DB2 10.1 Fundamentals 試験
Question No : 1
Which statement about INSERT operations is true?
Question No : 2
If the following result set is desired:
Which SQL statement must be executed?
Question No : 3
Which SQL statement will retrieve the employee number (EMPNO), hire date (HIREDATE), and salary (SALARY) for each employee from a table named EMPLOYEE who was hired before 1998 and earns a salary of less than $35,000.00 per year?
Question No : 4
User USER1 wants to retrieve records from a table named EMPLOYEE that satisfy at least one of the following criteria:
-The employee's hire date (HIREDATE) is before 1999 and the employee's salary (SALARY) is less than $40,000.00 a year. -The employee has attended university
Which SQL statement will accomplish this?
Question No : 5
Which function can be used to obtain values from XML documents that are to be inserted into one or more tables?
Question No : 6
Which command will delete all rows from a table without generating log records?
Question No : 7
Which two operations are allowed in the body of an SQL scalar user-defined function? (Choose two.)
Question No : 8
Given an EMPLOYEES table and a SALES table, a user wants to produce a list of all employees and their associated revenue, even if no revenue exists. Which SQL statement will produce the desired list?
Question No : 9
If a table named MY_TAB contains 100 rows and the following statement is executed:
What will happen?
Question No : 10
An SQL function designed to convert temperatures from Fahrenheit to Celsius was created as follows:
How can this function be used to convert average temperature (AVG_TEMP) data stored in a table called CLIMATE_INFO?
Question No : 11
Which command is used to back out a subset of database changes that have been made within a unit of work?
Question No : 12
When a COMMIT statement is executed, what happens?
Question No : 13
Which operation normally does NOT require an exclusive lock?
Question No : 14
What isolation level prevents dirty reads, nonrepeatable reads, and phantoms?
Question No : 15
What is the act of exchanging one lock an application holds on a resource for a more restrictive lock on the same resource known as?