Which constraint can be used to ensure that identical values are never stored in a set of columns in a table?
Which constraint can be used to ensure that identical values are never stored in a set of columns in a table?
A primary key constraint ensures that each value in the column or set of columns is unique and that no null values are allowed. This constraint is designed specifically to prevent duplicate values, making it the appropriate answer for ensuring that identical values are never stored in a set of columns in a table.
Which of the following is TRUE about a COMMIT statement executed at the end of the T1 unit of work?
A COMMIT statement concludes the current transaction, making all changes made by UPDATE and DELETE commands permanent. Once the COMMIT is complete, a new unit of work is initiated, and it is not possible to undo the committed changes with a ROLLBACK command. Thus, the correct choice is that it finishes the current T1 unit of work and a new one is initiated, committing all changes made during T1.
Which of the following statements about stored procedures is TRUE?
There are three main types of stored procedures which can be deployed: SQL procedures, external procedures, and sourced procedures. SQL procedures are written using SQL and run within the database server. External procedures are written in an external programming language and linked to the database. Sourced procedures are based on an existing procedure. These distinctions cover the general categories of stored procedures in many relational database management systems.
Which edition of DB2 LUW has been discontinued in v11.1?
DB2 Express Server Edition has been discontinued in version 11.1 of DB2 LUW. This information can be verified through IBM's official documentation, which explicitly states the discontinuation of the DB2 Express Server Edition in this version.
Which of the following statements about triggers are TRUE? (Choose two.)
Triggers can be activated as a result of changes due to referential constraint enforcement. This means that the enforcement of referential constraints can cause triggers to be fired. Additionally, constraints associated with a subject table are applied between the execution of BEFORE and AFTER triggers. BEFORE triggers allow modifications to the values being inserted or updated before the actual database data is changed, while AFTER triggers are used for actions that need to occur after the data modification, such as maintaining data relationships or audit trails.