March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

IBM C2090-616 Dumps

Page: 1 / 2
Total 63 questions

DB2 11.1 Fundamentals for LUW Questions and Answers

Question 1

What of the following is TRUE about triggers?

Options:

A.

Triggers are activated by INSERT, UPDATE, DELETE and SELECT statements

B.

Triggers can be used to perform data manipulation operations against complex views

C.

Triggers can only be used to execute logic before or after appropriate SQL statements

D.

Only one trigger for a particular event and activation time can be created for a particular table

Question 2

What is the purpose of a role?

Options:

A.

To define exactly what a specific user can and cannot do within a particular database once they have been authenticated

B.

To group a collection of users together so that they can be simultaneously granted and revoked specific authorities and privileges

C.

To group a collection of privileges together so that they can be simultaneously granted to and revoked from multiple users, groups, or other roles

D.

To assign one or more users that need to run local DB2 applications and tools on a particular server to the DB2ADMNS or the DB2USERS group

Question 3

Which of the following is TRUE about DB2 OLAP functions?

Options:

A.

They return scalar values and not array values

B.

There are no DB2 monitor elements specific to OLAP functions

C.

OLAP functions are not supported in a common table expression (CTE)

D.

OLAP aggregation functions are not supported with column organized tables

Question 4

Application 1 executes the following statements:

INSERT INTO TAB1 (NAME,AMOUNT) VALUES (‘John,100);

COMMIT;

UPDATE TAB1 SET AMOUNT=90 WHERE NAME=‘John’;

After a few seconds, application 2 executes the following query:

SELECT AMOUNT FROM TAB1 WHERE NAME=‘John’

Assuming the Currently Committed (CUR_COMMIT) configuration parameter is enabled, which of the following is TRUE?

Options:

A.

Application 2 will read the amount of 90

B.

Application 2 will read the amount of 100

C.

Application 2 will receive a warning message

D.

Application 2 will enter lock-wait state until application 1 commits or the locktimeout value expires

Question 5

The DDL statement is used to create table T1:

CREATE TABLEt1 (

c1 INTEGER,

c2 INTEGER NOT NULL,

c1 DECIMAL(11,2),

c4 TIMESTAMP WITH DEFAULT CURRENT TIMESTAMP

)

Which of the following INSERT statements will execute successfully?

Options:

A.

INSERT INTO t1 VALUES (100)

B.

INSERT INTO t1 (c1, c2) VALUES (100)

C.

INSERT INTO t1 (c1, c3) VALUES (‘100’, ‘100.00’)

D.

INSERT INTO t1 (c2, c3) VALUES (100, 100.00), (101, 101)

Question 6

Which three facilities are used to control authorization in DB2?

Options:

A.

privileges, db2ssh, LBAC credentials

B.

privileges, authority levels, certificates

C.

db2ssh, trusted contexts, authority levels

D.

privileges, authority levels, LBAC credentials

Question 7

Which of the following statements about stored procedures is TRUE?

Options:

A.

Stored procedures can be written in SQL PL, but not in the PL/SQL dialect

B.

The CREATE SOURCED PROCEDURE statement defines a procedure that is based on another procedure in a federated database

C.

There are three types of stored procedures which can be deployed: SQL procedures, external procedures, and sourced procedures

D.

Two identically-named procedures within a schema are permitted to have exactly the same number of parameters, but the parameters must have different data types assigned

Question 8

Which constraint can be used to ensure that identical values are never stored in a set of columns in a table?

Options:

A.

NOT NULL

B.

Foreign key

C.

Primary key

D.

Informational constraint

Question 9

Which method for restricting data access relies on security labels and security policies to control what data a user can access?

Options:

A.

Authentication

B.

Authorities and privileges

C.

Label-based access control

D.

Row and column access control

Page: 1 / 2
Total 63 questions