单选题Which of the following best describes how locks are used in DB2?()A To maintain control of updated rows for commit processingB To ensure only committed changes are altered by another applicationC To allow two applications to update the same row of data

题目
单选题
Which of the following best describes how locks are used in DB2?()
A

To maintain control of updated rows for commit processing

B

To ensure only committed changes are altered by another application

C

To allow two applications to update the same row of data simultaneously

D

To prevent multiple applications from accessing the same data simultaneously


相似考题
更多“单选题Which of the following best describes how locks are used in DB2?()A To maintain control of updated rows for commit processingB To ensure only committed changes are altered by another applicationC To allow two applications to update the same row of data”相关问题
  • 第1题:

    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()

    • A、IGP
    • B、EIGRP
    • C、EGP
    • D、BGP

    正确答案:A

  • 第2题:

    Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()

    • A、The cursor is only protected from updates and deletes by concurrent applications.
    • B、The row is only protected from positioned updates and deletes that reference another cursor of the same application.
    • C、The cursor is protected from positioned updates and deletes that reference another cursor of a different application.
    • D、The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.

    正确答案:A

  • 第3题:

    Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()

    • A、Define the column MAINID as NOT UPDATABLE
    • B、Define the column MAINID as a PRIMARY KEY
    • C、Define the column MAINID as a FOREIGN KEY
    • D、Define an UPDATE trigger on table TABLEX

    正确答案:D

  • 第4题:

    Which of the following best describes how locks are used in DB2?()

    • A、To maintain control of updated rows for commit processing
    • B、To ensure only committed changes are altered by another application
    • C、To allow two applications to update the same row of data simultaneously
    • D、To prevent multiple applications from accessing the same data simultaneously

    正确答案:B

  • 第5题:

    As a result of performance analysis, you created an index on the prod_name column of the prod_det table, which contains about ten thousand rows. Later, you updated a product name in the table. How does this change affect the index?()

    • A、A leaf will be marked as invalid.
    • B、An update in a leaf row takes place.
    • C、The index will be updated automatically at commit.
    • D、A leaf row in the index will be deleted and inserted.
    • E、The index becomes invalid when you make any updates.

    正确答案:D

  • 第6题:

    What is true regarding InnoDB locking?()

    • A、InnoDB uses row and table-level locks, but row locks are not escalates
    • B、InnoDB locks only those rows that are updated
    • C、InnoDB only uses row locks, not page or table-level locks
    • D、InnoDB row locks may be escalated to page or table-level locks
    • E、InnoDB uses row-level or table-level locks depending on the number of rows affected

    正确答案:B

  • 第7题:

    单选题
    Which of the following best describes how locks are used in DB2?()
    A

    To maintain control of updated rows for commit processing

    B

    To ensure only committed changes are altered by another application

    C

    To allow two applications to update the same row of data simultaneously

    D

    To prevent multiple applications from accessing the same data simultaneously


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()
    A

    IGP

    B

    EIGRP

    C

    EGP

    D

    BGP


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    What is true regarding InnoDB locking?()
    A

    InnoDB uses row and table-level locks, but row locks are not escalates

    B

    InnoDB locks only those rows that are updated

    C

    InnoDB only uses row locks, not page or table-level locks

    D

    InnoDB row locks may be escalated to page or table-level locks

    E

    InnoDB uses row-level or table-level locks depending on the number of rows affected


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A server has a processor that allows it to calculate two applications at the same time. Which of the following describes this capability of the processor?()
    A

     Dual processing

    B

     Multi-processing

    C

     Multi-tasking

    D

     Multi-threading


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    As a result of performance analysis, you created an index on the prod_name column of the prod_det table, which contains about ten thousand rows. Later, you updated a product name in the table. How does this change affect the index?()
    A

    A leaf will be marked as invalid.

    B

    An update in a leaf row takes place.

    C

    The index will be updated automatically at commit.

    D

    A leaf row in the index will be deleted and inserted.

    E

    The index becomes invalid when you make any updates.


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    Consider the following: Which statement best describes the meaning of the value for the key_len column?()
    A

    It shows the total size of the index row

    B

    It shows how many columns in the index are examined

    C

    It shows the number of characters indexed in the key

    D

    It shows how many bytes will be used from each index row


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()

    • A、An application process acquires at least a share lock on the current row of every cursor.
    • B、Any row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.
    • C、Any row changed by another application process can be read, even if the change has not been committed by that application process.
    • D、An application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.

    正确答案:A

  • 第14题:

    How does DB2 protect the integrity of indexes when data is updated?()

    • A、Locks are acquired on the data.
    • B、Locks are acquired on index keys.
    • C、Locks are acquired on index pages.
    • D、Locks are acquired on index pointers.

    正确答案:A

  • 第15题:

    Which of the following describes how DB2 9 stores an XML document if the XML Extender is not used?()

    • A、CLOB
    • B、BLOB
    • C、Hierarchically
    • D、Rows and columns

    正确答案:C

  • 第16题:

    Which three are true?()

    • A、A MERGE statement is used to merge the data of one table with data from another.
    • B、A MERGE statement replaces the data of one table with that of another.
    • C、A MERGE statement can be used to insert new rows into a table.
    • D、A MERGE statement can be used to update existing rows in a table.

    正确答案:A,C,D

  • 第17题:

    Which statement describes the effect on an index, when the indexed column for the rows is updatedin the base table()

    • A、An update in a leaf row takes place.
    • B、The index becomes invalid after the update.
    • C、The leaf block containing the row to be updated is marked as invalid.
    • D、A row in the leaf block of the index for the key value is logically deleted and a new leaf row is inserted

    正确答案:D

  • 第18题:

    单选题
    Which statement describes the effect on an index, when the indexed column for the rows is updatedin the base table()
    A

    An update in a leaf row takes place.

    B

    The index becomes invalid after the update.

    C

    The leaf block containing the row to be updated is marked as invalid.

    D

    A row in the leaf block of the index for the key value is logically deleted and a new leaf row is inserted


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following statements best describes Flashback Versions Query?()
    A

     Flashback Versions Query is used to make changes to multiple versions of data that existed between two points in time.

    B

     Flashback Versions Query is used to view all version changes on rows that existed between the time  the query was executed and a point in time in the past.

    C

     Flashback Versions Query is used to view version changes and the SQL to undo those changes on rows that existed between two points in time.

    D

     Flashback Versions Query is used to view all version changes on rows that existed between two  points in time.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    The System Administrator wants to do a backup of the HMC and notices that there are two options on the HMC menu: Backup Critical Console data and Save Upgrade Data. Which of the following best describes the differences between the two options?()
    A

    Both options back up user and partition profile data. Only the Backup Critical Console Data backs up TCP/IP settings or preferences

    B

    Both options back up partition profile information. Only the Backup Critical Console Data backs up service function settings, such as Inventory Scout, Service Agent, and Service Focal Point

    C

    The Backup Critical Console Data should be performed just before the HMC software update operation. The Save Upgrade Data should be performed each time configuration changes are made to the system or the HMC

    D

    The Save Upgrade Data should be performed just before the HMC software update operation. The Backup Critical Console Data should be performed each time configuration changes are made to the system or the HMC


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following describes how DB2 9 stores an XML document if the XML Extender is not used?()
    A

    CLOB

    B

    BLOB

    C

    Hierarchically

    D

    Rows and columns


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which three are true? ()
    A

    A MERGE statement is used to merge the data of one table with data from another.

    B

    A MERGE statement replaces the data of one table with that of another.

    C

    A MERGE statement can be used to insert new rows into a table.

    D

    A MERGE statement can be used to update existing rows in a table.


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()
    A

    Define the column MAINID as NOT UPDATABLE

    B

    Define the column MAINID as a PRIMARY KEY

    C

    Define the column MAINID as a FOREIGN KEY

    D

    Define an UPDATE trigger on table TABLEX


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()
    A

    The cursor is only protected from updates and deletes by concurrent applications.

    B

    The row is only protected from positioned updates and deletes that reference another cursor of the same application.

    C

    The cursor is protected from positioned updates and deletes that reference another cursor of a different application.

    D

    The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.


    正确答案: B
    解析: 暂无解析