You are not logged in.

#1 2012-03-28 06:21:31

User RankUser RankUser RankUser RankUser RankUser Rank
Agent Vinod
From: India
Registered: 2012-03-23
Posts: 1,149

IBM Certification Interview Questions And Answers

Education and Science :: IBM Certification Job Interview Questions and Answers

IBM Certification Exams Frequently Asked Questions in various IBM Certification Exams Interviews asked by the interviewer. So learn IBM Certification Exams with the help of this IBM Certification Exams Interview questions and answers guide and feel free to comment as your suggestions, questions and answers on any IBM Certification Exams Interview Question or answer by the comment feature available on the page.

1 Explain What are three advantages of fragmentation?A. higher availabilityB. reduced disk space requirementsC. parallel scans are possible with PDQD. finer granularity of archives and resources
2 Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER useraWhich of the following describes what USERA is allowed to do?A.Create a read?only view using TAB1. B.Alter TAB1 to add a check constraint.C.Define a primary key or unique constraint on TAB1.D.Define a dependent table where TAB1 is the parent.
3 What help ensure that the XIV Systems cache does not become a bottleneck?A. central cache locking mechanismB. use of industry standard chip technologyC. each module is responsible for caching the data in that moduleD. having all modules understand what is held cache at all times
4 Which statement fragments a table as round robin?A. FRAGMENT AS ROUND ROBIN IN dbspace 1, dbspace 2B. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2C. FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2D. FRAGMENT BY ROUND ROBIN
5 Which of the following can be kept in memory when the DB2 configuration parameterKEEPFENCED is enabled?A. SQLDAS after their cursor is closed. B. Referential integrity maps after a join.C. Stored procedure processes after they are run.D. Tables after they have been read into the buffer pool.
6 Explain Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?A The Linux command mtB The Linux command cpioC The OS/400 command RST option(*print)D The OS/400 command DSPTAP option(*savrst)
7 Suppose A customer has ordered a 10 module XIV System. How many interface modules are active in this configuration?
8 What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?A. XIV firmware V10.0.8B. Host Attachment Kit V1.0.1C. SAN Volume Controller (SVC)V4.2D. Virtual I/O Server (VIOS) V2.1.1
9 Which statement correctly changes the next extent size?A. ALTER TABLE customer MODIFY NEXT SIZE 300B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300C. ALTER TABLE customer MODIFY EXTENT SIZE 300D. ALTER TABLE customer NEXT SIZE 300
10 Explain Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)A. XIV partitionsB. XIV Data Mover (XDM)C. SAN Volume ControllerD. XIV Data Migration FunctionE. Tivoli Storage Productivity Center for Replication V4
11 Explain Which two types of fragmentation are allowed in a CREATE TABLE statement?A. disk stripingB. dbspaceC. indexingD. round robinE. mirroring F. tblspace G. sortingH. expression
12 A VM/VSE customer wants to implement a WAS on an existing zSeries server. On which of the following operating environments would WAS best be implemented?A. VSEB. z/VMC. z/OSD. Linux
13 How To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?A. on disks in other modulesB. on same disk in different modulesC. on different disks in the same moduleD. on same disk, in same module, and in different modules
14 Explain Which of the following tools is used to create subscription sets and add subscription?set members to subscription sets?A.JournalB.License CenterC.Replication CenterD.Development Center
15 Explain Which two of the following SQL data types should be used to store a small binary image?A.CLOBB.BLOBC.VARCHARD.GRAPHICE.VARCHAR FOR BIT DATA
16 Suppose a customer is planning to create a non-hosted Linux partition on an i825. Linux will have only direct-attach devices. What is the Linux console option?A Use OS/400 VNC support.B Telnet to the virtual console.C Share the primary partitions console.D Allocate a console IOA to the Linux partition.
17 Where is fragment information stored?A. in the system catalog tablesB. in the physical logsC. in the reserved pagesD. in the first page of the database tblspace
18 What is a chunk when using raw devices?A. a contiguous unit of disk spaceB. a dynamic unit of disk spaceC. a location in shared memoryD. a data table
19 Which three can be locked?A. a rowB. a pageC. a columnD. a keyE. shared memory
20 Which of the following tools can be used to identify inefficient SQL statements without executing them?A.QMFB.Task CenterC.Visual ExplainD.Development Center
21 Which two of the following table space attributes can be changes after the table space has been created?A. Page sizeB. Extent sizeC. Transfer rateD. Table space typeE. Table space name
22 Explain Which isolation level does a database without logging default to?A. committed readB. dirty readC. mode ANSID. repeatable read
23 In which two situations would you use a round robin fragmentation strategy?A. When all fragments must be secondB. To create uneven data distributionsC. When queries perform sequential scans and you have little information about the data being stored.D. When tables are accessed with a high degree of selectivity
24 Explain If there is a lock on an adjacent key, an insert will fail if the isolation level is set to what?A. committed readB. repeatable readC. share readD. indexed read
25 Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.Which of the following addresses this issue?A. GDPSB. TAMC. DRD. WASS
26 Explain What is database administration NOT concerned with?A. indexingB. creating tablesC. accessing dataD. application building
27 Explain Which of the following is required for the DB2 optimizer to consider a hash join strategy?A. Equijion predicatesB. Optimization level 1 or aboveC. Registry variable DB_ANTIJOIN=YESD. SORTHEAP large enough to contain the tables being joined
28 Suppose a customer is attempting to determine what failed during the last boot sequence of the Linuxpartition. Which of the following can be used to determine the error condition?A /var/log/messagesB /proc/startupC /usr/sbin/logD /etc/boot
29 Which of the following extenders allows data to be presented in a three?dimensional format?A.DB2 AVI ExtenderB.DB2 XML ExtenderC.DB2 Text ExtenderD.DB2 Spatial Extender
30 Explain Which of the following commands will format a new disk drive partition in Linux on iSeries?A mkts -e2 <path to device>B mkfs.ext2 <path to device>C mkfs -ext2 &It;path to device >D mkfs format -e2 <path to device>
31 Explain When creating a regular DMS table space, what is the minimum number of extents that must be specified?A. 1B. 3C. 4D. 6E. 8
32 The DBA can set the registry variable DB2_HASH_JOIN on or off because:A. hash joins may require more resources to run.B. hash joins are not used unless outer joins are requested.C. If hash joins are enabled, no other join method can be used.D. Hash joins are only needed when the tables are portioned using hash keys.
33 Suppose an application bound with isolation level Uncommitted Read updates a row. Which of the following is true regarding the locking of this row?A.No row lock is acquired when the row is updated.B.The row lock is released when the cursor accessing the row is closed.C.The row lock is released when the application issues a COMMIT statement.D.The row lock is released when the cursor accessing the row is moved to the next row.
34 When Disk space for a table is allocated in one or more units called what?A. tblspacesB. extentsC. blobsD. chunks
35 Explain Which of the following DB2 data types CANNOT be used to contain the date an employee was hired?A.CLOBB.TIMEC.VARCHARD.TIMESTAMP
36 Explain the Given following DDL statementCREATE TABLE RMW TABEL46&#8243;11&#8243; INTEGERD11&#8243; DECIMAL (1&#8242;0)NOT NULLD12&#8243; DECIMAL (1&#8242;0) NOT NULLS7&#8243; SMALLINTC8&#8243; CHAR(1) WITH DEFAULT)organize by ((D12&#8243; ;D11&#8243;))How many indexes will be created?A. 1B. 2C. 3D. 4
37 Suppose an installed z/OS customer also has Power6 Servers. They are investigating consolidation of both types of servers to z/OS.Which of the following will establish the capacity for a new z/OS server?A. AD ToolsB. Estimate the AIX load and add to CP3000 results.C. CP3000D. Run AIX in a z/OS LPAR to establish the loadWArialTimes New RomanZ
38 Explain With database logging, where are transaction records first placed?A. in a temporary database tableB. in the logical log bufferC. in the primary chunkD. in the physical buffer

2012-03-28 06:21:31

Ads By Google

Re: IBM Certification Interview Questions And Answers

The following user say "Thank You" for this post:Guest

Board footer