网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
If DB2 detects a deadlock between application A and application B (each waiting for a lock held by the other one), what action will DB2 take?()
A

Rollback the transaction in both applications.

B

Rollback the transaction in one of the two applications.

C

Decrease the lock timeout value for both applications, thereby causing a lock timeout situation.

D

Send a message to let the administrator know of the situation and decide which application or applications should be terminated.


参考答案

参考解析
解析: 暂无解析
更多 “单选题If DB2 detects a deadlock between application A and application B (each waiting for a lock held by the other one), what action will DB2 take?()A Rollback the transaction in both applications.B Rollback the transaction in one of the two applications.C Decrease the lock timeout value for both applications, thereby causing a lock timeout situation.D Send a message to let the administrator know of the situation and decide which application or applications should be terminated.” 相关考题
考题 Acts as an interface between computer hardware and users()。A.Operating systemB.Application softwareC.USBD.MODEM

考题 An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?() A.GRAPHICB.BINARYC.IMAGED.BLOB

考题 Which product must be installed on z/OS to allow a COBOL program running on that machine to access data on a remote DB2 for z/OS server?() A.DB2 for z/OSB.DB2 Run-Time Client for z/OSC.DB2 Connect Enterprise Edition for z/OSD.z/OS Application Connectivity to DB2 for z/OS and OS/390

考题 Which CRS Subsystem handles connections between the Application Server and the Enterprise Databases?()A、MediaB、JTAPIC、DatabaseD、Application

考题 What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways

考题 Which tool must be used to analyze all of the database operations performed by an application against a DB2 for i5/OS database?()A、Visual ExplainB、Activity MonitorC、SQL Performance MonitorD、DB2 Performance Monitor

考题 Application A currently holds an exclusive lock on a single row and application B tries to access that row. If lock timeout is set to -1 and both applications are using isolation level RS, which of the following will occur?()A、Applications A and B will cause a deadlock situationB、Application B will read the previous version of the rowC、Application B will read the row and see uncommitted changes made by application AD、Application B will be placed in a lock-wait state until application A releases its lock

考题 Which ONE of the following statements about Domino Enterprise server is true?()A、Can host Active Server Pages Web sitesB、Can host PHP Web sitesC、Includes a DB2 serverD、Includes an integrated Web application server

考题 Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()A、An application process acquires at least a share lock on the current row of every cursor.B、Any row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.C、Any row changed by another application process can be read, even if the change has not been committed by that application process.D、An application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.

考题 Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()A、The cursor is only protected from updates and deletes by concurrent applications.B、The row is only protected from positioned updates and deletes that reference another cursor of the same application.C、The cursor is protected from positioned updates and deletes that reference another cursor of a different application.D、The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.

考题 An administrator is attempting to use the Tivoli Performance Viewer to see the average response time for a WebSphere Commerce command, which of the following must be done in order to be successful?()A、Enable performance monitoring of the WebSphere Application Server through the WebSphere Application Server Administrative ConsoleB、Enable performance monitoring of the WebSphere Commerce application through the WebSphere Commerce Administration ConsoleC、Install and configure Tivoli Performance Viewer on a separate machine and configure it to connect to the Application Server.D、Install and configure DB2 Intelligent Miner for Data to support the appropriate closed-loop analytics

考题 Which of the following DB2 products are required on an iSeries or System i server to enable an application running on that server to retrieve data from a DB2 database on a Linux server?()A、DB2 for i5/OSB、DB2 Runtime ClientC、DB2 Connect Enterprise EditionD、DB2 for i5/OS SQL Development Kit

考题 Which product must be installed on z/OS to allow a COBOL program running on that machine to access data on a remote DB2 for z/OS server?()A、DB2 for z/OSB、DB2 Run-Time Client for z/OSC、DB2 Connect Enterprise Edition for z/OSD、z/OS Application Connectivity to DB2 for z/OS and OS/390

考题 Application A holds an Update lock on a single row and application B is trying to read that row. If both applications are using isolation level UR, which of the following will occur?()A、Application B will read the row.B、Applications A and B will cause a deadlock situation.C、Application B will wait until application A releases the Update lock.D、Application A will be terminated so that application B can read the row.

考题 An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()A、GRAPHICB、BINARYC、IMAGED、BLOB

考题 Which two statements are true?()A、It is possible for more than two threads to deadlock at once.B、The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.C、Deadlocked threads release once their sleep() method’s sleep duration has expired.D、Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.E、It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.F、If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().

考题 Identify architecturally where in an application, Coherence stack will be used ()A、 coherence resides locally on the machines of all remote application usersB、 coherence resides between remote users and the Web tierC、 coherence resides between the Web tier and application tierD、 coherence resides between the application tier and data tier

考题 You are designing a Windows Azure application that will communicate with existing on-premise applications and services.  The application will be activated for Windows Azure Connect.  You need to recommend a solution for completing the Windows Azure Connect configuration.  Which two actions should you recommend?()A、 Place local endpoints in groups and then configure a connection between the groups and the application.B、 Place hosted endpoints in groups and then configure a connection between the groups and the application.C、 Install endpoint software on local computers or virtual machines.D、 Install endpoint software on hosted virtual machines.

考题 TestKing.com uses SQL Server 2005. Users report with increasing frequency that they receive deadlock error messages in an order processing application.   You need to monitor which objects and SQL Server session IDs are involved when deadlock conditions occur. You want information about each participant in the deadlock. What should you do?()A、Trace the Lock:Timeout event by using SQL Server Profiler.B、Observe the SQLServer:Locks - Number of Deadlocks/sec counter by using System Monitor.C、Trace the Lock:Deadlock event by using SQL Server Profiler.D、Trace the Lock:Deadlock Chain event by using SQL Server Profiler.

考题 单选题Application A holds an Update lock on a single row and application B is trying to read that row. If both applications are using isolation level UR, which of the following will occur?()A Application B will read the row.B Applications A and B will cause a deadlock situation.C Application B will wait until application A releases the Update lock.D Application A will be terminated so that application B can read the row.

考题 单选题Which of the following DB2 products are required on an iSeries or System i server to enable an application running on that server to retrieve data from a DB2 database on a Linux server?()A DB2 for i5/OSB DB2 Runtime ClientC DB2 Connect Enterprise EditionD DB2 for i5/OS SQL Development Kit

考题 单选题Application A currently holds an exclusive lock on a single row and application B tries to access that row. If lock timeout is set to -1 and both applications are using isolation level RS, which of the following will occur?()A Applications A and B will cause a deadlock situationB Application B will read the previous version of the rowC Application B will read the row and see uncommitted changes made by application AD Application B will be placed in a lock-wait state until application A releases its lock

考题 单选题Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()A An application process acquires at least a share lock on the current row of every cursor.B Any row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.C Any row changed by another application process can be read, even if the change has not been committed by that application process.D An application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.

考题 单选题Given the following ALTER SEQUENCE statement: ALTER SEQUENCE myseq RESTART WITH 0 INCREMENT BY 1 NO MAXVALUE CACHE 5 ORDER Assuming that the sequence had reached a value of 100 prior to the RESTART, which of the following is true?()A The next value will be 0 and the sequence will never use the values 101 to 105.B The next value will be 101 to ensure uniqueness between existing and newly generated sequence values.C Previously cached values are retained by DB2, and after the restart, will be used for values 101 to 105.D The next value will be 0 and DB2 will not ensure uniqueness between existing and newly generated values.

考题 单选题Which CRS Subsystem handles connections between the Application Server and the Enterprise Databases?()A MediaB JTAPIC DatabaseD Application

考题 单选题If DB2 detects a deadlock between application A and application B (each waiting for a lock held by the other one), what action will DB2 take?()A Rollback the transaction in both applications.B Rollback the transaction in one of the two applications.C Decrease the lock timeout value for both applications, thereby causing a lock timeout situation.D Send a message to let the administrator know of the situation and decide which application or applications should be terminated.

考题 单选题Identify architecturally where in an application, Coherence stack will be used ()A  coherence resides locally on the machines of all remote application usersB  coherence resides between remote users and the Web tierC  coherence resides between the Web tier and application tierD  coherence resides between the application tier and data tier

考题 单选题What is meant by the term "firewall sandwich"?()A multiple layers of firewallingB a method of operating firewalls from multiple vendorsC firewall connections in either an active or standby stateD an architecture in which all traffic between firewalls goes through application-specific serversE an architecture in which all traffic between firewalls goes through application-specific gateways