Which type of constraint can be used to tell the DB2 Optimizer that a parent-child relationship exists between
Which type of constraint can be used to tell the DB2 Optimizer that a parent-child
relationship exists between two tables, but that the relationship is not enforced?
Which event will NOT cause a trigger to be fired?
Which event will NOT cause a trigger to be fired?
What is the primary purpose for using the INCLUDE clause with a CREATE UNIQUE INDEX statement?
What is the primary purpose for using the INCLUDE clause with a CREATE UNIQUE
INDEX statement?
What are INSTEAD OF triggers used for?
What are INSTEAD OF triggers used for?
Which statement should user USER1 execute to create the desired table?
User USER1 wants to store part numbers and part descriptions in a table named PARTS;
user USER1 also wants to ensure that any comparisons of part descriptions that are made
will be done so in binary, regardless of the database collating sequence used. Which
statement should user USER1 execute to create the desired table?
What mechanism is typically used to automatically update other tables, generate or transform values for insert
What mechanism is typically used to automatically update other tables, generate or
transform values for inserted or updated rows, and perform tasks such as issuing alerts?
Which data type should be used to store data in a column that represents money and accurately returns a two po
Which data type should be used to store data in a column that represents money and
accurately returns a two position scale?
What must user USER1 do to accomplish this?
User USER1 wants to define a required relationship between two tables named TAB1 and
TAB2 in such a way that whenever a record is deleted from table TAB1, any related records
are deleted from table TAB2. What must user USER1 do to accomplish this?
Which statement about a deadlock is true?
Which statement about a deadlock is true?
What takes place when a process accesses a data object on which it already holds a lock, and the access mode r
What takes place when a process accesses a data object on which it already holds a lock,
and the access mode requires a more restrictive lock than the one currently held?