Which DB2 product required to allow connections from DB2 LUW to DB2 on z/OS?
A. DB2 Connect
B. DB2 Runtime Client
C. DB2 Data Server Client
D. DB2 Enterprise Server Edition
What type of function is created using the following command? CREATE FUNCTION TAN (X DOUBLE) RETURNS DOUBLE LANGUAGE SQL CONTAINS SQL NO EXTERNAL ACTION DETERMINISTIC RETURN SIN(X)/COS(X)
A. Row
B. Table
C. Scalar
D. External
You are asked to provide a recommendation for the appropriate DB2 edition for a new application. The application is characterized by long, complex queries that select a subset of columns and often perform grouping and aggregation. The initial database size is estimated at 5 TB, with growth of about 100 GB per year. Keep data size on disk to a minimum is a priority?
Which of the following editions would be best meet the described needs?
A. DB2 Express-C
B. DB2 Enterprise Server Edition
C. DB2 Workgroup Server Edition
D. DB2 Advanced Enterprise Server Edition
Which database object can be locked explicitly?
A. Row
B. View
C. Index
D. Table
Shadow tables are a special kind of Materialized Query Table, but what makes them different? (Choose two.)
A. Shadow tables cannot be queried directly
B. Shadow tables do not store their data on disk
C. Shadow tables must be organized by column
D. Shadow tables must be maintained by replication
E. You cannot join shadow tables to other kinds of tables
The current user wants to produce a list of all user privileges she has been granted. Which table or view can be queried to produce the desired result?
A. SYSCAT.DBAUTH
B. SYSIBMADM.GRANTS
C. SYSIBMADM.PRIVILEGES
D. SYSCAT.USER_TAB_PRIVS
What is the maximum precision for the DECIMAL data type?
A. 7
B. 15
C. 23
D. 31
Which locking event occurs when two applications lock rows that are needed by the other, such that neither application can continue executing?
A. Deadlock
B. Lock timeout
C. Lock escalation
D. Lock conversion
A portion of your database tables are used for OLTP-type processing and another portion are used for more analytical queries. There is a small subset of tables that are used in both of these usage patterns. What could you use to derive the analytic improvements offered by BLU technology in such an environment?
A. Shadow tables
B. Range-partitioned tables
C. Materialized query tables
D. Multidimensional clustering tables
Consider the following sequence of events:
Eddie grants SELECT WITH GRANT OPTION privilege to Mike.
Mike grants SELECT privilege to Jeff.
Eddie revokes SELECT privilege from Mike.
What will happen to Jeff's SELECT privilege?
A. Jeff's SELECT privilege will be revoked
B. Jeff's SELECT privilege will be retained
C. Jeff's SELECT privilege will be retained only if he has ACCESSCTRL authority
D. Jeff's SELECT privilege will be retained only if Eddie has ACCESSCTRL authority
Which of the following statements will successfully create a table that scores index data in a different table space than the table data?
A. CREATE TABLE t1 (c1 INT, c2 INT);
B. CREATE TABLE t1 (c1 INT, c2 INT) IN TS1 INDEX IN TS2;
C. CREATE TABLE t1 (c1 INT, c2 INT) IN TS1 INDEX IN TS1;
D. CREATE TABLE t1 (c1 INT, c2 INT) DATA IN TS1 INDEX IN TS2;
Which of the following isolation levels most reduces concurrency and is most likely to cause lock escalations?
A. Read Stability
B. Cursor Stability
C. Repeatable Read
D. Uncommitted Read
How can you tell what privileges on a table or view have been granted to a user? (Choose two.)
A. db2look with the -x option
B. db2pd with the -auth option
C. Query the SYSCAT.DBAUTH view
D. Query the SYSCAT.TABLES view
E. Query the SYSCAT.TABAUTH view
Which of the following is TRUE regarding user switching in a trusted context?
A. You cannot switch user id in a trusted context.
B. You can issue a switch-user request within a transaction.
C. The new user must have the connect-privilege on the database for it to succeed.
D. No password is ever required for the new user as an authentication is established in the trusted connection.
With HADR, which of the following configuration and topology choices provides the highest level of protection from potential loss of data in a pureScale environment?
A. Principal standby with SYNC synchronization mode
B. Auxiliary standby with SYNC synchronization mode
C. Principal standby with NEARSYNC synchronization mode
D. Auxiliary standby with SUPERSYNC synchronization mode