Showing posts with label Server 2003. Show all posts
Showing posts with label Server 2003. Show all posts

Sunday, February 9, 2014

Difference Between Windows Server 2003 and Windows Server 2008

Difference Between Windows Server 2003 and 
Windows Server 2008

1. 2008 is combination of vista and windows 2003R2.
2. RODC one new domain controller introduced in it.[Read-only Domain Controllers.]
3. WDS (windows deployment services) instead of RIS in 2003 server
4. Shadow copy for each and every folders
5. Boot sequence is changed
5. Installation is 32 bit where as 2003 it is 16 bit as well as 32 bit, that’s why installation of 2008
is faster
6. Services are known as role in it
7. Group policy editor is a separate option in ads.
8. The main difference between 2003 and 2008 is Virtualization, management..
9. 2008 has more inbuilt components and updated third party drivers Microsoft introduces new
feature with 2k8 that is Hyper-V Windows Server 2008 introduces Hyper-V (V for Virtualization)
but only on 64bit versions.
10.In Windows Server 2008, Microsoft is introducing new features and technologies, some of
which were not available in Windows Server 2003 with Service Pack 1 (SP1), that will help to
reduce the power consumption of server and client operating systems, minimize environmental
byproducts, and increase server efficiency.
11.Microsoft Windows Server 2008 has been designed with energy efficiency in mind, to provide
customers with ready and convenient access to a number of new power-saving features. It
includes updated support for Advanced Configuration and Power Interface (ACPI) processor
power management (PPM) features, including support for processor performance states (P-states)
and processor idle sleep states on multiprocessor systems. These features simplify power
management in Windows Server 2008 (WS08) and can be managed easily across servers and
clients using Group Policies.
12. Many features are updated - as security, IIS and RODC.In security it enable outbound
firewall as well as inbound, IIS 7 release, Read only Domain controllers.
13.Virtualization
14.Server Core provides the minimum installation required to carry out a specific server role,
such as for a DHCP, DNS or print server.
15.Boot sequence is changed
16.Role-based installation or, services are known as role in it
17.Better security
18.Enhanced terminal services
19.Network Access Protection
20. Microsoft's system for ensuring that clients connecting to Server 2008 are patched, running
a firewall and in compliance with corporate security policies.
21.PowerShell
22. IIS
23. Bitlocker
24.System drive encryption can be a sensible security measure for servers located in remote
branch offices.More and more companies are seeing this as a way of reducing hardware costs by
2/9/2014 IT-Support: Difference Between Windows 2003 and Windows 2008 Server?
http://itgutss.blogspot.in/2011/04/difference-between-windows-2003-and.html 2/2
running several 'virtual' servers on one physical machine. If you like this exciting technology,
make sure that you buy an edition of Windows Server 2008 that includes Hyper-V, then launch
the Server Manger, add Roles.
Windows Server 2008, formerly codenamed Longhorn, is no leas than 45 times faster than its
predecessor, Windows Server 2003, in terms of network transfer speeds. Now whatever the
perspective is on Microsoft's last 32-bit server operating system, the fact of the matter is that faster
transfer speeds for of up to 45 times is quite an evolution compared to Windows Server 2003
25. Windows Aero
26.we can install windows 2008 server either in full version(install all services& applications) or
server core(only install minimal required services), but in 2003 we can only install fully O.S.
27.Windows server 2008 use Hyper-V application & Roles concept for better productivity but
server 2003 does not have such features.
28. Windows Server 2008, Active Directory has been renamed to Active Directory
DomainServices (AD DS). AD DS retains the tools, architectural design, and structure that were
introduced in Windows 2000 Server and Windows Server 2003, with some added improvements.
29.2003 was made to control XP networks.
30.2008 is made to control Vista networks.
31.The group policy and active directory schemas have been altered to include Vista polices.

Thursday, December 19, 2013

How to Shrink Partition in Windows Server 2003 for Free?

How to Shrink Partition in Windows Server 2003 for Free?

During the process of using computer, you may once encounter the following situations:
  1. The system volume (usually C drive) is in low space, which makes your machine run slowly or even crash;
  2. Your data are so much that you often feel at loss when finding a particular one or managing all of them;
  3. The built-in Disk Management does not have the function of resizing, and the complicated command line in diskpart.exe also could not give a good help.
What did you do at that time? Reinstall the system to get more space? Find or manage them really one by one? Or spend lots of time to remember the command and run the risk of putting them in?
If fact, the best solution is to generate unallocated space by shrinking some volumes to extend C drive or create more volumes. Question is how and via what to realize it. Searching on the internet and forums about shrinking partition in Server 2003, many kinds of software can be found. Indeed, each of them has its own merits, but considering the utility, integrity, security and availability, I recommend the server free partition software – AOMEI Partition Assistant Lite Edition.

Way to free shrink partition in Windows 2003

Background: Among the several volumes in your Windows 2003, there is no unallocated space, and drive C is 8G, drive D is 27.82G but with large space unused. Now you need to create a new drive with an unallocated space to store a new category of data, so to shrink partition D becomes your first choice. Then how to generate an unallocated space? Download server partition free tool and follow the steps below to reach your goal:
Step1: Install AOMEI Partition Assistant Lite Edition and launch it, in the main interface right click on D drive and select "Resize Partition".
Step2: Drag the slider bar leftward or set the particular size on your own in the box below to shrink partition D like in the screenshot, then click "Ok".
Shrink D Volume
Step3: Click "Apply" on the tool bar to save your changes after previewing them.
See? Only several simple steps, you can shrink the volume with ease. Besides, it is totally free of charge and you will not lose any data. Now download AOMEI Partition Assistant Lite Edition to free shrink partition in Windows 2003, and you can experience more features of it in person, such as extend volume, move, format, etc.

Windows 8 Activator - Windows 8 Product Key Free Download

Windows 8 Activator - Working windows 8 activator download [with proof]

With our windows 8 activator: You will get working windows 8 product key which enables you activate your windows 8 and have access to a wide range of Microsoft windows inbuilt locked-out features and function.


Windows 8 is the latest operating system developed by Microsoft and is launched few months ago. Microsoft has revamped the whole interface to interact with user. Windows 8 offers better power management, attractive interface, and instant start shutdown process.


Activation Proof


Windows 8 Activator Features:

- windows 8 product key included
- This activator works with all versions.
- Tested and working on both x86 and x64.
- Works in Virtual Environment.
- Works with dual-boot
- No key is needed for install or activation.
- The activation adds the OEM master key for you.
- "OEM" Brand is left up to end-user.
- No BIOS modification needed.
- It has no text during boot. (Vista activators had this)
- Uses OEM SLP method.
- Supports SLIC and non-SLIC enabled BIOS.
- Emulate a SLIC 2.1 enabled BIOS on a PC without SLIC 2.1 present...
- User friendly.
- Interface has a G.U.I for interaction.
- It is recommended to do a clean install of Windows 8 but not necessary as it has tested to work
with upgrades as well.
- You must remove all modifications made by previous 8 Loaders and Orbit30 Win8 Tool Kit (1.8
toolkit was for pre-RTM).
- Disable "UAC" to be safe.

How Activate you Windows8 OS
1. Run the 'windows 8 activator' on your Windows Partition
2. Select your desired "OEM" Brand
3. Wait for the pop-up to appear
4. Click "windows 8 activator"
5. Wait for the pop-up to appear
6. Press "OK" and PC will reboot once complete
- This activator has been put to the test by me & friends!
- Tested on clean installs.
- Tested on upgrades.
- Tested on all versions.
- Tested on both x86 / x64 Systems.
- Passed with flying colors !




Friday, November 22, 2013

Exchange Server 2007 Interview Questions & Answers

Microsoft Exchange Server 2007 Interview Questions & Answers

21. How Messages Get to Exchange from the Internet?
To follow the flow of messages in an Exchange 2007 environment with all of the various
Server roles, the following flow occurs:
  • An incoming message from the Internet first goes to the Edge Transport server.
  • The Edge Transport server performs first-level recipient validation as well as spam and virus filtering. The message is then passed on to the Hub Transport server.
  • The Hub Transport server performs compliance content assessment and then looks at the internal routing for messages and forwards the message to another Hub Transport server or directly to a Mailbox server.
  • The Mailbox server places the incoming message into the user’s mailbox and notifies the user that a message has arrived.
  • The user launches Outlook, OWA, their Windows Mobile device, or another client System and connects to the Client Access server. The Client Access server confirms the destination point of the user’s mailbox and provides the user access to their mailbox data.
  • In parallel, if a voice mail message comes in for a user, the Unified Messaging server processes the incoming voice message, and then takes the message and places the voice message into the user’s mailbox residing on the Mailbox server for the recipient.

22. What is Mail Exchange Record?
A mail exchange (MX) specifies a mail forwarder or delivery server for SMTP servers. MX records are the cornerstone of a successful Internet mail routing strategy.

23. File structures in exchange server 2007?
.CHK – check point file, keeps track of which transactional logs moves into database files. Keep on check the log file entering the database in a current order
.LOG - 2 types of transactional logs –
  • Current Transactional log – eoo.log file which write the current transactions into transactional logs. If it reaches 1 MB, it will rename the log file into E00000001.log
  • Transactional log – If Current Transactional log reaches 1 MB , it will rename the log file into E00000001.log

.EDB – Stores the database files
Temp.EDB – Temporary database file, which will process the transactional logs that are to be to write in .EDB Database file
.JRS – Reserved Log files – if the size of the disk is full and you can’t write any mails as transactional logs these files will help into action

24. Explain the difference between Exchange Management shell and windows Power shell?
The Exchange Management Shell is based on Microsoft Power Shell, which provides access to all .NET objects and classes. When the administrator installs Exchange Server 2007, the setup program automatically installs the .NET Framework and Power Shell. It also installs all the Exchange 2007 specific cmdlets.
The cmdlets were written by the Exchange 2007 team to perform Exchange-specific tasks.
There are over 350 cmdlets unique to Exchange and each cmdlet has its own set of help.

25. What is Viruses or Trojan horse messages?
Viruses have existed in the computer world long before the first email message was sent. However, just as email provides users with an easy method of communication, it also is an extremely efficient method of spreading malicious or troublesome code. Once considered the largest problem that email administrators had to face, viruses have been combated by an entire industry devoted to their prevention.

26. What is Spam?
The proliferation of unsolicited messages, often referred to as “spam” mail, has truly become the bane of the messaging world with recent estimates stating that spam accounts for 85%–90% of the messaging traffic on the Internet today. These unsolicited, usually unwanted, and often offensive advertisements cost companies and users billions of dollars annually in lost time and productivity. Unfortunately, because sending bulk messages to thousands (or millions) of recipients can be accomplished with very little expense, offending companies do not need a large response to maintain profitability. It is sad to note that as long as this method of advertising is profitable and effective, spam will be with us to stay. Fortunately, Exchange 2007 has several features to help alleviate the problem.

27. What is Address spoofing?
One tool that is commonly used by the distributors of both viruses and spam is known as address spoofing. By changing the From line in a Simple Mail Transfer Protocol (SMTP) message, users can often be fooled into opening a message that they think is from a friend or co-worker, only to find that the message originated somewhere else entirely. This method has been especially effective in the distribution of email worms. Because the message appears to come from a known associate, and often has an intriguing Subject line, the unwitting recipient opens the message and, if not properly protected, becomes a distributor of the virus to others.

28. What is Phishing?
Over the past several years, a relatively new type of fraudulent email has emerged. Known as phishing, this attack comes in the form of an official looking email message, often appearing to be from a reputable organization, such as a credit card company or a large electronics retailer. The message usually contains a link that, once clicked, brings up an official looking website—often an exact replica of the official site that is being mimicked. However, the fraudulent site has one purpose, to fool you into giving away personal information, such as passwords, credit card numbers, or Social Security numbers. With this information in hand, the offending party can steal your identity, make charges to your credit card, or otherwise profit from your loss.
29. What are the planning considerations in installing Edge transport Server?
  • Edge Transport Should not be included in Active Directory
  • Should be installed in a Standalone Server
  • Edge Transport Should not be Part of the domain
  • ADAM Should be installed
  • Prerequisites .Net framework, Windows Management Shell, MMC 3.0 to be installed
  • Two networks cards

30. What are the options available in Edge transport Server to configure?
  • Anti Spam / Anti Virus
  • Transport Rules and Accepted Domain
  • Address Rewriting

31. What is Edge Sync in Exchange Server 2007?
Edge Sync – it’s a one way replication from Hub Transport Server to Edge Transport Server, while Edge Sync happens the recipient configuration will be replicated from Active Directory to ADAM in Edge Transport Server

32. What is Address Rewriting?
Address Rewriting Agent runs in Edge Transport Server. The main purpose of Edge Transport Server is to rewrite the Address the address to some other address. This plays an important role, consider if there are 5 Sub domain inside a forest and the entire sub domain want send mail outside with a unique address space.

33. What happen if mails come into exchange server?
Once the mail comes into the exchange server it writes the mails as transactional logs and also the same in system memory simultaneously. What the transactional log will do in the sense, it will hold the mails for a while until the mailbox database is freed up. The transactional logs are 1 MB in size and if the mail comes with size of 5 MB, the transaction log will first write the 1Mb log and creates a another transactional log, it will write the log files until the mails have completed.

34. Suggest a good Storage solution for Exchange Server?
Operating System: System files to be backed up. RAID 0 or RAID1
Database Files: if we move the database to different disk and if you are making backup the transactional logs will be added into the Backup. Provides better recoverability, RAID5 (Stripe set with Parity)
Transactional Log Files: in order to handle load, it’s good to have Transactional log files in different disk. If both the log file and database file are in same disk, increase performance and reliability. RAID1 (Mirroring)

35. What are the preparation switches used in while installing exchange Server 2007? Why?
  • /prepare legacy exchange permissions – when we are having exchange 2000 or 2003 in our existing environment
  • /prepare schema – this will add various objects and attributes related to that object
  • /prepare AD – prepare the current domain and prepare a universal security group for the new exchange 2007 installation
  • /prepare domain “domain name”– only in the domain on the remote sites, or in the different domain going to have Exchange Server 2007

<< Page 1

Exchange Server 2007 Interview Questions & Answers

Microsoft Exchange Server 2007 Interview Questions & Answers

1. What are the same between Exchange Server 2000/2003 and Exchange Server 2007?

  • Core infrastructure of Exchange Server 2000/2003 versus Exchange Server 2007 is same, both are using the same JET EDB database as the database store.
  • Exchange Server 2007 still has the concept of a Mailbox Server where EDBs are stored: Storage Groups remain the same where databases are created.
  • Users can use the Microsoft Outlook client and can access Exchange using OWA.
  • Exchange Server 2007 still uses the VSS Backup application programming interface (API) to freeze the state of the Exchange database to perform a backup of the Exchange database.
2. What's missing in Exchange Server 2007, that was in previous versions? 

  • The STM database introduced in Exchange Server 2000 has been removed, Microsoft incorporated the streaming database into a new single EDB database file.
  • From administration point, Administrative Group and Routing Group introduced in Exchange Server 2000 have removed.
  • Microsoft noted that Public Folder is deemphasized in Exchange Server 2007. Not completely removed. Replaced by SharePoint Server 2007.
  • New Exchange Administration Tool.
  • Exchange Scripting Language.
  • Removal of Front-End and Bridgehead Servers with new server roles.
  • Runs on x64 bit platform.
3. What's new in Exchange Management Console?
EMC looks similar to Exchange Server Manager ; Exchange Server 2007 now organizes objects as a whole. Administrator can see all users, all servers, and all resources in the Exchange organization in a single view. The Exchange Administrator can regroup users, computers, and resources into smaller delegation groups.

4. What are the security features introduced in Exchange Server 2007?
  • Edge Transport Server – placed on the Edge of the Network replaced the Frontend server, functionalities includes virus and spam blocking, perform antivirus and anti spam filtering, and route the messages internal to the organization.
  • Hub Transport Server – replaced the bridgehead server act as a policy compliance server,
  • TLS – includes server to server Transport Layer Security for server – server message transport with a secured manner. It’s an Encryption technology.
  • Encryption – by default Exchange 2007 encrypts the content between exchange server 2007 and outlook 2007 client. Provides full support for certificate based PKI.
5. Name the reliable and recoverable features in Exchange server 2007?
Exchange 2007 holds to copies of user information in the network with the help of reliable and recoverability features introduced.
  • Local Continuous Replication – Two copies of user information in another drive (same server)
  • Cluster continuous Replication – holds the replication of information across the server
  • Single Copy Cluster – configured in SAN, DAS, and ISCSI etc. NAS not supported
  • Snapshot Backup – supported by third party vendors
6. What is Exchange Management Shell?
It is a command line utility introduced in Exchange server 2007, which provides an administrator the ability to configure, administer, and manage an Exchange 2007 server environment using text commands instead of solely a graphical user interface (GUI).

7. Name the Exchange server 2007 Roles?
  • Edge Transport Server Role – Function as firewall, providing Anti Spam and Anti virus protection for Exchange
  • Hub Transport Server Role – replaced the bridgehead server, handles message routing
  • Client Access Server Role – introduced newly, handles the client connection, function as Front end Server
  • Mailbox Server Role – replaced the Backend server, holds the mailboxes and Public Folder Database
  • Unified Messaging Server Role – messaging solution for mobile devices, OVA etc

8. Explain Edge Transport Role?
The Edge Transport Server Role is to transfer mails from inside of your organization to the outside world. This role installed on the edge of your network (perimeter Network). Main purpose is to prevent your exchange server from all kinds of Attack. Must have ports 25 (SMTP) and 50636 (LDAPS) open from it to the hub transport server on the internal LAN.  Port 25 is to send mail in.  Port 50636 is to replicate the Exchange information that it needs, such as changes to users’ safe and blocked senders lists

9. Explain Hub Transport Role?
The Main Purpose of the Hub Transport Server Role is to transfer the mails throughout you exchange, This server role is responsible for internal mail flow, This Server role replace the bridge head servers of Exchange server 2003. This can be used as an edge transport server in Smaller Organization. This must be the first role installed in Exchange 2007.  You can install the client access server role and the mailbox server role at the same time as the hub transport role, but not before.

10. Explain Client Access Server Role?
The role that handles client requests for OWA, Outlook Anywhere, ActiveSync, OVA and offline address book distribution. This role must be installed after the hub transport role and before the mailbox server role.  You can install the mailbox server role at the same time as the client access role, but not before.


11. Explain Mailbox Server Role?
Mailbox Server holds the Mailbox database and Public folder databases for your organization. It only retains the mailbox and it won’t transfer your mails. Transferring mails between your mailbox server are handled by Hub Transport servers. The mailbox server roles will be introduced only after the installation of Hub Transport Server and Client Access Server Roles. If we are installing Mailbox server with the clustering options Like CCR, SCC, or SCR, then no other server roles to be installed with this server role.

12. Explain Unified Messaging Server Role?
Functions as the interface point for the VOIP gateway or IP-PBX phone system. This Role uses the user mailboxes to be the single point for storage and access of voice mail and fax messages, in addition to their normal email.

13. Difference between Standard and Enterprise edition of Exchange server
If we choose Enterprise Edition, We can have
Exchange Server 2007
50 storage group / 5 Database in single storage group – Maximum of 50 Database, Recommended having 1 database per storage group

Exchange Server 2003
4 Storage Groups / 5 Database in single Storage group – Mailbox database and Public Folder Database can be combined

If we choose Standard Edition, We can have
Exchange Server 2007
5 storage group / 5 Database in single storage group – Maximum of 50 Database, Recommended having 1 database per storage group

Exchange Server 2003
1 storage group / 2 Database (Mailbox & public folder database) in single storage group – In which contain 1 Mailbox Database and 1 Public Folder Database

14. What are the supportable client connections available in Client Access Server?
  • Outlook Web Access (OWA)
  • Exchange ActiveSync
  • Outlook Anywhere (formerly RPC over HTTP)
  • Post Office Protocol 3 (POP3)
  • Internet Message Access Protocol (IMAP4)

15. What are the two special services available in CAS?
Auto discover service—The Auto discover service allows clients to determine their Synchronization settings (such as Mailbox server and so on) by entering in their SMTP address and their credentials. It is supported across standard OWA connections.
Availability service—The Availability service is the replacement for Free/Busy functionality in Exchange 2000/2003. It is responsible for making a user’s calendar availability visible to other users making meeting requests.

16. What is OWA?
OWA is to access the mail via browser from outside the corporate network. The Outlook Web Access (OWA) client is now nearly indistinguishable from the full Outlook client. The one major component missing is offline capability, but nearly every other Outlook functionality is part of OWA.

17. What is Exchange Active sync?
ActiveSync provides for synchronized access to email from a handheld device, such as a Pocket PC or other Windows Mobile device. It allows for real-time send and receives functionality to and from the handheld, through the use of push technology.

18. What is Outlook Anywhere?
Outlook Anywhere (previously known as RPC over HTTP) is a method by which a full Outlook client can dynamically send and receive messages directly from an Exchange server over an HTTP or Hypertext Transfer Protocol Secure (HTTPS) web connection. This allows for virtual private network (VPN)–free access to Exchange data, over a secured HTTPS connection.

19. What is POP3?
The Post Office Protocol 3 (POP3) is a legacy protocol that is supported in Exchange 2007. POP3 enables simple retrieval of mail data via applications that use the POP3 protocol. Mail messages, however, cannot be sent with POP3 and must use the SMTP engine in Exchange. By default, POP3 is not turned on and must be explicitly activated.

20. What is IMAP4?

Legacy Interactive Mail Access Protocol (IMAP) access to Exchange is also available, which can enable an Exchange server to be accessed via IMAP applications, such as some UNIX mail clients. As with the POP3 protocol, IMAP support must be explicitly turned on.


Friday, November 8, 2013

Top 5 Best Free Windows Backup Software

It is critical to have backup your laptop and desktops regularly. These are the 5 best free Windows backyp software.

1. GFI Backup



GFI is used professionally due to its built-in VSS services. Backing up is faster and simpler because it has the capacity to volume shadow copy. You can also auto notify yourself after the backup.

Pros: Scheduled Backup, Backup to FTP, Network Drive, Edternal Drive, Unlimited Backup Size, Compressed/Encrypted Backup, True Incremental Backups.
Cons: Does not do true remote backup via IP and does not run backup as services.
OS: All versions of Windows including Windows 7.

2. Cobian Backup
Cobian is among the favorite Windows 7 backup softwares because of its tool selection and efficiency.

Pros: Scheduled Backup, Backup to FTP, Network Drive, Edternal Drive, Unlimited Backup Size, Compressed/Encrypted Backup.
Cons: Cannot do the following: Synchronize 2 PCs, verify backkup.
OS: All versions of Windows (Both 32 and 64 bits Windows)

3. FBackup 

FBackup is absolutely free and can be used for personal and commercial files. It backs up automatically to your USB or Firewire device in either local or nerwork location. You may opt to compress the file in zip format or copy it as is.

Pros: Automatically backs up files, free, can store zip files or exact copies, easy to use, multi-language.
Cons: Basic Backup System
OS: All versions of Windows (both 32 and 64 bits Windows)

4. EASEUS Todo Backup
 The freeware version of Easeus backup software has pretty much all the things you would need to take a backup of your windos system.

Pros: This can backup image, disk partition, files, folders, easy diaster recovery option to recover your lost files quickly.
Cons: Some of the advanced features are available only in the professional version.
OS: All versions of Windows.

5. Comodo Backup 

Comodo is perfect for beginners and advanced users of Windows. It is a basic but reliable backup system.

Pros: Scheduled Backup, Backup to FTP, Network Drive, Edternal Drive, Unlimited Backup Size, Compressed/Encrypted Backup, email notifications.
Cons: Cannot do the following: true remote backup, run backup as service, volume shadow copy, sysnchronize 2 PCs, verify backup.
OS: All versions of Windows.

Thursday, October 31, 2013

SQL SERVER Interview Questions | SQL SERVER – Interview Questions and Answers – Frequently Asked Questions (Page-III)

SQL SERVER Interview Questions | SQL SERVER – Interview Questions and Answers – Frequently Asked Questions 
(Page-III)

41. What is a view?
A view is simply a virtual table that is made up of elements of multiple physical or “real” tables. Views are most commonly used to join multiple tables together, or control access to any tables existing in background server processes.


42. What is a Query Execution Plan?
SQL Server has several built-in tools that optimize how queries are executed within their databases. A query execution plan is exactly what it sounds like – a snapshot of how the optimizing tools will execute and deploy specific queries within the database. This service helps you troubleshoot problems with jobs that don’t necessarily execute perfectly.

43. What is the default port number for SQL Server?
While this is kind of a softball question – if you know anything about SQL Server you should at least know the basic configuration options – it’s an important one to nail in the interview. Basically, when SQL Server is enabled the server instant listens to the TCP port 1433.

44. What is RDBMS?
Relational Data Base Management Systems (RDBMS) are database management systems that maintain data records and indices in tables. Relationships may be created and maintained across and among the data and tables. In a relational database, relationships between data items are expressed by means of tables. Interdependencies among these tables are expressed by data values rather than by pointers. This allows a high degree of data independence. An RDBMS has the capability to recombine the data items from different files, providing powerful tools for data usage.

45. What are the Properties of the Relational Tables?
Relational tables have the following six properties:
Values are atomic.
Column values are of the same kind.
Each row is unique.
The sequence of columns is insignificant.
The sequence of rows is insignificant.
Each column must have a unique name.

46.What is Normalization?
Database normalization is a data design and organization process applied to data structures based on rules that help building relational databases. In relational database design, the process of organizing data to minimize redundancy is called normalization. Normalization usually involves dividing a database into two or more tables and defining relationships between the tables. The objective is to isolate data so that additions, deletions, and modifications of a field can be made in just one table and then propagated through the rest of the database via the defined relationships.

47. What is De-normalization?
De-normalization is the process of attempting to optimize the performance of a database by adding redundant data. It is sometimes necessary because current DBMSs implement the relational model poorly. A true relational DBMS would allow for a fully normalized database at the logical level, while providing physical storage of data that is tuned for high performance. De-normalization is a technique to move from higher to lower normal forms of database modeling in order to speed up database access.

48.How is ACID property related to Database?
ACID (an acronym for Atomicity Consistency Isolation Durability) is a concept that Database Professionals generally look for while evaluating databases and application architectures. For a reliable database, all this four attributes should be achieved.
Atomicity is an all-or-none proposition.
Consistency guarantees that a transaction never leaves your database in a half-finished state.
Isolation keeps transactions separated from each other until they are finished.
Durability guarantees that the database will keep track of pending changes in such a way that the server can recover from an abnormal termination.

49.What are the Different Normalization Forms?
1NF: Eliminate Repeating Groups
Make a separate table for each set of related attributes, and give each table a primary key. Each field contains at most one value from its attribute domain.
2NF: Eliminate Redundant Data
If an attribute depends on only part of a multi-valued key, then remove it to a separate table.
3NF: Eliminate Columns Not Dependent On Key
If attributes do not contribute to a description of the key, then remove them to a separate table. All attributes must be directly dependent on the primary key.
BCNF: Boyce-Codd Normal Form
If there are non-trivial dependencies between candidate key attributes, then separate them out into distinct tables.
4NF: Isolate Independent Multiple Relationships
No table may contain two or more 1:n or n:m relationships that are not directly related.
5NF: Isolate Semantically Related Multiple Relationships
There may be practical constrains on information that justify separating logically related many-to-many relationships.
ONF: Optimal Normal Form
A model limited to only simple (elemental) facts, as expressed in Object Role Model notation.
DKNF: Domain-Key Normal Form
A model free from all modification anomalies is said to be in DKNF.
Remember, these normalization guidelines are cumulative. For a database to be in 3NF, it must first fulfill all the criteria of a 2NF and 1NF database.

50. What is a Stored Procedure?
A stored procedure is a named group of SQL statements that have been previously created and stored in the server database. Stored procedures accept input parameters so that a single procedure can be used over the network by several clients using different input data. And when the procedure is modified, all clients automatically get the new version. Stored procedures reduce network traffic and improve performance. Stored procedures can be used to help ensure the integrity of the database.
e.g. sp_helpdb, sp_renamedb, sp_depends etc.

Saturday, October 26, 2013

SQL SERVER Interview Questions | SQL SERVER – Interview Questions and Answers – Frequently Asked Questions (Page-II)

SQL SERVER Interview Questions | SQL SERVER – Interview Questions and Answers – Frequently Asked Questions (Page-II)



21. What is PRIMARY KEY?
A PRIMARY KEY constraint is a unique identifier for a row within a database table. Every table should have a primary key constraint to uniquely identify each row and only one primary key constraint can be created for each table. The primary key constraints are used to enforce entity integrity.

22. What is UNIQUE KEY constraint?
A UNIQUE constraint enforces the uniqueness of the values in a set of columns, so no duplicate values are entered. The unique key constraints are used to enforce entity integrity as the primary key constraints.

23. What is FOREIGN KEY?
A FOREIGN KEY constraint prevents any actions that would destroy links between tables with the corresponding data values. A foreign key in one table points to a primary key in another table. Foreign keys prevent actions that would leave rows with foreign key values when there are no primary keys with that value. The foreign key constraints are used to enforce referential integrity.

24. What is CHECK Constraint?
A CHECK constraint is used to limit the values that can be placed in a column. The check constraints are used to enforce domain integrity.

25. What is NOT NULL Constraint?
A NOT NULL constraint enforces that the column will not accept null values. The not null constraints are used to enforce domain integrity, as the check constraints.

26. How to get @@ERROR and @@ROWCOUNT at the same time?
If @@Rowcount is checked after Error checking statement then it will have 0 as the value of @@Recordcount as it would have been reset. And if @@Recordcount is checked before the error-checking statement then @@Error would get reset. To get @@error and @@rowcount at the same time do both in same statement and store them in local variable.
SELECT @RC = @@ROWCOUNT, @ER = @@ERROR

27. What is a Scheduled Jobs or What is a Scheduled Tasks?
Scheduled tasks let user automate processes that run on regular or predictable cycles. User can schedule administrative tasks, such as cube processing, to run during times of slow business activity. User can also determine the order in which tasks run by creating job steps within a SQL Server Agent job. E.g. back up database, Update Stats of Tables. Job steps give user control over flow of execution. If one job fails, user can configure SQL Server Agent to continue to run the remaining tasks or to stop execution.

28. What are the advantages of using Stored Procedures?
1.    Stored procedure can reduced network traffic and latency, boosting application performance.
2.    Stored procedure execution plans can be reused, staying cached in SQL Server's memory, reducing server overhead.
3.    Stored procedures help promote code reuse.
4.    Stored procedures can encapsulate logic. You can change stored procedure code without affecting clients.
5.    Stored procedures provide better security to your data.

29. What is a table called, if it has neither Cluster nor Non-cluster Index? What is it used for?
Unindexed table or Heap. Microsoft Press Books and Book on Line (BOL) refers it as Heap. A heap is a table that does not have a clustered index and, therefore, the pages are not linked by pointers. The IAM pages are the only structures that link the pages in a table together. Unindexed tables are good for fast storing of data. Many times it is better to drop all indexes from table and then do bulk of inserts and to restore those indexes after that.

30. Can SQL Servers linked to other servers like Oracle?
SQL Server can be linked to any server provided it has OLE-DB provider from Microsoft to allow a link. E.g. Oracle has an OLE-DB provider for oracle that Microsoft provides to add it as linked server to SQL Server group.

31. What is BCP? When does it used?
BulkCopy is a tool used to copy huge amount of data from tables and views. BCP does not copy the structures same as source to destination. BULK INSERT command helps to import a data file into a database table or view in a user-specified format.

32. How to implement one-to-one, one-to-many and many-to-many relationships while designing tables?
One-to-One relationship can be implemented as a single table and rarely as two tables with primary and foreign key relationships. One-to-Many relationships are implemented by splitting the data into two tables with primary key and foreign key relationships. Many-to-Many relationships are implemented using a junction table with the keys from both the tables forming the composite primary key of the junction table.

33. What is an execution plan? When would you use it? How would you view the execution plan?

An execution plan is basically a road map that graphically or textually shows the data retrieval methods chosen by the SQL Server query optimizer for a stored procedure or ad- hoc query and is a very useful tool for a developer to understand the performance characteristics of a query or stored procedure since the plan is the one that SQL Server will place in its cache and use to execute the stored procedure or query. From within Query Analyzer is an option called "Show Execution Plan" (located on the Query drop-down menu). If this option is turned on it will display query execution plan in separate window when query is ran again.

34. What are DMVs?
Dynamic Management Views (DMVs), are functions that give you information on the state of the server. DMVs, for the most part, are used to monitor the health of a server. They really just give you a snapshot of what’s going on inside the server. They let you monitor the health of a server instance, troubleshoot major problems and tune the server to increase performance.

35. Define a temp table
In a nutshell, a temp table is a temporary storage structure. What does that mean? Basically, you can use a temp table to store data temporarily so you can manipulate and change it before it reaches its destination format.

36. What’s the difference between a local  temp table and a global temp table?
Local tables are accessible to a current user connected to the server. These tables disappear once the user has disconnected from the server. Global temp tables, on the other hand, are available to all users regardless of the connection. These tables stay active until all the global connections are closed.

37. How do you use transactions?
In general, there are three types of transactions that you can use in the SQL Server environment: BEGIN TRANSACTION, ROLL BACK TRANSACTION and COMMIT TRANSACTION. The gist behind deploying transactions is that they allow you to group multiple SQL commands into a single unit. From there, each transaction begins with a certain task, and ends when all the tasks within the transaction are complete. BEGIN TRANSACTION gets the ball rolling. ROLLBACK TRANSACTION functions a lot like an “undo” command, and COMMIT TRANSACTION completes all of the tasks within that transaction.

38. What’s the difference between a clustered and a non-clustered index?
A clustered index directly affects the way tabled data is stored on a specific disk. This means that when a clustered index is used, data is stored in sequential rows based on the index column value. This is why a table can only contain a single clustered index. Non-clustered indexes directly affect the way physical data is stored and managed within SQL Server.

39. What are DBCC commands?
In very basic terms the Database Consistency Checker (DBCC) is used to aid in server maintenance. DBCC commands, many of which are completely undocumented, provide a set of commands that let you perform routing maintenance, status and validation checks. The most common DBCC commands are: DBCC CHECKALLOC (Lets you check disk allocation); DBCC OPENTRAN (Lets you check any open transactions); and DBCC HELP (shows a list of available DBCC commands to aid your server maintenance processes).

40. Describe the difference between truncate and delete.
The difference between these two processes is fairly simple. Truncate means to simply empty out a table. On the other hand, the delete command lets you delete entire rows from within a table, but not all of the data within that table.

<< Page - I