Searching for "he"

Q:

Which statement correctly changes the next extent size?

A) ALTER TABLE customer MODIFY NEXT SIZE 300 B) ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
C) ALTER TABLE customer MODIFY EXTENT SIZE 300 D) ALTER TABLE customer NEXT SIZE 300
 
Answer & Explanation Answer: A) ALTER TABLE customer MODIFY NEXT SIZE 300

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

Q:

Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A) The Linux command mt B) The Linux command cpio
C) The OS/400 command RST option(*print) D) The OS/400 command DSPTAP option(*savrst)
 
Answer & Explanation Answer: B) The Linux command cpio

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

Q:

Which of the following can be kept in memory when the DB2 configuration parameter KEEPFENCED is enabled?

A) SQLDAS after their cursor is closed. B) Referential integrity maps after a join.
C) Stored procedure processes after they are run. D) Tables after they have been read into the buffer pool.
 
Answer & Explanation Answer: C) Stored procedure processes after they are run.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

Q:

What help ensure that the XIV Systems cache does not become a bottleneck?

A) central cache locking mechanism B) use of industry standard chip technology
C) each module is responsible for caching the data in that module D) having all modules understand what is held cache at all times
 
Answer & Explanation Answer: C) each module is responsible for caching the data in that module

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

Q:

Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera.Which of the following describes what USERA is allowed to do?

A) Create a read?only view using TAB1. B) Alter TAB1 to add a check constraint.
C) Define a primary key or unique constraint on TAB1. D) Define a dependent table where TAB1 is the parent.
 
Answer & Explanation Answer: D) Define a dependent table where TAB1 is the parent.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

Q:

 What are the advantages of fragmentation?

A) reduced disk space requirements B) higher availability
C) finer granularity of archives and resources D) parallel scans are possible with PDQ
 
Answer & Explanation Answer: B) higher availability

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

Q:

What happens when you drop a dimension into a blank part of a report that contains two blocks, without the ALT key selected?

A. The currently selected cell is displayed.

B. A new section is created

C. A new block is created.

D. An error message is displayed.

Answer

Answer : B

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

Q:

You are working with a previously saved document and you have deleted a logical operator. Which two methods can you use to recover the logical operator?

A. Click the Undo button in the Query panel.

B. Rebuild the filters.

C. Close the Query panel without executing and then open the query

D. From the Tools menu, select Recover Operator.

Answer

Answer : B , C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW