SQL SERVER INTERVIEW QUESTIONS 2014- SET 10 By
"Mr.J.Venkatesan Prabu"
KAASHIV INFOTECH
"Mr.J.Venkatesan Prabu"
1. When setting
Replication, can you have Distributor on SQL Server 2005, Publisher on SQL
Server 2008?
§
No you cannot have a Distributor on a previous version
than the Publisher.
2. When setting
Replication, is it possible to have a Publisher as 64 Bit SQL Server and
Distributor or Subscribers as a 32 Bit SQL Server.
§
Yes it is possible to have various configurations in a
Replication environment.
3. What is the
difference between dropping a database and taking a database offline?
§
Drop database deletes the database along with the
physical files, it is not possible to bring back the database unless you have a
backup of the database. When you take a database offline, you the database is
not available for users, it is not deleted physically, it can be brought back
online.
4. Which
autogrowth database setting is good?
§
Setting an autogrowth in multiples of MB is a better
option than setting autogrowth in percentage (%).
5. What are the
different types of database compression introduced in SQL Server 2008?
§
Row compression and Page compression.
6. What are the
different types of Upgrades that can be performed in SQL Server?
§
In-place upgrade and Side-by-Side Upgrade.
7. What is
Transparent Data Encryption?
§
Introduced in SQL Server 2008 Transparent Data Encryption
(TDE) is a mechanism through which you can protect the SQL Server Database
files from unauthorized access through encryption. Also, TDE can protect the database
backups of the instance on which TDE was setup.
8. Does
Transparent Data Encryption provide encryption when transmitting data across
network?
§
No, Transparent Data Encryption (TDE) does not encrypt
the data during transfer over a communication channel.
9. What are the
operating modes in which Database Mirroring runs?
§
Database Mirroring runs in 2 operating modes High-Safety
Mode and High-Performance Mode.
10. What is the
difference between the 2 operating modes of Database Mirroring (mentioned in
above answer)?
§
High-Safety Mode is to ensure that the Principal and
Mirrored database are synchronized state, that is the transactions are
committed at the same time on both servers to ensure consistency, but there
is/might be a time lag.
§
High-Performance Mode is to ensure that the Principal
database run faster, by not waiting for the Mirrored database to commit the
transactions. There is a slight chance of data loss and also the Mirrored
database can be lagging behind (in terms being up to date with Principal
database) if there is a heavy load on the Mirrored Server.
11.What is Log Shipping?
§ Log
shipping is the process of automating the backup of database and transaction
log files on a production SQL server, and then restoring them onto a standby
server. Enterprise Editions only supports log shipping. In log shipping the
transactional log file from one server is automatically updated into the backup
database on the other server. If one server fails, the other server will have
the same db and can be used this as the Disaster Recovery plan. The key feature
of log shipping is that it will automatically backup transaction logs
throughout the day and automatically restore them on the standby server at
defined interval.
12. Name 3 ways to get an accurate count of the number of
records in a table?
SELECT *
FROM table1
SELECT COUNT(*) FROM table1
SELECT rows FROM sysindexes WHERE id = OBJECT_ID(table1) AND in did < 2
13. What
are the different data types available in SQL Server?
Numeric:
Stores numeric values.
Monetary: It stores numeric values with decimal places. It is used
specially for currency values.
Data and Time: It stores date and time information.
Character: It supports character based values of varying lengths.
Binary: It stores data in strict binary (0 or 1) Representation.
Special purpose: SQL Server contains Complex data types to handle the XML
Documents, Globally unique identifiers etc.
14. What
are the specialized data types in SQL Server?
bit :Stores a 0, 1, or null. Used for basic “flag” values.
TRUE is converted to 1, and FALSE is converted to 0.
Timestamp: An
automatically generated value. Each database contains an internal counter that
designates a relative time counter not associated with an actual clock. A table
can have only one time stamp column, which is set to the database timestamp
when the row is inserted or modified.
Uniqueidentifier: A 16-bit
GUID used to globally identify a row across databases, instances, and servers.
sql_variant: It
can change the data type based on the data that is stored within it.
Cursor: Cursor
is used by applications that declare cursors. It contains a reference to the
cursor that can be used for operations. This data type cannot be used in a
table.
Table: It
is used to hold a result set for subsequent processing. This data type cannot
be used for a column. The only time you use this data type is when declaring
table variables in triggers, stored procedures, and functions.
Xml: It
stores an XML document of up to 2 GB in size. You can specify options to force
only well-formed documents to be stored in the column.
15. Which
of the following has the highest order of precedence?
·
Functions and Parenthesis
·
Multiplication, Division and Exponents
·
Addition and Subtraction
·
Logical Operations
SELECT COUNT(*) FROM table1
SELECT rows FROM sysindexes WHERE id = OBJECT_ID(table1) AND in did < 2
Numeric: Stores numeric values.
Monetary: It stores numeric values with decimal places. It is used specially for currency values.
Data and Time: It stores date and time information.
Character: It supports character based values of varying lengths.
Binary: It stores data in strict binary (0 or 1) Representation.
Special purpose: SQL Server contains Complex data types to handle the XML Documents, Globally unique identifiers etc.
bit :Stores a 0, 1, or null. Used for basic “flag” values.
TRUE is converted to 1, and FALSE is converted to 0.
Day
|
Programme
|
Day 1
|
BigData (Practical Demos)
|
Day 2
|
Windows 8 App Development (Practical Demos)
|
Day 3
|
Ethical Hacking (Facebook Hack,Server/Website Hacking(20 Attacks)
|
Day 4
|
Cloud Computing (Live Server Demo,Live Pjt Implementation)
|
Day 5
|
CCNA (-Networking-Router Configurations Practical Demo)
|
Day
|
Programme
|
Day 1
|
Embedded System (Embedded Program Designing ,Chip Burning)
|
Day 2
|
Wireless System (Device Designing,Controlling Fans with Wireless Sensors)
|
Day 3
|
CCNA (-Networking-Router Configurations Practical Demo)
|
Day 4
|
Ethical Hacking (Facebook Hack,Server/Website Hacking(20 Attacks)
|
Day 5
|
Matlab (Capture Image,Processing, Animate Images-Practical Demos)
|
Mechanical/Civil Inplant training Schedule
Day
|
Programme
|
Day 1
|
Aircraft Designing
|
Day 2
|
Vehicle Movement in Airports
|
Day 3
|
3D Packaging Designs
|
Day 4
|
3D Modeling
|
Day 5
|
3D Window Shading
|
Shivanantha Building,
X41, 5th Floor,2nd Avenue,
(Near Ayyappan Temple)
Anna Nagar, Chennai = 600040.
No comments:
Post a Comment