You are on page 1of 11

Exam Title

: IBM 000-711 : U2 UniData V6.1 for UNIX and Windows Administration

Version :

R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. Which UNIX directory contains the error logs for UniData daemons'? A. $UDTBIN B. $UDTHOME C. $UDTHOME/log D. /usr/ud61/include Answer: A 2. Which command can an administrator use to determine if user 'stu017' is waiting for a locked record resulting in a 'frozen' screen? A. LIST.LOCKS B. PORT.STATUS USER stu017 C. LIST.QUEUE USERNAME stu017 D. LIST.READU USERNAME stu017 Answer: C 3. From the ECL prompt which command displays information about users currently logged in and the number licensed for UniData? A. WHO B. LISTUSER C. LIST.QUEUE D. LIST.USERSTATS Answer: B 4. Which log file displays abnormally terminated UniData processes? A. udt.errlog B. smm.errlog C. sbcs.errlog D. cleanupd.errlog Answer: D 5. Which system-level command displays UniData daemons that are currently running? A. gstt B. showud C. ipcstat D. showconf Answer: B 6. Which 'log file' is the primary source of information describing what triggered a system crash on a UniData system with Recoverable File System on? A. $UDTBIN/sm.log

www.Prepking.com

B. $UDTBIN/smm.log C. $UDTBIN/udt.errlog D. $UDTBIN/smm.errlog Answer: A 7. Administrators would inspect which udtconfig parameter in response to the error 'Numra is maxed out in installshmid'? A. SHM_MAX_SIZE B. SBCS_SHM_SIZE C. NUMRA_SHMID_SIZE D. INSTALL_SHMID_SIZE Answer: B 8. Which procedure will analyze a UniBasic program to help determine reasons for poor performance? A. Compile the program with a -L option and execute the program with a -L option and check the 'list' files. B. Compile the program with a -E option and execute the program with a -E option and check the 'error' files. C. Compile the program with a -G option and execute the program with a -G option and check the 'profile' files. D. Compile the program with a -I option and execute the program with a -I option and check the 'information' files. Answer: C 9. Which log file does an administrator monitor to see messages produced when a UniData process encounters file corruption in a data file during processing? A. udt.errlog B. smm.errlog C. sbcs.errlog D. cleanupd.errlog Answer: A 10. If two users in the same UniData account execute the same 'verb' and UserA executes a basic program while UserB receives a 'Not a verb' message, what could cause this problem? A. SELECT privileges GRANTed to 'execute' the verb missing for USERB. B. UserB does not have the $UDTHOME environment variable defined the same as UserA. C. UserB does not have the same read permissions as UserA on the Basic Program (BP) file. D. UserB does not have the same execute permissions as UserA on the Basic Program (BP) file. Answer: B 11. Administrators can view the current ECL stack for the active udt process with pid number 13880, user

www.Prepking.com

name stu107, using which option? A. From the ECL prompt, enter: PORT.STATUS PID 13880 CALL.STACK B. From the ECL prompt, enter: LIST.READU USER_NAME stu107 DETAIL C. From the UNIX shell prompt: cd to the home directory for user stu107 enter 'cat .ustk_stu107' D. Login to UniData in the same account where user stu107 started their session. From the ECL prompt, enter: .L99 Answer: A 12. Which action should an administrator take when UniData will not start and $UDTBIN/smm.errlog contains the error 'smm can't get first GSM errno=22'? A. Increase the kernel parameter shmseg B. Increase the kernel parameter shmmax C. Increase the operating system paging space size D. Increase the available space in the /tmp filesystem Answer: B 13. Which option describes the result of executing the ECL command "CATALOG BP ProgramName" for the first time? A. ProgramName compiled code is copied to the global catalog B. VOC entry ProgramName is created to point to the global catalog C. VOC entry ProgramName is created that points to the compiled version D. ProgramName moved to the CTLG directory in the UniData account where the program was cataloged Answer: A 14. Which UniData system level command builds a new UniData (udt) executable? A. base.mk B. makeudt C. cfuncdef D. createudt Answer: B 15. Which situation causes index overflows? A. BUILD.INDEX has not been run recently. B. The available disk space falls below the indexing threshold. C. The maximum key length allocated is too small to contain the attributes being indexed. D. The modulo and block size of the primary file is not appropriate for the data contents. Answer: C 16. The VCATALOG command is used to A. catalog a specific program located in the BP file.

www.Prepking.com

B. verify all compiled code in your local BP file. C. verify and catalog all the BP programs in the current BP file. D. compare the object file and the compiled program in the global catalog file byte-by-byte. Answer: D 17. Which UniData command displays file and record locks? A. READ.LOCKS B. LIST.LOCKS C. LIST.READU D. LIST.QUEUE Answer: C 18. To list record and file locks for a specific user which LIST.READU identifier is required? A. user id of the user (UID) B. user number of the user (UNBR) C. terminal device of the user (TTY) D. process group ID of the user (PID) Answer: B 19. Which UniData command removes a specific udt process? A. stopud [pid] B. kill -9 [pid] C. deleteuser [pid] D. REMOVE.USER [pid] Answer: C 20. Which command provides information about UniData user and system activity? A. udtmon B. udtsvr C. showud D. udtconf Answer: A 21. Which UniData command displays active udt processes? A. WHO B. ps -ef C. GETUSER D. LISTUSER Answer: D 22. On UniData for UNIX, installation script answers are kept in which file?

www.Prepking.com

A. install.scr B. install.hist C. install.param D. install.config Answer: C 23. Which UniData command located in the $UDTBIN directory is used to shutdown UniData? A. stopud B. stopudt C. stopunidata D. haltudt Answer: A 24. Which privilege level is the minimum level required to install UniData on a Microsoft Windows system? A. User privileges B. Operator privileges C. No special privileges D. Administrator privileges Answer: D 25. Which UNIX command can be executed to display the supported LANG settings for a system? A. env -l B. set -v C. lang -v D. locale -a Answer: D 26. On a UNIX system, what are the 5 different types of UniData installations? A. Cold, Full, Partial, Basic, Service Pack B. Basic, Advanced, Concurrent, Patch, Upgrade C. Cold, Typical, Concurrent, Incremental, Patch D. Upgrade, Full, Advanced, Partial, Service Pack Answer: B 27. What is the default %UDTHOME directory for a Microsoft Windows installation running UniData 6.1? A. \IBM\ud61\include B. \Unidata\ud61 C. \IBM\ud61 D. \Winnt\Program Files\ud61 Answer: C

www.Prepking.com

28. Which command, located in the $UDTBIN directory, is used to license UniData on a UNIX system? A. shmconf B. confprod C. licenseud D. licenseudt Answer: B 29. Which command, located in the $UDTBIN directory, is used to start UniData in a UNIX environment? A. startud B. startudt C. udt.start D. start.unidata Answer: A 30. When SQL SELECT privilege is GRANTed on a UniData Subtable accessed by an ODBC client, which action is allowed? A. Read a record from an SQL View B. Insert a record into a SQL View C. Delete a record from the SQL Subtable D. Read a record from an SQL Subtable Answer: D 31. If the remote client connection to the server fails what diagnostic procedure needs to be confirmed? A. inspect the TIMEOUT value for udserver in unirpcservices file B. test for successful ping or telnet from the client to the server C. inspect HKEY_LOCAL_MACHINE/SOFTWARE/ODBC registry entry needs D. inspect path/unishared/unirpc/unirpcservices value for uvdrsrv Answer: B 32. Where are the UniData Open Database Connectivity (ODBC) drivers and dynamic link libraries (dll's) installed? A. On the client PC B. On the UNIX Server C. In $UDTHOME/$UDTBIN D. In $UDTHOME/sys/CTLG Answer: A 33. In addition to modifying dictionary attributes to be SQL compliant, what other important function is performed by the CONVERT.SQL command? A. Adds the Owner*Tablename to the SQL privilege file.

www.Prepking.com

B. Invokes the SQL GRANT command on the converted table. C. The process converts metacharacters "-" to "_" in the data file. D. The process changes record id metacharacters to legal SQL characters. Answer: A 34. In addition to the server HOSTNAME or IP ADDRESS, the UCI Config Editor is used to define which connection parameter? A. Service B. DBMS Type C. Network Protocol D. Connection Timeout Value Answer: B 35. Where is the connection timeout value for the Uni Call Interface (UCI) set? A. On the client PC in the WINNT\system32 directory. B. On the server in /usr/ud61/include/udtconfig file. C. On the server in the path/unishared/unirpc/unirpcservices file. D. On the client PC in the control panel - Network - Protocol - TCP/IP Protocol properties. Answer: C 36. Visual Schema Generator (VSG) will automatically assign a UniData file's @ID to the SQL Table as which field name? A. ID B. @ID C. ID1 D. ID_1 Answer: A 37. Which 'memresize' command option performed against a static hashed file will resize the file and convert it to a dynamic hashed file? A. STATIC B. KEYDATA C. NOPROMPT D. SPLIT.LOAD Answer: B 38. Which utility is used to check the integrity of an index? A. SETINDEX B. guide_ndx C. LIST.INDEX

www.Prepking.com

D. BUILD.INDEX Answer: B 39. Using the 'udfile' command a file cannot be converted to a recoverable file if it was created with which block size? A. 512 bytes B. 1024 bytes C. 2048 bytes D. 4096 bytes Answer: A 40. After successfully repairing all damage to a corrupted file it is recommended that the administrator A. back up the file B. reboot the system C. delete the corrupted file D. do nothing, and continue processing as normal Answer: A 41. Which tool can be used to scan UniData hashed files while UniData daemons are not running? A. guide B. verify2 C. guide_ndx D. dumpgroup Answer: B 42. After creating an alternate index on a UniData file, the 'build' populates an index file that A. consists of the alternate key values B. eliminates the need for primary key hashing C. uses a hashing algorithm applied to the @ID D. consists of the alternate key values and the corresponding @IDs of each record Answer: D 43. When designing a UniData file, the term modulo refers to which option? A. The number of groups the file will contain. B. The average number of bytes in each record. C. The potential number of records in the file. D. The standard deviation in the data distribution. Answer: A 44. Which tool can be used to produce a listing of corruption encountered in a damaged UniData file? A. guide

www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/000-711.htm

You might also like