Certbus > IBM > IBM Certified Database Associate > C2090-616 > C2090-616 Online Practice Questions and Answers

C2090-616 Online Practice Questions and Answers

Questions 4

Which DB2 product required to allow connections from DB2 LUW to DB2 on z/OS?

A. DB2 Connect

B. DB2 Runtime Client

C. DB2 Data Server Client

D. DB2 Enterprise Server Edition

Browse 63 Q&As
Questions 5

What type of function is created using the following command? CREATE FUNCTION TAN (X DOUBLE) RETURNS DOUBLE LANGUAGE SQL CONTAINS SQL NO EXTERNAL ACTION DETERMINISTIC RETURN SIN(X)/COS(X)

A. Row

B. Table

C. Scalar

D. External

Browse 63 Q&As
Questions 6

You are asked to provide a recommendation for the appropriate DB2 edition for a new application. The application is characterized by long, complex queries that select a subset of columns and often perform grouping and aggregation. The initial database size is estimated at 5 TB, with growth of about 100 GB per year. Keep data size on disk to a minimum is a priority?

Which of the following editions would be best meet the described needs?

A. DB2 Express-C

B. DB2 Enterprise Server Edition

C. DB2 Workgroup Server Edition

D. DB2 Advanced Enterprise Server Edition

Browse 63 Q&As
Questions 7

Which database object can be locked explicitly?

A. Row

B. View

C. Index

D. Table

Browse 63 Q&As
Questions 8

Shadow tables are a special kind of Materialized Query Table, but what makes them different? (Choose two.)

A. Shadow tables cannot be queried directly

B. Shadow tables do not store their data on disk

C. Shadow tables must be organized by column

D. Shadow tables must be maintained by replication

E. You cannot join shadow tables to other kinds of tables

Browse 63 Q&As
Questions 9

The current user wants to produce a list of all user privileges she has been granted. Which table or view can be queried to produce the desired result?

A. SYSCAT.DBAUTH

B. SYSIBMADM.GRANTS

C. SYSIBMADM.PRIVILEGES

D. SYSCAT.USER_TAB_PRIVS

Browse 63 Q&As
Questions 10

What is the maximum precision for the DECIMAL data type?

A. 7

B. 15

C. 23

D. 31

Browse 63 Q&As
Questions 11

Which locking event occurs when two applications lock rows that are needed by the other, such that neither application can continue executing?

A. Deadlock

B. Lock timeout

C. Lock escalation

D. Lock conversion

Browse 63 Q&As
Questions 12

A portion of your database tables are used for OLTP-type processing and another portion are used for more analytical queries. There is a small subset of tables that are used in both of these usage patterns. What could you use to derive the analytic improvements offered by BLU technology in such an environment?

A. Shadow tables

B. Range-partitioned tables

C. Materialized query tables

D. Multidimensional clustering tables

Browse 63 Q&As
Questions 13

Consider the following sequence of events:

Eddie grants SELECT WITH GRANT OPTION privilege to Mike.

Mike grants SELECT privilege to Jeff.

Eddie revokes SELECT privilege from Mike.

What will happen to Jeff's SELECT privilege?

A. Jeff's SELECT privilege will be revoked

B. Jeff's SELECT privilege will be retained

C. Jeff's SELECT privilege will be retained only if he has ACCESSCTRL authority

D. Jeff's SELECT privilege will be retained only if Eddie has ACCESSCTRL authority

Browse 63 Q&As
Questions 14

Which of the following statements will successfully create a table that scores index data in a different table space than the table data?

A. CREATE TABLE t1 (c1 INT, c2 INT);

B. CREATE TABLE t1 (c1 INT, c2 INT) IN TS1 INDEX IN TS2;

C. CREATE TABLE t1 (c1 INT, c2 INT) IN TS1 INDEX IN TS1;

D. CREATE TABLE t1 (c1 INT, c2 INT) DATA IN TS1 INDEX IN TS2;

Browse 63 Q&As
Questions 15

Which of the following isolation levels most reduces concurrency and is most likely to cause lock escalations?

A. Read Stability

B. Cursor Stability

C. Repeatable Read

D. Uncommitted Read

Browse 63 Q&As
Questions 16

How can you tell what privileges on a table or view have been granted to a user? (Choose two.)

A. db2look with the -x option

B. db2pd with the -auth option

C. Query the SYSCAT.DBAUTH view

D. Query the SYSCAT.TABLES view

E. Query the SYSCAT.TABAUTH view

Browse 63 Q&As
Questions 17

Which of the following is TRUE regarding user switching in a trusted context?

A. You cannot switch user id in a trusted context.

B. You can issue a switch-user request within a transaction.

C. The new user must have the connect-privilege on the database for it to succeed.

D. No password is ever required for the new user as an authentication is established in the trusted connection.

Browse 63 Q&As
Questions 18

With HADR, which of the following configuration and topology choices provides the highest level of protection from potential loss of data in a pureScale environment?

A. Principal standby with SYNC synchronization mode

B. Auxiliary standby with SYNC synchronization mode

C. Principal standby with NEARSYNC synchronization mode

D. Auxiliary standby with SUPERSYNC synchronization mode

Browse 63 Q&As
Exam Code: C2090-616
Exam Name: DB2 11.1 Fundamentals for LUW
Last Update: Apr 23, 2024
Questions: 63 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99