Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - Db2: Application Programming - Advanced

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


MFRDB23

Db2: Application Programming - Advanced
DURATION: 4 days

FEE: $2,180

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Programmer
  • Database Administrator
  • System Analyst
  • System Programmer
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. SQL Programming
      • The differences between a UNION and a UNION ALL.
      • The different processing for the four types of joins.
      • Code a program with two different types of UNIONs and use all four types of joins.
    2. Triggers
      • The differences between a BEFORE trigger and an AFTER trigger.
      • Handle exception processing in a trigger by communicating with the application program.
      • Code a BEFORE and AFTER trigger which handles exceptions.
    3. Creating and Using UDFs: User-defined Functions
      • Define, implement, and invoke a UDF passing parameters and returning a string value.
      • Code a user-defined function that performs string manipulation on three columns and returns a single value by implementing the following steps: 1- Definition, implementation, and invocation. 2- Defining a user-defined function. 3- Defining external user-defined functions.
    4. Creating and using Distinct Types
      • Appreciate the advantages of a UDT: User-defined Type.
      • Code a UDT for social security number and telephone number.
      • Use Distinct Types in application programs.
    5. Dynamic SQL
      • Recognize the limitations of coding a dynamic SQL program in COBOL.
      • Code an SQL statement that is built-in the program based on input from the user.
    6. Stored Procedures
      • Write and prepare a stored procedure.
      • Code a stored procedure that accepts two parameters and returns a single resultset.
      • Write a program which invokes and tests the stored procedure.
    7. Tuning and Performance
      • Utilize coding techniques which produce efficient predicates.
      • Use techniques which will influence access path selection.
      • Use EXPLAIN to determine the attributes of each SQL.
    8. Programming Considerations for CICS
      • Recognize and analyze considerations specific to coding programs in CICS.
    9. Loading Data into Db2 Tables
      • Load methods and tables with the Load Utility.
      • Load a table and create a discarded file from the rows that are rejected.
    10. Db2 Threads
      • Examine threads.
    11. Concurrency Issues
      • Promoting concurrency and locks.
      • Become knowledgeable with the effects of Db2 locks.
      • Given two case studies, determine the best techniques for promoting concurrency.
    12. Accessing Distributed Data
      • Develop code for utilizing distributed data.
      • Code a program which accesses data on multiple platforms.

    Virtual Classroom   Blended Learning    

Synchronous
Instruction
Asynchronous
Instruction

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.