CHECK
DCB
BLKSIZE
BUFCB
BUFL
LIMCT
LRECL
MACRF
The following fields of a DCB may be specified, relative to the
particular access method indicated:
BDAM BPAM BSAM
n(number) n n n
a(address) a a a
n n n n
n n n n
s(symbol) s s s
DA
a a a a
n n
n
n n n
R,W R,W
a a a a
n n
The manipulation of data is governed by an access method. To facilitate the exe
cution of as Code under
present it. For instance, when the processors expect an access method to acquire
input source cards sequentially,
late the
that the as access methods would have produced. Therefore, data appears in stor
age as if it had been manipulated using an as access method. For example, block
descriptor words (BDW), buffer pool management, and variable records are
updated in storage as if an as access method had processed the data. The actual
writing to and reading from the
Note that the character string X'61FFFF61' is interpreted by
file indicator.
The essential work of the volume table of contents
trol block (DSCB) is done in
the disk contents, and a file status table
are formatted in physical blocks of
device, for files whose filemode number is 4. That is, the block and record descrip
tor words (BDW and RDW) are written along with the data. If a data set consists
of blocked records, the data is written to, and read from, the
blocks, rather than logical records.
manipulating data sets.
8
If an input data set is not a BDAM data set, zero is the only value that should be specified for
KEYLEN. This applies to the user exit lists as well as to the DCB macro instruction.