A


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Access paths
Access plans
     definition
     displaying 2nd
     performance 2nd
Access profiles
     configuring connections 2nd 3rd 4th 5th 6th 7th 8th
     definition 2nd
     exporting 2nd 3rd
     importing 2nd 3rd 4th 5th 6th
Access tokens 2nd 3rd
activate database command
ACTIVATE DATABASE command
ACTIVATE NOT LOGGED INITIALLY clause
Active log directory
Active logs 2nd 3rd
Active subagents
Activity Monitor
     definition
     monitoring performance 2nd 3rd
     troubleshooting locking problems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
     uses for
ADD clause
Add Database Wizard
    configuring connections manually [See CA (Configuration Assistant]
    configuring connections with Discovery [See CA (Configuration Assistant]
    illustrations
        communication protocols, selecting [See CA (Configuration Assistant]
        configuration methods [See CA (Configuration Assistant]
        connecting with known discovery [See CA (Configuration Assistant]
        database names, specifying [See CA (Configuration Assistant]
        databases, registering [See CA (Configuration Assistant]
        databases, selecting by profile [See CA (Configuration Assistant]
        network search results [See CA (Configuration Assistant]
        node options, specifying [See CA (Configuration Assistant]
        registering a database [See CA (Configuration Assistant]
        security options, specifying [See CA (Configuration Assistant]
        specifying database alias [See CA (Configuration Assistant]
        system options, specifying [See CA (Configuration Assistant]
        TCP/IP parameters, selecting [See CA (Configuration Assistant]
        testing connections [See CA (Configuration Assistant]
    importing access profiles [See CA (Configuration Assistant]
    known discovery [See CA (Configuration Assistant]
    search discovery [See CA (Configuration Assistant]
Address space
Address Windowing Extensions (AWE) 2nd 3rd
admin_priority keyword
Administration clients
Administration notification logs
     definition
     examples 2nd 3rd
     FFDC (first-failure data capture) 2nd
Administrative authority 2nd 3rd 4th 5th 6th 7th 8th 9th
Administrative authorization
Administrators
Advanced Peer-to-Peer Networking (APPN)
Advanced Program-to-Program Communication (APPC)
After trigger
AFTER triggers 2nd
Agent pool, configuring instances 2nd
Agent private memory
Agentlevel operations memory
Agentlevel private memory 2nd 3rd
Agents
     active subagents
     associated (idle) subagents
     case study
     coordinator agents 2nd 3rd 4th 5th
     coordinator partitions
     definition
     monitoring and tuning 2nd 3rd
     unassociated subagents 2nd
Alert notification feature 2nd 3rd
Alerts
Aliases
allow no access option 2nd 3rd
allow read access option
allow write access option
ALTER BUFFERPOOL statement 2nd
ALTER DATABASE PARTITION GROUP statement 2nd
ALTER PROCEDURE statement
ALTER SEQUENCE statement, uses for
ALTER statement
ALTER TABLE statement
     adding columns 2nd
     locking tables 2nd
ALTER TABLESPACE statement 2nd 3rd 4th 5th 6th 7th 8th
ALTERIN schema privilege 2nd 3rd
Ambiguous cursors
American National Standard Code for Information Interchange (ASCII)
ANYORDER modifier
APAR (authorized program analysis report)
API (application programming interface)
     definition
     modifying isolation levels
APPC (Advanced Program-to-Program Communication)
APPL
Application control heap 2nd 3rd
Application Development Client 2nd
Application group shared heap 2nd 3rd
Application group shared memory 2nd 3rd
Application IDs
Application names
Application programming interface (API) [See API (application programming interface]
Application requesters
Application servers
Application shared memory
Application-level EDUs 2nd 3rd 4th
Application-level operations memory
Applications
APPN (Advanced Peer-to-Peer Networking)
Archival logging 2nd 3rd 4th 5th
Archived logs
ARCHRETRYDELAY parameter
ASC (nondelimited ASCII)
ASC (nondelimited ASCII) format
ASCII (American National Standard Code for Information Interchange)
Associated (idle) subagents
AST (automatic summary table)
ASYNC (Asynchronous) mode 2nd 3rd 4th
Asynchronous (ASYNC) mode 2nd 3rd 4th
Asynchronous I/O
Attach
attach command 2nd
Attachments versus connections
Authenticating users
    at the client [See security]
    at the server [See security]
    DRDA clients [See security]
    encryption [See security]
    GSSAPI plugins [See security]
    trusted clients [See security]
    untrusted clients [See security]
    with Kerberos [See security]
Authentication
    definition [See security]
    type
        client, summary table of [See security]
        configuring at a client [See security]
        configuring at a server [See security]
        server, summary table of [See security]
AUTHENTICATION parameter 2nd 3rd 4th
Authorities, storing and retrieving 2nd 3rd 4th 5th 6th
Authority
Authorization
Authorization ID
Authorized program analysis report (APAR)
Autocommit 2nd
autoconfigure command 2nd
Automatic configuration parameters
Automatic summary table (AST)
Autonomic computing systems
Autonomic ondemand business model
Average active applications 2nd
AVG_APPLS parameter
AWE (Address Windowing Extensions) 2nd 3rd



Understanding DB2(R. Learning Visually with Examples)
Understanding DB2: Learning Visually with Examples (2nd Edition)
ISBN: 0131580183
EAN: 2147483647
Year: 2004
Pages: 313

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net