SQL SERVER INTERVIEW QUESTIONS 2014- SET 1 By
"Mr.J.Venkatesan Prabu"
KAASHIV INFOTECH
[ The Asia, India & Tamil Nadu Book Of Record Holders ]
SQL Server Interview Questions 2014
-
Gives
you the interview tips for SQL Server
SQL SERVER INTERVIEW QUESTIONS WITH ANSWERS
1. Which TCP/IP port does SQL Server
run on? How can it be changed?
SQL Server runs
on port 1433. It can be changed from the Network Utility TCP/IP properties.
2. How to generate row number in
SQL Without ROWNUM
Generating a row number – that is a
running sequence of numbers for each row is not easy using plain SQL. In fact,
the method I am going to show below is not very generic either. This method
only works if there is at least one unique column in the table. This method
will also work if there is no single unique column, but collection of columns
that is unique
SELECT name, sal, (SELECT COUNT(*) FROM EMPLOYEE i WHERE o.name >= i.name)
row_num
FROM EMPLOYEE o
order by row_num
3. What are the difference between
clustered and a non-clustered index?
- A clustered index is a
special type of index that reorders the way records in the table are
physically stored. Therefore table can have only one clustered index. The
leaf nodes of a clustered index contain the data pages.
- A non clustered index is a
special type of index in which the logical order of the index does not
match the physical stored order of the rows on disk. The leaf node of a
non clustered index does not consist of the data pages. Instead, the leaf
nodes contain index rows.
4. What are the different index
configurations a table can have?
A table can have one of these index
configurations:
- No indexes
- A clustered index
- A clustered and many nonclustered indexes
- A nonclustered index
- Many nonclustered indexes
5. What are different types of
Collation
Sensitivity?
- Case sensitivity - A
and a, B and b, etc.
- Accent sensitivity
- Kana Sensitivity -
When Japanese kana characters Hiragana and Katakana are treated
differently, it is called Kana sensitive.
- Width sensitivity - A
single-byte character (half-width) and the same character represented as a
double-byte character (full-width) are treated differently than it is
width sensitive.
6. What is OLTP (Online Transaction
Processing)?
In OLTP -
online transaction processing systems relational database design use the
discipline of data modeling and generally follow the Codd rules of data
normalization in order to ensure absolute data integrity. Using these rules
complex information is broken down into its most simple structures (a table)
where all of the individual atomic level elements relate to each other and
satisfy the normalization rules.
7. What's the difference between a
primary key and a unique key?
Both primary
key and unique key enforces uniqueness of the column on which they are defined.
But by default primary key creates a clustered index on the column, where are
unique creates a nonclustered index by default. Another major difference is
that, primary key doesn't allow NULLs, but unique key allows one NULL only.
8. What is the difference between a
Local and a Global temporary table?
- A local temporary table
exists only for the duration of a connection or, if defined inside a
compound statement, for the duration of the compound statement.
- A global temporary table
remains in the database permanently, but the rows exist only within a
given connection. When connection is closed, the data in the global
temporary table disappears. However, the table definition remains with the
database for access when database is opened next time.
9. What is the STUFF function and how
does it differ from the REPLACE function?
STUFF function
is used to overwrite existing characters. Using this syntax, STUFF (string_expression,
start, length, replacement_characters), string_expression is the string that
will have characters substituted, start is the starting position, length is the
number of characters in the string that are substituted, and replacement_characters
are the new characters interjected into the string. REPLACE function to replace
existing characters of all occurrences. Using the syntax REPLACE
(string_expression, search_string, replacement_string), where every incidence
of search_string found in the string_expression will be replaced with
replacement_string.
10. What is PRIMARY KEY?
A PRIMARY KEY
constraint is a unique identifier for a row within a database table. Every
table should have a primary key constraint to uniquely identify each row and
only one primary key constraint can be created for each table. The primary key
constraints are used to enforce entity integrity.
11. What is UNIQUE KEY constraint?
A UNIQUE
constraint enforces the uniqueness of the values in a set of columns, so no duplicate
values are entered. The unique key constraints are used to enforce entity
integrity as the primary key constraints.
12. What is FOREIGN KEY?
A FOREIGN KEY
constraint prevents any actions that would destroy links between tables with
the corresponding data values. A foreign key in one table points to a primary
key in another table. Foreign keys prevent actions that would leave rows with
foreign key values when there are no primary keys with that value. The foreign
key constraints are used to enforce referential integrity.
13. What is CHECK Constraint?
A CHECK
constraint is used to limit the
values that can be placed in a column. The check
constraints are used to enforce domain integrity.
14. Error
severity 13 indicates what?
Transactional deadlock errors. This level of error severity indicates a transaction deadlock
error.
15. In which
order do you perform an upgrade to SQL Server 2008 for replicated databases?
Distributor, Publisher, then Subscriber.
You always perform an upgrade in this order: distributor, publisher and
subscriber.
KaaShiv InfoTech Offers Best Inpant Training in Chennai.
The
training at KAASHIV INFOTECH focus on developing the technical oriented
concepts that turn graduates into employable assets. Handled only by
professionals from MNC companies, we know how to equip you with strong
technologies fundamentals.
InPlant Training Schedule for
CSE/IT/MCA Students
Day
|
Programme
|
Day 1
|
BigData (Practical Demos)
|
Day 2
|
Windows 8 App Development (Practical
Demos)
|
Day 3
|
Ethical Hacking (Facebook
Hack,Server/Website Hacking(20 Attacks)
|
Day 4
|
Cloud Computing (Live Server Demo,Live
Pjt Implementation)
|
Day 5
|
CCNA (-Networking-Router
Configurations Practical Demo)
|
InPlant Training Schedule for
Electronic/Electrical/EIE Students
Day
|
Programme
|
Day 1
|
Embedded System (Embedded
Program Designing ,Chip Burning)
|
Day 2
|
Wireless System (Device
Designing,Controlling Fans with Wireless Sensors)
|
Day 3
|
CCNA (-Networking-Router
Configurations Practical Demo)
|
Day 4
|
Ethical Hacking (Facebook
Hack,Server/Website Hacking(20 Attacks)
|
Day 5
|
Matlab (Capture
Image,Processing, Animate Images-Practical Demos)
|
|
|
Mechanical/Civil Inplant training Schedule
Day
|
Programme
|
Day 1
|
Aircraft Designing
|
Day 2
|
Vehicle Movement in Airports
|
Day 3
|
3D Packaging Designs
|
Day 4
|
3D Modeling
|
Day 5
|
3D Window Shading
|
Address:
KAASHIV INFO TECH
Shivanantha Building,
X41, 5th Floor,2nd Avenue,
(Near Ayyappan Temple)
Anna Nagar, Chennai = 600040.
Contact Number : 9840678906 ,9003718877 , 9962345637 .
Visit our other websites
http://www.inplanttrainingchennai.com
http://www.inplanttraining-in-chennai.com
http://www.Kaashiveinotech.com
http://www.internshipinchennai.in
https://plus.google.com/u/0/b/110228862465265998202/dashboard/overview
https://plus.google.com/u/0/b/117408505876070870512/dashboard/overview
https://plus.google.com/u/0/b/104468163439231303834/dashboard/overview
https://plus.google.com/u/0/b/117640664472494971423/dashboard/overview
Feedback URLS
KaaShiv
InfoTech Facebook Page
https://www.facebook.com/KaaShivInfoTech
Inplant
Training Program in Chennai
https://www.facebook.com/pages/Inplant-Training-Program-in-Chennai/1402097696706380
Internship Training Program in Chennai
https://www.facebook.com/pages/Internship-in-Chennai-KaaShiv/1446147235603704
Facebook Inplant
Training page
https://www.facebook.com/pages/Inplant-Training/256116284550327
No comments:
Post a Comment