Term
| SQL Server Analysis Services (SSAS): |
|
Definition
| online analytical processing (OLAP) and data mining; enables you to work with aggregated data from multiple sources |
|
|
Term
| SQL Server Integration Services (SSIS): |
|
Definition
| for extracting and transforming data from multiple sources and moving it to one or more destination data sources for data warehouses, data marts, etc. |
|
|
Term
|
Definition
Report Manager and Report Server for creating, managing, and distributing reports; built on IIS and .NET Framework technology |
|
|
Term
|
Definition
| provides reliable queuing and messaging as a central part of the database; allows queries to be stacked and performed as resources allow; delivers notification messages |
|
|
Term
|
Definition
| enables data synchronization for collaboration and offline use |
|
|
Term
| Where are files stored in filestream? |
|
Definition
| Files are stored in a folder on the OS, but are linked directly into a database |
|
|
Term
| what property do you use to designate a filegroup to be used for unstructured data? |
|
Definition
| the CONTAINS FILESTREAM property |
|
|
Term
| what does the filestream.hdr file do? |
|
Definition
| a system file used to manage files written to the folder in FILESTREAM |
|
|
Term
| DBCC CHECKDB, what does it do? |
|
Definition
| use this command to read every page from disk and check integrity |
|
|
Term
| DBCC CHECKDB, if integrity error is found in index |
|
Definition
|
|
Term
| DBCC CHECKDB, If integrity error is found in table |
|
Definition
|
|
Term
| What three commands does DBCC CHECKDB execute? |
|
Definition
1. DBCC CHECKALLOC: checks page allocation of the DB 2. DBCC CHECKCATALOG: checks the DB catalog 3. DBCC CHECKTABLE: checks each table and view in the DB for structural integrity |
|
|
Term
| Transaction Logs, when a transaction has been committed, the change must be ________________ |
|
Definition
| hardened to persistent storage |
|
|
Term
| Maximum transaction throughput for any database is bound by the amount of data per second that can be written to the ___________ |
|
Definition
|
|
Term
| When is the only time that data is read from the transaction log? |
|
Definition
|
|
Term
Put these in order: Transaction Log, Buffer, Data Files |
|
Definition
| Buffer > Transaction Log > Data File |
|
|
Term
| What are the three types of recovery models? |
|
Definition
1. Full 2. Bulk-logged 3. Simple |
|
|
Term
| Which Recovery Model allows you to retrieve data from any given point in time? |
|
Definition
|
|
Term
| Which recovery model has the least amount of data loss? |
|
Definition
|
|
Term
| in Full Recovery, when are changes to the transaction log removed? |
|
Definition
| execution of a transaction log backup |
|
|
Term
| Which Recovery model is used most for OLTP (online transaction processing) DBs |
|
Definition
|
|
Term
| Which recovery model uses minimal logging |
|
Definition
| Bulk-logged Recovery Model |
|
|
Term
| BCP and Bulk Insert are used in what Recovery Model |
|
Definition
| Bulk-logged Recovery Model |
|
|
Term
| Which recovery models cannot recover to a given point in time? |
|
Definition
|
|
Term
| In the Simple Recovery model, what happens to the transaction log once it's committed |
|
Definition
| It is immediately discarded |
|
|
Term
| T or F, you can recover to a specific point in time using Simple Recovery Model |
|
Definition
|
|
Term
| What command do you use to set the recovery model |
|
Definition
|
|
Term
| how many pages are in an Extent? |
|
Definition
|
|
Term
| How many kilobytes does a page hold? |
|
Definition
|
|
Term
| Full text indexes allow you to work with unstructured data in what 3 types of columns? |
|
Definition
1. Filestream 2. XML 3. Large Character |
|
|
Term
| For Data Protection, Data should use RAID _______ |
|
Definition
|
|
Term
| For Data Protection, Data should use RAID _______ |
|
Definition
|
|