⟩ In c#, a statement "a?bc" means?
a = answer b if not null else c
a = answer b if not null else c
If you network is currently congested and you are using hubs in you network, what would be the best solution to decrease congestion on your network?
How many key in key board?
Which of the following is true regarding 2 switches? (Choose two)?
What is the broadcast address of the subnet address 172.16.8.159 255.255.255.192?
Explain What are three advantages of fragmentation? A. higher availability B. reduced disk space requirements C. parallel scans are possible with PDQ D. finer granularity of archives and resources
Explain Given the following SQL statement GRANT REFERENCES ON TABLE tab1 TO USER usera Which of the following describes what USERA is allowed to do? A.Create a read?only view using TAB1. B.Alter TAB1 to add a check constraint. C.Define a primary key or unique constraint on TAB1. D.Define a dependent table where TAB1 is the parent.
What help ensure that the XIV Systems cache does not become a bottleneck? A. central cache locking mechanism B. use of industry standard chip technology C. each module is responsible for caching the data in that module D. having all modules understand what is held cache at all times
Which statement fragments a table as round robin? A. FRAGMENT AS ROUND ROBIN IN dbspace 1, dbspace 2 B. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2 C. FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2 D. FRAGMENT BY ROUND ROBIN
Which of the following can be kept in memory when the DB2 configuration parameter KEEPFENCED is enabled? A. SQLDAS after their cursor is closed. B. Referential integrity maps after a join. C. Stored procedure processes after they are run. D. Tables after they have been read into the buffer pool.
The DBA can set the registry variable DB2_HASH_JOIN on or off because A. hash joins may require more resources to run. B. hash joins are not used unless outer joins are requested. C. If hash joins are enabled, no other join method can be used. D. Hash joins are only needed when the tables are portioned using hash keys.