![]() |
I. General AS/400 Systems, Design and Function A.Describe Basic Features and Benefits of the AS/400 1.Identify compatible applications B.Describe Basic Models and Basic System Design 1.Describe disk protection 2.Describe the basic features of FSIOP II. Pre-Installation A. Perform Installation Planning 1.Identify number of users 2.Describe the purpose of a System Assurance Planning Review B. Survey the Installation Environment 1.Verify adequate power and I/O devices 2.Identify temperature and power requirements III. Hardware Installation A. Install and Configure Hardware 1.Install Console 2.Install ECS Modem 3.Set terminal address 4.Connect cables B. Verify HardWare Installation 1.IPL the machine in manual mode 2.Complete IPL 3.Initiate Dedicated Service Tools 4.Review hardware configuration 5.Review disk configuration C. Perform Problem Determination/Troubleshooting 1.Work with Service Tools 2.Run tests on Input/Output to verify status 3.Review error log 4.Identify possible problem causes given a set of symptoms IV. Software Installation A. Install and Configure Software 1.Install required software from tape or CD 2.Set user licenses to appropriate value 3.Verify correctness of pre-installed software and PTFs 4.Backup entire system 5.Set Network attributes 6.Install AS/400 User Tools V. Installing Added Features A. Connect Peripherals and options 1.Connect PCs 2.Connect Printers 3.Verify that PCs are connected properly 4.Identify where Client Access programs are located B. Configure and Test the ECS Line 1.Test the ECS Line 2.Review the appropriate error information and correct 3.Set up contact information 4.Set up dial out numbers 5.Download current PTF Information VI. Customizing the Installation A. Customize/Configure the Installation 1.Install License Program Products 2.Identify the components of a communications configuration 3.Set system values 4.Set networking configurations 5.Create user profiles 6.Select Operational Assistant Options 7.Select appropriate controlling subsystem 8.Identify where to seek information on tailoring memory pools 9.Setup initial security environment 10.Create device descriptions B. Consult with Customer/Close Job 1.Identify effective backup strategies 2.Explain the importance of changing IBM User IDs 3.Explain the importance of security 4.Identify where to seek assistance Take the sample test. |