CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Advertisements
IBM Certification Exams Interview Questions

Below we have listed all the IBM Certification Exams Interview Questions and answers. Feel free to comment on any IBM Certification Exams Interview Questions or answer by the comment feature available on the page.

To buy an eBook containing 30,000 Interview Questions, with Answers, Click Here.
View All IBM Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode

IBM Business Analytics Certification provides an industry standard benchmark for technical competence, and offers validation for professionals who work with IBM Business Analytics technologies. IBM Business Analytics Certification offers the only authorized accreditation in the industry for benchmarking and validating your expertise with Cognos or SPSS products.

Highly Recommended, Hand Picked IBM Certification Exams Books


Subcategories for IBM Certification Exams Interview Questions & Answers :-

Following are sub categories for which Interview Questions & Answers are available under IBM Certification Exams Interview Questions & Answers. Please select the appropriate sub-category:-

IBM DB2 DBA Certification Exam Interview Questions & Answers (12) Exam Mode | Learning Mode

Previous 1 2 3 4 5 Next

Sort By : Latest First | Oldest First | By Rating

Question
Rating
View Answer
On the XIV System, what is the approximate rebuild time for a 1 TB drive that is 50% utilized?

A. 5 minutes
B. 15 minutes
C. 30 minutes
D. 120 minutes
0.2 Rating
View Answer
Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)

A. XIV partitions
B. XIV Data Mover (XDM)
C. SAN Volume Controller
D. XIV Data Migration Function
E. Tivoli Storage Productivity Center for Replication V4
0.3 Rating
View Answer
Given the following table definition: COUNTRY c1 INTEGER name CHAR(20) Which of the following SQL statements will remove all rows from the table named COUNTRY?
A.DELETE FROM country
B.DELETE * FROM country C.DELETE FROM TABLE country
D.DELETE FROM country WHERE c1 IS NOT NULL
0.3 Rating
View Answer
A mainframe customer is planning to replace several ISV application sets and significant home written applications with a single application set.
Which of the following products should be mentioned by the System z Sales Professional?

A. WebSphere Application Server
B. z/VM
C. WebSphere with SOA
D. Domino

0.2 Rating
View Answer
Assuming the proper privileges, which two of the following would allow access to data in a table T1 using the name A1?
A.CREATE ALIAS a1 FOR t1
B.CREATE TABLE a1 LIKE t1
C.CREATE INDEX a1 ON t1 (col1)
D.CREATE VIEW a1 AS SELECT * FROM t1
E.CREATE TRIGGER trig1 AFTER INSERT ON t1 FOR EACH ROW MODE DB2SQL INSERT INTO a1
0.3 Rating
View Answer
A prospect is considering a new e-business solution. They are comparing the iSeries
to a Linux solution from a local systems integrator. Which of the following iSeries

advantages should be emphasized?

A. LPAR
B. Initial cost
C. Reliability of hardware and software
D. Availability of i5/OS or Linux as the base OS
0.2 Rating
View Answer
.A table called EMPLOYEE has the following columns: NAME DEPARTMENT PHONE_NUMBER
Which of the following will allow USER1 to modify the PHONE_NUMBER column?
A.GRANT INDEX (phone_number) ON TABLE employee TO user1
B.GRANT ALTER (phone_number) ON TABLE employee TO user1
C.GRANT UPDATE (phone_number) ON TABLE employee TO user1
D.GRANT REFERENCES (phone_number) ON TABLE employee TO user1
0.2 Rating
View Answer
The DBA can set the registry variable DB2_HASH_JOIN on or off because:
A. hash joins may require more resources to run.
B. hash joins are not used unless outer joins are requested.
C. If hash joins are enabled, no other join method can be used.
D. Hash joins are only needed when the tables are portioned using hash keys.
0.2 Rating
View Answer
When defining a volume on a thin-provisioned pool on an XIV System, the size of the volume is limited by

A. the hard capacity of the volume
B. the 2 TB maximum volume size on XIV
C. the hard capacity of the storage pool
D. the soft capacity of the storage pool
0.2 Rating
View Answer
A new Linux IOA has been added into a system, but it is not reporting into the hyper visor as
viewed through the primary partition display I/O resources screen. Which of the following is the most likely cause of the problem?

A The IOA is incorrectly installed.
B The bus is not allocated to the Linux partition.
C Empty slots on a shared bus are defaulted to unallocated, so it will not report in until the slot
is allocated to a running partition.
D For IOAs to report in, the IOA must first be allocated to the primary partition, then the hyper visor can register them as a resource.
0.2 Rating
View Answer
Where is fragment information stored?

A. in the system catalog tables
B. in the physical logs
C. in the reserved pages
D. in the first page of the database tblspace
0.3 Rating
View Answer
Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A The Linux command mt
B The Linux command cpio
C The OS/400 command RST option(*print)
D The OS/400 command DSPTAP option(*savrst)
0.2 Rating
View Answer
Certkiller .com has asked for a proposal to combine several computing groups within their company. They have an i810 that is fully utilized, a small HP/UX system with
an engineering application, and almost 40 Microsoft Windows servers with very low utilization. They also plan to add a Linux firewall. Which of the following will establish the requirements?

A. Use Workload Estimator to establish the requirements for the i5/OS, AIX, Linux, and
Windows workloads.
B. Use Pilot Predict to model the existing and proposed workloads. Factor in the mutually agreed growth factor.
C. Propose an iSeries running LPAR with i5/OS, Linux, AIX, and IXS to handle the combined and proposed workloads.
D. Propose a study to review the applications, processing, storage, communications, and other considerations for all existing and proposed systems.

0.2 Rating
View Answer
Which of the following DB2 UDB isolation levels will lock no rows during read processing?
A.Read Stability
B.Repeatable Read
C.Uncommitted Read

D.Cursor Stability
0.3 Rating
View Answer
Given the following DDL statement
CREATE TABLE RMW TABEL46″
11″ INTEGER
D11″ DECIMAL (1′0)NOT NULL
D12″ DECIMAL (1′0) NOT NULL
S7″ SMALLINT
C8″ CHAR(1) WITH DEFAULT)
organize by (
(D12″ ;D11″))
How many indexes will be created?

A. 1
B. 2
C. 3
D. 4

0.2 Rating
View Answer
What is the minimum privilege required to allow USER1 to access table data?
A.READ privilege on the table
B.SELECT privilege on the table
C.REFERENCES privilege on the table
D.SELECT privilege WITH GRANT OPTION on the table
0.2 Rating
View Answer
An iSeries Linux partition has been created without a physical network card assigned. When
signed on to OS/400, users are able to use FTP and Telnet to the Linux partition. However, attempts to establish a terminal connection to Linux from their PCs fail. Which of the following is the most likely cause of the problem?

A Datagram forwarding was not enabled in OS/400 TCP/IP.
B The Linux configuration did not have proxy ARP enabled.
C The Linux Ethernet adapter was not enabled.
D The Linux feature code was not ordered.
0.3 Rating
View Answer
Which of the following occurs if an application ends abnormally during an active unit of work?
A.The unit of work remains active
B.The unit of work is rolled back
C.The unit of work moves to CHECK_PENDING
D.The unit of work moves to pending state
0.2 Rating
View Answer
A prospect has multiple Intel servers installed and would like to replace them with new application software on an iSeries. How can the disk requirements be determined?

A. Add a growth factor to the total amount of disk on all existing processors.
B. Complete a sizing based on the application volumes, number of users, and file requirements.
C. Use an equal number of disk arms because response time is dependent on the number
of disk arms.
D. Check on each server for unused disk space and propose the amount of disk currently being actively used.

0.2 Rating
View Answer
With database logging, where are transaction records first placed?

A. in a temporary database table
B. in the logical log buffer
C. in the primary chunk
D. in the physical buffer
0.2 Rating
View Answer

Previous 1 2 3 4 5 Next

India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.15625 Seconds