A Access Methods... 8:6 Access Path Selection... 8:6 Access Paths... 5:22 ACQUIRE(ALLOCATE) / RELEASE(DEALLOCATE)... 5:14 ACQUIRE(USE) / RELEASE(DEALLOCATE)... 5:14 Active Log... 9:3 Active Logs - Determining the Size... 8:26 ALL... 1:13 ANY... 1:13 Application Design... 5:6 Archive Log... 9:4 Arithmetic Expressions... 8:4 Audit Trace... 7:20 Audit Trails - Implementing... 4:2 B Bind Options... 5:13 Basic Predicate... 1:12 BIND Process... 8:26 Built-in Functions... 8:1 Business Rules - Implementing... 4:2 C CAF Capabilities... 10:1 CAF Connections - General Properties... 10:9 CAF - How to Use... 10:5 CAF Return Codes and Reason Codes... 10:17 Caching Dynamic SQL Statements... 2:7 Calling Other Programs... 3:7 Call DSNALI Parameter List... 10:11 Catalog in Design - Use... 7:33 Change Catalog and Directory - Size and Location... 8:27 CHAR Versus VARCHAR... 7:17 Checkpoint Records... 9:6 CLOSE... 10:14 Columns Consideration: NULL or NOT NULL?... 7:2 Columns Considerations... 7:2 Columns Considerations: Edit Routine... 7:3 Columns Considerations: Field Procedure... 7:4 Columns Considerations: NOT NULL with Default... 7:3 Columns Considerations: Validation Routine for a Table... 7:3 Columns to be Updated... 8:4 Concurrency... 5:1, 9:11 Concurrency and Locks... 5:1 Concurrency - Uncontrolled: Problems with... 9:11 Concurrent Access... 7:7 Concurrent Data Access - Improving... 8:24 CONNECT... 10:12 Connection Functions... 10:6 Correlated and Uncorrelated Subqueries... 1:11 SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC. (DB2/SQL AP PRG: ADV - 3.10) IDX: Page 1
Correlated Subqueries... 1:11, 1:15 Correlated Subqueries in a DELETE Statement... 1:16 Correlated Subqueries in an UPDATE Statement... 1:16 Create Table Options... 7:21 CREATE TABLESPACE - Options on... 7:12 CREATE TRIGGER Statement... 4:17 CURRENTDATA Option... 5:17 D DASD Utilization - Improving... 8:22 Data-only Locking... 5:12 Data Types - Additional Facts... 7:16 Data Types Used in Defining Tables... 7:16 Database Design - Recommendations... 5:5 Database - Monitoring... 4:1, 6:1 Database - Reconstructing... 9:7 DB2 - Defining a Stored Procedure... 3:3 DB2 Lock Attributes... 8:7 DB2 Log... 9:2 DB2 Traces... 6:2 Deadlock... 5:4 Declare a Cursor for the Statement Name... 2:17 Design Storage Groups... 7:5 Designing a DB2/SQL Data Base... 7:6 DISCONNECT... 10:15 Distinct... 8:4 Distinct Types - Application Programs... 1:31 Distinct Types - Creating and Using... 1:29 DSNALI... 10:7 DSNALI - Explicit Load... 10:8 Dynamic Execution - PREPARE and EXECUTE... 2:13 Dynamic SQL in Application Programs... 2:2 Dynamic SQL for Fixed-list SELECT Statements... 2:16 Dynamic SQL - Limited with the Resource Limit Facility... 2:10 Dynamic SQL Statements... 2:6 E EXECUTE Statement... 2:15 EXISTS Keyword... 1:14 Exit Routines for EDITPROC, VALIDPROC, and FIELDPROC... 7:19 EXPLAIN Exercises... 8:15 EXPLAIN Statement... 6:2, 8:11 F Fetch Rows from the Result Table... 2:18 FOR FETCH ONLY... 1:1 Foreign Key... 7:23 Full Outer Join... 1:6 SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC. (DB2/SQL AP PRG: ADV - 3.10) IDX: Page 2
G GROUP BY... 8:1 H Host Language for Dynamic SQL Applications: Choosing... 2:11 Host Variables in Static SQL... 2:3 I - Clustering... 7:26 Design Considerations... 7:28 : `OR' Predicate - Use... 8:1 - Partitioned... 7:27 Space Calculation... 7:30 - Unique... 7:27 es and Data-only Locking... 5:12 es - Designing... 7:26 Inner Join... 1:5 Isolation Values - Advantages and Disadvantages... 5:15 ISOLATION Option... 5:15 J JCL (Sample) for Using CAF... 10:18 Join... 8:4 Joining Data from More than One Table... 1:5 Joining Table to Itself... 8:5 L Left Outer Join... 1:6 `LIKE' Predicate... 8:2 LOAD and Run Environments... 10:4 Loading Data... 9:1 Lock Duration... 5:8 Lock Mode... 5:9 Lock Mode Compatibility... 5:11 Lock Size... 5:7 LOCK TABLE... 5:21 LOCK TABLE - Effect... 5:21 Lock Table Statement... 8:8 Locking... 9:11 Locks... 5:1, 8:7 Log Records - Categories... 9:5 Logic Underlying Selection... 8:9 M Matching Data Type... 8:3 Merge Join... 8:10 Modes of Partition Locks... 5:10 Modes of Table Locks... 5:10 Modes of Table, Partition, and Table Space Locks... 5:10 Modes of Table Space Locks... 5:10 Monitoring the Database... 1:21, 6:1 Multiple Triggers - Ordering... 4:16 SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC. (DB2/SQL AP PRG: ADV - 3.10) IDX: Page 3
N Nested Loop Join... 8:10 Nested Table Expressions and User-defined Table Functions in Joins... 1:9 `NOT' Predicate... 8:2 O OPEN... 10:13 OPTIMIZE-FOR-CLAUSE... 1:2 Optional Variables... 4:7 P Partitioned Tablespace... 7:9 Passing Parameters in a User-defined Function... 1:25 Performance Considerations... 9:12 Performance Recommendations... 8:1 Physical Table Design... 7:5 Predicates... 1:11 PREPARE Statement... 2:15 Prepared Statements - Keeping After Commit Points... 2:9 Primary Key... 7:22 Primary Key Constraints... 7:22 Processing of Large Tables - Improving... 8:24 Programming Language... 10:3 Q Quantified predicates: ALL, ANY, and SOME... 1:13 QUERYNO-CLAUSE... 1:4 R Recovery... 9:2 Recovery Procedure... 9:7 Redundant Predicate... 8:5 Referential Integrity... 7:22 Referential Integrity - Enforcing... 4:3 REORG Utility... 6:2 Right Outer Join... 1:7 Run Environments... 10:4 RUNSTAT Utility... 2:1, 6:1 S Scratchpad in a User-defined Function... 1:28 Security... 9:8 Security Procedures for Database Users... 9:8 Security Procedures for Operations Personnel... 9:10 Security Procedures for Programmers... 9:10 Segmented Tablespace... 7:10 Simple Tablespace... 7:8 SOME... 1:13 Specifying Isolation by SQL Statement... 5:19 Speed of the DB2 Subsystem - Improving... 8:19 SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC. (DB2/SQL AP PRG: ADV - 3.10) IDX: Page 4
SQL Efficiency Techniques... 6:3 SQL Rules for Statements Containing Join Operations... 1:8 SQL Statements - Restrictions When Coding... 4:6 Statement Sharing - Conditions... 2:8 Static SQL Statements with Input Host Variables... 2:5 Stored Procedures - Invoking... 4:15 Stored Procedure Linkage Convention GENERAL... 3:12 Stored Procedure - Passing Environment Information... 3:5 Stored Procedure - Preparing... 3:9 Stored Procedure - Running... 3:15 Stored Procedure - Special Registers... 3:7 Stored Procedures - Setting Up... 3:2 STOSPACE Utility... 6:2 String Length - Same... 8:3 Subqueries... 1:10, 1:11 Subqueries and Predicates... 1:11 Subquery... 8:4 Subquery - Coding... 1:12 Subquery or Join... 8:4 Subsystem Log... 9:2 Summary Data - Updating... 4:3 Suspension... 5:2 T Table Considerations... 7:1 Table Design... 7:1 Table Logic - Joining... 8:10 Table Names - Characteristics... 7:14 Table Space Calculation... 7:25 Tables - How Many for Each Tablespace... 7:18 Task Capabilities... 10:2 Task Termination... 10:10 Timeout... 5:3 TRANSLATE... 10:16 Trigger Cascading... 4:16 Trigger Characteristics... 4:4 Trigger - Creating and Using... 4:9 Trigger - Parts... 4:10 Triggers... 4:2 Triggers - Creating to Obtain Consistent Results... 4:16 Tuning Strategy... 8:19 Tuning - When to Tune... 8:17 U Uncorrelated Subqueries... 1:11 Unit of Work in CICS... 5:24 Unit of Work in TSO: Batch and Online... 5:23 User Defined Functions... 1:17 User-defined Function as a Main Program or as a Subprogram... 1:24 User-defined Function Definition - Components... 1:20 User-defined Function Definitions - Examples... 1:22 User-defined Function - Passing Parameters... 1:25 SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC. (DB2/SQL AP PRG: ADV - 3.10) IDX: Page 5
User-defined Function Programs - Restrictions... 1:23 User-defined Function - Writing... 1:23 User-defined Functions from Triggers... 4:15 User-defined Scalar Function - Creating and Using... 1:18 V Virtual Storage Utilization - Improving... 8:23 View Restrictions... 7:32 Views - Designing... 7:31 W WITH Clause... 5:20 WITH-CLAUSE... 1:3 WITH HOLD for a Cursor - Effects... 5:18 SYS-ED \COMPUTER EDUCATION TECHNIQUES, INC. (DB2/SQL AP PRG: ADV - 3.10) IDX: Page 6