Which statement is true about an index that is used to support a UNIQUE constraint?
A. It must not contain more than one column.
B. It cannot be used in a referential constraint.
C. It must be defined with the UNIQUE attribute.
D. It must be defined as UNIQUE WHERE NOT NULL.
When an application using a temporary table terminates or disconnects from the database unexpectedly, what happens to the temporary table and any data stored in it?
A. The data in the table is deleted and the table persists.
B. The data in the table is deleted and the table is implicitly dropped.
C. The temporary table is converted to a base table and the data is deleted.
D. The temporary table is converted to a base table and the data is persistent.
Which statement about triggers is true?
A. A trigger is designed to return specific types of values and contains executable code.
B. A trigger is designed to return specific types of values but contains no executable code.
C. A trigger performs actions to capture details about an activity like a join operation against multiple tables.
D. A trigger performs actions in response to an event like an INSERT, UPDATE or DELETE operation on a table.
When is a mask used to limit access to data in a table?
A. When mandatory access control (MAC) is used to protect the table.
B. When discretionary access control (DAC) is used to protect the table.
C. When label-based access control (LBAC) is used to protect the table.
D. When row and column access control (RCAC) is used to protect the table.
Which statement is valid about the Row and Column Access Control (RCAC) feature?
A. A row mask's access control rule is defined by an SQL CASE expression; a column permission's access control rule is defined by an SQLsearch condition.
B. A row permission's access control rule is defined by an SQL CASE expression; a column mask's access control rule is defined by an SQLsearch condition.
C. A row mask's access control rule is defined by an SQL search condition; a column permission's access control rule is defined by an SQL CASEexpression.
D. A row permission's access control rule is defined by an SQL search condition; a column mask's access control rule is defined by an SQL CASEexpression.
Which DB2 object limits the user's ability to retrieve data from a table by defining a SQL statement in the object?
A. View
B. Index
C. Trigger
D. Check constraint
A table named EMPLOYEES was created as follows:
What will be the results?
A. 0
B. 1
C. 2
D. 3
Which DB2 object is associated with PREVIOUS VALUE and NEXT VALUE expressions?
A. View
B. Table
C. Sequence
D. Identity Column
What type of large object (LOB) is used to store LOB data together with the formatted rows on data pages, instead of in a separate LOB storage object?
A. inline
B. binary
C. internal
D. partitioned
Which statement about roll back operations is correct?
A. When a ROLLBACK statement is executed, all locks held by the terminating transaction are released.
B. When a ROLLBACK TO SAVEPOINT statement is executed, all locks acquired up to the savepoint are released.
C. When a ROLLBACK TO SAVEPOINT statement is executed, all locks acquired after the savepoint are released.
D. When a ROLLBACK statement is executed, all locks acquired for open cursors that were declared WITH HOLD, are held.