免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 4202 | 回复: 0

701的测试题,欢迎大家讨论!!! [复制链接]

论坛徽章:
0
发表于 2003-12-21 12:45 |显示全部楼层
1
Given the dynamic SQL statement:

SELECT * FROM t1 WHERE customer = ?

Which two of the following tools can be used to examine the explain results for this statement?

  A. dynexpln

  B. db2exfmt

  C. db2expln

  D. Design Advisor

  E. Visual Explain

3
Which two of the following steps are required on the DB2 server to allow remote client access using TCP/IP?

  A. Catalog the client workstation

  B. Create a DB2 instance for TCP/IP

  C. Set the DB2COMM registry variable

  D. Update the database manager configuration

  E. Update the database configuration for each database

4.
Use the exhibit button to display the exhibit for this question.
The exhibit shows documentation from the System Monitor Guide and Reference. An application is experiencing poor performance that has been surmised to be due to contention on a critical table.
Which of the following will help to determine if contention is the issue?

  A. Turn LOCK monitor switch on and get snapshot for locks.

  B. Turn LOCK monitor switch on and get snapshot for applications.

  C. Turn APPLICATION monitor switch on and get snapshot for locks.

  D. Turn APPLICATION monitor switch on and get snapshot for applications.

5.
Which of the following is TRUE of Database Managed Space (DMS) table spaces?

  A. Space is not allocated until required

  B. DMS table spaces allow LOBs to be cached in the buffer pool

  C. Containers may be on either system directories or raw devices

  D. Tables in DMS table spaces may be split up by data type (LOBs, index, data)


6.
Which of the following actions is required before forcing a user off of a remote database?

  A. Catalog the remote database

  B. Quiesce the remote database

  C. Connect to the remote database

  D. Attach to the remote DB2 instance

  E. Update DB2INSTANCE environment variable
7.
A non-administrative user has successfully connected to the database. At what level are the privileges defined that control the access this user has to the data?

  A. The DB2 instance level

  B. The database object level

  C. The operating system level

  D. The database directory level

8.
Given the following statement:

CREATE TABLE tab1 (col1 INT CONSTRAINT notnul CHECK(col1 IS NOT NULL), col2 CHAR(10))

Which of the following will enforce uniqueness of COL1 which currently does not contain duplicate values?

  A. Create a primary key on COL1

  B. Create a unique index on COL1

  C. Create a clustered index on COL1

  D. Create a unique constraint on COL1

9.
Given a database named MYDB that contains table space MYTS. An offline database backup of database MYDB was started at 1am and completed at 3am.
Which of the following commands will restore from the offline backup and allow users to successfully connect to the database MYDB after the restore completes?

  A. RESTORE DB mydb FROM /backups

  B. RESTORE DB mydb ONLINE FROM /backups

  C. RESTORE DB mydb FROM /backups AND STOP

  D. RESTORE DB mydb TABLESPACE (MYTS) FROM /backups WITHOUT ROLLING FORWARD

10.
For messages written using the db2AdminMsgWrite API, the component listed in the notification log will be which of the following?

  A. User Function

  B. Application ID

  C. User Application

  D. Admin Message API

11.
Given the following command:

BACKUP DATABASE sample TO e: WITH 5 BUFFERS

Which of the following is the size of the buffer used during the backup?

  A. 5 4K pages

  B. 1024 4K pages

  C. The value of DB2_BACKUPSZ registry variable

  D. The value of BUFFPAGES Database configuration parameter

12.
Health Monitor alerts will be sent to which two of the following locations?

  A. Journal

  B. Health Center

  C. Visual Explain

  D. Command Center

  E. Recovery History File

13.
A DB2 table has just been reorganized.
To realize potential improvements in query performance, which of the following should be the next step?

  A. Collect statistics for the table

  B. Update the database configuration

  C. Rebind any packages that access the table

  D. Drop and recreate each index on the table


14.
Which of the following DB2 utilities can insert data into a DRDA host database using DB2 Connect?

  A. LOAD

  B. EXPORT

  C. IMPORT

  D. UPLOAD

15.
Given the following scenario:

* A database is configured with circular logging
* The database has active connections
* A table space within the database is OFFLINE because some of its containers are temporarily inaccessible

After the containers become accessible, which of the following can bring the table space ONLINE?

  A. Using the ACTIVATE DATABASE command

  B. Using the ALTER TABLESPACE statement

  C. The next new connection to the database

  D. Changing from circular logging to log retain

16.
Given an activated database, when does a database log file become inactive?

  A. When the log file is full

  B. When the log file is archived

  C. When the log file is no longer required for restart recovery

  D. When the log file is full and the next log file is being processed

17.
When creating an index, which of the following allows DB2 to attempt to maintain a physical ordering of the table data?

  A. Use the PCTFREE parameter

  B. Designate as clustering index

  C. Specify that it is the PRIMARY KEY

  D. Use the ALLOW REVERSE SCANS parameter

18.
Which of the following configuration parameter settings will allow online table space backups?

  A. LOGPRIMARY=ONLINE
USEREXIT=NO

  B. LOGRETAIN=RECOVERY
USEREXIT=NO

  C. DB_RECOVERY=NO
TBSP_RECOVERY=YES

  D. ONLINE_RECOVERY=YES
TBSP_RECOVERY=YES

19.
Given the following:
A System has twenty 4GB disk devices for the database.

* Table is named mytab
* mytab row data portion 17GB
* mytab index portion 23GB
* Two table spaces exist
    * mydatats
    * myindexts

If the table was created as follows:

CREATE TABLE mytab (...) IN mydatats INDEX IN myindexts

Given that containers cannot span devices, which of the following number of containers is sufficient to hold the expected amount of data for both rows and indexes?

  A. 5

  B. 10

  C. 15

  D. 20

20.
Which of the following can add data to a table with a primary key defined and have all rows which violate the primary key constraint stored in an exception table?

  A. LOAD

  B. INSERT

  C. UPDATE

  D. IMPORT

Given the following Advisor command:

21.
db2advis -d sample -F db2advis.in -L 30 -T 20

Which of the following specifies the maximum space to be used for all recommended objects in the existing schema?

  A. 20 MB

  B. 30 MB

  C. 20 GB

  D. 30 GB

  E. Unlimited


In which of the following are the definitions of the tables stored in a DB2 database?

  A. The system catalogs

  B. The DB2DIAG.LOG file

  C. The recovery history file

  D. The database configuration

Which of the following DB2 utilities provides the fastest method of adding large amounts of data to a table?

  A. Load

  B. Import

  C. Fastload

  D. Replication
24.
Which of the following will capture explain snapshots for an embedded static SQL application?

  A. The EXPLAIN YES bind option

  B. The EXPLSNAP YES bind option

  C. The SET CURRENT EXPLAIN SNAPSHOT YES command

  D. The SET CURRENT EXPLAIN SNAPSHOT EXPLAIN command
25
Which of the following may result in a table queue in an access plan?

  A. Hash join

  B. Sort operation

  C. Nested loop join

  D. Intra-partition parallelism
26
Which of the following file formats allows for the creation of a table during import?

  A. ASC

  B. DEL

  C. IXF

  D. WSF
27
To see the DDL needed to create objects in an existing database you can do which two of the following?

  A. Use the db2look utility.

  B. Run SELECT * FROM SYSCAT.TABLES.

  C. Click on Show DDL in Visual Explain

  D. Click on Generate DDL in the Control Center.

  E. Click on the Catalogs tab in the Control Center.
28
Which of the following CREATE VIEW options indicates that any updated or inserted row must qualify against the view definition and will be rejected if it does not conform?

  A. SET INTEGRITY

  B. GENERATED ALWAYS

  C. CONSTRAINT CHECK

  D. WITH CHECK OPTION
29
Which of the following authority levels can force users off the system?

  A. DBADM

  B. DBCTRL

  C. DBMAINT

  D. SYSCTRL

  E. SYSMAINT
30
How can the amount of data returned when listing the tables in the Control Center be limited?

  A. Use the filter feature of the Details pane.

  B. Use the filter feature of the Tables folder.

  C. Create your tables in different table spaces.

  D. Use the Customize Columns feature of the Details pane
31
Which of the following is TRUE of System Managed Space (SMS) table spaces?

  A. Space is not allocated until required

  B. Containers may be on either system files or raw devices

  C. SMS table spaces allow LOBs to be cached in the buffer pool

  D. SMS table spaces may be split up by data type (LOBs, index, data)
32
Given the following information:

Database server timezone is Atlantic Time
Client timezone is Central European Time

The following command is issued from the client:
ROLLFORWARD DB MYDB TO 2003-10-03-15.13.01.000000 USING LOCAL TIME

Which time is used on the rollforward command?

  A. Atlantic Time

  B. Central European Time

  C. UTC time on the client

  D. UTC time on the server
33
Given database configuration parameters of:

LOGRETAIN=NO
USEREXIT=NO

Which of the following commands is valid?

  A. BACKUP DB MYDB ONLINE TO /backups

  B. RESTORE DB MYDB FROM /backups REDIRECT

  C. BACKUP DB MYDB TABLESPACE (MYTS) TO /backups

  D. RESTORE DB MYDB TABLESPACE (MYTS) FROM /backups
34
When creating a database, how many table spaces are created?

  A. 0

  B. 1

  C. 2

  D. 3

  E. 4
35
Two databases, DATA1 and DATA2, will reside in different instances on the same DB2 UDB server. Which of the following actions provides a user SYSADM authority on DATA1, but no SYSADM authority on DATA2?

  A. GRANT SYSADM to the user on DATA1.

  B. REVOKE SYSADM from the user on DATA2.

  C. Specify different SYSADM groups for the instances.

  D. Specify different SYSADM groups for the databases.

[img][/img]
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP