Ejemplo_1_1

Description

Quiz on Ejemplo_1_1, created by mmorenonf on 17/06/2015.
mmorenonf
Quiz by mmorenonf, updated more than 1 year ago More Less
Mª Carmen Ruiz Garcia
Created by Mª Carmen Ruiz Garcia almost 9 years ago
ismael mesa domi
Copied by ismael mesa domi almost 9 years ago
renanvkas
Copied by renanvkas almost 9 years ago
mmorenonf
Copied by mmorenonf almost 9 years ago
12
0

Resource summary

Question 1

Question
If the following command is executed: CREATE DATABASE test What is the page size (in kilobytes) of the database?
Answer
  • 4
  • 8
  • 16
  • 32

Question 2

Question
Given the following DDL statement: CREATE TABLE sales (item CHAR(20)); If a DBA wishes to increase the size of the ITEM column, which SQL statement needs to be used?
Answer
  • ALTER TABLE sales ADD COLUMN item CHAR(40);
  • ALTER TABLE sales ALTER COLUMN item CHAR(40);
  • ALTER TABLE sales MODIFY COLUMN item CHAR(40);
  • ALTER TABLE sales ALTER COLUMN item SET DATA TYPE CHAR(40);

Question 3

Question
Which DB2 object can be used to improve the execution performance of qualified SELECT statements?
Answer
  • Trigger
  • SQL Procedure
  • Sequence Object
  • Materialized Query Table

Question 4

Question
When is it appropriate to use a sequence?
Answer
  • When you want to control the order in which triggers are fired.
  • When you want to control the order in which stored procedures can be invoked.
  • When you want to automatically generate a numeric value that is not tied to any specific column or table.
  • When you want to automatically generate a numeric value for each row that is added to a specific table.

Question 5

Question
5.Which clause should be included in a ALTER TABLE statement to update a table definition with a new column?
Answer
  • ADD COLUMN
  • ALTER COLUMN
  • APPEND COLUMN
  • RENAME COLUMN

Question 6

Question
Which object is a stored procedure defined into?
Answer
  • Table
  • Schema
  • Package
  • Database

Question 7

Question
Which action needs to be performed in order to complete the definition of an application-period temporal table?
Answer
  • A transaction-start-id column must be defined for the table.
  • A history table must be defined and associated with the base table.
  • A BUSINESS_TIME period must be specified in a CREATE or ALTER of the table.
  • A unique index must be created that prevents overlapping of the BUSINESS_TIME period of the table.

Question 8

Question
What functionality allows users to perform a UNION operation between a DB2 table and an Oracle view?
Answer
  • Oracle connect
  • Trusted context
  • Oracle federation
  • Distributed request

Question 9

Question
You have a business need to query DB2 10 and DB2 9 databases and you want to write an application that can run on most platforms unchanged. Which interface would you use to achieve your goal?
Answer
  • CLI
  • XML
  • JDBC
  • RUBY

Question 10

Question
Which DB2 object is used to provide a logical grouping of other database objects?
Answer
  • Alias
  • Index
  • Schema
  • Collection

Question 11

Question
What are two valid objects that can be created in DB2? (Choose two.)
Answer
  • Tree
  • Node
  • Trigger
  • Contexts
  • Sequence

Question 12

Question
Which type of temporal table can be used to store only time-sensitive data?
Answer
  • Bitemporal
  • Time-period
  • System-period
  • Application-period

Question 13

Question
When an index is created for a table, where is the metadata for that index stored?
Answer
  • In the table definition
  • In the system catalog.
  • In the schema that the index resides in.
  • In the metadata of the table the index was created for.

Question 14

Question
Which product is used to customize execution environments for the purpose of controlling system resources so that one department or service class does not overwhelm the system?
Answer
  • pureScale
  • Workload manager
  • Data partitioning feature
  • Self-tuning memory manager

Question 15

Question
What type of mechanism is a simple token value that is used to refer to a much bigger large object (LOB)?
Answer
  • locator
  • pointer
  • address
  • reference

Question 16

Question
What type of large object (LOB) is used to store LOB data together with the formatted rows on data pages, instead of in a separate LOB storage object?
Answer
  • inline
  • binary
  • internal
  • partitioned

Question 17

Question
What is the purpose of the Query Tuner?
Answer
  • To automatically capture and stop rogue queries.
  • To provide recommendations and analysis for tuning a single query.
  • To provide recommendations and analysis for tuning up to 100 queries.
  • To recommend indexes and to guide DBAs through the process of creating new indexes.

Question 18

Question
Which tool allows users to connect to a DB2 database using a wizard?
Answer
  • Control Center
  • IBM Data Studio
  • Universal Connection Expert
  • DB2 Connection Pool Manager

Question 19

Question
Which two activities indicate the need for a data warehouse? (Choose two.)
Answer
  • Confirm product inventory.
  • Monitor product availability.
  • Summarize sales by region.
  • Identify patterns for products sold in the last five years.
  • Associate one or more products with a purchase order.

Question 20

Question
What is the primary function of an Online Transaction Processing (OLTP) workload?
Answer
  • To combine data from multiple sources.
  • To discover hidden relationships in data.
  • To analyze large amounts of data to find patterns.
  • To make changes to a small number of records within a single transaction.

Question 21

Question
Which isolation level offers the greatest protection of data but provides the least amount of concurrency?
Answer
  • Read Stability (RS)
  • Cursor Stability (CS)
  • Repeatable Read (RR)
  • Uncommitted Read (UR)

Question 22

Question
What factor influences lock escalation?
Answer
  • Table size
  • Buffer space
  • Number of locks
  • Available real storage

Question 23

Question
Which type of lock allows the lock owner and all concurrent applications to read, but not update, the locked data?
Answer
  • Share (S)
  • Update (U)
  • Exclusive (X)
  • Intent Exclusive (IX)

Question 24

Question
Application APP_A is performing updates to table TAB1 using the cursor stability (CS) isolation level. If application APP_B wants to retrieve all rows from table TAB1 without waiting for application APP_A to finish making updates, what isolation level must application APP_B use?
Answer
  • Read Stability (RS)
  • Repeatable Read (RR)
  • Uncommitted Read (UR)
  • Cursor Stability (CS)

Question 25

Question
Which statement will prevent concurrent application processes from performing anything other than read-only operations against a table named TAB1?
Answer
  • LOCK TABLE tab1 IN READ MODE
  • LOCK TABLE tab1 IN SHARE MODE
  • LOCK TABLE tab1 IN EXCLUSIVE MODE
  • LOCK TABLE tab1 IN READ-ONLY MODE

Question 26

Question
When is an INTENT EXCLUSIVE (IX) lock required?
Answer
  • When a transaction intends to read or change data.
  • When a transaction intends to change but not read data.
  • When a transaction intends to read but not change data.
  • When a transaction intends to change the system catalog.

Question 27

Question
What is the act of exchanging one lock an application holds on a resource for a more restrictive lock on the same resource known as?
Answer
  • Lock escalation
  • Lock substitution
  • Lock switch/exchange
  • Lock conversion/promotion

Question 28

Question
What isolation level prevents dirty reads, nonrepeatable reads, and phantoms?
Answer
  • Read stability (RS)
  • Cursor stability (CS)
  • Repeatable read (RR)
  • Uncommitted read (UR)

Question 29

Question
Which operation normally does NOT require an exclusive lock?
Answer
  • BIND
  • DROP
  • GRANT
  • SELECT

Question 30

Question
When a COMMIT statement is executed, what happens?
Answer
  • All locks held on the database are automatically released.
  • Data stored in global temporary tables is automatically deleted.
  • Open cursors defined WITH HOLD are closed, but their data is retained.
  • The current transaction is terminated and a new transaction boundary is started.

Question 31

Question
Which command is used to back out a subset of database changes that have been made within a unit of work?
Answer
  • COMMIT
  • ROLLBACK
  • COMMIT TO SAVEPOINT
  • ROLLBACK TO SAVEPOINT

Question 32

Question
An SQL function designed to convert temperatures from Fahrenheit to Celsius was created as follows: CREATE FUNCTION conv_temp (IN temp_f FLOAT RETURNS INTEGER NO EXTERNALACTION SPECIFIC convert_ftoc RETURN INT ((temp_f -32)/1.8) How can this function be used to convert average temperature (AVG_TEMP) data stored in a table called CLIMATE_INFO?
Answer
  • CALL conv_temp(climate_info.avg_temp);
  • CALL convert_ftoc(climate_info.avg_temp);
  • SELECT conv_temp(avg_temp) FROM climate_info;
  • SELECT convert_ftoc(avg_temp) FROM climate_info;

Question 33

Question
If a table named MY_TAB contains 100 rows and the following statement is executed: DELETE FROM (SELECT * FROM my_tab ORDER BY col1 DESC FETCH FIRST 5 ROWS ONLY) AS tmp; What will happen?
Answer
  • The last 5 rows in the table will be deleted.
  • The first 5 rows in the table will be deleted.
  • The statement will fail because a subquery cannot be used with a DELETE statement.
  • The statement will fail because a table name was not specified with the DELETE statement.

Question 34

Question
Given an EMPLOYEES table and a SALES table, a user wants to produce a list of all employees and their associated revenue, even if no revenue exists. Which SQL statement will produce the desired list?
Answer
  • SELECT employees.name, sales.revenue FROM employees INNER JOIN sales ON employees.id = sales.emp_id
  • SELECT employees.name, sales.revenue FROM employees INNER JOIN sales ON sales.emp_id = employees.id
  • SELECT employees.name, sales.revenue FROM sales LEFT OUTER JOIN employees ON employees.id = sales.emp_id
  • SELECT employees.name, sales.revenue FROM sales RIGHT OUTER JOIN employees ON employees.id = sales.emp_id

Question 35

Question
Which two operations are allowed in the body of an SQL scalar user-defined function? (Choose two.)
Answer
  • CALL statements.
  • External file access.
  • Use of a scratch pad.
  • COMMIT statements.
  • SQL control statements.

Question 36

Question
Which command will delete all rows from a table without generating log records?
Answer
  • TRIM
  • DROP
  • DELETE
  • TRUNCATE

Question 37

Question
Which function can be used to obtain values from XML documents that are to be inserted into one or more tables?
Answer
  • XMLTABLE
  • XMLPARSE
  • XMLEXISTS
  • XMLATTRIBUTES

Question 38

Question
User USER1 wants to retrieve records from a table named EMPLOYEE that satisfy at least one of the following criteria: -The employee's hire date (HIREDATE) is before 1999 and the employee's salary (SALARY) is less than $40,000.00 a year. -The employee has attended university Which SQL statement will accomplish this?
Answer
  • SELECT * FROM employee WHERE (hiredate < '1999-01-01' AND salary < 40000) OR (education ='University')
  • SELECT * FROM employee WHERE (hiredate < '1999-01-01') OR (salary < 40000) OR (education ='University')
  • SELECT * FROM employee WHERE (hiredate < '1999-01-01' OR (salary < 40000 AND (education ='University')
  • SELECT * FROM employee WHERE (hiredate < '1999-01-01' AND salary < 40000 AND (education ='University')

Question 39

Question
Which SQL statement will retrieve the employee number (EMPNO), hire date (HIREDATE), and salary (SALARY) for each employee from a table named EMPLOYEE who was hired before 1998 and earns a salary of less than $35,000.00 per year?
Answer
  • SELECT empno, hiredate, salary FROM employee FOR hiredate < '1998-01-01' AND salary < 35000
  • SELECT empno, hiredate, salary FROM employee WHERE hiredate < '1998-01-01' AND salary < 35000
  • SELECT empno, hiredate, salary FROM employee WHERE hiredate < '1998-01-01' OR salary < 35000
  • SELECT empno, hiredate, salary FROM employee FOR hiredate < '1998-01-01' OR salary < 35000

Question 40

Question
If the following result set is desired: Which SQL statement must be executed?
Answer
  • SELECT lastname, firstnme, salary, job FROM employee ORDER BY 3 FETCH FIRST 5 ROWS ONLY
  • SELECT lastname, firstnme, salary, job FROM employee ORDER BY 3 DESC FETCH FIRST 5 ROWS ONLY
  • SELECT lastname, firstnme, salary, job FROM employee ORDER BY 3 FETCH FIRST 5 ROWS
  • SELECT lastname, firstnme, salary, job FROM employee ORDER BY 3 DESC FETCH FIRST 5 ROWS

Question 41

Question
Which statement about INSERT operations is true?
Answer
  • The INSERT statement is used to insert rows into a table, view, or table function.
  • Inserted values must satisfy the conditions of any check constraints defined on the table.
  • If an INSERT statement omits any column from the inserted row that is defined as NULL or NOT NULL WITH DEFAULT, the statement will fail.
  • If the underlying table of a view being referenced by an INSERT statement has one or more unique indexes, each row inserted does not have to conform to the constraints imposed by those indexes.

Question 42

Question
Which statement about application-period temporal tables is true?
Answer
  • Consists of explicitly-supplied timestamps and a separate associated history table.
  • Is based on explicitly-supplied timestamps that define the time periods during which data is valid.
  • Is useful when one wants to keep both user-based period information and system-based historical information.
  • Consists of a pair of columns with database-manager maintained values that indicate the period when a row is current.

Question 43

Question
Which SQL statement should be used to select the minimum and maximum salaries (SALARY), by job code (JOB), from a table EMPLOYEE?
Answer
  • SELECT job, MIN(salary), MAX(salary) FROM employee GROUP BY job;
  • SELECT job, MIN(salary), MAX(salary) FROM employee ORDER BY job;
  • SELECT job, MIN(salary), MAX(salary) FROM employee GROUP BY job, MIN(salary), MAX(salary);
  • SELECT JOB, MIN(salary), MAX(salary) FROM employee ORDER BY job, MIN(salary), MAX(salary);

Question 44

Question
In a trusted context environment, if a switch request is made with an authorization ID that is not allowed on a trusted connection, what state is the connection placed in?
Answer
  • Locked
  • Waiting
  • Pending
  • Unconnected

Question 45

Question
If a user has been granted SYSCTRL authority, which activities can they perform?
Answer
  • Load operations
  • Backup/copy table spaces
  • Create and drop databases
  • Monitor database performance

Question 46

Question
What is the purpose of a role?
Answer
  • To define exactly what a specific user can do within a particular database once they have been authenticated.
  • To group a collection of privileges together so that they can be simultaneously granted to and revoked from multiple users.
  • To establish a credible relationship between DB2 and an external entity, such as a database administrator or a middleware server.
  • To group a collection of users together so that they can be simultaneously granted and revoked specific authorities and privileges.

Question 47

Question
Which SQL statement will give user USER1 the ability to assign a comment to a sequence named MYSEQ?
Answer
  • GRANT ALTER ON SEQUENCE myseq TO user1
  • GRANT USAGE ON SEQUENCE myseq TO user1
  • GRANT SELECT ON SEQUENCE myseq TO user1
  • GRANT COMMENT ON SEQUENCE myseq TO user1

Question 48

Question
A column mask that is to be used for row and column access control (RCAC) was created with the DISABLE option specified. What must be done if this mask is to be used to restrict access to data stored in a table named EMPLOYEE?
Answer
  • The column mask must be enabled; the EMPLOYEE table must be altered to activate column access control.
  • The column mask must be enabled (column access control for the EMPLOYEE table will be activated automatically).
  • The EMPLOYEE table must be altered to activate column access control (the column mask will be enabled automatically).
  • The EMPLOYEE table must be altered to activate column access control; row permission must be granted to everyone who needs to use thecolumn mask.

Question 49

Question
User USER1 holds both DBADM and SECADM authority and you want to separate database administration activities from security administration tasks. What authority must you have in order to revoke SECADM authority from user USER1 and assign it to someone else?
Answer
  • DBADM
  • DBCTRL
  • SECADM
  • DBMAINT

Question 50

Question
A table named EMPLOYEE was created as follows: Which action will prevent unauthorized users from accessing SSN data?
Answer
  • Assign the SSN column to a restricted role that only authorized users can access.
  • Only grant ACCESSCTRL authority for the SSN column to users who need to access SSN data.
  • Alter the table definition so that SSN data is stored in a separate schema that only authorized users can access.
  • Create a view for the EMPLOYEE table that does not contain the SSN column and require unauthorized users to use the view.

Question 51

Question
Which SQL statement will allow user USER1 to create a view on a table named EMPLOYEE?
Answer
  • GRANT CREATETAB ON DATABASE TO user1
  • GRANT SELECT ON TABLE employee TO user1
  • GRANT CREATEVIEW ON DATABASE TO user1
  • GRANT REFERENCES ON TABLE employee TO user1

Question 52

Question
A new user named USER1 needs to retrieve information from a database named MYDB. What authority must be granted to user USER1?
Answer
  • DBCTRL authority
  • SQLADM authority
  • DATAACCESS authority
  • ACCESSCTRL authority

Question 53

Question
Which privilege is required to invoke a user defined function?
Answer
  • CALL
  • USAGE
  • EXECUTE
  • REFERENCES

Question 54

Question
Which statement is true about an index that is used to support a UNIQUE constraint?
Answer
  • It must not contain more than one column.
  • It cannot be used in a referential constraint.
  • It must be defined with the UNIQUE attribute.
  • It must be defined as UNIQUE WHERE NOT NULL.

Question 55

Question
Which statement regarding triggers is true?
Answer
  • Only one INSERT, UPDATE, or DELETE trigger can be defined per table.
  • Triggers cannot be modified, they must be dropped and recreated with new definitions.
  • Adding a trigger to a table that already has rows in it will cause triggered actions to be fired.
  • Triggers can only be fired one time per statement irrespective of the number of rows affected.

Question 56

Question
A table named STATES was created as follows: CREATE TABLE states (state_cd CHAR(2) NOT NULL, state_desc CHAR(20)); CREATE UNIQUE INDEX indx1 ON states (state_cd); if the following ALTER statement is executed: ALTER TABLE states ADD PRIMARY KEY (state_cd); What will happen?
Answer
  • An error will be returned and the operation will fail.
  • A warning will be returned and the unique index INDX1 will become the index for the primary key.
  • The primary key will be successfully added and the unique index INDX1 will be dropped and recreated as the primary key index.
  • The primary key will be successfully added, the unique index INDX1 will be dropped, and a new index will be created for the primary key.

Question 57

Question
When an application using a temporary table terminates or disconnects from the database unexpectedly, what happens to the temporary table and any data stored in it?
Answer
  • The data in the table is deleted and the table persists.
  • The data in the table is deleted and the table is implicitly dropped.
  • The temporary table is converted to a base table and the data is deleted.
  • The temporary table is converted to a base table and the data is persistent.

Question 58

Question
When a user-defined function (UDF) is created and no schema is specified, what schema is used to store the UDF?
Answer
  • The SYSIBM schema.
  • The SYSFUN schema.
  • A schema with the name of the UDF.
  • A schema with the userid of the UDF definer.

Question 59

Question
Which statement about triggers is true?
Answer
  • A trigger is designed to return specific types of values and contains executable code.
  • A trigger is designed to return specific types of values but contains no executable code.
  • A trigger performs actions to capture details about an activity like a join operation against multiple tables.
  • A trigger performs actions in response to an event like an INSERT, UPDATE or DELETE operation on a table.

Question 60

Question
Which two statements are true about foreign key constraints? (Choose two.)
Answer
  • The foreign key constraint columns must be supported by an index.
  • The foreign key constraint columns must be defined as NOT NULL.
  • The number and data types of foreign key constraint columns must match the parent key.
  • The columns of one foreign key constraint cannot be used in another foreign key constraint.
  • To define a foreign key constraint there must be an associated primary key or unique key in the same or different table.

Question 61

Question
What is the primary purpose of a view?
Answer
  • To enable uniqueness.
  • To ensure data clustering.
  • To combine data from multiple tables.
  • To optimize queries ran against multiple tables.

Question 62

Question
By default, a column defined as a TIMESTAMP includes which attributes?
Answer
  • No fractional digits or time zone.
  • 6 fractional digits and no time zone.
  • 12 fractional digits plus a time zone.
  • 12 fractional digits and no time zone.

Question 63

Question
Which is NOT a valid reason for creating an index?
Answer
  • To allow queries to run more efficiently.
  • To enforce constraints such as uniqueness on index keys.
  • To order the columns of a table in ascending or descending sequence according to values in a row.
  • To order the rows of a table in ascending or descending sequence according to the values in a column.

Question 64

Question
To order the rows of a table in ascending or descending sequence according to the values in a column.
Answer
  • Unique constraint
  • Primary key constraint
  • Informational constraint
  • Column default constraint

Question 65

Question
Which statement is true regarding constraints?
Answer
  • A table can only have one unique key constraint.
  • A table can have multiple primary key constraints.
  • Informational constraints tell DB2 what rules the data conforms to, but the rules are not enforced.
  • Foreign key constraints are enforced on the values within the rows of a table, or between the rows of two tables, by a unique index on a foreignkey.

Question 66

Question
By default, where is the data stored for a column defined with an XML data type?
Answer
  • In an XML index.
  • In line with the rest of the data for the table.
  • In an XML storage object that is separate from the table.
  • In line with the rest of the data for the table, for XML columns less than 32KB.

Question 67

Question
Which statement about BEFORE triggers is FALSE?
Answer
  • A BEFORE trigger can be used to perform validation of input data.
  • A BEFORE trigger can be used to automatically generate values for newly inserted rows.
  • A BEFORE trigger is fired for each row in the set of affected rows before the trigger event executes.
  • A BEFORE trigger is fired for each row in the set of affected rows instead of executing the trigger event.

Question 68

Question
What is used in conjunction with a foreign key to define a relationship between two tables?
Answer
  • Primary key
  • Partitioning key
  • Check constraint
  • Unique constraint

Question 69

Question
Which case will require a sequence to be dropped and recreated instead of being modified by the ALTER SEQUENCE statement?
Answer
  • Change the data type of the sequence.
  • Reset the sequence to its starting value.
  • Establish new minimum or maximum values.
  • Change the increment between future values.

Question 70

Question
Given the following statement: GRANT DELETE ON TABLE sales TO User1 WITH GRANT OPTION; Which statement is correct?
Answer
  • USER1 can only remove the SALES table.
  • USER1 can only remove records from the SALES table.
  • USER1 can remove the SALES table and grant the privilege to remove the SALES table to other users.
  • USER1 can remove records from the SALES table and grant the privilege to remove records from the SALES table to other users.

Question 71

Question
Which method for restricting data access relies on a SQL search condition that describes what set of rows a user has access to?
Answer
  • Authentication
  • Authorities and privileges
  • Label-based access control
  • Row and column access control

Question 72

Question
Which SQL statement will take the ability to create tables in a table space named MYTBSP away from user USER1?
Answer
  • REVOKE USE OF TABLESPACE mytbsp FROM user1
  • REVOKE ALTER ON TABLESPACE mytbsp FROM user1
  • REVOKE UPDATE OF TABLESPACE mytbsp FROM user1
  • REVOKE CREATETAB ON TABLESPACE mytbsp FROM user1

Question 73

Question
In a trusted context environment, if a switch request is made with an authorization ID that is not allowed on a trusted connection, what state is the connection placed in?
Answer
  • Locked
  • Waiting
  • Pending
  • Unconnected

Question 74

Question
When is a mask used to limit access to data in a table?
Answer
  • When mandatory access control (MAC) is used to protect the table.
  • When discretionary access control (DAC) is used to protect the table.
  • When label-based access control (LBAC) is used to protect the table.
  • When row and column access control (RCAC) is used to protect the table.

Question 75

Question
What privilege is required to create a view on a table that you are not the owner of?
Answer
  • INSERT
  • SELECT
  • CREATE
  • TRIGGER
Show full summary Hide full summary

Similar

The Cold War
dottydiva96
SSAT Verbal Questions (Analogies)
philip.ellis
Break-even Analysis - FLASH CARDS
Harshad Karia
New Possibilities with ExamTime's Flashcard Maker
Andrea Leyden
GCSE Statistics
Andrea Leyden
How Parliament Makes Laws
harryloftus505
Computing Hardware - CPU and Memory
ollietablet123
GCSE AQA Biology - Unit 3
James Jolliffe
B3, C3, P3
George Moores
Biology (B3)
Sian Griffiths
NSI Test First day
brahim matrix