You are on page 1of 9

SQL SERVER Questions And Answers 1. What is an Entity?

Visit dotnetfuncorner.blogspot.com for more

Ans: The basic data item stored in database is called entity. An entity can be any object, item, place, person, concept, or activity about which data is stored. 2. What is an attribute?

Ans: An attribute is a property of an entity. It describes a part of an entity. Entity could have one or more attributes. 3. What is ER diagram?

Ans: An Entity Relationship Diagram is diagrammatic representation of the logical structure of a database system. 4. Ans: Describe the concept of keys. Candidate key An attribute that uniquely identifies a row is called candidate key. It is also called das surrogate key. Primary key A candidate key that you choose to identify rows uniquely is called a primary key. Alternate key If there are multiple candidate keys in a table, the candidate keys that are chosen as primary key are called the alternate keys. Composite key When the key that uniquely identifies the rows of a table is made up of more than one attribute, it is called as a composite key. Foreign key Two tables can be related using a common attribute. When a primary key of one table is also available as an attribute in another related table it is called a foreign key. 5. What are joins?

Ans: Sometimes, data from multiple tables is to be displayed using select statement. For this purpose, the tables in use must have a column that is equated. This is termed as simple join or multiple join. Sometimes, you might want to display all records from one table and some from another. This type of join is called an outer join. An outer join is only possible between two tables.

Page

There are two types of outer join, namely left and right. In a left outer join, all the rows of the first table named in the FROM clause are displayed. In a right outer join all the rows from the second table mentioned in the FROM clause are displayed. In either case, all the matching rows from other table are displayed. 6. What is a sub query?

Visit dotnetfuncorner.blogspot.com for more

Ans: Sometimes the results of one query are dependant on the results of another query. For this purpose one query is nested inside another query, this is called as sub query. 7. What are the types of constraints?

Ans: You can enforce data integrity by using constraints. Constraints are divided in to five categories. Primary key constraint A primary key constraint is defined on a column are a set of columns whose values uniquely identify the rows in a table. It cannot contain null values. Unique constraint Unique constraints are used to enforce uniqueness on non-primary key columns. It allows null values but only one row can have a null value. Multiple unique constraints can be created on a table. Foreign Key constraint You can use the foreign key constraint to remove the inconsistency in two tables when the data in the one table is dependant on the other table. Check constraint It enforces domain integrity by restricting the values to be inserted in a column. It is possible to define multiple check constraints on a single column. These are evaluated in the order in which they are defined. Default Constraint A default constraint can be use to assign a constant value to a column and the user need not insert values in to that column. 8. What is a rule?

Page

Ans: The required integrity can be enforced by specifying a check constraint or by defining a rule. But check constraint modifies the table structure. The constraint can there fore be implemented using rules with out changing the table structure. This rule is applied before an insert or update statement . A rule must be bound to a column or a user-define d data type. This is done using stored procedure sp_bindrule. Rules do not apply to data that has already been inserted in the table. The existing values in tables do not have to meet the criteria specified by the rule.

9.

What are indexes?

Visit dotnetfuncorner.blogspot.com for more

Ans: To speed up data retrieval indexes are used. Indexes also enforce the uniqueness of rows. Advantages 1. Improves the speed of execution. 2. Enforces uniqueness of data. 3. Speeds up joins between tables. Disadvantages 1. Takes disk space to store. 2. Data modification takes longer. 3. Takes time to create index. Types of indexes Clustered index The data is physically sorted. One clustered index can be created per table, so you should build it on attributes that have a high percentage of unique values and that are not modified often. Nonclustered index The physical order of the rows is not the same as the index order. There can be as many as 249 nonclustered indexes per column. 10. What are views?

Ans: A view is a virtual table, which gives access to a subset of columns from one or more tables. It is a query stored as an object in the database. Hence a view is an object that derives it data from one or more tables. Advantages 1. A view serves as a security mechanism. 2. A view simplifies the usage of complex queries. 11. What are store procedures and its advantages?

Ans: A stored procedure is collection or batch of Transact-SQL statements and control flow language that is stored under one name, and executed as single unit. It helps in improving the performance of a query. It is a precompiled object. As it is ready to execute no time is needed for parsing and compiling the procedure.
Page

Advantages

Visit dotnetfuncorner.blogspot.com for more

Improved performance Applications do not have to compile the procedure over and over again. Reduction in network congestion applications need not submit multiple SQL statements to server for the purpose of processing. Enhanced accuracy SQL statements included in a procedure are designed by experienced programmers and are therefore more efficient, error free, and tested. Better security mechanism users can be granted permission to execute a stored procedure even if they do not own it. Types of stored procedures 1. User-defined 2. System defined These are prefixed with sp_. These are for administrative purpose and are stored in the database and are accessible to all users. 3. Temporary These are prefixed with #, stored in tempdb and are automatically dropped when connection terminates. 4. Remote These are created and stored in remote servers and can accessed by users with appropriate permissions. 5. Extended These are dlls that are executed outside SQL Server. They are prefixed by xp_. 12. Explain about BCP and DTS. BCP The transfer data from an external source to SQL Server is performed using Bulk Copy Program utility. The external source is a flat file. Data transfer from external source to SQL Server in BCP IN. The transfer of data from SQL Server to external source is BCP OUT

Page

DTS

Visit dotnetfuncorner.blogspot.com for more

Data transformation services can be used to import and export data between heterogeneous data sources and SQL Server. The external data sources include Visual FoxPro, MS Excel, Paradox, MS Access, Dbase, and text files.

13.

What are transactions and their properties? A transaction is a sequence of operations performed together as a single unit of logical work. It has four properties. Atomicity it states that either all the data modifications are performed or none are performed. Consistency - it states that all the data is in a consistent state after a successful completion of transaction. Isolation it states any data modification made my concurrent transactions must be isolated from the modifications made by other concurrent transaction. Durability it states that ay change made by a completed transaction remains permanently in the system.

14.

Locking mechanism. SQL Server uses the concept of locking to ensure transactional integrity and database consistency. Locking, by functionally prevents users from accessing information being changed by other users. In a multi-user environment, Locking prevents users from changing the same data at the same time. In SQL Server locking is implemented automatically. SQL Server implements multi-granular locking, which allows transactions to lock different types of resources at different levels. SQL Server can lock the following resources. RID is a row identifier that individually locks a row in a table. Key is a rowlock with in an index. Page is an 8k page or an index page. Extent is a contiguous group of 8k data pages or index pages. Table is the entire table, including all data and indexes. Database is the complete database.

Page

Shared Locks

Visit dotnetfuncorner.blogspot.com for more

It is used for operations that do not change or update the data. This allows concurrent transactions to read a resource and no other transaction can modify the data on that resource. Update Locks This lock is implemented when a transaction modify a row. Only one update lock is allowed on a resource at a time. Exclusive locks Intent locks Schema Locks 15. What is deadlock? A dead lock is a situation in which two users (or transactions) have locks on separate objects, and each user is waiting for a lock on the others object. It usually occurs in a multi-user environment. 16. What are triggers? A trigger is a block of code that constitutes with a set of T-SQL statements that are activated in response to certain actions. A trigger can also be interpreted as a special kind of stored procedure that is executed whenever an action, such as data modification, takes place. A trigger is always defined on a table, and is said to have fired whenever the data in the underlying table is affected by any of the Data Manipulation Language (DML) statements-INSERT, UPDATE, or DELETE. A trigger fires in response to an event like insertion, updation, and deletion of data. Triggers help in maintaining consistent, reliable, and correct data in tables. They enable the performance of complex actions and cascade these actions to other dependant tables. Characteristics of a trigger: It can be associated with tables. It cannot be defined on temporary tables or views. However, it can reference temporary tables and views. Whenever any data modification statement is issued then SQL Server fires it automatically. It cannot be explicitly invoked or executed, as in the case of stored procedures. Triggers can be nested up to 16 levels. The nesting of triggers occurs when a trigger performs an action that initiates another trigger. It prevents incorrect, unauthorized, and inconsistent changes in data.

Page

It cannot return data to the user. There are three types of triggers 1) INSERT 2) DELETE 3) UPDATE 17.

Visit dotnetfuncorner.blogspot.com for more

What is Normalization? Explain three normal forms? Normalization is a scientific method of breaking down complex table structures in to simple table structures by using certain rules. Hence reduce redundancy in a table and eliminate inconsistency problems and disk space usage. First Normal Form A table is said to be in 1NF when each cell of the table contains precisely one value. Functional dependency If you have two attribute A and B, A is said to be functionally dependant on B, if for each value of B, there is exactly one value of A. Second Normal Form Identify the functionally dependent keys and place them in a different table. Third Normal Form A relation is said to be 3NF when every non-key attribute is functionally dependant only on the primary key.

18.

What are Cursors and types of cursors? A cursor is a work area called private SQL area, which executes SQL statements and stores the results. Cursor Types So you can specify the four-cursor types for Transact-SQL cursors. These cursors vary in their ability to detect changes to the result set and in the resources, such as memory and space in tempdb, they consume. The four API server cursor types supported by SQL Server are:

Page

Static cursors Dynamic cursors Forward-only cursors Key set-driven cursors

Static cursors detect few or no changes but consume relatively few resources while scrolling, although they store the entire cursor in tempdb. Dynamic cursors detect all changes but consume more resources while scrolling, although they make the lightest use of tempdb. Key set-driven cursors lie in between, detecting most changes but at less expense than dynamic cursors. Although the database API cursor models consider a forward-only cursor to be a distinct type of cursor, SQL Server does not. SQL Server considers both Forward only and scroll to be options that can be applied to static, key set-driven, and dynamic cursors. 19. What is Encryption option in SQL Server? Encryption is a method for keeping sensitive information confidential by changing data into an unreadable form. Encryption ensures that data remains secure by keeping the information hidden from everyone, even if the encrypted data is viewed directly. Decryption is the process of changing encrypted data back into its original form and so authorized users can view it. 20. What are time-stamped data types? It is a database-wide unique number. The storage size is 8 bytes. A table can have only one timestamp column. The value in the timestamp column is updated every time a row containing a timestamp column is inserted or updated. This property makes a timestamp column a poor candidate for keys, especially primary keys. Any update made to the row changes the timestamp value, thereby changing the key value. If the column is in a primary key, the old key value is no longer valid, and foreign keys referencing the old value are no longer valid. If the table is referenced in a dynamic cursor, all updates change the position of the rows in the cursor. If the column is in an index key, all updates to the data row also generate updates of the index. 21. Correlated queries. In correlated queries a sub query is executed for each row the parent query is executed.

Visit dotnetfuncorner.blogspot.com for more

Ex: Select e. * from EMP e where e.sal >(select Avg (Sal) from emp where e.deptno = emp.deptno

22.

What is OLAP and how it works with SQL Server? OLAP Services is a new middle-tier server for online analytical processing (OLAP). OLAP Services provides wizards, editors, and information to make OLAP technology easier to use. OLAP Services supports various data and storage models to help you create and maintain an OLAP system that meets your organizations needs.

Page

25. What are the advantages of SQL Server 7.0 over SQL Server 6.5? Trigger Enhancements

Visit dotnetfuncorner.blogspot.com for more

Recursive triggers Multiple triggers per INSERT, UPDATE, or DELETE statement

Data Transformation Services Web Assistant Wizard The Web Assistant Wizard has been enhanced in SQL Server 7.0. In addition to exporting SQL Server data out to an HTML file, it can also import tabular data from an HTML file into SQL Server, and post to and read from HTTP and FTP locations. Row-level locking SQL Server 7.0 supports complete row-level locking on both data pages and index pages.

SQL Server 7.0 supports applications that span a broad range of platforms. Gigabytes of memory, and a terabyte or more of disk storage. Stored Procedures The stored procedure model has been enhanced in SQL Server 7.0 to provide improved performance and increased application flexibility. When a stored procedure is compiled and placed in the procedure cache, all users of the stored procedure share that one copy of the compiled plan. The most notable feature is update replication. Using update replication, data replicated by SQL Server 7.0 can be modified at multiple sites.

Page

You might also like