Explain What are three advantages of fragmentation?
A. higher availability
B. reduced disk space requirements
C. parallel scans are possible with PDQ
D. finer granularity of archives and resources
Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera
Which of the following describes what USERA is allowed to do?
A.Create a read?only view using TAB1. B.Alter TAB1 to add a check constraint.
C.Define a primary key or unique constraint on TAB1.
D.Define a dependent table where TAB1 is the parent.
What help ensure that the XIV Systems cache does not become a bottleneck?
A. central cache locking mechanism
B. use of industry standard chip technology
C. each module is responsible for caching the data in that module
D. having all modules understand what is held cache at all times
Which statement fragments a table as round robin?
A. FRAGMENT AS ROUND ROBIN IN dbspace 1, dbspace 2
B. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2
C. FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2
D. FRAGMENT BY ROUND ROBIN
Which of the following can be kept in memory when the DB2 configuration parameter
KEEPFENCED is enabled?
A. SQLDAS after their cursor is closed. B. Referential integrity maps after a join.
C. Stored procedure processes after they are run.
D. Tables after they have been read into the buffer pool.
Explain Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?
A The Linux command mt
B The Linux command cpio
C The OS/400 command RST option(*print)
D The OS/400 command DSPTAP option(*savrst)
Suppose A customer has ordered a 10 module XIV System. How many interface modules are active in this configuration?
What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?
A. XIV firmware V10.0.8
B. Host Attachment Kit V1.0.1
C. SAN Volume Controller (SVC)V4.2
D. Virtual I/O Server (VIOS) V2.1.1
Which statement correctly changes the next extent size?
A. ALTER TABLE customer MODIFY NEXT SIZE 300
B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
C. ALTER TABLE customer MODIFY EXTENT SIZE 300
D. ALTER TABLE customer NEXT SIZE 300
Explain Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)
A. XIV partitions
B. XIV Data Mover (XDM)
C. SAN Volume Controller
D. XIV Data Migration Function
E. Tivoli Storage Productivity Center for Replication V4
Explain Which two types of fragmentation are allowed in a CREATE TABLE statement?
A. disk striping
D. round robin
E. mirroring F. tblspace G. sorting
A VM/VSE customer wants to implement a WAS on an existing zSeries server. On which of the following operating environments would WAS best be implemented?
How To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?
A. on disks in other modules
B. on same disk in different modules
C. on different disks in the same module
D. on same disk, in same module, and in different modules
Explain Which of the following tools is used to create subscription sets and add subscription?set members to subscription sets?
Explain Which two of the following SQL data types should be used to store a small binary image?
E.VARCHAR FOR BIT DATA
Suppose a customer is planning to create a non-hosted Linux partition on an i825. Linux will have only direct-attach devices. What is the Linux console option?
A Use OS/400 VNC support.
B Telnet to the virtual console.
C Share the primary partitions console.
D Allocate a console IOA to the Linux partition.
Where is fragment information stored?
A. in the system catalog tables
B. in the physical logs
C. in the reserved pages
D. in the first page of the database tblspace
What is a chunk when using raw devices?
A. a contiguous unit of disk space
B. a dynamic unit of disk space
C. a location in shared memory
D. a data table
Which three can be locked?
A. a row
B. a page
C. a column
D. a key
E. shared memory
Which of the following tools can be used to identify inefficient SQL statements without executing them?
Which two of the following table space attributes can be changes after the table space has been created?
A. Page size
B. Extent size
C. Transfer rate
D. Table space type
E. Table space name
Explain Which isolation level does a database without logging default to?
A. committed read
B. dirty read
C. mode ANSI
D. repeatable read
In which two situations would you use a round robin fragmentation strategy?
A. When all fragments must be second
B. To create uneven data distributions
C. When queries perform sequential scans and you have little information about the data being stored.
D. When tables are accessed with a high degree of selectivity
Explain If there is a lock on an adjacent key, an insert will fail if the isolation level is set to what?
A. committed read
B. repeatable read
C. share read
D. indexed read
Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.
Which of the following addresses this issue?
Explain What is database administration NOT concerned with?
B. creating tables
C. accessing data
D. application building
Explain Which of the following is required for the DB2 optimizer to consider a hash join strategy?
A. Equijion predicates
B. Optimization level 1 or above
C. Registry variable DB_ANTIJOIN=YES
D. SORTHEAP large enough to contain the tables being joined
Suppose a customer is attempting to determine what failed during the last boot sequence of the Linux
partition. Which of the following can be used to determine the error condition?
Which of the following extenders allows data to be presented in a three?dimensional format?
A.DB2 AVI Extender
B.DB2 XML Extender
C.DB2 Text Extender
D.DB2 Spatial Extender
Explain Which of the following commands will format a new disk drive partition in Linux on iSeries?
A mkts -e2
C mkfs -ext2 &It;path to device >
D mkfs format -e2
Explain When creating a regular DMS table space, what is the minimum number of extents that must be specified?
The DBA can set the registry variable DB2_HASH_JOIN on or off because:
A. hash joins may require more resources to run.
B. hash joins are not used unless outer joins are requested.
C. If hash joins are enabled, no other join method can be used.
D. Hash joins are only needed when the tables are portioned using hash keys.
Suppose an application bound with isolation level Uncommitted Read updates a row. Which of the following is true regarding the locking of this row?
A.No row lock is acquired when the row is updated.
B.The row lock is released when the cursor accessing the row is closed.
C.The row lock is released when the application issues a COMMIT statement.
D.The row lock is released when the cursor accessing the row is moved to the next row.
When Disk space for a table is allocated in one or more units called what?
Explain Which of the following DB2 data types CANNOT be used to contain the date an employee was hired?
Explain the Given following DDL statement
CREATE TABLE RMW TABEL46″
D11″ DECIMAL (1′0)NOT NULL
D12″ DECIMAL (1′0) NOT NULL
C8″ CHAR(1) WITH DEFAULT)
organize by (
How many indexes will be created?
Suppose an installed z/OS customer also has Power6 Servers. They are investigating consolidation of both types of servers to z/OS.
Which of the following will establish the capacity for a new z/OS server?
A. AD Tools
B. Estimate the AIX load and add to CP3000 results.
D. Run AIX in a z/OS LPAR to establish the loadWArialTimes New RomanZ
Explain With database logging, where are transaction records first placed?
A. in a temporary database table
B. in the logical log buffer
C. in the primary chunk
D. in the physical buffer