Skip to main content

SQL Server interview questions.



Q.Explain the use of keyword WITH ENCRYPTION. Create a Store Procedure with Encryption.
It is a way to convert the original text of the stored procedure into encrypted form. The stored procedure gets obfuscated and the output of this is not visible to
CREATE PROCEDURE Abc
WITH ENCRYPTION
AS
<<    SELECT statement>>
GO
Q.What is a linked server in SQL Server?
It enables SQL server to address diverse data sources like OLE DB similarly. It allows Remote server access and has the ability to issue distributed queries, updates, commands and transactions.
Q.Features and concepts of Analysis Services
Analysis Services is a middle tier server for analytical processing, OLAP, and Data mining. It manages multidimensional cubes of data and provides access to heaps of information including aggregation of data One can create data mining models from data sources and use it for Business Intelligence also including reporting features.
Some of the key features are:
·         Ease of use with a lot of wizards and designers.
·         Flexible data model creation and management
·         Scalable architecture to handle OLAP
·         Provides integration of administration tools, data sources, security, caching, and reporting etc.
·         Provides extensive support for custom applications
Q.What is Analysis service repository?
Every Analysis server has a repository to store metadata for the objects  like cubes, data sources etc. It’s by default stored in a MS Access database which can be also migrated to a SQL Server database.
Q.What is SQL service broker?
Service Broker allows internal and external processes to send and receive guaranteed, asynchronous messaging. Messages can also be sent to remote servers hosting databases as well. The concept of queues is used by the broker to put a message in a queue and continue with other applications asynchronously. This enables client applications to process messages at their leisure without blocking the broker. Service Broker uses the concepts of message ordering, coordination, multithreading and receiver management to solve some major message queuing problems. It allows for loosely coupled services, for database applications.
Q.What is user defined datatypes and when you should go for them?
User defined data types are based on system data types. They should be used when multiple tables need to store the same type of data in a column and you need to ensure that all these columns are exactly the same including length, and nullability.
Parameters for user defined datatype:Name
System data type on which user defined data type is based upon.
Nullability.
For example, a user-defined data type called post_code could be created based on char system data type.
Q.What is bit datatype?
A bit datatype is an integer data type which can store either a 0 or 1 or null value.
Q.Describe the XML support SQL server extends.
SQL Server (server-side) supports 3 major elements:
  1. Creation of XML fragments: This is done from the relational data using FOR XML to the select query. 
  2. Ability to shred xml data to be stored in the database.
  3. Finally, storing the xml data.
Client-side XML support in SQL Server is in the form of SQLXML. It can be described in terms of
  • XML Views:  providing bidirectional mapping between XML schemas and relational tables.
  • Creation of XML Templates:  allows creation of dynamic sections in XML.
Q.What is SQL Server English Query?:-English query allows accessing the relational databases through English Query applications. Such applications permit the users to ask the database to fetch data based on simple English instead of using SQL statements.

Q.What is the purpose of SQL Profiler in SQL server?
SQL profiler is a tool to monitor performance of various stored procedures. It is used to debug the queries and procedures. Based on performance, it identifies the slow executing queries. Capture any problems by capturing the events on  production environment so that they can be solved.
Q.What is XPath?
XPath is an expressions to select a xml node in an XML document.
It allows the navigation on the XML document to the straight to the element where we need to reach and access the attributes.
Q.What are the Authentication Modes in SQL Server?

a.       Windows Authentication Mode  (Windows Authentication): uses user’s Windows account
b.      Mixed Mode (Windows Authentication and SQL Server Authentication): uses either windows or SQL server
Q.Explain Data Definition Language, Data Control Language and Data Manipulation Language.
Data Definition Language (DDL):- are the SQL statements that define the database structure.
Example:
a.       CREATE
b.      ALTER
c.       DROP
d.      TRUNCATE
e.      COMMENT
f.        RENAME
Data Manipulation Language (DML):- statements are used for manipulate or edit data.
Example:
a.       SELECT - retrieve data from the a database
b.      INSERT - insert data into a table
c.       UPDATE - updates existing data within a table
d.      DELETE
e.      MERGE
f.        CALL
g.       EXPLAIN PLAN
h.      LOCK TABLE
Data Control Language (DCL):-statements to take care of the security and authorization.
Examples:
  1. GRANT
  2. REVOKE
Q.What are the steps to process a single SELECT statement?
Steps
a.       The select statement is broken into logical units
b.            A sequence tree is built based on the keywords and expressions in the form of the logical units.
c.             Query optimizer checks for various permutations and combinations to figure out the fastest way using minimum resources to access the source tables. The best found way is called as an execution plan.
d.      Relational engine executes the plan and processes the data


Q.Explain GO Command.
Go command is a signal to execute the entire batch of SQL statements after previous Go.

Q.What is the significance of NULL value and why should we avoid permitting null values?
NULL value means that no entry has been made into the column. It states that the corresponding value is either unknown or undefined. It is different from zero or "". They should be avoided to avoid the complexity in select & update queries and also because columns which have constraints like primary or foreign key constraints cannot contain a NULL value.
Q.What is the difference between UNION and UNION ALL?
UNION selects only distinct values whereas UNION ALL selects all values and not just distinct ones.
UNION: SELECT column_names FROM table_name1
UNION
SELECT column_names FROM table_name2
UNION All: SELECT column_names FROM table_name1
UNION ALL
SELECT column_names FROM table_name2
Q.What is use of DBCC Commands?
DBCC (Database consistency checker) act as Database console commands for SQL Server to check database consistency. They are grouped as:
Maintenance: Maintenance tasks on Db, filegroup, index etc. Commands include DBCC CLEANTABLE, DBCC INDEXDEFRAG, DBCC DBREINDEX, DBCC SHRINKDATABASE, DBCC DROPCLEANBUFFERS, DBCC SHRINKFILE, DBCC FREEPROCCACHE, and DBCC UPDATEUSAGE.
Miscellaneous: Tasks such as enabling tracing, removing dll from memory. Commands include DBCC dllname, DBCC HELP, DBCC FREESESSIONCACHE, DBCC TRACEOFF, DBCC FREESYSTEMCACHE, and DBCC TRACEON.
Informational: Tasks which gather and display various types of information. Commands include DBCC INPUTBUFFER, DBCC SHOWCONTIG, DBCC OPENTRAN, DBCC SQLPERF, DBCC OUTPUTBUFFER, DBCC TRACESTATUS, DBCC PROCCACHE, DBCC USEROPTIONS, and DBCC SHOW_STATISTICS.
Validation: Operations for validating on Db, index, table etc. Commands include DBCC CHECKALLOC, DBCC CHECKFILEGROUP, DBCC CHECKCATALOG, DBCC CHECKIDENT, DBCC CHECKCONSTRAINTS, DBCC CHECKTABLE, and DBCC CHECKDB.           
Q.What is Log Shipping?
Log shipping defines the process for automatically taking backup of the database and transaction files on a SQL Server and then restoring them on a standby/backup server. This keeps the two SQL Server instances in sync with each other. In case production server fails, users simply need to be pointed to the standby/backup server. Log shipping primarily consists of 3 operations:
Backup transaction logs of the Production server.
Copy these logs on the standby/backup server.
Restore the log on standby/backup server.
Q.What is the difference between a Local and a Global temporary table?
Temporary tables are used to allow short term use of data in SQL Server. They are of 2 types:
Local
Global
Only available to the current Db connection for current user and are cleared when connection is closed.
Available to any connection once created. They are cleared when the last connection is closed.
Multiple users can’t share a local temporary table.
Can be shared by multiple user sessions.
Q.What is the STUFF and how does it differ from the REPLACE function?
Both STUFF and REPLACE are used to replace characters in a string.
select replace('abcdef','ab','xx') results in xxcdef
select replace('defdefdef','def','abc') results in abcabcabc
We cannot replace a specific occurrence of “def” using REPLACE.
select stuff('defdefdef',4, 3,'abc') results in defabcdef
where 4 is the character to begin replace from and 3 is the number of characters to replace.
Q.What are the rules to use the ROWGUIDCOL property to define a globally unique identifier column?
Only one column can exist per table that is attached with ROWGUIDCOL property. One can then use $ROWGUID instead of column name in select list.
Q.What is the actions prevented once referential integrity is enforced?
Actions prevented are:
·         Breaking of relationships is prevented once referential integrity on a database is enforced.
·         Can’t delete a row from primary table if there are related rows in secondary table.
·         Can’t update primary table’s primary key if row being modified has related rows in secondary table.
·         Can’t insert a new row in secondary table if there are not related rows in primary table.
·         Can’t update secondary table’s foreign key if there is no related row in primary table.


Q.What are the commands available for Summarizing Data in SQL Server?
Commands for summarizing data in SQL Server:
Command
Description
Syntax/Example
SUM
Sums related values
SELECT SUM(Sal) as Tot from Table1;
AVG
Average value
SELECT AVG(Sal) as Avg_Sal from Table1;
COUNT
Returns number of rows of resultset
SELECT COUNT(*) from Table1;
MAX
Returns max value from a resultset
SELECT MAX(Sal) from Table1;
MIN
Returns min value from a resultset
SELECT MIN(Sal) from Table1;
GROUP BY
Arrange resultset in groups
SELECT ZIP,City FROM Emp GROUP BY ZIP
ORDER BY
Sort resultset
SELECT ZIP,City FROM Emp ORDER BY City
Q.List out the difference between CUBE operator and ROLLUP operator
Difference between CUBE and ROLLUP:
CUBE
ROLLUP
It’s an additional switch to GROUP BY clause. It can be applied to all aggregation functions to return cross tabular result sets. .
It’s an extension to GROUP BY clause. It’s used to extract statistical and summarized information from result sets. It creates groupings and then applies aggregation functions on them.
Produces all possible combinations of subtotals specified in GROUP BY clause and a Grand Total.
Produces only some possible subtotal combinations.
Q.What are the guidelines to use bulk copy utility of SQL Server?
Bulk copy is an API that allows interacting with SQL Server to export/import data in one of the two data formats. Bulk copy needs sufficient system credentials.
·         Need INSERT permissions on destination table while importing.
·         Need SELECT permissions on source table while exporting.
·         Need SELECT permissions on sysindexes, sysobjects and syscolumns tables.
bcp.exe northwind..cust out "c:\cust.txt" –c -T
Export all rows in Northwind.Cust table to an ASCII-character formatted text file.
Q.What are the capabilities of Cursors?
Capabilities of cursors:
·         Cursor reads every row one by one.
·         Cursors can be used to update a set of rows or a single specific row in a resultset
·         Cursors can be positioned to specific rows.
·         Cursors can be parameterized and hence are flexible.
·         Cursors lock row(s) while updating them.
Q.What are the ways to controlling Cursor Behavior?
There are 2 ways to control Cursor behavior:
·         Cursor Types: Data access behavior depends on the type of cursor; forward only, static, keyset-drive and dynamic.
·         Cursor behaviors: Keywords such as SCROLL and INSENSITIVE along with the Cursor declaration define scrollability and sensitivity of the cursor.
Q.What are the advantages of using Stored Procedures?
Advantages of using stored procedures are:
·         They are easier to maintain and troubleshoot as they are modular.
·         Stored procedures enable better tuning for performance.
·         Using stored procedures is much easier from a GUI end than building/using complex queries.
·         They can be part of a separate layer which allows separating the concerns. Hence Database layer can be handled by separate developers proficient in database queries.
·         Help in reducing network usage.
·         Provides more scalability to an application.
·         Reusable and hence reduce code.


Q.What are the ways to code efficient transactions?
Some ways and guidelines to code efficient transactions:
·         Do not ask for an input from a user during a transaction.
·         Get all input needed for a transaction before starting the transaction.
·         Transaction should be atomic
·         Transactions should be as short and small as possible.
·         Rollback a transaction if a user intervenes and re-starts the transaction.
·         Transaction should involve a small amount of data as it needs to lock the number of rows involved.
·         Avoid transactions while browsing through data.
Q.What are the differences among batches, stored procedures, and triggers?  
Batch
Stored Procedure
Triggers
Collection or group of SQL statements. All statements of a batch are compiled into one executional unit called execution plan. All statements are then executed statement by statement.
It’s a collection or group of SQL statements that’s compiled once but used many times.
It’s a type of Stored procedure that cannot be called directly. Instead it fires when a row is updated, deleted, or inserted.
Q.What security features are available for stored procedures?
Security features for stored procedures:
·         Grants users permissions to execute a stored procedure irrespective of the related tables.
·         Grant users users permission to work with a stored procedure to access a restricted set of data yet no give them permissions to update or select underlying data.
·         Stored procedures can be granted execute permissions rather than setting permissions on data itself.
·         Provide more granular security control through stored procedures rather than complete control on underlying data in tables.
Q.What are the instances when triggers are appropriate?
Scenarios for using triggers:
·         To create a audit log of database activity.
·         To apply business rules.
·         To apply some calculation on data from tables which is not stored in them.
·         To enforce referential integrity.
·         Alter data in a third party application
·         To execute SQL statements as a result of an event/condition automatically.
Q.What are the restrictions applicable while creating views?
Restrictions applicable while creating views:
·         A view cannot be indexed.
·         A view cannot be Altered or renamed. Its columns cannot be renamed.
·         To alter a view, it must be dropped and re-created.
·         ANSI_NULLS and QUOTED_IDENTIFIER options should be turned on to create a view.
·         All tables referenced in a view must be part of the same database.
·         Any user defined functions referenced in a view must be created with SCHEMABINDING option.
·         Cannot use ROWSET, UNION, TOP, ORDER BY, DISTINCT, COUNT(*), COMPUTE, COMPUTE BY in views.
Q.What are the events recorded in a transaction log?
Events recorded in a transaction log:
·         Broker event category includes events produced by Service Broker.
·         Cursors event category includes cursor operations events.
·         CLR event category includes events fired by .Net CLR objects.
·         Database event category includes events of data.log files shrinking or growing on their own.
·         Errors and Warning         event category includes SQL Server warnings and errors.
·         Full text event category include events occurred when text searches are started, interrupted, or stopped.
·         Locks event category includes events caused when a lock is acquired, released, or cancelled.
Object event category includes events of database objects being created, updated or deleted.
·          OLEDB event category includes events caused by OLEDB calls.
·         Performance event category includes events caused by DML operators.
·         Progress report event category includes Online index operation events.
·         Scans event category includes events notifying table/index scanning.
·         Security audit event category includes audit server activities.
·         Server event category includes server events.
·         Sessions event category includes connecting and disconnecting events of clients to SQL Server.
·         Stored procedures event category includes events of execution of Stored procedures.
·         Transactions event category includes events related to transactions.
·         TSQL event category includes events generated while executing TSQL statements.
·         User configurable event category includes user defined events.
Describe when checkpoints are created in a transaction log.
Activities causing checkpoints are:
·         When a checkpoint is explicitly executed.
·         A logged operation is performed on the database.
·         Database files have been altered using Alter Database command.
·         SQL Server has been stopped explicitly or on its own.
·         SQL Server periodically generates checkpoints.
·         Backup of a database is taken.
Define Truncate and Delete commands.
TRUNCATE
DELETE
This is also a logged operation but in terms of deallocation of data pages.
This is a logged operation for every row.
Cannot TRUNCATE a table that has foreign key constraints.
Any row not violating a constraint can be Deleted.
Resets identity column to the default starting value.
Does not reset the identity column. Starts where it left from last.
Removes all rows from a table.
Used delete all or selected rows from a table based on WHERE clause.
Cannot be Rolled back.
Need to Commit or Rollback
DDL command
DML command

Open any Page any other Tag
<body>
<form runat="server">
<asp:AdRotator id="ad1" AdvertisementFile="Ad1.xml" runat="server" />
</form>
<p><a href="ad1.xml" target="_blank">View XML file</a></p>
</body>
</html>

Explain various data region available in SSRS with their use.

Data regions are report items used to display data from a single dataset. You can perform grouping, sorting and various aggregate functions on data in data region. In SSRS 2005, there were 4 data regions:-
1. Table
2. Matrix
3. List
4. Chart
While in SSRS 2008, there are one additional data region namely Gauge.
Let’s explain each one of them:

1. Table - Table Data region has fixed tabular structure i.e. fixed number of columns. It is useful for displaying data grouped by row. You can have maximum of 1 report item per cell. The size of table depends on number of rows dataset fetches i.e., if number of rows returned by dataset is more; it can expand to multiple pages.
2. Matrix – A matrix data region display data in pivot table format, hence also popularly known as pivot table or crosstab report. It has minimum of one row group and one column group. The size of matrix data region depends on columns and rows fetched.
3. List - A list data region is free layout. It is useful for complex reporting resign. The list can be used to display multiple table and matrix. Each getting data from different dataset.
4. Chart – This data region is for displays the data graphically i.e., in form of chart. A various chart types are available in SSRS 2008 namely line, pie chart, columns etc.
5. Gauge - This can be used in a table or matrix to show the relative value of a field in a range of values in the data region. You can also add a gauge to the design surface to show a single relative value.




Comments

Popular posts from this blog

For Assignment Solution Contact Omegaitsolution.com https://www.omegaitsolution.com 9899682018 DEC 2018 NMIMS Solved Assignments,

For Assignment Solution Contact Omegaitsolution.com https://www.omegaitsolution.com 9899682018 1. The manager of a company was analysing the trend of the products of its company (Commodity Y) getting replaced by another substitute product available in the market which gives the same level of satisfaction to the consumers. Calculate the rate of Marginal Rate of Substitution and analyse the result. Combination Units of Commodity Y Units of Commodity X Total Utility a 40 10 U b 25 14 U c 17 19 U d 10 27 U e 7 38 U 2. Neha has just completed her MBA and joined a startup company. The company was planning to launch a new product in the market so the management wanted to understand the different factors that can impact the demand and supply of their products in the market. Help Neha to prepare a report on the factors impacting d

For Assignment Solution Contact Niraj kumar Call and whatsapp (9899682018) Mail:-Nirajkumar294@gmail.com

GET SOLVED ASSIGNMENTS AT NOMINAL COST For Assignment Solution Contact Niraj kumar Call and whatsapp (9899682018) Mail:-Nirajkumar294@gmail.com INTERNAL ASSIGNMENT APPLICABLE FOR JUNE 2019 EXAMINATION SEMESTER 2 ASSIGNMENTS Marketing Management 1. Assume you plan to purchase a new car for personal use. This will be the first car that you will be purchasing. Discuss various steps of consumer buying process that will be involved in purchasing a car.  2. M/s Furnideas wishes to sell furniture in the Indian Market. The company is known for their innovative ideas in furniture. The company has a global presence in selling furniture. The company sells to High, Middle and Lower Income group in different countries based on the segmentation. Furnideas appoints you as a consultant to guide them on types of segmentation that they should use for their furniture. 3. M/s Furnideas (as given in question 2) wants to promote its brand and products to create awareness and increase the sale of i

Networking interview questions .

What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN). Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions. What's the difference Between an Intranet and the Internet? There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space. An intranet may b