We provide real C2090-612 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass IBM C2090-612 Exam quickly & easily. The C2090-612 PDF type is available for reading and printing. You can print more and practice many times. With the help of our IBM C2090-612 dumps pdf and vce product and material, you can easily pass the C2090-612 exam.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for IBM C2090-612 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW C2090-612 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/C2090-612-exam-dumps.html
Q71. Which of the following utilities is NOT relevant for health checking the DB2 V10 catalog or directory in new function mode?
A. CHECK LOB
B. CHECK INDEX
C. DSN1COPY
D. DSN1CHKR
Answer: D
Explanation:
Q72. In determining whether a REORG on an index space would improve performance, which two of the following columns would NOT be needed? (Choose two.)
A. Column CLUSTERING in SYSIBM.SYSINDEXES
B. Column LEAFDIST in SYSIBM.SYSINDEXPART
C. Column CLUSTERRATIOF in SYSIBM.SYSINDEXES
D. Column LASTUSED in SYSIBM.SYSINDEXSPACESTATS
E. Columns LEAFNEAR and LEAFFAR in SYSIBM.SYSINDEXPART
Answer: A,D
Explanation:
Q73. When is a merge scan join a well performing access path?
A. When the number of qualifying rows of the inner and outer table are both large.
B. When the query references at least two dimensions and the STARJOIN subsystem parameter is 1.
C. When the number of rows in the outer table is small and the number of pages accessed in the inner table is small.
D. When the matching columns of the inner table are in a non-clustering index or the outer table has duplicate qualifying rows.
Answer: A
Explanation:
Q74. Using the -SET LOG command, what logging characteristics CANNOT be modified?
A. The number of minutes between the start of successive checkpoints.
B. Add a newly defined active log data set to the active log inventory.
C. Altering DB2 from dual active logging mode to single active logging mode.
D. The number of log records that DB2 writes between the start of successive checkpoints.
Answer: C
Explanation:
Q75. Which connection type can exploit trusted connections?
A. IMS
B. CAF
C. CICS
D. RRSAF
Answer: D
Explanation:
Q76. In a normalized design, in third normal form, the entity defined in the logical design is often transformed in the physical design to which of the following?
A. Index
B. Table
C. Schema
D. Database
Answer: B
Explanation:
Q77. The EXPLAIN STMTCACHE ALL statement provides information about SQL tuning. Which information is part of the DSN_STATEMENT_CACHE_TABLE?
A. Filter factor information.
B. Stage 1 and stage 2 information.
C. Number of columns used in an index.
D. Number of times an SQL statement is executed.
Answer: D
Explanation:
Q78. DB2 workfiles are critical to performance of applications. Which of the following will NOT assist with achieving best performance for workfile usage?
A. Create several 4K and 32K workfiles.
B. Assign workfiles to their own bufferpools.
C. Assign workfiles to their own DASD volumes.
D. Create one large workfile for the data sharing group.
Answer: D
Explanation:
Q79. What is the DSNZPARM that determines the maximum amount of temporary storage in the work file data base for a single user at any given time?
A. MAXRBLK
B. MAXDBAT
C. MAXKEEPD
D. MAXTEMPS
Answer: D
Explanation:
Q80. The UNLOAD utility can be used to do which of the following functions?
A. Unload compressed data.
B. Unload rows from a FlashCopy image copy.
C. Unload data from an image copy of an index.
D. Unload rows from an image copy that has rows from a dropped table.
Answer: A
Explanation: