当前分类: IBM(000-730)
问题:单选题Which of the following objects contains control structures that are considered the bound form of SQL statements?()A UDTB TriggerC PackageD Access plan...
查看答案
问题:单选题A UDT is a data type which:()A must contain unique values.B cannot be CAST to other data types.C is created using the CREATE DISTINCT command.D contains a value that was automatically calculated from values in other columns....
问题:单选题Application A holds an Update lock on a single row and application B is trying to read that row. If both applications are using isolation level UR, which of the following will occur?()A Application B will read the row.B Applications A and B will cause ...
问题:单选题A programmer wants to generate values for a numeric ID column in their EXPENSE table. The ID column values need to be incremented by 1000 for each new expense report added to the EXPENSE table. Which DB2 object can be referenced by an INSERT statement ...
问题:单选题Given the following requirements:Create a table named TESTTAB, which has an identity column named ACTIVITYNO. Define the identity column to generate the values for the column by default. Start the values at 10 and increment by 10. Make the identity col...
问题:单选题Given the following table definition: STOCK: item VARCHAR(30) status CHAR(1) quantity INT price DEC(7,2) If items are indicated to be out of stock by setting STATUS to NULL and QUANTITY and PRICE to zero, which of the following statements would be used...
问题:单选题An Alias can be an alternate name for which DB2 object?()A SequenceB TriggerC SchemaD View...
问题:单选题Which of the following is a characteristic of a sequence?()A A sequence will never generate duplicate valuesB The MAXVALUE of a sequence can be equal to the MINVALUEC It is not possible to create a sequence that generates a constant since the INCREMENT...
问题:单选题Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()A The cursor is only protected from updates and deletes by concurrent applications.B The row is only protected from positioned updates and delet...
问题:单选题How does DB2 protect the integrity of indexes when data is updated?()A Locks are acquired on the data.B Locks are acquired on index keys.C Locks are acquired on index pages.D Locks are acquired on index pointers....
问题:单选题Which of the following DB2 products are required on an iSeries or System i server to enable an application running on that server to retrieve data from a DB2 database on a Linux server?()A DB2 for i5/OSB DB2 Runtime ClientC DB2 Connect Enterprise Editi...
问题:单选题Which of the following best describes how locks are used in DB2?()A To maintain control of updated rows for commit processingB To ensure only committed changes are altered by another applicationC To allow two applications to update the same row of data...
问题:单选题If a unique constraint is defined on column COL1 of table TAB1, what are the characteristics of COL1?()A COL1 will accept NULL values and can be referenced in another table's foreign key specification.B COL1 will not accept NULL values and cannot be re...
问题:单选题Which of the following is a typical data warehouse query?()A What is this customers address?B Does this customer have any unpaid bills?C What is the balance in this customers account?D What are the total sales for each of the last 6 months?...
问题:单选题Given that tables T1 and T2 contain the following rows: Table T1: C1 C2 5 4 5 2 5 5 Table T2: C1 C2 5 1 5 2 5 3 Which of the following queries will return only those rows that exist in T1 and not in T2?()A SELECT * FROM T1 MINUS SELECT * FROM T2B SELEC...
问题:单选题An application needs a table for each connection that tracks the ID and Name of all items previously ordered and committed within the connection. The table also needs to be cleaned up and automatically removed each time a connection is ended. Assuming ...
问题:单选题Which of the following is a characteristic of a schema?()A Foreign key references cannot cross schema boundaries.B A DB2 user must be created before a schema with the same name can be created.C If no schema is specified when an object is created, the d...
问题:单选题What type of constraint can be used to ensure that, in any given row in a table, the value of one column never exceeds the value of another column?()A CheckB RangeC ReferentialD Informational...
问题:单选题Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()A GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpB GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1C GRANT INSERT ON TA...
问题:单选题How should the following UDF be invoked in order to convert US currency values stored in the EXPENSES table into Canadian currency?CREATE FUNCTION getratews11 ( country1 VARCHAR(100), country2 VARCHAR(100) ) RETURNS DOUBLE LANGUAGE SQL CONTAINS SQL EXT...