0% found this document useful (0 votes)
22 views4 pages

Samc2090 320

Uploaded by

Johnny Jumper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

Samc2090 320

Uploaded by

Johnny Jumper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Sample Test:

This sample test is designed to give the candidate an idea of the content and format of the questions that
will be on the certification exam. Performance on the sample test is NOT an indicator of performance on
the certification exam and this should not be considered an assessment tool.

(Answer Key at end)

1) Which SQL language element can be used to define a set of actions that are executed when a
DELETE, INSERT, or UPDATE operation occurs on a specified table or view?

A. A trigger
B. A special register
C. The VALUE function
D. A referential constraint

2) When a stored procedure returns a result set to the calling program, which of the following
statements is true about the two programs?

A. The OPEN and FETCH statements are both coded in the calling program
B. The OPEN and FETCH statements are both coded in the stored procedure
C. The OPEN statement is coded in the calling program and the FETCH statement is coded in the stored
procedure
D. The OPEN statement is coded in the stored procedure and the FETCH statement is coded in the
calling program

3) For an existing nonpartitioned secondary index (NPSI) with user-managed data sets, you need
to determine the following values:

 Name of the index (NAME)


 The database in which the index was created (DBNAME)
 Its space allocation in units of 4KB storage blocks (PQTY, SQTY)
 The number of KB of DASD storage allocated to the index (SPACE)

Which two DB2 Catalog tables contain the information to determine these values?

A. SYSINDEXES and SYSKEYS


B. SYSINDEXPART and SYSINDEXSTATS
C. SYSINDEXES and SYSINDEXPART
D. SYSDATABASE and SYSINDEXPART
4) Given the following CREATE VIEW statement, which of the following is TRUE?

CREATE VIEW A.CA_PROJECT_TEAM


(PROJNO, PROJNAME, PROJDEP, RESPEMP, FIRSTNME, MIDINIT, LASTNAME)
AS SELECT ALL
PROJNO, PROJNAME, DEPTNO, EMPNO, FIRSTNME, MIDINIT, LASTNAME
FROM A.PROJ, A.EMP
WHERE RESPEMP = EMPNO and STATE = 'CA';

A. The final view result set includes all rows of the joined tables but eliminates redundant duplicate rows
B. The view is a join of tables and is therefore read-only
C. A column named in the WHERE, GROUP BY, or HAVING clause must be part of the view
D. All possible columns defined in A.PROJ and A.EMP have been included in the view

5) What does the fourth character in a DB2 message number indicate?

A. The subcomponent identifier


B. The severity of the message
C. The resource type of the involved database object
D. Whether or not the message only relates to the data sharing member where the event occurred.

6) Which of the following statements is true for stand-alone utilities?

A. They can only run when DB2 is operational


B. They can only run when DB2 is in a stopped state
C. Only one stand-alone utility requires DB2 to be stopped so that it can be executed.
D. Only one stand-alone utility can be run when DB2 is stopped.

7) A transaction reads the same row twice and needs the same value returned each time.
However, it is not concerned about new rows appearing during the course of the transaction’s
execution. Which isolation level is appropriate?

A. Read stability
B. Repeatable read
C. Cursor stability
D. Uncommitted read

8) Which DB2 address space is responsible for managing locking?

A. IRLM
B. DIST
C. MSTR
D. DBM1
9) Which of the following statement describes the effect of setting the SEPARATE_SECURITY
installation parameter to YES?

A. Prevents DBADM from starting traces.


B. Allows statement to be explained without table access privileges.
C. Prevents SYSADM from accessing data in unauthorized tables.
D. Prevents SYSADM and SYSCTRL from granting or revoking privileges.

10) Which of the following SECURITY values tells DB2 to use the authorization ID of the user that
calls the stored procedure to access a non DB2 resource?

A. DB2
B. RACF
C. USER
D. DEFINER

11) What are the only predicates that can be applied to an XML data type?

A. XMLEXISTS and NULL


B. DISTINCT and IN
C. LIKE and ORDER BY
D. BETWEEN and IS NOT NULL

12) Which of the following data types would be used to specify an implicit decimal point?

A. REAL
B. FLOAT
C. NUMERIC
D. SMALLINT

13) Which of the following types of DB2 tables would you use to store information that is derived and
summarized from other tables?

A. A clone table
B. An auxiliary table
C. A materialized query table
D. A real-time statistics table
14) In a data sharing environment, to control access to data that is of inter-DB2 interest, whenever the
data is changed, DB2 caches it in which of the following objects?

A. The lock structure


B. A group buffer pool
C. A bootstrap data set
D. The shared communications area

Answer Key
1. A
2. D
3. C
4. B
5. A
6. C
7. A
8. A
9. D
10. C
11. A
12. C
13. C
14. B

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy