IBM Certification Questions

Q:

Which of the following tools is used to create subscription sets and add subscription?set members to subscription sets?

A) Journal B) License Center
C) Replication Center D) Development Center
 
Answer & Explanation Answer: C) Replication Center

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2392
Q:

What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?

A) XIV firmware V10.0.8 B) Host Attachment Kit V1.0.1
C) SAN Volume Controller (SVC)V4.2 D) Virtual I/O Server (VIOS) V2.1.1
 
Answer & Explanation Answer: D) Virtual I/O Server (VIOS) V2.1.1

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2342
Q:

Suppose a customer is planning to create a non-hosted Linux partition on an i825. Linux will have only direct-attach devices. What is the Linux console option?

A) Use OS/400 VNC support. B) Telnet to the virtual console.
C) Share the primary partitions console. D) Allocate a console IOA to the Linux partition.
 
Answer & Explanation Answer: B) Telnet to the virtual console.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2330
Q:

Which of the following can be kept in memory when the DB2 configuration parameter KEEPFENCED is enabled?

A) SQLDAS after their cursor is closed. B) Referential integrity maps after a join.
C) Stored procedure processes after they are run. D) Tables after they have been read into the buffer pool.
 
Answer & Explanation Answer: C) Stored procedure processes after they are run.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2329
Q:

which of the following represents a set of properties that guarantee that database transactions are processed reliably in computer science ?

A) Buffer Cache B) ACID
C) Foreign Key D) None
 
Answer & Explanation Answer: B) ACID

Explanation:

ACID means (Atomicity, Consistency, Isolation, Durability) is a set of properties of database transactions intended to guarantee validity even in the event of errors, power failures, etc.

In the context of databases, a sequence of database operations that satisfies the ACID properties and, thus, can be perceived as single logical operation on the data, is called a transaction. For example, a transfer of funds from one bank account to another, even involving multiple changes such as debiting one account and crediting another, is a single transaction.

Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification
Job Role: Analyst , IT Trainer

6 2327
Q:

Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera.Which of the following describes what USERA is allowed to do?

A) Create a read?only view using TAB1. B) Alter TAB1 to add a check constraint.
C) Define a primary key or unique constraint on TAB1. D) Define a dependent table where TAB1 is the parent.
 
Answer & Explanation Answer: D) Define a dependent table where TAB1 is the parent.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2325
Q:

Which statement correctly changes the next extent size?

A) ALTER TABLE customer MODIFY NEXT SIZE 300 B) ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
C) ALTER TABLE customer MODIFY EXTENT SIZE 300 D) ALTER TABLE customer NEXT SIZE 300
 
Answer & Explanation Answer: A) ALTER TABLE customer MODIFY NEXT SIZE 300

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

2 2273
Q:

 Which isolation level does a database without logging default to?

A) committed read B) dirty read
C) mode ANSI D) repeatable read
 
Answer & Explanation Answer: B) dirty read

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2227