Preface |
|
xiii | |
|
|
1 | (38) |
|
DB2 and the On Demand Business |
|
|
2 | (1) |
|
|
3 | (18) |
|
DB2 Middleware and Connectivity |
|
|
21 | (4) |
|
DB2 Application Development |
|
|
25 | (3) |
|
|
28 | (6) |
|
|
34 | (1) |
|
|
35 | (2) |
|
|
37 | (2) |
|
|
39 | (60) |
|
|
40 | (11) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Storage Management Subsystem |
|
|
52 | (1) |
|
|
52 | (3) |
|
Installation, Migration, and Conversion |
|
|
55 | (4) |
|
|
59 | (9) |
|
|
68 | (4) |
|
|
72 | (5) |
|
|
77 | (8) |
|
|
85 | (3) |
|
|
88 | (4) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (2) |
|
|
96 | (3) |
|
|
99 | (42) |
|
|
101 | (4) |
|
|
105 | (1) |
|
|
105 | (23) |
|
|
128 | (3) |
|
|
131 | (1) |
|
|
132 | (3) |
|
Auditing Specific IDs or Roles |
|
|
135 | (1) |
|
Starting/Stopping the Trace |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (2) |
|
|
140 | (1) |
|
|
141 | (108) |
|
Understanding Data Structures |
|
|
142 | (6) |
|
Managing Database Objects |
|
|
148 | (3) |
|
|
151 | (24) |
|
|
175 | (12) |
|
|
187 | (2) |
|
|
189 | (19) |
|
|
208 | (3) |
|
Materialized Query Tables |
|
|
211 | (2) |
|
|
213 | (2) |
|
|
215 | (12) |
|
|
227 | (1) |
|
|
228 | (2) |
|
Database Design and Implementation |
|
|
230 | (8) |
|
|
238 | (5) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
247 | (2) |
|
Retrieving and Manipulating Database Objects |
|
|
249 | (46) |
|
|
250 | (28) |
|
|
278 | (11) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
291 | (2) |
|
|
293 | (2) |
|
|
295 | (50) |
|
|
296 | (4) |
|
|
300 | (3) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
307 | (2) |
|
|
309 | (14) |
|
Order by and Fetch First in Subselects and Fullselects |
|
|
323 | (1) |
|
|
324 | (2) |
|
|
326 | (1) |
|
|
326 | (6) |
|
|
332 | (5) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (4) |
|
|
343 | (2) |
|
|
345 | (82) |
|
|
346 | (18) |
|
|
364 | (25) |
|
|
389 | (11) |
|
|
400 | (2) |
|
|
402 | (9) |
|
|
411 | (1) |
|
|
412 | (4) |
|
|
416 | (1) |
|
Resolving Restrictive and Advisory States |
|
|
417 | (5) |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
423 | (2) |
|
|
425 | (2) |
|
|
427 | (54) |
|
Database Recovery Concepts |
|
|
427 | (2) |
|
|
429 | (4) |
|
|
433 | (13) |
|
Establishing a Point of Consistency |
|
|
446 | (1) |
|
|
447 | (10) |
|
System-Level Backup and Recovery |
|
|
457 | (4) |
|
Backup and Recovery of the DB2 Catalog and Directory |
|
|
461 | (2) |
|
|
463 | (4) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
469 | (7) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
477 | (2) |
|
|
479 | (2) |
|
|
481 | (34) |
|
|
482 | (2) |
|
|
484 | (7) |
|
|
491 | (1) |
|
Maintaining Data Integrity |
|
|
492 | (8) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (3) |
|
Workload Management and Affinity Processing |
|
|
504 | (1) |
|
|
505 | (1) |
|
Sysplex Query Parallelism |
|
|
506 | (1) |
|
|
507 | (4) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
512 | (2) |
|
|
514 | (1) |
|
Using SQL in an Application Program |
|
|
515 | (34) |
|
Delimiting SQL in a Program |
|
|
516 | (1) |
|
Declaring Table and View Definitions |
|
|
516 | (8) |
|
|
524 | (8) |
|
|
532 | (3) |
|
|
535 | (8) |
|
|
543 | (2) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
546 | (2) |
|
|
548 | (1) |
|
Binding an Application Program |
|
|
549 | (24) |
|
|
549 | (17) |
|
Plan or Package Ownership |
|
|
566 | (2) |
|
Plan Execution Authorization |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
569 | (2) |
|
|
571 | (2) |
|
Application Program Features |
|
|
573 | (36) |
|
Application Program Features |
|
|
573 | (15) |
|
|
588 | (2) |
|
|
590 | (3) |
|
|
593 | (3) |
|
|
596 | (7) |
|
|
603 | (1) |
|
|
603 | (1) |
|
|
604 | (2) |
|
|
606 | (3) |
|
|
609 | (28) |
|
|
609 | (1) |
|
|
610 | (2) |
|
Writing Stored Procedures |
|
|
612 | (10) |
|
Defining Stored Procedures |
|
|
622 | (1) |
|
Removing Stored Procedures |
|
|
622 | (2) |
|
|
624 | (4) |
|
|
628 | (4) |
|
|
632 | (1) |
|
|
633 | (1) |
|
|
633 | (1) |
|
|
634 | (2) |
|
|
636 | (1) |
|
Accessing Distributed Data |
|
|
637 | (30) |
|
|
637 | (3) |
|
|
640 | (1) |
|
|
641 | (3) |
|
Communicating with a Data-Sharing Group |
|
|
644 | (1) |
|
Coding Methods for Distributed Data |
|
|
645 | (9) |
|
Programming Considerations |
|
|
654 | (1) |
|
Application Design Options |
|
|
655 | (1) |
|
|
656 | (6) |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
663 | (2) |
|
|
665 | (2) |
|
|
667 | (54) |
|
|
667 | (18) |
|
Object-Relational Extensions |
|
|
685 | (6) |
|
|
691 | (12) |
|
|
703 | (5) |
|
|
708 | (9) |
|
|
717 | (1) |
|
|
717 | (1) |
|
|
718 | (2) |
|
|
720 | (1) |
|
|
721 | (34) |
|
|
722 | (14) |
|
|
736 | (2) |
|
|
738 | (2) |
|
|
740 | (1) |
|
Locking Issues and Problems |
|
|
741 | (3) |
|
Lock Promotion and Escalation |
|
|
744 | (2) |
|
Database and Application Design for Concurrency |
|
|
746 | (2) |
|
|
748 | (3) |
|
|
751 | (1) |
|
|
751 | (1) |
|
|
752 | (2) |
|
|
754 | (1) |
|
Performance Monitoring and Tuning |
|
|
755 | (126) |
|
Access Paths and Optimization |
|
|
756 | (9) |
|
|
765 | (38) |
|
Guidelines for Using Explain Output |
|
|
803 | (2) |
|
Access Path Optimization Hints |
|
|
805 | (1) |
|
|
806 | (7) |
|
|
813 | (2) |
|
Designing Indexes and SQL for Performance |
|
|
815 | (6) |
|
|
821 | (1) |
|
|
821 | (3) |
|
|
824 | (3) |
|
|
827 | (4) |
|
|
831 | (3) |
|
|
834 | (22) |
|
|
856 | (1) |
|
|
857 | (18) |
|
|
875 | (1) |
|
|
876 | (1) |
|
|
877 | (1) |
|
|
878 | (2) |
|
|
880 | (1) |
Appendix A DB2 Sample Database |
|
881 | (10) |
Appendix B Sample Exam Questions |
|
891 | (28) |
Appendix C Sample Exam Answers |
|
919 | (16) |
Appendix D References |
|
935 | |