NAME

Question types


Start with


Question limit

of 141 available terms

Print test

138 Matching questions

  1. Pause
  2. HASHED option
  3. Single, can be
  4. Can, trigger
  5. -n option
  6. I/O affinity task
  7. -E option
  8. Windows, SQL Server
  9. Database Engine service
  10. Database, SMTP
  11. CHECK_POLICY option
  12. sp_help_jobcount
  13. Aggregate monitoring of sessions
  14. Explicit transaction
  15. MUST_CHANGE option
  16. One, Browser
  17. REPEATABLE READ
  18. Table hints
  19. sysadmin,
    serveradmin
    securityadmin
    processadmin
    setupadmin
    bulkadmin
    diskadmin
    dbcreator
    public
  20. sp_start_job
  21. securityadmin role
  22. TSQL_Duration Template
  23. TABLOCKX hint
  24. Authentication, user session
  25. Right-click, Properties
  26. SQL Server Profiler
  27. ALTER RESOURCE GOVERNOR RECONFIGURE, Management node
  28. Cannot, Agent
  29. TSQL Template
  30. CREATE CREDENTIAL, Management Studio
  31. Dynamically, CPU
  32. Affinity mask, affinity I/O mask
  33. Off, SNAPSHOT
  34. Latches
  35. Schemas
  36. Credentials
  37. View, Resource Governor
  38. 5
  39. Resource pool
  40. Does not, implicit
  41. -s option
  42. ROWLOCK hint
  43. SERIALIZABLE
  44. -c option
  45. Older applications, third-party, mixed operating systems
  46. Locks
  47. UPDLOCK hint
  48. diskadmin role
  49. sp_help_jobactivity
  50. Cannot
  51. migrating, server
  52. WINDOWS option
  53. Compatibility
  54. Cannot, credential
  55. Should, dynamically
  56. SQL Server Agent, automation
  57. CREATE WORKLOAD GROUP, ALTER RESOURCE GOVERNOR RECONFIGURE
  58. Are mutually
  59. COMMIT TRANSACTION
  60. 9
  61. Standard Template
  62. Management, resource pools
  63. 100
  64. affinity masks
  65. ALTER DATABASE statement
  66. User must change password at next login
    Enforce password expiration
    Enforce password policy
  67. processadmin role
  68. Query Window
  69. TSQL_SPs Template
  70. dbcreator role
  71. Autocommit mode
  72. Resource Governor
  73. ROWLOCK, PAGLOCK, TABLOCK
  74. SQL Mail
  75. CREATE TRIGGER statement
  76. Database Mail or SQL Mail
  77. Lower
  78. Configuration values, -f
  79. Standard, TSQL, TSQL_Duration, TSQL_Grouped, TSQL_SPs
  80. Client Application Name
  81. Management Studio
  82. Event class, trace
  83. setupadmin role
  84. sysadmin role
  85. On, default
  86. TABLOCK hint
  87. -f option
  88. Implicit transaction mode
  89. Memory, memory
  90. The Standard Template
  91. RECONFIGURE or RECONFIGURE WITH OVERRIDE statements
  92. Workload Groups
  93. -m option
  94. File system, filegroups
  95. Management Studio, sp_configure
  96. Can, user-defined
  97. sys.dm_tran_locks
  98. serveradmin role
  99. More restricted
  100. ROLLBACK TRANSACTION statement
  101. One, isolation
  102. Increase concurrency and improve performance
  103. Don't have
  104. SET IMPLICIT_TRANSACTIONS OFF
  105. Transaction Isolation Levels
  106. TSQL_Grouped Template
  107. .trc extension
  108. sp_configure, all, GUI, most commonly
  109. SNAPSHOT
  110. BEGIN TRANSACTION, SET IMPLICIT_TRANSACTIONS
  111. Cannot, public
  112. RECONFIGURE statement
  113. sp_get_schedule_description
  114. Default TCP port
  115. sysjobs_view
  116. Public
  117. CHECK_EXPIRATION option
  118. sp_update_job
  119. SQL Server Agent
  120. Performance bottlenecks
  121. Logon Triggers
  122. sp_configure
  123. bulkadmin role
  124. ALTER SERVER CONFIGURATION, PROCESS AFFINITY
  125. Script Login
  126. SQL Server Browser
  127. READ COMMITTED
  128. XLOCK
  129. Reporting Services Configuration Manager
  130. Management Studio, CREATE LOGIN
  131. Off, default
  132. -g option
  133. SET statement
  134. Pausing, does not
  135. CREATE RESOURCE POOL, ALTER RESOURCE GOVERNOR RECONFIGURE
  136. SET TRANSACTION ISOLATION LEVEL
  137. READ UNCOMMITTED level
  138. SQL Server Configuration Manager
  1. a You ____ remove someone from the ____ server role.
  2. b Capture statements submitted and their execution time. Used to identify the slower queries.
  3. c The difference between the Management Studio GUI and sp_configure is while ____ allows access to ____ options the ____ contains the ____ used server configuration options.
  4. d Granted the permission to end processes that are running.
  5. e ____ is the biggest advantage of SQL Server Authentication
  6. f Allows you to increase the number of extents allocated for each file in a filegroup.
  7. g The ____ statement, practically, marks the end of a successful implicit or explicit transaction.
  8. h Used to produce a count on how many jobs a schedule is tied to.
  9. i Another statement ____ need to be written to mark the start of a new ____ transaction.
  10. j Tell whether password expiration policy should be enforced on that login
  11. k ____ and ____ are the two statements that can end Autocommit mode.
  12. l Captures all T-SQL statements submitted by clients and the time issued. Used for debugging client applications.
  13. m Captures detailed information about the executing stored procedures. Used to get information about stored procedures that are executed.
  14. n You can query ____ to find out if there are many locks outstanding.
  15. o Used to instruct SQL Server Agent to make changes to a job
  16. p Using the ____ statement or Right-clicking on it in the ____ of the Management Studio and selecting Enable are the two ways can you enable the Resource Governor.
  17. q Disallows the use of Windows application log to record events.
  18. r Granted the permission to change server-wide configuration options and shut down the server
  19. s SQL Server ____ be allowed to adjust and use memory ____.
  20. t ____ is the default template for SQL Server Profiler.
  21. u ____ is the default state of READ_COMMITTED ____.
  22. v ____ are the predefined templates for SQL Server Profiler (5)
  23. w A mode that means every T-SQL statement will be committed or rolled back when it is completed.
  24. x You can reconfigure Resource Governor in Management Studio Under ____ - Template Explorer - ____ - Configure Resource Governor.
  25. y Triggers that can fire stored procedures when a LOGON event is raised.
  26. z Removes all data modifications made and rolls back to the beginning of the transaction
  27. aa There ____ be more than one ____ defined on the LOGON event.
  28. ab The executable process of the SQL Server Database Engine.
  29. ac Will not issue shared locks. They are not blocked by exclusive locks, and it means dirty reads.
  30. ad Used for starting an instance with minimal configuration.
  31. ae Granted the permission to manage disk files.
  32. af Definitions of the types of locks that can be acquired on read operations.
  33. ag ____ is the statement that will end implicit transaction mode.
  34. ah Used to find out further information on the various jobs
  35. ai You can reconfigure the ____ while configuring the Resource Governor.
  36. aj You need ____ SQL Server ____ for all SQL Server instances installed on the same server.
  37. ak You will prevent new users from connecting to the Database Engine if you ____ it.
  38. al ____ is the ____ state for the CHECK-EXPIRATION option.
  39. am ____ is the T-SQL statement used for transaction isolation levels.
  40. an You can use ____ to apply locks when you select, modify or insert rows.
  41. ao An option in Management Studio, allows you to script a login
  42. ap More than a ____ instance of SQL server ____ installed at a time.
  43. aq A transaction can only recognize data modifications committed prior to the start of the transaction. Modifications made after the start will be invisible.
  44. ar In the ____, in files, and often group into ____ is how databases are stored
  45. as Used for assigning processors to specific threads.
  46. at You ____ create ____ server level roles.
  47. au The ____ email system is depreciated.
  48. av Statements cannot read data that has been changed but not yet committed.
  49. aw ____ the Database Engine service ____ remove users currently connected.
  50. ax The sums of the minimum CPU and minimum memory percentages for all available resource polls cannot go over ____ percent.
  51. ay The acquired lock is to be applied at the table level
  52. az The ____ is how you make changes to the current user session only.
  53. ba The ____ or ____ statement are two ways to configure logins and their passwords.
  54. bb There can be ____ transaction ____ levels set at a time.
  55. bc To set up ____ Mail you would configure one or more databases as mail hosts and then define client settings so SQL Server Agent can send message via ____ mail server
  56. bd Workload groups located under the ____ node - ____ in Management Studio.
  57. be Provides an identity outside of the SQL Server. Can be mapped to more than one login.
  58. bf The ____ is how you change Database level settings.
  59. bg A Windows service that listens for incoming requests.
  60. bh Used to produce information on the status of a job run
  61. bi Granted the permission to create, alter, drop and restore any database. They cannot alter others databases.
  62. bj The ____ or ____ is how you change memory options manually.
  63. bk ____ are the fixed Server Level Roles provided by SQL Server. (9)
  64. bl Used to extract and read the job schedule.
  65. bm Used to utilize captured traces, and capture and save data to analyze later. Can also create templates to define event classes and data columns
  66. bn Used to show or change server-level settings
  67. bo You can configure processor affinity options in SQL Server 2012 by using the ____ statement and then the ____ argument.
  68. bp The ____ can be used in real time.
  69. bq Used to prevent concurrent use of a resource by multiple different transactions
  70. br Allows you to start only a named instance of SQL Server
  71. bs Minimizing locks will ____.
  72. bt ____ is what is started with the SET IMPLICIT_TRANSACTIONS statement.
  73. bu You create a logon trigger with the ____.
  74. bv There are ____ fixed Server Level Roles in SQL Server
  75. bw ____ then ____ are the two T-SQL statements that are needed for creating resource pools.
  76. bx Permissions ____ be changed for fixed Server Level Roles.
  77. by You would use ____ for database ____. Designed for processing alerts, and running scheduled jobs. Can also send out relevant alerts and notifications through email
  78. bz Provides a basic editor to write T-SQL statements/scripts
  79. ca The primary interface for managing the databases.
  80. cb ____ are the hints that XLOCK can be specified with.
  81. cc ____ are the optional password policies available. (3)
  82. cd 1433
  83. ce The max CPU percentage cannot be ____ than the min CPU percentage.
  84. cf Used for directly affecting the I/O affinity mask.
  85. cg Used to configure and manage the reporting services.
  86. ch Update locks that are held in place until a transaction is completed.
  87. ci Object ownership groups
  88. cj Granted the permission to manage logins and their properties, as well as GRANT, DENY, and REVOKE permissions at server-level, and if they have access to database-level permissions. They can reset passwords
  89. ck ____ is the kind of transaction started with the BEGIN TRANSACTION statement.
  90. cl The HASHED argument should be used only when ____ databases from one ____ to another.
  91. cm The affinity mask can be configured without a restart with the ____.
  92. cn Used to manage the SQL server instances and set up the clients/client protocols.
  93. co Every log in belongs to the ____ server role.
  94. cp Internal SQL Server resource locks related to user activity and resource usage.
  95. cq ____ statement or ____ are two ways to set up credentials.
  96. cr The max ____ percentage cannot be lower than the min ____ percentage.
  97. cs A Windows service that executes scheduled administrative tasks.
  98. ct Used for shortening the startup time when starting SQL Server from the command prompt
  99. cu Says the Windows password policies of the local server computer should be enforced on this particular login.
  100. cv You ____ to use the Query Window in order to write T-SQL.
  101. cw Granted the permission to preform any activity in the server
  102. cx Specifics that the password that follows the PASSWORD argument is already hashed
  103. cy Granted the permission to add or removed linked servers
  104. cz Specifies that the login is to be mapped to a Windows login
  105. da Has the server prompt the user for a new password on their first login with that password
  106. db You would use workload groups to ____.
  107. dc Captures all the stored procedures and T-SQL batches that are run. Used to monitor the general database server activities
  108. dd ____ are the two email systems SQL Server Agent can use to send emails.
  109. de The CPU and I/O affinities ____ exclusive.
  110. df Granted the permission to execute the BULK INSERT statement
  111. dg Allows you to limit connections to a specified client application
  112. dh Produces the same effect as setting HOLDLOCK on all tables in the SELECT statement.
  113. di Captures all statements submitted with information grouped by the client that submitted it. Use it to investigate queries from specific clients.
  114. dj Applies exclusive locks
  115. dk ____ and ____ are the two T-SQL statements that are needed to make a new workload group,
  116. dl The row locks are to be taken
  117. dm READ COMMITTED is ____ than READ UNCOMMITTED.
  118. dn Locks commonly cause ____.
  119. do ____ instances that you can monitor in the ____ process are what captured events in the Database Engine become.
  120. dp You ____ pause the SQL Server ____.
  121. dq The '____' should be included with the -m option.
  122. dr After ____ is finished and before the ____ is established is when logon triggers fire.
  123. ds Multiple logins ____ be mapped to a ____.
  124. dt Statements cannot read data modified but not yet committed and no other transactions can modify data that has been read until current transaction is completed.
  125. du An affinity mask is used for ____ controlling ____ affinity.
  126. dv The ____ password policies are enforced for ____ logins.
  127. dw If you need to provide support for ____, ____ applications, or if you have ____ in place is when you would use SQL Server Authentication.
  128. dx The file extension of trace files
  129. dy Used to instruct SQL Server Agent to execute a job immediately
  130. dz Refers to an exclusive lock on the table
  131. ea ____ and ____ are the two affinity mask options.
  132. eb When there a is particular ____ preventing the server from starting is when you most often use the ____ option.
  133. ec ____ is the ____ state for CHECK_POLICY.
  134. ed Are containers for session requests with similar or identical classification criteria.
  135. ee ____ on the object and select ____ to get information about an objects properties in Management Studio.
  136. ef The ____ is how you update current configured values that have been changed with sp_configure.
  137. eg Used to specify the size of memory that SQL Server can leave available for allocations within the process outside of the Server memory pool
  138. eh There are ____ predefined templates for SQL Server Profiler.