program listing

Code valid COBOL names for programs, files,paragraphs, and data items

Code the SELECT and FD statements todescribe a file

Code the COBOL record description when giventhe record layout of a file

Code the COBOL data descriptions whenrequired variable and constant data items aredescribed

Code the COBOL statements to define, set, andtest a program flag, given a description ofprogram requirements

Code simple ADD, SUBTRACT, and MOVEstatements when given a description of thedesired result

Code simple OPEN, READ, WRITE, andCLOSE statements when given a description ofthe desired result

Code an in-line PERFORM statement todelineate a block of COBOL code

Code an out-of-line PERFORM statement toexecute a precoded paragraph

Code an IF statement to implement a simpleselection structure

Code a PERFORM statement to implement aniteration, testing the controlling condition eitherbefore or after each iteration

Predict the results of move and comparisonoperations when the source and target fields areof the same or different lengths

Code the corresponding data descriptions whengiven a description of required constant dataitems

Code INITIALIZE and MOVE statements usingliterals and/or figurative constants

Identify coding techniques that can improve theperformance of a COBOL program

Write COBOL statements using the DISPLAY orWRITE verbs to report on program execution orunexpected situations

Code a MOVE CORRESPONDING statement,to move corresponding fields of one group itemto another, when given the descriptions of twogroup items containing matching subordinateitems

Write COBOL statements using the ACCEPTverb to obtain data from the TIME, DAY, DAY-OF-WEEK, and/or DATE special registers

Define a date, time, or timestamp data item

Predict the result of move and comparisonoperations involving dates, times, andtimestamp data items

Code a COPY statement to insert COBOL codeinto a program from a source file member or anIFS file

Code a REPLACING option to modify a sourceprogram being copied

Code a REPLACE statement to globally changea word or group of words in a source program

Code a COPY statement to create datadescription entries using an external databasefile

Modify the appearance of a source programlisting by using the / (slash), TITLE, EJECT,*CONTROL, and SKIP statements

Use the COBOL Language Reference manual todetermine the proper syntax of a COBOLstatement

Identify the manual in which the answer to aquestion about COBOL programming can befound

Manta COBOL Programming

Technologies Inc. 199

Topic Outline

A Sample COBOL Program

Selecting Name

Defining Data Items

Coding Procedure Division Statementss

Basic Control Structures

Using Literals and Figurative Constants

Enhancing the Sample Program

Defining and Using Dates

Using the COBOL Copy Facility

Using Reference Manuals

Audience

The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Prerequisites

Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.

This course also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the Introduction to theIBM i Environment series.

Finally, the course also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in The IBM i ProgrammingEnvironment series.

Manta COBOL Programming

Technologies Inc. 200

COBOL Output Programming

Order Number: PCOB02

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course expands upon the fundamental COBOLprogramming skills taught in the previous course ofthis series, Developing a COBOL Program. Thecourse first describes general report concepts andthe differences between program-described andexternally described report files. It then shows howCOBOL facilities can be used to enhance thereadability of program output by formatting numericfields. The techniques covered here will applywhether the output is in the form of a printed reportor a display on a terminal screen. Next the coursedescribes how to improve the appearance of printedreports by adding headings and footings andcontrolling vertical spacing. Finally, the coursediscusses a somewhat more complex examplerequiring the use of multiple control breaks toproduce a report containing totals and subtotals.

Approximate Study Time: 4 hours

Objectives

After completing this course, you should be able to:

Identify the various components of typicalbusiness reports

Describe common report types and theirassociated business uses

Code the SELECT and ASSIGN clauses toidentify a printer file that uses either anexternally described report format or a program-described report format

Code the COBOL statements to perform outputediting, including character insertion, zerosuppression, check protection, and characterreplacement, given a description of the desiredresults

Code COBOL data definition statements toimplement a given report layout

Code WRITE statements to vary the verticalspacing of a report or to start a new page

Design and code a COBOL program to create asimple report, including headings, pagenumbers, and footings, given a problemstatement, the input data description for asequential file, and a report layout

Design and code a COBOL program to create areport using the COBOL automatic page controlfacility, given a problem statement, the inputdata description for a sequential file, and areport layout

Design and code a COBOL program to create areport requiring multiple levels of group totals(multiple control breaks), given a problemstatement, the input data description for asequential file containing records with multiplecontrol fields, and a desired report layout

Topic Outline

Introduction to Output Formatting

Report Programming

Field Editing Basics

Advanced Field Editing

A COBOL Report Program – Part 1

A COBOL Report Program – Part 2

Using the Automatic Page Control Facility

Handling Control Breaks

Handling Multiple-Level Control Breaks

Audience

The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Prerequisites

Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.

This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:

Introduction to the IBM i Environment

The IBM i Programming Environment

Finally, the course assumes that you havecompleted the previous course of this series:

Developing a COBOL Program

Manta COBOL Programming

Technologies Inc. 201

COBOL Input Programming

Order Number: PCOB03

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course describes the COBOL programmingtechniques you will use to process input for typicalbusiness applications.

The course begins by describing methods forhandling input files that contain multiple recordtypes. You will see then how to detect and processinput errors. You will also find out how to control theprocessing each input record receives. In addition,you will see various techniques for selectingspecified records from a file, processing combinedconditions, and using case structures. This courseends by explaining how to manipulate characterstrings.

Approximate Study Time: 5 hours

Objectives

After completing this course, you should be able to:

Code the COBOL statements necessary todescribe the input data for a file containingrecords with multiple descriptions

Construct the edit tests required to validategiven input data

Design and code the COBOL statementsnecessary to process rejected transactions,given a description of edits to be performed

Design and code the COBOL statementsneeded to select the specified records (usingcombined conditions and/or nested IFstatements), given a problem descriptionspecifying multiple selection criteria

Design and code a COBOL program solutiongiven a problem statement requiring the use of acase structure

Design and code COBOL program segmentsthat use INSPECT, reference modification,STRING, and UNSTRING to manipulatecharacter data

Topic Outline

Handling Multiple Data Descriptions for a SingleArea

Basic Input Editing

Detecting Other Input Errors

Processing Input Errors

Controlling Record Processing

Processing Case Structures

Processing Character Strings

Audience

The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Prerequisites

Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.

This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:

Introduction to the IBM i Environment

The IBM i Programming Environment

Finally, the course assumes that you havecompleted the previous courses of this series:

Developing a COBOL Program

COBOL Output Programming

Related Products

A Student Reference Guide is available for theseries that contains this course.

This course is contained in the COBOLProgramming series.

This course is contained in the following combinationpacks:

Program Development Combination Pack

COBOL Programming Combination Pack

Manta COBOL Programming

Technologies Inc. 202

Performing Arithmetic in COBOL

Order Number: PCOB04

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course discusses in detail the definition and useof numeric fields in COBOL. It describes how tocode the Data Division statements necessary todefine each type of numeric field, how to initializenumeric fields, and how to use them efficiently in theProcedure Division. All types of arithmetic operationsare covered. Upon completion of the course, youshould have a strong working knowledge ofarithmetic programming techniques in COBOL.

Approximate Study Time: 5 hours

Objectives

After completing this course, you should be able to:

Code the COBOL statements (ADD,SUBTRACT, MULTIPLY, DIVIDE, andCOMPUTE) to perform arithmetic operations onexternal decimal (display), packed decimal,binary, and floating-point fields

Convert numbers from one to another amongthe available numeric formats

Add and subtract hexadecimal numbers

Code the Data Division statements necessary todefine external decimal, binary, packed decimal,and floating-point fields

Convert numbers from one to another amongthe external decimal, packed decimal, andbinary formats

Predict the results of a MOVE operationbetween numeric fields of different types andunequal length

Predict the results of a comparison of numericfields

Code the COBOL statements necessary toinitialize numeric fields to specified values

Predict the results of an ADDCORRESPONDING or SUBTRACTCORRESPONDING operation

Identify common errors resulting from invalidarithmetic operations

Compute the length of a record containingexternal decimal, binary, packed decimal and/orfloating-point fields

Define work fields and output fields of sufficientsize to hold all possible results, given adescription of input fields and the arithmeticoperations to be performed

Round arithmetic results using the ROUNDEDphrase, and use the ON SIZE ERROR phrase tocatch truncation errors

Recognize arithmetic inefficiencies in a givenCOBOL program segment

Select data types, data field lengths, sign, anddecimal position options to maximize programperformance

Use decimal scale factors in a PICTURE clauseto cause scaling of a numeric item

Identify the COBOL intrinsic function to performa specified task

Invoke an intrinsic function, given a descriptionof the input data and the function desired

Topic Outline

Arithmetic Operations

Computer Numbering Systems (Optional)

Binary, Packed Decimal, and Floating-PointNumbers

Arithmetic Programming Techniques

Accuracy and Length Considerations

Efficiency Considerations

Using Scale Factors

Intrinsic Functions

Audience

The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Manta COBOL Programming

Technologies Inc. 203

Prerequisites

Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.

This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:

Introduction to the IBM i Environment

The IBM i Programming Environment

Finally, the course assumes that you havecompleted the previous courses of this series:

Developing a COBOL Program

COBOL Output Programming

COBOL Input Programming

Related Products

A Student Reference Guide is available for theseries that contains this course.

This course is contained in the COBOLProgramming series.

This course is contained in the following combinationpacks:

Program Development Combination Pack

COBOL Programming Combination Pack

COBOL Table Processing

Order Number: PCOB05

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

Table usage is an important element of manyprograms. COBOL Table Processing discusseshow to define, maintain, and use tables in aCOBOL program.

The course begins with a discussion of commontable applications. It then reviews the COBOLstatements that are used to define a table and toaccess table elements. Next the course describestechniques for loading, updating, and searching atable. A discussion of COBOL statements designedto simplify common table operations is next, followedby an introduction to tables of two and threedimensions.

Approximate Study Time: 6 hours

Objectives

After completing this course, you should be able to:

Code the Data Division entries to define andinitialize a one-dimensional table

Code a COBOL routine to retrieve a particularargument from a table, using one of thefollowing techniques, as appropriate:

o Sequential search

o Progressive search

o Direct retrieval

o Key transformation

Code COBOL routines to perform commonoperations using a variable-length table

Code the Data Division entries to define andinitialize a multi-dimensional table

Code a COBOL routine to perform the followingtable operations:

o Load the table from a sequential file

o Directly access a particular element of thetable

o Serially access each element of the table orof a specified row or column

Code the COBOL statements required toassociate an index (or indexes) with a table

Manta COBOL Programming

Technologies Inc. 204

Code the COBOL SEARCH verb to locate aspecified entry in a table

Code the COBOL SEARCH ALL verb to locatea specified entry in a sorted table

Reorder the elements in a table to reduce theaverage time required for a sequential search,given the description of a table and table lookupstatistics

Code a COBOL routine to keep track of andreport on the number of times each element isaccessed

Estimate the number of comparisons required tolocate a typical element in a table, given adescription of the table and a proposed searchstrategy

Select the optimal table organization and searchtechnique for a given table depending onwhether the objective is faster execution speed,reduced memory requirements, or fastestprogramming implementation

Topic Outline

Table Concepts and Terminology

Basic Table Operations

Useful Table Operations

Using Indexes

The Binary Search Technique

Multi-Dimensional Tables

Selecting a Table-Handling Technique

Audience

The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Prerequisites

Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.

This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:

Introduction to the IBM i Environment

The IBM i Programming Environment

Finally, the course assumes that you havecompleted the previous courses of this series:

Developing a COBOL Program

COBOL Output Programming

COBOL Input Programming

Performing Arithmetic in COBOL

Related Products

A Student Reference Guide is available for theseries that contains this course.

This course is contained in the COBOLProgramming series.

This course is contained in the following combinationpacks:

Program Development Combination Pack

COBOL Programming Combination Pack

Manta COBOL Programming

Technologies Inc. 205

COBOL File Processing

Order Number: PCOB06

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the statements and techniquesused by a COBOL programmer to process IBM ifiles.

The course begins with a review of Db2 concepts,file types, and processing. It then shows how toaccess a physical or logical data file sequentially ineither arrival sequence or key sequence. Directaccess is then covered. You will see how to accessrecords using either a record key or a relative recordnumber. In addition to learning the relevant COBOLstatements, you will also learn programmingtechniques for handling file in these ways. Thecourse ends with a discussion of I/O error detectionand handling in a COBOL program.

Approximate Study Time: 6 hours

Objectives

After completing this course, you should be able to:

Identify the processing capabilities andlimitations of the three types of COBOL files

Identify a sequential, indexed, or relative file in aCOBOL program

Code a COBOL program to load, access,update, or extend a database file using anarrival sequence access path

Code a COBOL program to access an indexedor a relative file sequentially, randomly, anddynamically, including the addition, replacement,and deletion of records

Perform generic key processing with an indexedfile

Code a COBOL program to process an indexedfile through an alternate key

Code a COBOL program that uses commitmentcontrol

Given the description of a relative file, select andcode a randomizing algorithm and an overflowtechnique for optimal performance

Code the COBOL statements to diagnose andrespond to I/O errors

Topic Outline

Db2 Review

Accessing a File Sequentially

Keyed Access

Keyed Access Enhancements

Relative Access

Relative Access Enhancements

Error Handling

Audience

The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Prerequisites

Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.

This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:

Introduction to the IBM i Environment

The IBM i Programming Environment

Finally, the course assumes that you havecompleted the previous courses of this series:

Developing a COBOL Program

COBOL Output Programming

COBOL Input Programming

Performing Arithmetic in COBOL

COBOL Table Processing

Manta COBOL Programming

Technologies Inc. 206

Related Products

A Student Reference Guide is available for theseries that contains this course.

This course is contained in the COBOLProgramming series.

This course is contained in the following combinationpacks:

Program Development Combination Pack

COBOL Programming Combination Pack

Writing Subprograms in COBOLOrder Number: PCOB07

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This course covers the creation and use ofsubprograms. The course begins by describing theconcepts that are common to all subprograms. Itthen discusses appropriate applications forsubprograms. Following this, the course illustrateshow external subprograms affect the executionprocess and examines subprogram linkage.

Next, the course discusses subprogram usage inCOBOL, beginning with how to call a subprogramfrom a COBOL program. You will then see how towrite a subprogram in COBOL. The course alsodiscusses design and testing considerations whenusing subprograms, as well as several advancedsubprogramming techniques. Finally, the coursedemonstrates how to use dynamic subprogram calls.

Objectives

After completing this course, you should be able to:

Identify the ways in which a subprogram may becalled from a COBOL program

Describe the ways in which data can be sharedbetween a subprogram and its caller

Write a COBOL program that uses asubprogram

Design and code a COBOL subprogram

Use the RETURN-CODE special register in asubprogram and a calling program to determinethe success of a subprogram

Code a COBOL subprogram which, in turn,invokes another subprogram

Code a COBOL main program that acceptsparameter information from the operatingsystem

Modify a COBOL subprogram so that it can beused in a wider variety of situations

Write a program stub to replace a COBOLsubprogram during the testing of its callingprograms

Manta COBOL Programming

Technologies Inc. 207

Write a COBOL driver program to test asubprogram

Code the COBOL statements to accomplishdynamic subprogram linkage

Topic Outline

Subprogram Concepts and Applications

External Subprogram Execution and Linkage

Invoking Subprograms in COBOL

Writing COBOL Subprograms

Advanced Subprogram Considerations

Designing and Testing in a SubprogramEnvironment

Using Programs and Procedures Written inOther Languages

Dynamic Subprogram Linkage

Audience

The course is suitable for entry-level programmingstudents with no prior COBOL experience. It canalso be taken by COBOL/400 programmers whowant to learn ILE COBOL.

Prerequisites

Before you begin your study of the material, youshould know basic programming concepts and beacquainted with structured programming designtechniques. In particular, you will be expected tounderstand program logic that is documented usingpseudocode or structured flowcharts. You may havegained this knowledge from attending classes orfrom relevant work experience.

This course also assumes that you have a workingknowledge of IBM i programming concepts andfacilities. You can satisfy this prerequisite bysuccessfully completing the courses in the followingManta series:

Introduction to the IBM i Environment

The IBM i Programming Environment

Finally, the course assumes that you havecompleted the previous courses of this series:

Developing a COBOL Program

COBOL Output Programming

COBOL Input Programming

Performing Arithmetic in COBOL

COBOL Table Processing

COBOL File Processing

Related Products

A Student Reference Guide is available for theseries that contains this course.

This course is contained in the COBOLProgramming series.

This course is contained in the following combinationpacks:

Program Development Combination Pack

COBOL Programming Combination Pack

Manta COBOL Programming

Technologies Inc. 208

COBOL Programming Competency Exam Order Number: PCOB99

Max.Users

FirstYear

SecondYear

Later Years

1 $120 $60 $305 $180 $90 $45

Each add’l $12 $6 $3

Overview

This Competency Exam tests your mastery of theobjectives for the courses that make up the COBOLProgramming series. The following exams areavailable now:

Developing a COBOL Program

COBOL Output Programming

COBOL Input Programming

Performing Arithmetic in COBOL

COBOL Table Processing

COBOL File Processing

Writing Subprograms in COBOL

The exam is divided into separate parts, one foreach course in the series. Successfully completingall parts of the exam demonstrates your proficiencyin the skills required to develop ILE COBOLapplications.

Approximate time to complete all parts of theexam: 4 hours

Recommended Uses

This Competency Exam was designed as a masterytest for the COBOL Programming series. Werecommend that you take the exam after youcomplete the series. Alternatively, you can take thecorresponding portion of the exam when youcomplete each course.

Another use for the Competency Exam is as apretest. Depending on your previous experienceand training, you may feel that you already know thematerial covered by a given course. If this is thecase, you should take the exam corresponding tothat course. If you successfully complete the exam,you can skip the course, confident that you havealready mastered the skills it teaches.

Evaluation

The exam automatically evaluates your performanceand reports how you did. To "pass" the exam, youmust successfully work at least 80% of the exercisescorresponding to each topic. If you score less than80%, you will be directed to the appropriate sessionfor review.

Audience

The COBOL Programming series, including thisexam, is intended for programmers new to theCOBOL programming language. It can also be takenby COBOL/400 programmers who want to learn ILECOBOL.

Prerequisites

All courses in this series assume that you knowbasic programming concepts and are acquaintedwith structured programming design techniques. Inparticular, you will be expected to understandprogram logic that is documented using pseudocodeor structured flowcharts. You may have gained thisknowledge from attending classes or from relevantwork experience.

This series also assumes that you have a workingknowledge of basic IBM i concepts and facilities.You can satisfy this prerequisite by successfullycompleting the courses in the Introduction to theIBM i Environment series.

Finally, the series also assumes you familiar withIBM i programming concepts and facilities. You cansatisfy this prerequisite by successfully completingthe courses in The IBM i ProgrammingEnvironment series.