1
Q:

Which of the following can be kept in memory when the DB2 configuration parameter KEEPFENCED is enabled?

A) SQLDAS after their cursor is closed. B) Referential integrity maps after a join.
C) Stored procedure processes after they are run. D) Tables after they have been read into the buffer pool.

Answer:   C) Stored procedure processes after they are run.



Explanation:
Q:

A solution developer needs to configure the HTTP listener of an Integration Server on a Linux Server.

Which operating system privileges does the developer need to modify Integration node
properties and properties of integration node resources?

A) root user B) mqm
C) mqbrks D) mqm and mqbrks
 
Answer & Explanation Answer: A) root user

Explanation:
Report Error

View Answer Report Error Discuss

7 1617
Q:

Proxy servers have two main purposes :

1. Improve Performance  (and)

2.  is  ______ ?

A) Transmit Request B) Decrease Requests
C) Increase Requests D) Filter Requests
 
Answer & Explanation Answer: D) Filter Requests

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

9 12149
Q:

which of the following represents a set of properties that guarantee that database transactions are processed reliably in computer science ?

A) Buffer Cache B) ACID
C) Foreign Key D) None
 
Answer & Explanation Answer: B) ACID

Explanation:

ACID means (Atomicity, Consistency, Isolation, Durability) is a set of properties of database transactions intended to guarantee validity even in the event of errors, power failures, etc.

In the context of databases, a sequence of database operations that satisfies the ACID properties and, thus, can be perceived as single logical operation on the data, is called a transaction. For example, a transfer of funds from one bank account to another, even involving multiple changes such as debiting one account and crediting another, is a single transaction.

Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification
Job Role: Analyst , IT Trainer

6 2323
Q:

With database logging, where are transaction records first placed?

A) in the logical log buffer B) in the primary chunk
C) in the physical buffer D) in a temporary database table
 
Answer & Explanation Answer: A) in the logical log buffer

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

9 4015
Q:

Suppose an installed z/OS customer also has Power6 Servers. They are investigating consolidation of both types of servers to z/OS.Which of the following will establish the capacity for a new z/OS server?

A) AD Tools B) CP3000
C) Estimate the AIX load and add to CP3000 results. D) Run AIX in a z/OS LPAR to establish the loadWArialTimes New RomanZ
 
Answer & Explanation Answer: C) Estimate the AIX load and add to CP3000 results.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

4 2977
Q:

Which of the following DB2 data types CANNOT be used to contain the date an employee was hired?

A) CLOB B) TIME
C) VARCHAR D) TIMESTAMP
 
Answer & Explanation Answer: B) TIME

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

11 4490
Q:

The DBA can set the registry variable DB2_HASH_JOIN on or off because:

A) hash joins may require more resources to run. B) hash joins are not used unless outer joins are requested.
C) If hash joins are enabled, no other join method can be used. D) Hash joins are only needed when the tables are portioned using hash keys.
 
Answer & Explanation Answer: A) hash joins may require more resources to run.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

8 3989
Q:

Which of the following extenders allows data to be presented in a three dimensional format?

A) DB2 AVI Extender B) DB2 XML Extender
C) DB2 Text Extender D) DB2 Spatial Extender
 
Answer & Explanation Answer: D) DB2 Spatial Extender

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

8 4052