Ensurepass.com : Ensure you pass the IT Exams
2018 Jan IBM Official New Released C2090-610
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2090-610.html

DB2 10.1 Fundamentals

Question No: 81 – (Topic 2)

Which statement about roll back operations is correct?

  1. When a ROLLBACK statement isexecuted, all locks held by the terminating transaction are released.

  2. When a ROLLBACK TO SAVEPOINT statement is executed, all locks acquired up to the savepoint are released.

  3. When a ROLLBACK TO SAVEPOINT statement is executed, all locks acquired after the savepoint are released.

  4. When a ROLLBACK statement is executed, all locks acquired for open cursors that were declared WITH HOLD, are held.

Answer: A

Question No: 82 – (Topic 2)

Which DB2 product is NOT suitable for very large data warehouse applications?

  1. DB2 for i

  2. DB2 for AIX

  3. DB2 for z/OS

  4. DB2 for Linux

Answer: A

Question No: 83 – (Topic 2)

Which statement about a deadlock is true?

  1. The victim will be rolled back.

  2. The victim willread through the lock.

  3. Both victim and holder are rolled back.

  4. The victim must wait until the holder releases the lock.

Answer: A

Question No: 84 – (Topic 2)

A table named STATES has the following columns: STATE_CD, REGION_CD, and STATE_NAME. Which SQL statement will return the number of states in each region, ordered by number of states?

  1. SELECT state_cd, COUNT(*) FROM states

    ORDER BY COUNT(*);

  2. SELECT state_cd, COUNT(*) FROM states

    GROUP BY state_cd ORDER BY state_cd;

  3. SELECT region_cd, COUNT(*) FROM states

    GROUP BY state_cd ORDER BY COUNT(*);

  4. SELECT region_cd, COUNT(*) FROM states

GROUP BYregion_cd ORDER BY COUNT(*);

Answer: D

Question No: 85 – (Topic 2)

The EXCLUSIVE MODE option of the LOCKTABLE statement is used to prevent which of the following?

  1. Concurrent application processes from performing any operations on the table.

  2. Concurrent application processes from performing any read-only operations on the table.

  3. Concurrent applications processes that are running under the cursor stability (CS) isolation level from performing read-only operations on the table.

  4. Concurrent applications processes that are running under the uncommitted read (UR) isolation level from performing read-only operations on the table.

Answer: A

Question No: 86 – (Topic 2)

Given the SQL statement: CREATE ALIAStotal_sales FOR sales Which statement is valid?

  1. SALES can be the name of a schema.

  2. SALES can be the name of a package.

  3. SALES can be the name of an existing alias.

  4. SALES can be the name of a declared global temporary table.

Answer: C Explanation:

Which DB2 object limits the user#39;s ability to retrieve data from a table by defining a SQL statement in the object?

  1. View

  2. Index

  3. Trigger

  4. Check constraint Answer: A

Question No: 87 – (Topic 2)

When a user-defined function (UDF) is created and no schema is specified, what schema is used to store the UDF?

  1. The SYSIBM schema.

  2. The SYSFUN schema.

  3. A schema with the name of the UDF.

  4. A schema with the userid of the UDF definer.

Answer: D

Question No: 88 – (Topic 2)

When a COMMIT statement is executed, what happens?

  1. All locks held on the database are automatically released.

  2. Data stored in global temporary tables is automatically deleted.

  3. Open cursors defined WITH HOLD are closed, but their data is retained.

  4. The current transaction is terminated and a new transaction boundary is started.

Answer: D

Question No: 89 – (Topic 2)

Which type of constraint can be used to tell the DB2 Optimizer that a parent-child relationship exists between two tables, but that the relationship is not enforced?

  1. Check

  2. Unique

  3. Referential

  4. Informational

Answer: D

Question No: 90 – (Topic 2)

What is a function of a table check constraint?

  1. To provide a method of avoiding duplicate entries for a column.

  2. To provide a method of ensuring a column#39;s values are within aspecific range.

  3. To ensure that XML columns are properly populated in an associated XML table space.

  4. To enforce relationships between tables by checking the existence of rows in one table against another.

Answer: B

100% Ensurepass Free Download!
Download Free Demo:C2090-610 Demo PDF
100% Ensurepass Free Guaranteed!
C2090-610 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.