Question types

Start with

Question limit

of 235 available terms

Print test

234 Matching questions

  1. Good candidate for key columns in a non clustered index
  2. Can you change the IDENTITY constraint of an existing column with an ALTER statement?
  3. Collation
  4. COMMIT statement
  5. A bit is the T-SQL integer data type that can take a ___ of 1, 0 or NULL.
  6. Scalar function
  7. Name 3 levels of security supported by SQL Server
  8. What is TRANSACT-SQL
  9. What is DB prototyping?
  11. What is the diffrence between an application role and a database role?
  12. Mark works as a Database Designer for Reon Inc. He is assigned the task to create a database for the company. He issues the following query to create the database.


    What will be the output of the query?
  13. What is the difference between a function and a stored procedure?
  15. .WRITE
  16. SET NOCOUNT statement
  17. Cross Joins
  18. A regular character uses how much storage?
  19. ORDER BY
  20. server-scoped securable
  21. Transact-SQL data types
  22. What is one thing to consider when creating a view?
  23. two major reasons you might want to provide a view instead of enabling users to access the underlying tables in your database:
  24. Grant Execute
  25. SELECT
  26. INSERT
  27. The ___ role gives access to anything on the SQL server, while the ____ role gives full access to a specific database:
  28. Trigger
  29. When is the best time to back up dynamic log files?
  30. The sa account is only used in
  31. Schema
  32. Which of the following statements are true regarding the procedural data manipulation language?
  33. What's the difference between time, date, datetime, datetime2, datetimeoffset and smalldatetime?
  34. What does ANSI SQL syntax refer to?
  36. Name the two types of prototyping
  37. When querying a database you can obtain faster results from properly ______ tables and views.
  38. All users are automatically members of the ______ database role.
  39. The core DDL statements are:
  40. UPDATE clause
  41. What is the UNIQUE constraint?
  42. Tables created using the ________ statement are used to store data.
  44. db_denydatawriter
  45. Databases are often put on database servers for what reason
  46. db_ddladmin
  47. What is the default length for the CAST function?
  48. What does degree refer to?
  49. OLTP(Online Transaction Processing) database
  50. Graphical designers are _________ and are drag-and-drop given.
  51. Which column do you need to set a value for when issuing a INSERT statement?
  52. CHARINDEX function
  53. A stored procedure
  54. What always returns a value but never updates data?
  55. What is the correct way to select an avg of a column?
  56. Table sizes
  57. Advantage of database over spreadsheet
  58. The code DML statements are (5)
  59. DENY
  60. What is the bottom up approach?
  61. What 2 things speeds up data retrieval?
  62. USE
  63. What is a clustered index?
  64. What is abstraction?
  65. A regular character uses ___ bytes of storage, whereas a unicode character requires ____ bytes.
  66. What's the most efficient way to delete all rows from a table?
  67. CREATE
  69. A unicode characters uses how much storage?
  70. What are three things true about views?
  71. A ____ backup contains only the data that has changed since the LAST backup.
  72. When do you pick the DBMS?
  73. Views ensure the security of data by restricting access to the following data
  74. Explicit conversions require you to use
  75. An ___ ____ is the same thing as a CROSS JOIN with a WHERE condition:
  76. UPDATE
  77. De-normailization
  78. in a relational database, data is stored in
  79. composite primary key
  80. For the CHAR data set, it is a _____ length and uses ___ bytes:
  81. Explicit transaction
  82. db_denydatareader
  83. Define 4NF
  84. serveradmin fixed server role
  85. MAX
  86. Implicit Transactions
  87. Inline table
  88. relational database
  89. Which DB design process allows you to create a data model independent of a specific DBMS?
  90. SQL Server utility can view what entities
  91. What prefix must you have in front of a string to use Unicode?
  92. Windows Authentication mode is superior to mixed mode because
  93. Application design involves 2 important activities:
  94. Between statement
  95. index
  96. HAVING clause
  97. The MS database server that hosts relational databases is called _____
  98. MERGE
  99. to search strings in a column
  100. Data Types
  102. Subquery
  103. Which form of database design uses secondary storage media?
  104. three things you need to be sure to identify in your statement to form a proper SELECT query:
  105. Normalization
  106. COLLATE clause
  107. Full Outer Joins
  108. REVOKE
  109. Which normal form ensures that each attribute describes the entity?
  110. What is the primary key?
  111. What command would you use to track changes to a table?
  112. How do you start a transaction?
  113. Any ___ permission will always override a GRANT permission.
  114. The foreign key constraint is a ____ identifier.
  115. What does the IDENTITY constraint do?
  116. Boolean stores what data type?
  117. Use the _____ command to recover data that was accidentally deleted by a user.
  118. hierarchical database
  119. What are the three types of files in SQL?
  120. UPDATE statement
  121. Not null constraint
  122. What would happen if you had a BETWEEN operator of BETWEEN 'D' and 'F'
  123. T/F: Null is a valid constraint
  124. Non Clustered Index
  125. Check constraint
  126. WHERE
  127. What is the With Execute Owner clause?
  128. What is SQLCMD?
  129. What is a non-clustered index?
  130. Function
  131. DELETE syntax
  132. What 3 reasons should you consider using a clustered index?
  133. Partial Backup
  134. If you are querying the same table for two different things you'd use a....
  135. A user-defined function
  136. view
  137. Name 3 things which can be used to improve query performance
  138. JOIN statements
  140. Full-Text index
  141. Which 4 things always have a related data type?
  142. An inline table-valued Function
  143. What are 6 constraint types?
  144. SELECT statement query
  145. database index
  146. What are the three methods for whicha user can be initially identified?
  147. sysindexes
  148. Why is it a bad idea to let a foreign key contain a NULL value?
  149. EXCEPT clause
  151. DEFAULT
  153. Schema-scoped secure-able
  154. A ____ backup contains only the data that has changed since the last FULL backup.
  155. SET clause
  156. In order to use views, you must use the ______ T-SQL statement to show data from the tables.
  157. What clause is required when issuing a UPDATE statement
  158. Name 4 types of decomposition
  159. What is a foreign key?
  160. Table-valued function
  161. covering index
  162. Flat-type databases
  163. What does floating-point store in relation to data types?
  164. What is a fillfactor?
  165. Constraints are also referred to as ____ constraints.
  166. What steps should you take to create full-text searching?
  167. Heap
  168. spatial index
  169. DDL influences _____, while _______ influences actual data stored in tables.
  170. What's the difference between an INNER join and an OUTER join?
  171. How do you gather the size of a file?
  172. RESTORE DATABASE command
  174. Dbcreator
  175. db_backupoperator
  177. what happens when you connect two tables
  178. What language are triggers written in?
  179. If you have already defined a view on a specific table, then you add columns to that table, what must you do to the view?
  180. INTERSECT clause
  181. Setupadmin
  182. Exact numeric data types
  183. Aggregate Functions
  184. Precision (p)
  185. SQL server supports ____ conversions without using actual callout functions CAST or CONVERT
  186. What is a default constraint?
  187. Diskadmin
  188. Cartesian Product
  190. What is represented by a column in a well-designed relational database table
  191. Deterministic function
  193. Some common examples of views include the following:
  194. sysobjects
  195. What happens if data is missing for a particular column when designing the INSERT SQL statement?
  196. Character stores what data type?
  197. ADD
  198. What is the CHECK constraint?
  199. primary drawbacks to using indexes
  200. CREATE INDEX statement
  201. Database objects are divide into two categories:
  202. What is a self-reference?
  203. ALTER
  204. T/F: A single INSERT statement can be used to add rows to multiple tables.
  205. What is the inside-out approach to db design?
  206. STR Function does what?
  207. A clustered index usually _____ performance when inserting data.
  208. CRUD
  209. %
  210. OPTION
  211. How do you adjust indexes to reduce fragmentation from page splits?
  212. DROP
  213. What are 3 characteristics of a simple view?
  214. What command do you use to invoke a stored procedure?
  215. referential integrity
  216. DELETE
  217. What is XQuery?
  218. SQL injection
  219. Define Normal Form
  220. What is a two-phase commit system?
  221. What is the top-down approach?
  222. Define 5NF
  223. How would you set fillfactor?
  224. What is native auditing?
  225. application role
  226. What does the REPLACE function do?
  227. A ____ will combine the results of two or more queries into a resulting set that includes all the rows belonging to the query:
  228. Both the EXCEPT and the INTERSECT statements
  229. STR
  230. You would include a HAVING clause in a query to:
  231. System views belong to the ______
  232. PERSISTENT clause
  233. What command allows a Windows account to access SQL-Server?
  234. A Parameter name must begin with
  1. a Implicit,(automatic)
  2. b Index that includes all columns used in the query. Can optimize performance because the query can be generated from the index without accessing the actual tables involved in the query.
  3. c To automatically assign sequential integer values to a column
  4. d Generates a continuous chain of transactions without stopping until completed
  5. e Ensures domain integrity by ensuring each record has a column value if one is not assigned.
  6. f Can modify the data in permanent tables and return multiple values as output parameters. It doesn't control how underlying data is physically accessed. Can return a value to the caller.
  7. g Used to insert a default value into a column.
  8. h value
  9. i Can create, alter, and drop disk files. This is a Fixed server role
  10. j - Views allow you to limit the type of data users can access. You can grant view permissions in designated tables, and you can also choose to deny permissions for certain information.
    - Views reduce complexity for end users so they don't have to learn how to write complex SQL queries. Instead, you can write those queries on their behalf and hide them in a view.
  11. k is a database-specific role intended to allow an application to gain access regardless of the user.
  12. l returns a result set that contains all the combinations of rows from two tables that do not have a column in common, also know as a Cartesian product. WHERE conditions should always be included.
  13. m users don't need to learn yet another password and because it leverages the security design of the network.
  14. n Creates a SQL Server database object (table, view, or stored procedure)
  15. o Available across all database instances(network)(LOGIN)
  16. p shows line stating the number of rows "affected". This is off by default. This will suppress the '(1 row affected)
  17. q is the process of stepping back through the normalization steps until you get something that is "comfortable". Improves data retrieval performance.
  18. r A column of the uniqueidentifer data type. You need to use the NEWID() function in the values list to generate the value.
  19. s can Configure server -wide settings and issue SHUTDOWN command which immediately stops the SQL server.
  20. t Use BEGIN TRAN
  21. u Database s-scoped secure-able. Created within a database and provides a namespace and a security container for database objects. Each secure-able object must have a unique name
  22. v Integrity between tables using relationships.
  23. w 1 or 0, true or false
  24. x Top-down, Bottom-up, Inside-out, Mixed
  25. y Prevents users of members of a role from performing an action on a secure-able object, such as a view, or stored procedure. even if permission is grated directly through membership in another role.
  26. z MDF = Primary data files, NDF = Secondary data files and LDF = Log files
  27. aa To ensure all child tables are deleted inf the parent is deleted. This can be your FOREIGN KEY constraint.
  28. ab Changes an existing object(changes the object definition)
  29. ac update columns with calculated values
  30. ad Can create, alter,drop, and restore databases
  31. ae Incremental
  32. af can issue DDL commands(statements)(create, alter,drop)
  33. ag Execute
  34. ah One that returns the same predictable value when called with same nvarchar(3500). Meets requirements using least amt of storage. Supports multiple language input parameters.
  35. ai To commit changes made within a manual transaction to the database.
  36. aj physical structure in non clustered index
  37. ak Windows user logon, Membership in a windows group, SQL server logon
  38. al SELECT AVG("column name") FROM "table name"
  39. am 1. If a view definition contains the DISTINCT keyword, rows cannot be deleted through the view.
    2. The WITH OBJECT IDENTIFIER clause is used to specify a top level (root) object view.
    3. The OR REPLACE option is used to change the definition of a existing view without dropping and recreating.
  40. an is simplistic in design. They are two dimensional tables that are consisting to rows and columns. for fast searches.
  41. ao @
  42. ap used to ensure that no changes to the underlying data can be made through the view that would cause data no to conform to the definitions of the view.
  44. ar the functions cast or convert specifically.
  45. as Modifies a table definition by altering, adding, or dropping columns and constraints, reassigning partitions or disabling or enabling constraints and triggers.(cannot change IDENTITY constraint)
  46. at A method of coding that enables a user to focus on the coding rather than the syntax for a specific database API, allowing them to use generic methods of access as long as they have the additional codes or libraries which fill in the blanks.
  47. au are the most common SQL Server data types used to store numeric information.
  48. av (table scoped object and not securable) is a data structure that improves the speed of data retrieval operations on a database table. The disadvantage of indexes is that they need to be created and updated,.
  49. aw occurs when you define more than one column as your primary key.
  50. ax Creates a full-text index on a table or indexed view in a database. Only one full-text index is allowed per table or indexed view, and each full-text index applies to a single table or indexed view
  51. ay gives you the final result set where data exists in the first query and not in the second dataset.
  52. az 2 bytes, This allows 65,536 characters at almost any language.
  53. ba 1 byte, 256 possible characters.
  54. bb 1. It does not have any usage of SQL group functions or grouping of data.
    2. DML operations are allowed on the view
    3. It fetches data from one database table only
  55. bc Specifically identifies which column should not contain duplicate values.
  56. bd ensures the tables in the DB and the indexes are correctly linked.
  57. be • A subset of rows or columns of a base table
    • A union of two or more tables
    • A join of two or more tables
    • A statistical summary of base tables
    • A subset of another view or some combination of views and base tables
  58. bf A-z or 0-9(any digit or letter that math functions will not be applied to)
  59. bg 2nf
  60. bh Unique, Check(domain Integrity), Default(domain integrity), Not Null, Primary Key(entity integrity), Foreign Key(referential integrity)
  61. bi is similar to a tree structure (such as a family tree). Each parent table can have multiple children, but each child table can have only one parent.
  62. bj Adds one or more new rows to a table or a view in SQL Server. Must contain a table or view name into which to insert the data. Can be used to insert explicit values into a table or to insert the result set returned by a query into a table.
  63. bk Backup copy of only specific file groups.
  64. bl used to ensure that none of the tables references by the view are dropped or have their structure changes such that the view would not function properly. Cannot use asterisk in SELECT list., must specify column by name
  65. bm used to specify query hints that will allow for optimization of a query's execution.
  66. bn To cause the result set to be sorted by the value in a specific column or columns. Not allowed in a CREATE VIEW Statement.
  67. bo so that they can be accessed by multiple users and provide a higher level of performance. One popular database server is Microsoft SQL Server.
  68. bp • Columns to retrieve
    • Tables to retrieve the columns from
    • Conditions, if any, that the data must satisfy
  69. bq used to create a user-defines data type or an alias data type.
  70. br Retrieves rows from the database and enables the selection of one or many rows or columns from one or many tables in SQL Server.
  71. bs preserves the unmatched rows from the second (right) table, joining them with a NULL in the shape of the first (left) table
  72. bt transaction design and interface design
  73. bu Function returns the maximum value of an expression(IE: The maximum salary of all employees)
  74. bv Returns character data converted from numeric data. The second parameter is for the total length of the output including the decimal point, signs, digits, and spaces. output is round as specified in the third parameter.
  75. bw huge numbers(way bigger than millions) = bigint
    Big numbers= int(-2,147,483,648 to 2,147,483,647)Can store dates YYYYMMDD(4 bytes)
    small numbers = smallin(-32768 to 32,767 however req 2 bytes of space)
    smaller numbers = tinyint(max value of 255 with minimum storage 1 byte)
    lots of text = varchar(expands as needed) YYYYMMDD(8 bytes)
    text containing Unicode symbols(diff language or symbols) = nvarchar
    currency = smallmoney(-214,748.3648 to 214,748.3647 (4 decimal places))
    yes/no = bit(value of 0,1 or null)
    Float = precision and scale(best for finding percent %)
    decimal(3) - 5 bytes
  76. bx removes user access rights or privileges on the database objects granted using the GRANT statement, but does not prevent permissions from being obtained through membership in other roles.
  77. by Database objects, DML
  78. bz INNER will only produce matching rows from both tables while OUTER will join all rows from both tables whether they match or not.
  79. ca Large amount of selects on a table, create a clustered index on the primary key of the table. This index should be the most common column that is in your WHERE clauses for queries against this table. So if most of the time you search by primary key, then leave it as the default. But if you search by DateCreated or LastName most of the time on this table, then you might want to consider changing the clustered index to this column instead. Each table can only have 1 clustered index. (faster searching)
  80. cb SELECT
  82. cd Database can parse out redundant storage and information obtained from various relational spreadsheets.
  83. ce Is optimized to handle a large number of simultaneous updates additions and deletions.
  84. cf It requires users to specify which data is needed and how to obtain it, it is a low-level DML, it requires users to know the data structure used in the db.
  85. cg Isolate semantically related multiple relationships
  86. ch A select statement that is nested within another SQL statement.
  87. ci Removes rows from a table or view(, which deletes data from within a table) Use for smaller databases
  88. cj Storage and Programmability
  89. ck No
  90. cl Multiple tables that are related using primary and foreign keys
  91. cm Time is the 24 hr clock without time zone awareness(Minimizes storage but can store time the includes hours, minutes, seconds but not fractional seconds.)
    Date is used to define 1/1 to 12/31 9999
    Datetime is accurate to .00333 seconds(1/1 1753 to 9999)
    datetime2 is accurate up to 100 nanoseconds
    datetimeoffset includes daylight savings time
    smalldatetime(1\1 1900 to june 6, 2079)(2 bytes) does not keep track of seconds.(cant use neg numbers)
    Time(3) stores fractional seconds, however increases storage space.
    timestamp - is uses for row versioning, not to store time data.
  92. cn is simply a virtual table consisting of different columns from one or more tables. Unlike a table, a view is stored in a database as a query object; therefore, a view is an object that obtains its data from one or more tables. View is a database object that can be used in SELECT queries just like a table. When a view contains a join, DML can be preformed but only a single base table.
  93. co used in a UPDATE statement when you need to update the values of columns that have a large object data type such as varchar(max) or varbinary(max) columns.
  94. cp 1NF - Eliminate duplicative columns from the same table.
    -Create separate tables for each group of related data and identify each row with a unique column (the primary key).
    2NF - Move repeating fields into a new table that contains a primary key, and relate it back to the old table using a foreign key. (requirement that each field value in a table is associated with only one row)
    3NF - Eliminate columns not- transitively dependent (useless) on key
    4NF - all in table are dependent on superkey
    5NF - every join is implied by superkeys of the table
  95. cq refers to a set of rules that determine how data is sorted and compared. By default, SQL Server has predefined collation precedence. If you wish to override how data is being sorted, you must use a collation clause.
  96. cr Breaking down the smaller components so that each describes a basic fragment.
  97. cs N
  98. ct The number of columns.
  99. cu An explicit transaction is one where all events of the transaction either happen together or they don't take place at all.
  100. cv , which combine columns from multiple different tables. JOIN statements can be specified in either the FROM or the WHERE clause, but it is recommended that you specify them in the FROM clause.
  101. cw Use the CREATE or REPLACE VIEW command to redefine it.
  102. cx A database will be created.
  103. cy You would get all values for D, E but not F. (MUST HAVE AND IN BETWEEN STATEMENT)
  104. cz Primary key constraints and Clustered indexes
  105. da valued function includes only a single SELECT statement.
  106. db A relational database is similar to a hierarchical database in that data is stored in tables and any new information is automatically added to the table without the need to reorganize the table itself. Minimizes the amount of redundant data stored in the database. database can have multiple parents.
  107. dc • Specific rows of tables
    • Specific columns of tables
    • Specific rows and columns of tables
    • Rows obtained by using joins
    • Statistical summaries of data in given tables
    • Subsets of another view or subsets of views and tables
  108. dd is used to obtain only subset of rows that fulfill criterion in the WHERE clause
  109. de DML or DDL
  110. df Requirements and Evolutionary
  111. dg Changes existing data in one or more rows in a table or view(changes the data in the table)
  112. dh used to optimize operations that use spatial data types, such as geometry and geography data types.
  113. di includes a row for each possible combination of results from the other tables. the number of rows returned will equal the number of rows in one table multiplied by the number of rows in the other table.
  114. dj The INSERT statement uses the default value for the column.
  115. dk Object-Oriented
  116. dl This is the primary means of programming and manageing SQL Server. When you use an SSMS to perform an action, it is using T-SQL commands in the background to do the work.
  117. dm Changes the database context
  118. dn Public
  119. do CREATE LOGIN
  120. dp Differential
  121. dq A DDL statement used to remove objects, such as tables, views, stored procedures, and triggers , from a database.
  122. dr can be used with a previously taken full backup to recover a database. you can add a NO RECOVERY clause if you plan to apply a transaction log of differential backup as part of your recovery process.
  123. ds returns all rows from the left table (table1) and from the right table (table2).
  124. dt Must have AND; can only admit two expressions(between(10000 and 50000)) cant add another between(10000 and 50000) and (60000 and 90000)
  125. du must contain a RETURNS clause and a RETURN statement.
  126. dv Returns a single value, based on the input value of a single field(EX: UCASE - Returns the value of the field in all upper case).
  127. dw False
  128. dx A function
  129. dy TRUNCATE command; does not log each row
  130. dz UNION; without any duplicates. Duplicates require UNION ALL.
  131. ea It specifies a percentage that indicates how much free space will be in the leaf level of each index page.
  132. eb Gives a database user or group(defined with a role) specific permissions to data objects. Uses ON clause preceding it.
  133. ec is a database object that can accept values, perform a calculation and return the result to the caller. Can be directly referenced using a SELECT statement.
  134. ed allows you to modify data stored in tables using data attributes. Note: If you don't specify what records to update, all records or rows will be updated with the new value. To update another table use FROM clause. In this, SET specifies column to be updated.
  135. ee Isolate independent multiple relationships
  136. ef to filter the results grouped by a GROUP BY clause. Can only reference aggregate functions or column that are also specified in the GROUP BY clause.
  137. eg A SQL procedure that initiates an action when an event(INSERT, DELETE or UPDATE) occurs.
  139. ei Performs insert, update, or delete operations on a target table based on the results of a join with a source table.
  140. ej Can read from any table in the database, this deny will override an object-level grant
  141. ek sys schema
  142. el Prior to the Logical design phase.
  143. em returns when there is at least one match in both tables.
  144. en are the time it takes to build the indexes and the storage space the indexes require. Note: each table can have only one clustered index , data can be sorted in only one way.
  145. eo contains one row for each index and table in the database.
  146. ep Column, localvariable, expression and parameter.
  147. eq When creating a stored procedure, this can be used to allow the person running the SP to have the same permissions as the person who owns the SP. This is better than granting SELECT to the user.
  148. er A reserved Keyword and cannot be used as a object name or column name in a table unless delimited. Add is used to add a new column in a alter table statement.
  149. es indexed
  150. et used to define a clustered or non clustered index.
  151. eu Allows the admin to limit the types of data a user can insert into that column of the database.
  152. ev Would prevent a parent row from being deleted if it had a related child rows in another table.
  153. ew Non-clustered indexes are not copies of the table but a sorting of the columns you specify that "point" back to the data pages in the clustered index. Add non-clustered indexes for queries that return smaller result sets
  154. ex contains one row for each function, constraint or trigger created within a database. Indexes are not stored in this table(sysindexes).
  155. ey You can identify and delete individual rows from the database
  156. ez When the foreign key refers to columns in the same table.
  157. fa Blocks modifying data in any table in the database. Will override any object-level grant
  158. fb Column; limitations or rules placed on a field or column to ensure that data that is considered invalid is not entered.
  159. fc Command will remove a windows user or group from the SQL server. This will not alter Windows its self
  160. fd A database role is assigned to users
  161. fe the primary key is replicated from the primary to secondary table, and all the key attributes duplicated from the primary table are known as the foreign key.
  162. ff series of steps(or rules) called "forms" the more steps you take, the more normalized your tables.
  163. fg Real numbers
  164. fh UNION
  165. fi allows you to limit the types of data a user can insert into a the database and that they meet a certain condition.
  166. fj Set the fillfactor to 60.
  167. fk Database performance
  168. fl 30
  169. fm A function can be directly referenced in a select statement, and return only a single scalar or table vaule.
  170. fn False, NULL is not a constraint
  171. fo This uniquely identifies a column in the db. Has to have a unique constraint by default. Cannot be Null and data type must match. Ensures entity integrity(Uniquely id each row). Not always created as CLUSTERED indexes if one is already made.
  172. fp SET
  173. fq A primary key, a UNIQUE index and a CLUSTERED index
  174. fr worsens, because it's constantly sorting it. Improves it for retrieving it though. Physical sort. Only 1 per table.
  175. fs gives you the final result set where values in both of the queries match by the query on both the left and right sides of the operand.
    • The number and order of the columns must be the same in all queries.
    • The data types must be compatible.
  176. ft Logical DB design
  177. fu 1MB = 1024KB
    1 record is 165 bytes - Multiply by amt of records.
  178. fv to specify sorting rules that are different than those used for other columns in the table.
  179. fw can perform backups, checkpoints, and DBCC commands, but not restores(only sysadmins can perform restores)
  180. fx (stored procedure)one that is created within a schema and can receive permissions through that schema.
  181. fy When the server is stopped.
  182. fz A code injection technique that exploits security vulnerabilities in the DB layer of an application.
  183. ga 1. Create a full text catalog in the database
    2. Create a full text index on the column in question
  184. gb Selects data and returns the results as a table. Cannot modify any permanent tables.
  185. gc Includes only a single SELECT statement. Can accept parameters.
  186. gd Grammar and rules governing the structure and content of statements.
  187. ge replaces all occurrences of the second given string in the first string expression with a third expression(SELECT REPLACE('The best TTS Solution','s','z') - The bezt TTZ ..
  188. gf Instances of SQL server, Data-Tier apps, Databse Files, Volumes
  189. gg Relationship; Enforces referential integrity
  190. gh MS SQL Server
  191. gi to create a computed column that can be included in an index.
  192. gj Fixed, N
  193. gk To check all pages in a DB are correctly allocated
  194. gl Server, Database and Table
  195. gm A query and functional programming language designed to query collections of XML data.
  196. gn In computer programing, create, read, update and delete (CRUD)are the four basic functions of persistent change
  197. go It's used on the primary key to automatically start with 1 and auto-increment by 1.
  198. gp Columns frequently uses as a query join conditions.
  199. gq returns character data converted from numeric data.
  200. gr returns the starting position of the specifies expression in a character string. The third parameter of the function is the character position to start searching for the first parameter in the second parameter. If starting ocation is a negative number, search starts at beginning of second parameter.
  201. gs Because it may be impossible to verify the constraints if a foreign key consists of two or more columns if one of them is NULL.
  202. gt lets you produce individual lists, but the result may be that you get all the information you need but in an individual list format.
  203. gu is the maximum total number of decimal digits that can be stored in a numeric data type, both to the left and to the right of the decimal point; this value must be at least 1 and at most 38. The default precision number is 18.
  204. gv A feature of a transaction processing system which enables DB's to be returned to the pre-transaction state if some error condition occurs. All databases are updated or none of them are.
  205. gw When a schema is created through a series of successive refinements, starting with the first schema.
  206. gx is a data structure that improves the speed of data retrieval operations on a database table.
  207. gy Restore
  208. gz mixed-mode
  209. ha Checks all tables file group for any damage
  210. hb Building a working model of the DB system in order to suggest improvements or add new features.
  211. hc sysadmin, db_owner
  212. hd 1. Columns contain a large number of distinct values
    2. Columns are accessed sequentially
    3. Queries return large result sets
  213. he A type of bottom-up approach, the inside-out method begins with identifying a few important concepts then proceeds outward radially.
  214. hf The LIKE operator is used together with the % wildcard character
  215. hg ensures that data is entered in to a cell(cant be blank).
  216. hh A command line application that comes with SQL and exposes the management features of SQL Server. It allows SQL queries to be written and executed from the command prompt.
  217. hi ALTER TABLE tablename
  218. hj one, two
  219. hk 1MB - 1024 KB - 1 field - 165 bytes. a 100k table - = 16113.28125 kb(15.73563 mb)
  220. hl filter the results grouped by a GROUP BY clause.
  221. hm Physical database design
  222. hn DENY
  223. ho INNER JOIN
  224. hp The process of extracting trails on a regular basis so they can be transferred to a designated security system where the database admins do not have access, this ensures a certain level of separation of duties and provides evidence that the audit trails were not modified.
  225. hq Non-clustered indexes are not copies of the table but a sorting of the columns you specify that "point" back to the data pages in the clustered index. Add non-clustered indexes for queries that return smaller result sets. (Optimal Performance)
  226. hr Wild Card character(IE: WHERE lastname LIKE 'J%'); LIKE operator is used with %
  227. hs Can configure linked servers, extend stored procedures and the start-up stored procedure. This is a Fixed server role
  228. ht are designed to return distinct values by comparing the results of two queries.
  229. hu This is a column in one table that points to the primary key in another table(defines relationship between two tables). Ensures domain and referential integrity, not entity integrity. There is not a predefined limit for foreign keys.
  230. hv The function of the is to change data in a table or view
  231. hw ALTER INDEX ALL ON dbo.OrderDetails REBUILD WITH (FILLFACTOR = 60);
  232. hx Return a single value, calculated from values in a column. Ex. COUNT
  233. hy bit, decimal and numeric. Transact-SQL data types that have a fixed precision and scale. money and smallmoney are Transact-SQL data types you would use to represent monetary or currency values.
  234. hz A single entity attribute