< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] A-marks abbreviation standards columns /rows ABEND command abends UDFs ABS function ABSOLUTE keyword scrollable cursors absolute positioning. ABSVAL function access buffer pools isolating clustered batch programs conditional table CICS customizing dynamic SQL 2nd direct row access 2nd index-only 2nd indexed 2nd 3rd 4th 5th 6th clustered index access direct index lookups index lookasides index scans index screening index-only access list prefetches 2nd matching index scans 2nd multi-indexes 2nd non-clustered index access non-matching index scans 2nd skip sequential prefetches indexes disabling multi-index 2nd public granting 2nd read-only cursors SYSIBM.SYSDUMMY1 table views access controls row-level MLS ACCESS DEGREE column PLAN TABLE access methods XML collection column DAD files access paths application tuning 2nd 3rd 4th 5th customizing MQTs OPTHINT parameter PLAN TABLE examples PLAN TABLE, populating 2nd 3rd 4th PLAN TABLEs efficiency reviewing/analyzing Procedural DBA selecting optimizer selection 2nd 3rd statistics 2nd strategies indexed access 2nd 3rd 4th 5th 6th joins 2nd 3rd 4th 5th 6th 7th 8th 9th joins. query parallelism 2nd 3rd 4th 5th 6th scans 2nd 3rd sequential prefetch 2nd 3rd strategy compatibility 2nd subqueries 2nd 3rd 4th correlated 2nd inside-out subquery access non-correlated outside-in-outside subquery access view materialization 2nd view merge ACCESS PGROUP ID column PLAN TABLE ACCESSCREATOR column PLAN TABLE accessing data warehouses DB2 data (Internet) Java Net.Data 2nd 3rd 4th network traffic software versions distributed data application-directed 2nd 3rd 4th methods, comparing system-directed 2nd 3rd 4th dynamic data dynamic SQL IMS databases stored procedures Internet LOB data non-DB2 resources triggers ACCESSNAME column PLAN TABLE ACCESSTYPE column PLAN TABLE accounting records CICS accounting report sets 2nd 3rd 4th 5th 6th long buffer pool information 2nd 3rd 4th CPU and Elapsed Time 2nd 3rd database code usage information highlights 2nd 3rd locking activity 2nd miscellaneous information 2nd 3rd package/DBRM information 2nd program status RID list processing SQL activity 2nd 3rd short 2nd 3rd 4th traces accounting traces 2nd 3rd 4th ACCOUNTREC parameter CICS pool thread attributes CICS thread operation attributes accuracy RTS ACENDATE column ACOS function ACQUIRE parameter EDM pools, tuning table space locks ACS (Automatic Class Selection) ACSTDATE column ACTION clause stored procedures ACTION parameter BIND statements activating triggers active buffer pools converting active databases active logs DSN1LOGP RECOVER utility active objects viewing ACTIVE parameter DISPLAY DATABASE command active traces maximum active users tuning DSNZPARMs activity checking RTS activity table DDL actual commit (two-phase commit distribution) 2nd ad hoc SQL ADD PART parameter ALTER TABLE statements add-on tools auditing 2nd 3rd Catalog query and analysis 2nd categories 2nd 3rd client/server compression 2nd DASD and space management data movement 2nd database analysis 2nd database modeling and design 2nd integrity 2nd Internet enabling miscellaneous object migration operational support 2nd PC-based performance enhancements performance monitors 2nd plan analysis 2nd programming and development QMF enhancements query 2nd 3rd repositories 2nd security 2nd table editors 2nd talbe altering 2nd 3rd utility enhancement ADD_MONTHS function adding columns base table views 2nd 3rd indexes 2nd multiple rows rowset positioning cursr objects database object lists 2nd partitions table spaces 2nd address spaces DBAS BM DM RDS DDFS dispatching priority IRLM non-swappable SPAS SSAS administration application development guide data standards/procedures 2nd data sharing backup/recovery buffer pools CF failures CF recovery database statuses DSNDB07 work file database name EDM pools group buffer pool duplexing 2nd groups, creating groups, monitoring 2nd lock structures logs, archiving LPL page recovery member shutdowns multiple coupling facilities naming conventions restart light row-level locking subsystem availability databases guide initial binds ODBC applications packages production/test application coexistence systematic rebinding version maintenance 2nd responsibilities 2nd 3rd roles 2nd 3rd security security guide system guide XML 2nd support tables 2nd 3rd XML Extender administrative commands 2nd 3rd 4th active traces ALTER BUFFERPOOL ALTER UTILITY ARCHIVE LOG 2nd RECOVER INDOUBT START DATABASE 2nd START PROCEDURE START RLIMIT START TRACE 2nd START/STOP STOP STOP DATABASE system parameters TERM UTILITY 2nd Advanced Program-to-Program Communication. advanced training topics Advisor (ital) Advisory Rebuild Pending exception state Advisory Reorg exception state AEY9 bends avoiding AFTER keyword scrollable cursors after triggers 2nd aggregation data transformations data warehouses, populating algorithms buffer pools FIFO buffer pools LRU buffer pools page stealing space search non-segmented table spaces segmented table spaces ALIAS DB2 object aliases 2nd databases listing navigational queries location names AlignValue UDF audio video ALLOCATE parameter table space locks allocating buffer pools 2nd 3rd data sets data sets. ALT tools 2nd 3rd ALTER BUFFERPOOL command 2nd ALTER TABLE ALTER PART ROTATE FIRST TO LAST statement ALTER TABLE ALTER PART VALUES statement ALTER TABLE statement ADD PART parameter query rewrites ALTER UTILITY command ALWAYS parameter rows/columns Ambeo Systems ambiguous cursors 2nd analysis tools SQL statements Aonix APIs DBaAdminGetInaccessibleFiles APPC (Advanced Program-to-Program Communication) appending data LOAD utility applets (Java) 2nd Net.Data application efficiency queries 2nd 3rd application I/O tuning 2nd 3rd application joins data retrieval listing 2nd application programs active databases black boxes 2nd code literals complex SQL statements cursors developing embedded SQL 2nd 3rd comments DB2 tables, declaring delimiting statements error codes error trapping statement 2nd error-handling paragraph 2nd 3rd flat files, compared 2nd GET DIAGNOSTICS statement 2nd 3rd 4th 5th names 2nd 3rd SQLCA 2nd 3rd SQLCODE statement 2nd types filtering data host structures host variable lists, simulating isolation levels joins 2nd modular programs non-relational data, joining read-only access row sequencing rows, retrieving sample programs scrollable cursors SELECT statements size , minimizing stored procedures unqualified SQL user -defined functions application requesters (AR) function application server (AS) function Application Server Edition (DB2 Connect) application supoort data sharing application-directed distribution connections establishing releasing 2nd system-directed distribution, compared application-enforced referential integrity applications 4GLs data extraction embedded SQL join tables performance storage formats strengths training weaknesses authorizations 2nd batch IMS TSO 2nd 3rd 4th batch message processor IMS binding DB2 Connect CAF sample CASE tools 2nd business strategy support data modeling support development support diagramming support generated SQL I/O routines integrated development platforms metadata support multiple platform support process modeling support prototyping support quality assurance support runtime modules system testing support technical environment support classes 2nd client/server complex environment DB2 connections 2nd distributed cursors SQL anomalies SQL requests , consolidating stored procedures tools documentation triggers conversational data sharing DB2I 2nd bind option DB2 Commands option DCLGEN option Defaults option Free Plan option menu precompile option Program Preparation option rebind option Run option SPUFI option 2nd 3rd 4th 5th Utilities option DDL design reviews Procedural DBA development enhancements DB2 Version 7 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th development guide DSN8DLPL DSN9DLRV DSNTEP2 IMS 2nd IMS/TM online 2nd Java like, grouping link-editing language interface modules LOB sample non-critical DSN1COPY recovery strategy ODBC 2nd 3rd 4th administration COMMIT/ROLLBACK cursors DRDA, compared embedded SQL parameter markers portability restrictions return codes sample code 2nd SQLError() function online cascading delete rule commits concurrency, increasing cursor repositioning 2nd data sorting direct row access 2nd empty tables joins, limiting list prefetch, disabling modifications, saving overactive data 2nd pages retrieved sequential values timestamps transactions TSO 2nd 3rd 4th 5th 6th 7th 8th precompiling binding, avoiding DBRM libraries DBRM names DBRMs, retaining decimal precision requirements versioning program preparation background jobs batch procedures 2nd BIND command 2nd CICS preprocessors CLIST compiling DB2I 2nd 3rd 4th DCLGEN command 2nd 3rd 4th 5th default names goals linking programs multiple methods 2nd 3rd 4th 5th 6th objects 2nd precompiling 2nd 3rd REXX EXEC pseudo-conversational report writers 2nd capabilities REXX 2nd comments data types host variables null SQL statements running 2nd sample DSNTEP2 2nd 3rd 4th 5th 6th 7th 8th DSNTIAD 2nd 3rd DSNTIAUL 2nd 3rd sources SQL only developed domains, simulating 2nd 3rd integrity native SQL tuning 2nd 3rd access paths 2nd 3rd 4th 5th nonuniform distribution statistics, deleting 2nd optimizer, influencing. referential integrity 2nd 3rd APPLNAME column DSN STATEMENT TABLE DSN_FUNCTION_TABLE table PLAN TABLE AQR (automatic query rewrite) 2nd DDL queries supported 2nd query rewrites referential constraints 2nd refreshes special registers 2nd AR (application requester) function architecture Version 8 2nd architectures DRDA APPC CDRA DDM FD( colon )OCA ARCHIVE LOG command 2nd disaster recovery archive logs RECOVER utility archives mailing lists archiving data REORG utility 2nd disaster recovery logs arithmetic date and time 2nd dates/non-dates combinations arithmetic expressions 2nd 3rd column renaming columns 2nd date and time 2nd decimal precision/scale MULTIPLY_ALT two numbers AS (application server) function Ascential Software ASCII support asensitive scrollable cursors ASG Software Solutions ASIN function AspectRatio UDF video assignments multiple buffer pools assistants parallelims ASTs. ASUTIME [NO] LIMIT UDF characteristic ASUTIME column RLSTs ATAN function ATAN2 function ATANH function athorities DSNTIAD execution atomic parameters stored procedures Attach Facility availability 2nd CICS 2nd 3rd 4th IMS 2nd 3rd Attachment Facility (TSO) attachment interfaces data sharing attributes columns MQTs 2nd command thread DB2CONN parameter 2nd connection DB2CONN parameter 2nd pool thread DB2CONN parameter 2nd 3rd thread operation DB2ENTRY parameter 2nd thread selection DB2ENTRY parameter AUD tools 2nd 3rd AUDIT ALL parameter tables AUDIT CHANGES parameter tables AUDIT clause AUDIT NONE parameter tables audit report sets 2nd 3rd Audit Summary report audit trace audit traces 2nd 3rd 4th auditable tables auditing tables auditing tools 2nd 3rd AUTH COMD macro parameter AUTH ENTRY macro parameter AUTH POOL macro parameter AUTHID column RLSTs AUTHID parameter CICS pool thread attributes CICS thread operation attributes authids secondary 2nd translating 2nd consistent authids network specific authids password encryption authorites public display grannting SYSCTRL authorities BINDAGENT DELETE restricting dynamic group INSERT restricting SELECT SYSIBM.SYSDUMMY1 table SYSADM restricting revoking UPDATE restricting user DSN1SDMP utility authorization applications 2nd automatic security bind-time checking BINDAGENT authority built-in groupings DELETE/UPDATE/INSERT authorities dynamic authorities external 2nd grants 2nd group authorities group-level multilevel security 2nd package caching packages plan caching plans proliferation avoidance rule public access 2nd public display authority re-creating REFERENCES privilege restricted userids secondary authids 2nd synonyms SYSADM authority restricting revoking SYSCTRL authority SYSIBM.SYSDUMMY1 table authorization cache EDM pools authorization errors authorization queries 2nd 3rd authorizations group-level RACF CICS AUTHTYPE parameter CICS pool thread attributes CICS thread operation attributes Automatic Class Selection. automatic query rewrite. automatic summary tables. automatic versions names automating data transformations 2nd AUXERROR parameter LOB references auxiliary tables creating indexes names navigational queries availability throughput average package size query average plan size query AVG function avoidance (locks) 2nd 3rd occurences 2nd |
< Day Day Up > |