Which action needs to be performed in order to complete the definition of an application-period temporal table?
A. A transaction-start-id column must be defined for the table.
B. A history table must be defined and associated with the base table.
C. A BUSINESS_TIME period must be specified in a CREATE or ALTER of the table.
D. A unique index must be created that prevents overlapping of the BUSINESS_TIME period of the table.
Which product is used to customize execution environments for the purpose of controlling system resources so that one department or service class does not overwhelm the system?
A. pureScale
B. Workload manager
C. Data partitioning feature
D. Self-tuning memory manager
Application APP_A is performing updates to table TAB1 using the cursor stability (CS) isolation level. If application APP_B wants to retrieve all rows from table TAB1 without waiting for application APP_A to finish making updates, what isolation level must application APP_B use?
A. Read Stability (RS)
B. Repeatable Read (RR)
C. Uncommitted Read (UR)
D. Cursor Stability (CS)
Which command is used to back out a subset of database changes that have been made within a unit of work?
A. COMMIT
B. ROLLBACK
C. COMMIT TO SAVEPOINT
D. ROLLBACK TO SAVEPOINT
A table named EMPLOYEE was created as follows: Which action will prevent unauthorized users from accessing SSN data?
A. Assign the SSN column to a restricted role that only authorized users can access.
B. Only grant ACCESSCTRL authority for the SSN column to users who need to access SSN data.
C. Alter the table definition so that SSN data is stored in a separate schema that only authorized users can access.
D. Create a view for the EMPLOYEE table that does not contain the SSN column and require unauthorized users to use the view.
Which statement about BEFORE triggers is FALSE?
A. A BEFORE trigger can be used to perform validation of input data.
B. A BEFORE trigger can be used to automatically generate values for newly inserted rows.
C. A BEFORE trigger is fired for each row in the set of affected rows before the trigger event executes.
D. A BEFORE trigger is fired for each row in the set of affected rows instead of executing the trigger event.
When is a mask used to limit access to data in a table?
A. When mandatory access control (MAC) is used to protect the table.
B. When discretionary access control (DAC) is used to protect the table.
C. When label-based access control (LBAC) is used to protect the table.
D. When row and column access control (RCAC) is used to protect the table.
What privilege is required to create a view on a table that you are not the owner of?
A. INSERT
B. SELECT
C. CREATE
D. TRIGGER
Which of the following privileges allow a user to update the comment on a sequence?
A. ALTER
B. USAGE
C. UPDATE
D. COMMENT
Given the SQL statement: CREATE ALIAS total_sales FOR sales Which statement is valid?
A. SALES can be the name of a schema.
B. SALES can be the name of a package.
C. SALES can be the name of an existing alias.
D. SALES can be the name of a declared global temporary table.
Which DB2 object is associated with PREVIOUS VALUE and NEXT VALUE expressions?
A. View
B. Table
C. Sequence
D. Identity Column
Given the following statements:
What will be the result?
A. Joe Smith
B.
C.
D.
When a user-defined function (UDF) is created and no schema is specified, what schema is used to store the UDF?
A. The SYSIBM schema.
B. The SYSFUN schema.
C. A schema with the name of the UDF.
D. A schema with the userid of the UDF definer.
Which statement regarding referential integrity constraints is true?
A. Multiple primary keys can be defined for a table.
B. A foreign key can reference multiple primary keys.
C. A primary key can be referenced by only one foreign key.
D. Primary keys and foreign keys are used to define relationships.
The EXCLUSIVE MODE option of the LOCK TABLE statement is used to prevent which of the following?
A. Concurrent application processes from performing any operations on the table.
B. Concurrent application processes from performing any read-only operations on the table.
C. Concurrent applications processes that are running under the cursor stability (CS) isolation level from performing read-only operations on thetable.
D. Concurrent applications processes that are running under the uncommitted read (UR) isolation level from performing read-only operations onthe table.