[Free] 2018(Jan) Dumps4cert Braindumps IBM C2090-610 Dumps with VCE and PDF 71-80

By | February 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan IBM Official New Released C2090-610
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/C2090-610.html

DB2 10.1 Fundamentals

Question No: 71 – (Topic 2)

What mechanism is typically used to automatically update other tables, generate or transform values for inserted or updated rows, and perform tasks such as issuing alerts?

  1. Trigger

  2. Procedure

  3. Table function

  4. Scalar function

Answer: A

Question No: 72 – (Topic 2)

Which SQL statement would be used to retrieve only salaries that are greater than

$100,000.00 from a table named EMPLOYEE?

  1. SELECT * FROM employee WHERE salary lt; 100000

  2. SELECT salary FROM employee WHERE salary gt; 100000

  3. SELECT salary FROM employee WHERE salary gt;100,000.00

  4. SELECT * FROM employee

WHERE salary GREATER THAN 100000

Answer: B

Question No: 73 – (Topic 2)

If no isolation level is specified, what is the default isolation level used?

  1. Cursor Stability (CS)

  2. Repeatable Read (RR)

  3. Read Stability(RS) with Currently Committed semantics

  4. Cursor Stability (CS) with Currently Committed semantics

Answer: A

Question No: 74 – (Topic 2)

Which statement about UPDATE processing is FALSE?

  1. The UPDATE statement logs the before and after value of every column it modifies.

  2. A searched UPDATE is used to update one or more rows and a positioned UPDATE is used to update exactly one row.

  3. When the UPDATE statement modifies parent key columns, the value of corresponding foreign key columns are also modified.

  4. The UPDATE statement modifies the values of specified columns in the rows of a table, view, or underlying table(s) of a specified fullselect.

Answer: C

Question No: 75 – (Topic 2)

User USER1 wants to define arequired relationship between two tables named TAB1 and TAB2 in such a way that whenever a record is deleted from table TAB1, any related records are deleted from table TAB2. What must user USER1 do to accomplish this?

  1. 1) Create a primary key on tableTAB1;

    2) Create a foreign key on table TAB2 that references the primary key on table TAB1 and adheres to the ON DELETE CASCADE rule.

  2. 1) Create a primary key on table TAB2;

    2) Create a foreign key on table TAB1 that references the primary key on table TAB2 and adheres to the ON DELETE CASCADE rule.

  3. 1) Create a primary key on table TAB1;

    2) Create a foreign key on table TAB2 that references the primary key on table TAB1 and adheres to the ON DELETE RESTRICT rule.

  4. 1) Create a primary key on table TAB2;

2) Create a foreign key on table TAB1 that references the primary key on table TAB2 and adheres to the ON DELETE RESTRICT rule.

Answer: A

Question No: 76 – (Topic 2)

In a trusted context environment, if a switch request is made with an authorization ID that is not allowed on a trusted connection, what state is the connection placed in?

  1. Locked

  2. Waiting

  3. Pending

  4. Unconnected

Answer: D

Question No: 77 – (Topic 2)

Which two DB2 objects can a view be derived from? (Choose two.)

  1. View

  2. Index

  3. Table

  4. Trigger

  5. Procedure

Answer: A,C

Question No: 78 – (Topic 2)

Which statement about system-period temporal tables is true?

  1. They store user-basedperiod information.

  2. They do not have a separate history table.

  3. They can be queried without a time period specification.

  4. They manage data based on time criteria specified by users or applications.

Answer: C

Question No: 79 – (Topic 2)

What takes place when a process accesses a data object on which it already holds a lock, and theaccess mode requires a more restrictive lock than the one currently held?

  1. Lock wait

  2. Lock timeout

  3. Lock escalation

  4. Lock conversion

Answer: D

Question No: 80 – (Topic 2)

What is the act of releasing a large number of row-level locks that an application holds on a single table to acquire a table-level lock known as?

  1. Lock exchange

  2. Lock promotion

  3. Lock escalation

  4. Lock conversion

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:C2090-610 Demo PDF
100% Dumps4cert Free Guaranteed!
C2090-610 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.