Are you interested in
answering questions on DB2 for Common Servers? Try these 20. Some
of these questions are for a DBA.
1. Which communication protocol could you use to access a DB2
common server database?
A. X.25
B. AppleTalk
C. TCP / IP
2. Which is the command to start the instance?
A. db2begin
B. startdb2
C. db2start
3. If a user has ALTER privilege for a table, which task can
they perform?
A. Create a view on the table
B. Select data from the table
C. Drop a primary key definition
4. What is the relationship between DB2 instances and
databases?
A. You can have only one database for each instance
B. The instance name and the database name must match
C. The authentication for the database and its instance must
match
5. Which authority or privilege is specified in the DBM
configuration?
A. DBADM
B. DBCTRL
C. SYSADM
6. Given the following users :
USER1 needs to be able to backup databases, USER2 needs to be
able to monitor database activity
If USER1 and USER2 belong to GROUPA, which task is required to
setup these users?
A. Add their userids to the SYSADM group, as specified in the DBM
configuration
B. Grant SYSADM authority to GROUPA
C. Grant DBADM authority to GROUPA
7. Where would you look to determine which users had the
ability to create a table?
A. SYSTEM.TABLES
B. SYSIBM.TABAUTH
C. SYSCAT.DBAUTH
8. Which statement defines table check constraints?
A. CREATE INDEX
B. CREATE TABLE
C. CREATE CHECK CONSTRAINT
9. What action can result in internal record deletes?
A. table-check constraints
B. user-defined data types
C. referential integrity constraints
10. Given the tables:
PC
serial_num INT
model_num INT
owner_id INT
EMPLOYEE
employee_num INT NOT NULL PRIMARY KEY
Which action ensures that no rows can be inserted into the PC
table unless the owner_id matches an employee_num value in the
EMPLOYEE table?
A. Add a foreign key constraint to the EMPLOYEE table
B. Add a primary key constraint to the PC table
C. Add a foreign key constraint to the PC table
11. Which action will cause an index to be created?
A. Define a table check constraint
B. Define a user-defined data type
C. Define a primary key constraint
12. Which isolation level would lock the most data?
A. read stability
B. cursor stability
C. repeatable read
13. Which table space characteristic can be altered for a DMS
table space?
A. Modify the extent size
B. Modify the prefetch size
C. Change the location of an existing container
14. Which of the following can be used as a container in an
SMS table space?
A. File
B. Logical Volume
C. Directory
15. Why might data exist in the exception table following a
LOAD operation?
A. Primary key constraint violations
B. Triggers may have fired and populated the exception table
C. Referential integrity constraint violations occurred
16. What command would update the database recovery history
file?
A. ROLLFORWARD
B. IMPORT
C. BACKUP
17. When is the table space recovery available?
A. Always
B. When log retain is disabled
C. When log retain is enabled
18. Which command should you use to update a package after the
developer has modified the application executable?
A. REBIND
B. BIND
C. OPTIMIZE PACKAGE
19. What must be done prior to capturing an EXPLAIN snapshot?
A. Create the EXPLAIN database
B. Rebind the EXPLAIN tool
C. Create the EXPLAIN tables
20. There are two tables defined in a database called:
db2.staff and payroll.staff
An application issues a dynamic SQL statement "SELECT * FROM
staff". What determines which table will be accessed?
A. the userid of the binder of the package
B. the userid connected to the database
C. the userid of the precompiler of the package
Show me the answers
Visit
my quiz archive
Return to
my homepage
My site is in Geocities.
|