Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Access paths Access plans definition displaying 2nd performance 2nd Access profiles configuring connections 2nd 3rd 4th 5th 6th 7th 8th definition 2nd exporting 2nd 3rd importing 2nd 3rd 4th 5th 6th Access tokens 2nd 3rd activate database command ACTIVATE DATABASE command ACTIVATE NOT LOGGED INITIALLY clause Active log directory Active logs 2nd 3rd Active subagents Activity Monitor definition monitoring performance 2nd 3rd troubleshooting locking problems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th uses for ADD clause Add Database Wizard configuring connections manually [See CA (Configuration Assistant] configuring connections with Discovery [See CA (Configuration Assistant] illustrations communication protocols, selecting [See CA (Configuration Assistant] configuration methods [See CA (Configuration Assistant] connecting with known discovery [See CA (Configuration Assistant] database names, specifying [See CA (Configuration Assistant] databases, registering [See CA (Configuration Assistant] databases, selecting by profile [See CA (Configuration Assistant] network search results [See CA (Configuration Assistant] node options, specifying [See CA (Configuration Assistant] registering a database [See CA (Configuration Assistant] security options, specifying [See CA (Configuration Assistant] specifying database alias [See CA (Configuration Assistant] system options, specifying [See CA (Configuration Assistant] TCP/IP parameters, selecting [See CA (Configuration Assistant] testing connections [See CA (Configuration Assistant] importing access profiles [See CA (Configuration Assistant] known discovery [See CA (Configuration Assistant] search discovery [See CA (Configuration Assistant] Address space Address Windowing Extensions (AWE) 2nd 3rd admin_priority keyword Administration clients Administration notification logs definition examples 2nd 3rd FFDC (first-failure data capture) 2nd Administrative authority 2nd 3rd 4th 5th 6th 7th 8th 9th Administrative authorization Administrators Advanced Peer-to-Peer Networking (APPN) Advanced Program-to-Program Communication (APPC) After trigger AFTER triggers 2nd Agent pool, configuring instances 2nd Agent private memory Agentlevel operations memory Agentlevel private memory 2nd 3rd Agents active subagents associated (idle) subagents case study coordinator agents 2nd 3rd 4th 5th coordinator partitions definition monitoring and tuning 2nd 3rd unassociated subagents 2nd Alert notification feature 2nd 3rd Alerts Aliases allow no access option 2nd 3rd allow read access option allow write access option ALTER BUFFERPOOL statement 2nd ALTER DATABASE PARTITION GROUP statement 2nd ALTER PROCEDURE statement ALTER SEQUENCE statement, uses for ALTER statement ALTER TABLE statement adding columns 2nd locking tables 2nd ALTER TABLESPACE statement 2nd 3rd 4th 5th 6th 7th 8th ALTERIN schema privilege 2nd 3rd Ambiguous cursors American National Standard Code for Information Interchange (ASCII) ANYORDER modifier APAR (authorized program analysis report) API (application programming interface) definition modifying isolation levels APPC (Advanced Program-to-Program Communication) APPL Application control heap 2nd 3rd Application Development Client 2nd Application group shared heap 2nd 3rd Application group shared memory 2nd 3rd Application IDs Application names Application programming interface (API) [See API (application programming interface] Application requesters Application servers Application shared memory Application-level EDUs 2nd 3rd 4th Application-level operations memory Applications APPN (Advanced Peer-to-Peer Networking) Archival logging 2nd 3rd 4th 5th Archived logs ARCHRETRYDELAY parameter ASC (nondelimited ASCII) ASC (nondelimited ASCII) format ASCII (American National Standard Code for Information Interchange) Associated (idle) subagents AST (automatic summary table) ASYNC (Asynchronous) mode 2nd 3rd 4th Asynchronous (ASYNC) mode 2nd 3rd 4th Asynchronous I/O Attach attach command 2nd Attachments versus connections Authenticating users at the client [See security] at the server [See security] DRDA clients [See security] encryption [See security] GSSAPI plugins [See security] trusted clients [See security] untrusted clients [See security] with Kerberos [See security] Authentication definition [See security] type client, summary table of [See security] configuring at a client [See security] configuring at a server [See security] server, summary table of [See security] AUTHENTICATION parameter 2nd 3rd 4th Authorities, storing and retrieving 2nd 3rd 4th 5th 6th Authority Authorization Authorization ID Authorized program analysis report (APAR) Autocommit 2nd autoconfigure command 2nd Automatic configuration parameters Automatic summary table (AST) Autonomic computing systems Autonomic ondemand business model Average active applications 2nd AVG_APPLS parameter AWE (Address Windowing Extensions) 2nd 3rd |